skip to main content
10.1145/3291940.3291989acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
short-paper

Study on interference effect against MAC layer protocol in underwater acoustic network

Authors Info & Claims
Published:03 December 2018Publication History

ABSTRACT

With the development of underwater acoustic communication and networking, the past forty years have witnessed rapid progress in the application of underwater acoustic networks (UANs). As the necessary component of large-area underwater monitoring and surveillance systems, UANs may confront malicious attacks. Within UANs, MAC layer protocols play an important role in their formation and maintenance. For the sake of the security of UAN itself, it is important to understand the mechanisms of attack against the protocols. One of the main methods is jamming, whose effects are studied in this paper via simulation and experiments. Conflict making, NAV interference and modification of the back-off window interference methods are adapted to gain insight into the approaches of attack, with results showing that the NAV interference method has the better interference effect.

References

  1. Gu Yuntao. The Naval Force Network Warefare and Research of CEC System Development{J}. Ship Science and Technology, 2003, 25(5): 34--36.Google ScholarGoogle Scholar
  2. Dong Yangze, Zhang Gangqiang, Yin Mingming. Networked Water Acoustic Warfare Technology{M}. Beijing: Publishing House of Electronics Industy, 2011.Google ScholarGoogle Scholar
  3. Yangze Dong, Hefeng Dong, Gangqiang Zhang. Study on Denial of Service against Underwater acoustic Networks{J}. Journal of Communication, 2014, 2(4): 135--143.Google ScholarGoogle ScholarCross RefCross Ref
  4. Zuba M, Fagan M, Cui J H, et al. A vulnerability study of geographic routing in Underwater Acoustic Networks{C}.Communications and Network Security (CNS), 2013 IEEE Conference on. IEEE, 2013: 109--117.Google ScholarGoogle Scholar
  5. Kong J, Ji Z, Wang W, et al. On wormhole attacks in under-water sensor networks: A two-tier localization approach{J}. UCLA Computer Science Department Technical Report, 2004,4005.Google ScholarGoogle Scholar
  6. Zhang Gangqiang, Zhang Junqing, Liu Junkai. Simulation Study on Underwater Acoustic Network MAC Layer Protocol Attacking {C}. Proceedings of Conference on Underwater Acoustics of CAS, 2016.Google ScholarGoogle Scholar
  7. Shi Chun, Deng Zhengjie, He Shuqian. Wireless Adaptive Access Mechanism and OPNET Simulation{M}. Beijing: National Defence Industry Press, 2013.Google ScholarGoogle Scholar
  8. XU Xiao-na, CHENG En, LIN Wen. Research on MAC Protocol for Underwater Acoustic Network Based on OPNET{J}. Computer and Modernization Conference, 2013(2):181--184.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    WUWNet '18: Proceedings of the 13th International Conference on Underwater Networks & Systems
    December 2018
    261 pages
    ISBN:9781450361934
    DOI:10.1145/3291940

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 3 December 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Acceptance Rates

    WUWNet '18 Paper Acceptance Rate11of23submissions,48%Overall Acceptance Rate84of180submissions,47%
  • Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)2

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader