skip to main content
10.1145/2076569.2076581acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
short-paper

Launching denial-of-service jamming attacks in underwater sensor networks

Published: 01 December 2011 Publication History

Abstract

Recent surges in the development of Underwater Sensor Networks (UWSNs) have lead to a rapid acceptance of this technology in scientific, commercial, and military applications. However, there is limited work on secure communication mechanisms and techniques to protect these networks. Security mechanisms are widely studied in terrestrial networks and various defense mechanisms have been developed as safeguards. Due to the difference in communication mediums and physical environments, the existing solutions for terrestrial networks cannot be directly applied for UWSNs. In this paper, we study the effects of denial-of-service jamming attacks on UWSNs in real-world field tests. We develop our own jammer hardware and signals in order to analyze the characteristics of different jamming attack models on a network. Our tests are performed on existing commercial brand acoustic modems and an OFDM modem prototype. We show that UWSNs can be easily jammed using carefully timed attacks which are energy efficient.

References

[1]
R. Merkle, "A digital signature based on a conventional encryption function." in Proceedings of Crypto 1987, LNCS 293, 1987, pp. 369--378.
[2]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "Spins: Security protocols for sensor networks." in ACM MobiCom 2001, July 2001, pp. 189--199.
[3]
W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel surfing and spatial retreats: defenses against wireless denial of service." in International Conference on Web Information Systems Engineering (WiSe), 2004, pp. 80--89.
[4]
L. Liu, S. Zhou, and J.-H. Cui, "Prospects and problems of wireless communication for underwater sensor networks." in Wiley Wireless Communications and Mobile Computing, Special Issue on Underwater Sensor Networks, 2008, vol. 8, no. 8, pp. 977--994.
[5]
J.-H. Cui, J. Kong, M. Gerla, and S. Zhou, "Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications." IEEE Network, Special Issue on Wireless Sensor Networking, vol. 20, no. 3, pp. 12--18, 2006.
[6]
R. Urich, Principles of Underwater Sound. New York: McGraw-Hill, 1983.
[7]
Z. Peng, S. Le, M. Zuba, H. Mo, Y. Zhu, L. Pu, J. Liu, and J.-H. Cui, "Aqua-TUNE: A field testbed for underwater networks." in Proc. of OCEANS'11 IEEE Santander, June 2011.
[8]
Teledyne-Benthos, "Fast and reliable access to undersea data." Available: http://www.benthos.com/.
[9]
H. Yan, L. Wan, S. Zhou, J. Cui, J. Huang, and H. Zhou, "Dsp based receiver implementation for ofdm acoustic modems." in Elsevier Journal on Physical Communication, 2011.
[10]
J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhargava, "Low-cost attacks against packet delivery, localization and synchronization services in under-water sensor networks." in ACM WiSe, 2005.
[11]
W. Wang, J. Kong, B. Bhargava, and M. Gerla, "Visualization of wormholes in underwater sensor networks: a distributed approach." in International Journal of Security and Networks, 2008, pp. vol. 3, No. 1, pp. 10--23.
[12]
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks." in ACM MobiHoc, 2005, pp. 46--57.
[13]
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks." in IEEE INFOCOM, 2007, pp. 1307--1315.
[14]
B. Li, S. Zhou, M. Stojanovic, L. Freitag, and P. Willett, "Multicarrier communication over underwater acoustic channels with nonuniform doppler shifts." in IEEE Journal of Oceanic Engineering, April 2008, vol 33, no.2, pp. 198--209.

Cited By

View all
  • (2024)The Vulnerability Analysis of Remote Estimation With Batch-Data Detectors Against Integrity AttacksIEEE Transactions on Automatic Control10.1109/TAC.2023.333201369:5(3096-3111)Online publication date: May-2024
  • (2024)AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00201(331-349)Online publication date: 19-May-2024
  • (2024)Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation TechniquesIEEE Access10.1109/ACCESS.2024.349049812(161096-161133)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Launching denial-of-service jamming attacks in underwater sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WUWNet '11: Proceedings of the 6th International Workshop on Underwater Networks
      December 2011
      94 pages
      ISBN:9781450311519
      DOI:10.1145/2076569
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 December 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Short-paper

      Conference

      WUWNet'11
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 84 of 180 submissions, 47%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)The Vulnerability Analysis of Remote Estimation With Batch-Data Detectors Against Integrity AttacksIEEE Transactions on Automatic Control10.1109/TAC.2023.333201369:5(3096-3111)Online publication date: May-2024
      • (2024)AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00201(331-349)Online publication date: 19-May-2024
      • (2024)Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation TechniquesIEEE Access10.1109/ACCESS.2024.349049812(161096-161133)Online publication date: 2024
      • (2023)Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers?Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems10.1145/3599691.3603403(51-57)Online publication date: 9-Jul-2023
      • (2022)Communication for Underwater Sensor Networks: A Comprehensive SummaryACM Transactions on Sensor Networks10.1145/354682719:1(1-44)Online publication date: 8-Dec-2022
      • (2022)A Geometry-Based Game Theoretical Model of Blind and Reactive Underwater JammingIEEE Transactions on Wireless Communications10.1109/TWC.2021.312345421:6(3737-3751)Online publication date: Jun-2022
      • (2022)Deception Attacks on Remote Estimation with Disclosure and Disruption ResourcesIEEE Transactions on Automatic Control10.1109/TAC.2022.3202981(1-16)Online publication date: 2022
      • (2021)A Systematic Review on Recent Trends, Challenges, Privacy and Security Issues of Underwater Internet of ThingsSensors10.3390/s2124826221:24(8262)Online publication date: 10-Dec-2021
      • (2021)A Secure Cross-Layer Communication Stack for Underwater Acoustic NetworksOCEANS 2021: San Diego – Porto10.23919/OCEANS44145.2021.9705988(1-8)Online publication date: 20-Sep-2021
      • (2021)IoUT Based Underwater Target Localization in the Presence of Time Synchronization AttacksIEEE Transactions on Wireless Communications10.1109/TWC.2021.305474520:6(3958-3973)Online publication date: Jun-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media