ABSTRACT
With the development of underwater acoustic communication and networking, the past forty years have witnessed rapid progress in the application of underwater acoustic networks (UANs). As the necessary component of large-area underwater monitoring and surveillance systems, UANs may confront malicious attacks. Within UANs, MAC layer protocols play an important role in their formation and maintenance. For the sake of the security of UAN itself, it is important to understand the mechanisms of attack against the protocols. One of the main methods is jamming, whose effects are studied in this paper via simulation and experiments. Conflict making, NAV interference and modification of the back-off window interference methods are adapted to gain insight into the approaches of attack, with results showing that the NAV interference method has the better interference effect.
- Gu Yuntao. The Naval Force Network Warefare and Research of CEC System Development{J}. Ship Science and Technology, 2003, 25(5): 34--36.Google Scholar
- Dong Yangze, Zhang Gangqiang, Yin Mingming. Networked Water Acoustic Warfare Technology{M}. Beijing: Publishing House of Electronics Industy, 2011.Google Scholar
- Yangze Dong, Hefeng Dong, Gangqiang Zhang. Study on Denial of Service against Underwater acoustic Networks{J}. Journal of Communication, 2014, 2(4): 135--143.Google ScholarCross Ref
- Zuba M, Fagan M, Cui J H, et al. A vulnerability study of geographic routing in Underwater Acoustic Networks{C}.Communications and Network Security (CNS), 2013 IEEE Conference on. IEEE, 2013: 109--117.Google Scholar
- Kong J, Ji Z, Wang W, et al. On wormhole attacks in under-water sensor networks: A two-tier localization approach{J}. UCLA Computer Science Department Technical Report, 2004,4005.Google Scholar
- Zhang Gangqiang, Zhang Junqing, Liu Junkai. Simulation Study on Underwater Acoustic Network MAC Layer Protocol Attacking {C}. Proceedings of Conference on Underwater Acoustics of CAS, 2016.Google Scholar
- Shi Chun, Deng Zhengjie, He Shuqian. Wireless Adaptive Access Mechanism and OPNET Simulation{M}. Beijing: National Defence Industry Press, 2013.Google Scholar
- XU Xiao-na, CHENG En, LIN Wen. Research on MAC Protocol for Underwater Acoustic Network Based on OPNET{J}. Computer and Modernization Conference, 2013(2):181--184.Google Scholar
Recommendations
Underwater Acoustic Network Protocol based on Directed Graph: A self-organization method of underwater acoustic network with asymmetric communication links
WUWNet '21: Proceedings of the 15th International Conference on Underwater Networks & SystemsIn an underwater acoustic network, the position of each underwater node is relatively fixed after it is deployed. Commonly, it is not easy to obtain auxiliary information before the network is established, such as accurate geographical position, ...
A Multichannel MAC Protocol for Underwater Acoustic Sensor Networks
WUWNet '14: Proceedings of the 9th International Conference on Underwater Networks & SystemsOwing to long propagation delays and limited available bandwidth in underwater acoustics channels, it takes a long time to establish a node handshake that will decrease the channel utilization ratio. In this paper, a multi-channel time-based MAC ...
A virtual backoff algorithm-based MAC protocol for underwater acoustic sensor networks
Underwater acoustic sensor networks UASN is different from terrestrial sensor networks. Designing medium access control MAC protocols are challenging task in UASN. In this paper, we proposed a new MAC protocol for underwater communication which is ...
Comments