Username   Password       Forgot your password?  Forgot your username? 

SDBR: A Secure Depth-Based Anonymous Routing Protocol in Underwater Acoustic Networks

Volume 13, Number 5, September 2017 - Paper 16  - pp. 731-741
DOI: 10.23940/ijpe.17.05.p16.731741

Chunyan Peng, Xiujuan Du*

School of Computer Science and Technology, Qinghai Normal University, Xining 810008, Qinghai,  China

(Submitted on April 5, 2017; Revised on June 21, 2017; Accepted on August 20, 2017)

Abstract:

Underwater Acoustic Networks (UANs) adopt acoustic communication. The opening and sharing features of underwater acoustic channel make communication in UANs vulnerable to eavesdropping and interfering, and UANs appeal for higher security. This paper presents a secure and depth-based anonymous routing (SDBR) protocol tailored for UANs. Based on bilinear pairings and hash function, by involving limited computation and communication resources, SDBR protocol achieves the backward and forward secrecy for underwater depth-based routing protocol. Theoretical analysis shows that SDBR protocol can provide identity confidentiality, location privacy and routing anonymity as well as decrease computation and communication costs.

 

References: 31

    1. I F Akyildiz, D. Pompili and T. Melodia, “State of the art in protocol research for underwater acoustic sensor networks,” Proc of the 1st ACM international workshop on underwater networks, pp. 7-16, New York, 2006
    2. A. Caiti and A. Munafo', “Adaptive Cooperative Algorithms for AUV Networks,” IEEE International Conference on Communications Workshops (ICC 2010), pp. 1–5, Capetown, May 2010
    3. T. Chen and H.  Yu, “Bilinear Parings in Property-based attestation,” International Conference on Networks Security, pp. 256-260,2010
    4. Y. P. Cong, G. Yang, Z. Q. Wei, and W. Zhou, “Security in underwater Sensor network,” International Conference on Communication and Mobile Computing, 2010
    5. J. H. Cui, J. Kong, M. Gerla, and S. Zhou, “The challenges of building mobile underwater wireless networks for aquatic applications,” Network, IEEE, vol. 20, no. 3, pp. 12–18, May-June, 2006
    6. Y. Dong and P. Liu, “Security consideration of Underwater Acoustic Networks,” International Congress on Acoustics, ICA, 2010
    7. A. Enge, “Bilinear pairings on elliptic curves,”   HAL - INRIA, vol.61,no.1, 2013(DOI 10.4171/LEM/61-1/2-9)
    8. D. Galindo, R. Roman and J. Lopez, “A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks,” Cryptology and Network Security, pp. 120-132, Springer Berlin Heidelberg ,2008
    9. Dini Gianluca and Duca Lo Angelica, “A Secure Communication Suite for Underwater Acoustic Sensor Networks,” Sensors ,vol.12, no.11, pp. 15133-15158, 2012
    10. Z. Guo, H. Luo, F. Hong, M. Yang, and M. Ni Lionel,  “Current Progress and Research Issues in Underwater Sensor Networks,” Journal of Computer Research and Development, vol. 47, no.3, pp. 377-389, 2010
    11. Z. Hu, C. Wang, Y. Zhu, and D. Kong, “Signal Detection for the Underwater Acoustic Voice Communication,” Proc of the International Symposium on Test and Measurement 2003, pp. 1-5, Washington, IEEE,  2003
    12. M. R. Jafri, S. Ahmed, N. Javaid, Z. Ahmad, and R.J. Qureshi, “AMCTD: Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks,”  International Journal of Distributed Sensor Networks, vol. 2014, pp. 259-273, 2014
    13. D. B. Kilfoyle and A. B. Baggeroer, “The State of the Art in Underwater Acoustic Telemetry,” IEEE Journal of oceanic engineering, Vol.25, No.1, pp. 4-27, 2000
