Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3366486.3366511acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
short-paper

Active Jamming for Eavesdropping Prevention in Underwater Wireless Networks

Published: 13 February 2020 Publication History

Abstract

To protect the Underwater Wireless Networks (UWNs) from eavesdroppers, conventional wisdom is to employ encryption algorithms. In this paper, we propose an encryption-less mechanism to protect the underwater network from eavesdropping. We utilize jamming signals as a countermeasure to eavesdropping and adopt a coordinated multi-point (CoMP) communication based method to protect the intended receiver. We present the basic design of the system and a quantitative analysis on the factors affecting the performance. The preliminary results indicate that our proposed method protects the network spanning large geographic area.

References

[1]
Ian F. Akyildiz, Dario Pompili, and Tommaso Melodia. 2005. Underwater Acoustic Sensor Networks: Research Challenges. Ad Hoc Networks, 3, 3, 257--281.
[2]
Jun-Hong Cui et al. 2006. Challenges: Building Scalable Mobile Underwater Wireless Sensor Networks for Aquatic Applications. IEEE Network, 20, 3, 12--18.
[3]
Huacheng Zeng et al. 2014. Shark-ia: an interference alignment algorithm for multi-hop underwater acoustic networks with large propagation delays. WUWNET 2014, (November 2014).
[4]
H. Kulhandjian, T. Melodia, and D. Koutsonikolas. 2014. Securing underwater acoustic communications through analog network coding. In SECON'14, 266--274.
[5]
C. Wang and Z. Wang. 2016. Signal alignment for secure underwater coordinated multipoint transmissions. IEEE Transactions on Signal Processing, 64, 23, 6360--6374. issn: 1053-587X.
[6]
Michael Zuba et al. 2015. Vulnerabilities of Underwater Acoustic Networks to Denial-of-Service Jamming Attacks. Wiley Security and Communication Networks, 8, 16, 2635--2645.
[7]
Michael Zuba et al. 2011. Launching Denial-of-Service Jamming Attacks in Underwater Sensor Networks. In WUWNet'11.
[8]
R. Irmer et al. 2011. Coordinated multi-point: concepts, performance, and field trial results. IEEE Communications Magazine, 49, 2, 102--111. issn: 0163-6804.
[9]
S. Bassoy et al. 2017. Coordinated multi-point clustering schemes: a survey. IEEE Communications Surveys Tutorials, 19, 2, 743--764. issn: 1553-877X.
[10]
A. F. Molisch, M. Z. Win, and J. H. Winters. 2002. Space-time-frequency (stf) coding for mimo-ofdm systems. IEEE Communications Letters, 6, 9, 370--372. ISSN: 1089-7798.
[11]
S. Fu et al. 2017. Energy-efficient precoded coordinated multipoint transmission with pricing power game mechanism. IEEE Systems Journal, 11, 2, 578--587. issn: 1932-8184.
[12]
J. Xie and S. Ulukus. 2012. Secure degrees of freedom of the gaussian wiretap channel with helpers. In 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 193--200.
[13]
Milica Stojanovic and James Preisig. 2009. Underwater Acoustic Communication Channels: Propagation Models and Statistical Characterization. IEEE Communications Magazine, 47, 1, 84--89.

Cited By

View all
  • (2022)A Geometry-Based Game Theoretical Model of Blind and Reactive Underwater JammingIEEE Transactions on Wireless Communications10.1109/TWC.2021.312345421:6(3737-3751)Online publication date: Jun-2022
  • (2021)Enhancing Underwater Sensor Network Security with Coordinated CommunicationsICC 2021 - IEEE International Conference on Communications10.1109/ICC42927.2021.9500758(1-6)Online publication date: Jun-2021

Index Terms

  1. Active Jamming for Eavesdropping Prevention in Underwater Wireless Networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    WUWNet '19: Proceedings of the 14th International Conference on Underwater Networks & Systems
    October 2019
    210 pages
    ISBN:9781450377409
    DOI:10.1145/3366486
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 February 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Coordinated Multi-Point
    2. Security
    3. Underwater Wireless Network

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Conference

    WUWNET'19

    Acceptance Rates

    Overall Acceptance Rate 84 of 180 submissions, 47%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Geometry-Based Game Theoretical Model of Blind and Reactive Underwater JammingIEEE Transactions on Wireless Communications10.1109/TWC.2021.312345421:6(3737-3751)Online publication date: Jun-2022
    • (2021)Enhancing Underwater Sensor Network Security with Coordinated CommunicationsICC 2021 - IEEE International Conference on Communications10.1109/ICC42927.2021.9500758(1-6)Online publication date: Jun-2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media