Abstract




 
   

IJE TRANSACTIONS A: Basics Vol. 31, No. 10 (October 2018) 1659-1665   

downloaded Downloaded: 47   viewed Viewed: 490

  A SECURE ROUTING ALGORITHM FOR UNDERWATER WIRELESS SENSOR NETWORKS
 
M. Ahmadi and S. M. Jameii
 
( Received: February 11, 2018 – Accepted in Revised Form: August 17, 2018 )
 
 

Abstract    Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet delivery. A few researches have been done on secure routing in UWSNs. In this article, a new secure routing algorithm called Secure Routing Algorithm for Underwater (SRAU) sensor networks is proposed to resist against wormhole and sybil attacks. The results indicate acceptable performance in terms of increasing the packet delivery ratio regarding the wormhole and sybil attacks, increasing network lifetime through balancing the network energy consumption, high detection rates against the attacks, and decreasing the end to end delay.

 

Keywords    Underwater wireless sensor networks, security, routing, wormhole and sybil attacks.‎

 

چکیده   

اخیرا شبکه های حسگر بی سیم زیر آب توجه بسیاری از محققین را به خود جلب کرده است و ارتباطات صوتی نیز در طی سه دهه اخیر پیشرفت سریعی داشته است. یکی از مسائل اضلی در شبکه های حسگر بی سیم زیر آب این است که چگونه داده از گره متحرک به ایستگاه پایه ارسال شود و مسیر بهینه برای ارسال داده انتخاب شود. مسیریابی امن در شبکه های حسگر بی سیم زیر آب برای تحویل بسته ها الزامی است. تحقیقات اندکی روی بحث مسیریابی امن در این نوع شبکه ها صورت گرفته است. در این مقاله، یک الگوریتم مسیریابی امن جدید بنام SRAU ارائه می شود که در مقابل حملات wormhole و sybil مقاوم است. نتایج شبیه-سازی نشاندهنده کارایی قابل قبول روش پیشنهادی با توجه به معیارهای نرخ تجویل بسته، طول عمر شبکه و مصرف متوازن انرژی، نرخ تشخیص حملات و تاخیر انتها به انتها است.

References   

1. Ribeiro, F.J.L., Pedroza, A.d.C.P. and Costa, L.H.M.K., "Underwater monitoring system for oil exploration using acoustic sensor networks", Telecommunication Systems,  Vol. 58, No. 1, (2015), 91-106.
2. Li, X., Han, G., Qian, A., Shu, L. and Rodrigues, J., "Detecting sybil attack based on state information in underwater wireless sensor networks", in Software, Telecommunications and Computer Networks (SoftCOM), 2013 21st International Conference on, IEEE., (2013), 1-5.
3. Du, X., Peng, C. and Li, K., "A secure routing scheme for underwater acoustic networks", International Journal of Distributed Sensor Networks,  Vol. 13, No. 6, (2017), doi: 10.1177/1550147717713643.
4. Bharamagoudra, M.R. and Manvi, S.S., "Agent‐based secure routing for underwater acoustic sensor networks", International Journal of Communication Systems,  Vol. 30, No. 13, (2017), e3281.
5. Dargahi, T., Javadi, H.H. and Shafiei, H., "Securing underwater sensor networks against routing attacks", Wireless Personal Communications,  Vol. 96, No. 2, (2017), 2585-2602.
6. Ateniese, G., Capossele, A., Gjanci, P., Petrioli, C. and Spaccini, D., "Secfun: Security framework for underwater acoustic sensor networks", in Proceedings of MTS/IEEE OCEANS. (2015), 1-9.
7. Basagni, S., Petrioli, C., Petroccia, R. and Spaccini, D., "Carp: A channel-aware routing protocol for underwater acoustic wireless networks", Ad Hoc Networks,  Vol. 34, (2015), 92-104.
8. Gomathi, R. and Manickam, J.M.L., "Energy efficient shortest path routing protocol for underwater acoustic wireless sensor network", Wireless Personal Communications,  Vol. 98, No. 1, (2018), 843-856.
9. Bu, R., Wang, S. and Wang, H., "Fuzzy logic vector–based forwarding routing protocol for underwater acoustic sensor networks", Transactions on Emerging Telecommunications Technologies,  Vol. 29, No. 3, (2018), doi: 10.1002/ett.3252.
10. Taghizadeh, S. and Mohammadi, S., "Lebrp-a lightweight and energy balancing routing protocol for energy-constrained wireless ad hoc networks", International Journal of Engineering-Transactions A: Basics,  Vol. 27, No. 1, (2013), 33-38.
11. Pouyan, A. and Yadollahzadeh Tabari, M., "Estimating reliability in mobile ad-hoc networks based on monte carlo simulation", International Journal of Engineering,  Vol. 7, No. 5, (2014), 739-746.
12. Zhang, R., Sun, J., Zhang, Y. and Huang, X., "Jamming-resilient secure neighbor discovery in mobile ad hoc networks", IEEE Trans. Wireless Communications,  Vol. 14, No. 10, (2015), 5588-5601.
13. Zhang, Y., Liu, W., Lou, W. and Fang, Y., "Location-based compromise-tolerant security mechanisms for wireless sensor networks", IEEE Journal on Selected Areas in Communications,  Vol. 24, No. 2, (2006), 247-260.
14. Heinzelman, W.R., Chandrakasan, A. and Balakrishnan, H., "Energy-efficient communication protocol for wireless microsensor networks", in System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on, IEEE., (2000), doi: 10.1109/HICSS.2000.926982.





International Journal of Engineering
E-mail: office@ije.ir
Web Site: http://www.ije.ir