    14. F. Li and P. Liu, “An Efficient Certificateless Signature Scheme from Bilinear Parings,” International Conference on Network Computing & Information Security,  pp. 35-37, 2011
    15. Q. Liang and X. Cheng, “Underwater acoustic sensor networks: Target size detection and performance analysis,” Ad Hoc Networks, vol.7,no.4, pp. 830-808,2009
    16. H. P. Liu, C. H. Lan, Y. J. Ding, and Q. J. Yue, “An ID-Based Proxy Signature Using Bilinear Pairing,” Journal of Lanzhou Jiaotong University, 2008
    17. R. Lu, Z. Cao, L. Wang, and C. Sun, “A secure anonymous routing protocol with authenticated key exchange for ad hoc networks,” Computer Standards & Interfaces, vol. 29, no.5, pp. 521–527, 2007
    18. H. Nasir, N. Javaid, H. Ashraf, and S Manzoor, “CoDBR: Cooperative Depth Based Routing for Underwater Wireless Sensor Networks,”Broadband and Wireless Computing, Communication and Applications (BWCCA), 2014 Ninth International Conference on IEEE, pp. 52-57,2014
    19. J. Preisig, “Acoustic Propagation Considerations for Underwater Acoustic Communications Network Development,” Acm International Workshop on Underwater Networks, vol. 11, no.4, pp. 1-5, 2006
    20. J. Rice and D. Green, “Underwater acoustic communications and networks for the US Navy’s Sea web Program,”  Proc of the second International Conference on Sensor Technologies and Applications, pp. 715-722, Washington, 2008
    21. W. K. G. Seah and H. X. Tan, “Multipath Virtual Sink Architecture for Underwater Sensor Networks,” Research Collection School Of Information Systems, 2001
    22. S. Seys and B. Preneel, “ARM: anonymous routing protocol for mobile ad hoc networks,” Advanced Information Networking and Applications,  AINA 2006, 20th International Conference on IEEE, pp. 133-137, 2006
    23. E. M. Sozer, M. Stojanovic, and J. G.Proakis, “Underwater acoustic networks,” IEEE Journal of Oceanic Engineering, vol.25, no.1, pp. 72-83, 2000
    24. M. Stojanovic. “Underwater Acoustic Communication: Design Considerations on the Physical Layer,”  Wireless on Demand Network Systems and Services, 2008
    25. Y. Su, Y. Zhu, H. Mo, J. H. Cui, and Z. Jin, “UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks,” International Conference on Wireless Algorithms, Systems, and Applications,Vol.7992, pp.377-390,2013
    26. A. Wahid ,S. Lee , H. J. Jeong , and D. Kim, “EEDBR: Energy-Efficient Depth-Based Routing Protocol for Underwater Wireless Sensor Networks,” Advanced Computer Science and Information Technology, pp. 223-234,  Springer Berlin Heidelberg, 2011
    27. Z. Wei, G. Yang, Y. Cong, and J. Dong, “Analysis of security and threat of underwater wireless sensor network topology,”   Proceedings of the ICCEE 2010,  Chengdu,  pp. 506-510, 2010
    28. P. Xie,  Z. Zhou,  Z. Peng,  J. H. Cui, and  Z. Shi, “SDRT: A reliable data transport protocol for underwater sensor networks,” Ad Hoc Networks, vol.8, no.7, pp. 708-722, 2010
    29. H. Yan, Z. J. Shi, and J. H. Cui, “DBR: Depth-Based Routing for Underwater Sensor Networks,” Lecture Notes in Computer Science, 4982, pp. 72-86, 2008
    30. B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H. Deng, “Anonymous Secure Routing in Mobile Ad-Hoc Networks,” IEEE International Conference on Local Computer Networks, Vol.37, pp.102-108, 2004
    31. M. Zuba, M. Fagan, J. H. Cui, and Z. Shi, “A vulnerability study of geographic routing in Underwater Acoustic Networks,” 2013 IEEE Conference on Communications and Network Security (CNS), pp. 109-117, 2013

     

       

      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

       
      This site uses encryption for transmitting your passwords. ratmilwebsolutions.com