Abstract

Underwater Wireless Sensor Networks (UWSN) is widely used in variety of applications but none of the applications have taken network security into considerations. Deployment of underwater network is a challenging task and because of the hash underwater environment, the network is vulnerable to large class of security attacks. Recent research on underwater communication focuses mainly on energy efficiency, network connectivity and maximum communication range. The nature of underwater sensor network makes it more attractive for the attackers. One of the most serious problems in underwater networks is wormhole attack. In this research work we concentrate on providing security to the underwater network against wormhole attacks. We introduce the wormhole attack in the network and propose a solution to detect this attack in underwater wireless networks. Energy Efficient Hybrid Optical - Acoustic Cluster Based Routing Protocol (EEHRCP) is incorporated and using the round trip time and other characteristics of wormhole attack, the presence of the wormhole attack in the network is identified. The simulation results depicts that the proposed wormhole detection mechanism increases throughput by 26%, reduces energy consumption by 3%, reduces end to end delay by 13% and increases packet delivery ratio by 3%.

Highlights

  • Underwater Wireless Sensor Networks (UWSN) are used for variety of applications like military, pollution monitoring, disaster maintaining etc

  • In this research work we propose a methodology for identifying the wormhole attack in UWSN

  • One of the applications of underwater communication is military where the secret information is sent through underwater nodes, so security is the important feature that needs to be considered

Read more

Summary

INTRODUCTION

UWSN are used for variety of applications like military, pollution monitoring, disaster maintaining etc. UWSN are vulnerable to large kind of attacks These attacks can be classified as data security attacks, Denial of Service (DOS) attack, replication attack and physical attacks [3]. Jamming: It is a type of DoS attack where the intruder disturbs communication by corrupting valid packets or by sending excess packets in order to drain the energy level of the nodes. Sybil attack: In this type to attack the attacked node appears at different locations at a particular time instance This attack degrades the routing technique used in the network. In this research work we propose a methodology for identifying the wormhole attack in UWSN. To identify the intruder node that performs wormhole attack in the network.

RELATED WORK
Environment Settings
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.