Skip to main content
Log in

CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we briefly describe an underwater media access control protocol based on the request to send/clear to send mechanism with security algorithms, which is proposed to provide data confidentiality, authenticity, and replay attack protection. The protocol includes the counter with cipher block chaining-message authentication code (CBC-MAC) for underwater (CCM-UW) mode that is the modified form of the counter with CBC-MAC (CCM*) mode for underwater acoustic communication, based on the advanced encryption standard/agency, research and institute, academy block cipher algorithm. CCM-UW security mechanism is suitable for underwater acoustic sensor networks (UWASNs) and offers six different security levels with different security strength, energy consumption and transmission time. The results in the paper show that the protocol is not impracticable for UWASNs since it is energy efficient and saves transmission time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Akyildiz, I. F., Pompili, D., & Melodia, T. (2005). Underwater acoustic sensor networks: Research challenges. Ad hoc Networks, 3(3), 257–279.

    Article  Google Scholar 

  2. Detweiller, C., Vasilescu, I., & Rus, D. (2007). An underwater sensor network with dual communications, sensing, and mobility. Proceedings of OCEANS 2007-Europe, pp. 1–6.

  3. Dini, G., & Lo Duca, A. (2012). A secure communication suite for underwater acoustic sensor networks. Sensors, 12(11), 15133–15158.

    Article  Google Scholar 

  4. Yi, O., et al. (2014). Implementation of ARIA Cryptographic Modules based on ARM9 Devices. International Journal of Security and Its Applications, 8(2), 243–250.

    Article  Google Scholar 

  5. Domingo, M. C. (2011). Securing underwater wireless communication networks. Wireless Communications IEEE, 18(1), 22–28.

    Article  Google Scholar 

  6. Jiang, H. F., & Xu, Y. (2011). Research advances on security problems of underwater sensor networks. Advanced Materials Research, 317, 1002–1006.

    Google Scholar 

  7. Yang, G., Wei, Z., Cong, Y., & Jia, D. (2012). Analysis of security and threat of underwater wireless sensor network topology. Fourth International Conference on Digital Image Processing (ICDIP 2012). International Society for Optics and Photonics.

  8. Dong, Y., & Liu, P. (2010). Security considerations of underwater acoustic networks. Proceedings of the International Congress on Acoustics (ICA’10), Sydney, Australia.

  9. Zuba, M. et al. (2015). Vulnerabilities of underwater acoustic networks to denial of service jamming attacks. Security and Communication Networks, 8(16), 2635–2645.

    Article  Google Scholar 

  10. Singh, Y., Barak, D. D., Siwach, V., & Rani, P. (2012). Attacks on wireless sensor network: A survey. International Journal of Computer Science and Management Studies, 12(3), 2231–5268.

    Google Scholar 

  11. Katariya, A., Arya, A., & Minda, K. (2010). Coded under water acoustic communication (UWA) with cryptography. In Computational Intelligence and Communication Networks (CICN), 2010 International Conference on (pp. 493–497). IEEE.

  12. Yan, H., Shi, Z. J., & Fei, Y. (2009). Efficient implementation of elliptic curve cryptography on DSP for underwater sensor networks. In 7th Workshop on Optimizations for DSP and Embedded Systems (ODES-7) (pp. 7–15).

  13. Kim, Y.-P., An, J.-W., Park, S.-H., et al. (2012). Data encryption and authentication mechanism based on block cipher mode for underwater acoustic sensor networks. Proceeding of the 2012 International Conference on Information Science and Technology, Part 1, April 28–30, pp. 374–376, Shanghai, China.

  14. Cong, Y., Yang, G., Wei, Z., & Zhou, W. (2010). Security in underwater sensor network. In Communications and Mobile Computing (CMC), 2010 International Conference on (Vol. 1, pp. 162–168). IEEE.

  15. Ateniese, G., Capossele, A., Gjanci, P., Petrioli, C., & Spaccini, D. (2015). SecFUN: Security Framework for Underwater acoustic sensor Networks. In Proceedings of OCEANS-Genova, 1–9.

  16. Dini, G., & Duca, A. L. (2011). SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks. In Computers and Communications (ISCC), 2011 IEEE Symposium on (pp. 636–638). IEEE.

  17. Xu, M., Liu, G., & Guan, J. (2015). Towards a secure medium access control protocol for cluster-based underwater wireless sensor networks. International Journal of Distributed Sensor Networks, 2015, 40.

    Google Scholar 

  18. Caiti, A., Calabro, V., Dini, G., Lo Duca, A., & Munafo, A. (2012). Secure cooperation of autonomous mobile sensors using an underwater acoustic network. Sensors, 12(2), 1967–1989.

    Article  Google Scholar 

  19. Shin, S. Y., Namgung, J. I., & Park, S. H. (2010). SBMAC: Smart blocking MAC mechanism for variable UW-ASN underwater acoustic sensor network environment. Sensors, 10(1), 501–525.

    Article  Google Scholar 

  20. Melodia, T., Kulhandjian, H., Kuo, L. C., Demirors, E. (2013). Advances in underwater acoustic networking. In: Mobile Ad Hoc Networking: Cutting Edge Directions (p. 852).

  21. Lee, J.-Y., et al. (2013). A MAC protocol based on flexible RWT for underwater mobile ad-hoc networks. OCEANS-Bergen, 2013 MTS/IEEE. IEEE.

  22. Yi, O., Yun, S., Park, M., & Song, H. (2014). Implementation of ARIA cryptographic modules based on ARM9 devices. International Journal of Security and Its Applications, 8(2), 243–250.

    Article  Google Scholar 

  23. Jeon, J.-H., Yun, N.-Y., Park, S.-H., et al. (2012). A moving underwater communication system with bio-inspired fish robots. In Proceedings of the Seventh ACM International Conference on Underwater Networks and Systems, WUWNet ‘12, No. 15.

Download references

Acknowledgments

This work is part of the results for the research “Development of the wide-band underwater mobile communication systems” supported by the Ministry of Oceans and Fisheries, Korea.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soo-Hyun Park.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ibragimov, M., Lee, JH., Kalyani, M. et al. CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks. Wireless Pers Commun 89, 479–499 (2016). https://doi.org/10.1007/s11277-016-3283-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3283-z

Keywords

Navigation