Underwater Wireless Sensor Networks : Security

Issues

 

 

 

 

 

Sihem Souiki

Maghnia Feham

Mohamed Feham

Benamar Kadri

STIC Laboratory

STIC Laboratory

STIC Laboratory

STIC Laboratory

University of Tlemcen,

University of Tlemcen,

University of Tlemcen,

University of Tlemcen,

Algeria

Algeria

Algeria

Algeria

sihemCette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.

Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.

Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.

Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.

 

 

 

 

 

Abstract—  Underwater  wireless  Sensor  Network (UWSN)  is  a novel network paradigm that is being proposed to explore, monitor and protect the oceans. Underwater Wireless sensor networks are composed of large number of tiny sensor nodes, static or dynamic (AUV) which usually communicate using the acoustic channel, and in various cases, with none access to renewable energy resources. The security task being fundamental to the acceptance and employ of underwater sensor networks for numerous applications; also different set of challenges in UWSN are existed, However, most of the proposed algorithms have given little attention to the related security issues. In this paper we have focused   on   security   issues   of   Underwater   Wireless   Sensor Network and have provided the direction of research towards effective defenses against the threats posed by these issues.

 

Keywords—UWSN; security threats; attacks and attackers.

 

I.      INTRODUCTION

In recent years, underwater wireless sensor network (UWSN) has emerged as a powerful technique in order to discover and exploit this harsh environment. The UWSN is mainly designed to  provide  several  categories of  applications which  can  be Scientific  applications  to  observe  the  environment:  from geological processes on the ocean floor, to water characteristics (temperature,  salinity,  oxygen  levels,  bacterial  and  other pollutant  content,etc.)  to  counting  or  imaging  animal  life (microorganisms, fish, or mammals). Industrial applications to monitor and control commercial activities, such as underwater equipment  related  to  oil  or  mineral  extraction,  underwater pipelines, or commercial fisheries. Industrial applications often involve control and actuation components as well. Military and homeland   security   applications   to   involve   securing   or monitoring  port  facilities  or  ships  in  foreign  harbors,  de- mining, and communication with submarines and divers [1]. Some of these applications require real time information and this transmitted information can affect life or death decisions. Simple and effective security mechanism is a major problem of deploying UWSN. Without security, an underwater wireless sensor networks is wide open to a number of attacks which can be divided into two kinds: one is the natural destroy, such as the harsh circumstances of the network ; the second is from

 

hostile   attacks,   which   are   performed   purposely   by   the adversary [2], thereby causing damages and disaster. Underwater  acoustic  sensors  networks  are  incorporated  by distributed  sensors  and   autonomous  underwater  vehicles (AUVs),  which  are  capable  of  forming  self  organizing networks  with  no  prior  knowledge  of  each  other,  whose security level is very low and they are the most vulnerable part of  the  network  which  can  be  attacked  easily.  This  makes security a factor of major concern in building such networks. The remainder of the paper is organized as follows. In section

2, an overview on underwater wireless sensor networks are presented. Section 3 various limitations of UWSN security are

discussed. Section 4 presents the security requirements in UWSN. Section 5 discusses various attacks that can be launched on UWSN. In Section 6 we highlight some future directions and research challenges in UWSN security. Finally,

the paper closes with a conclusion in Section 7.

 

 

télécharger l'article