DOI QR코드

DOI QR Code

Considerations and Issues for Applying the Existing Network Security to Underwater Acoustic Sensor Networks

수중 음파 센서네트워크에 기존 네트워크 보안을 적용하기 위한 고려사항과 논쟁점

  • Shin, DongHyun (Department of Computer Science & Engineering, Gangneung-Wonju National University) ;
  • Lee, Seung-Jun (Department of Computer Science & Engineering, Gangneung-Wonju National University) ;
  • Kim, Changhwa (Department of Computer Science & Engineering, Gangneung-Wonju National University)
  • Received : 2017.09.15
  • Accepted : 2017.11.30
  • Published : 2017.12.31

Abstract

The security threat types in underwater communication networks environment are almost the same as the terrestrial, but the security of mechanisms the terrestrial RF-based networks environment can not be directly applied due to not only the limited resources of each node but also unsafe channel such as low propagation delay, high bit error rate etc. Nevertheless there has not been much research on the security of underwater acoustic communication networks. Therefore, in this paper analyzes the differences between the terrestrial communication networks and underwater acoustic communication networks, and identifies issues that are the starting points of underwater communication networks security research.

Keywords

References

  1. S.J. Park, S.H. Park, S.K. Kim, and C.H. Kim, "Underwater Communication and Ocean Sensor Network Technology," Communications of the Korean Institute of Information Scientists and Engineers, Vol. 28, No. 7, pp. 79-88, 2010.
  2. H.W. Nam, S.S. An, C.H. Kim, S.H. Park, Y.H. Kim, and S.H. Lim, "Remote Monitoring System Based on Ocean Sensor Networks for Offshore Aquaculture," Proceeding of IEEE Oceanic Engineering Society, pp. 14-19, 2014.
  3. D.H. Shin and C.H. Kim, “Sensor Network System for Littoral Sea Cage Culture Monitoring,” Korea Information Proceesing Society Transaction on Computer and Communication System, Vol. 5, No. 9, pp. 247-260, 2016.
  4. D.H. Shin and C.H. Kim, "Data Compression Method for Reducing Sensor Data Loss and Error in Wireless Sensor Network," Journal of Korea Multimedia Society, Vol. 19, No. 2, pp. 360-374, 2016. https://doi.org/10.9717/kmms.2016.19.2.360
  5. R. Martin and S. Rajasekaran, "Data Centric Approach to Analyzing Security Threats in Underwater Sensor Networks," Proceeding of OCEANS 2016 Marine Technology Society/IEEE Monterey, pp. 1-5, 2016.
  6. G. Han, J. Jiang, N. Sun, and L. Shu, “Secure Communication for Underwater Acoustic Sensor Networks,” IEEE Communication Magazine, Vol. 53, No. 8, pp. 54-60, 2015. https://doi.org/10.1109/MCOM.2015.7180508
  7. E. Michael, Whitman and J. Herbert Mattord, Principles of Information Security, CENGAGE Learning, U.K., 2017.
  8. H.J. Seo and H.W. Kim, "On Dynamic Voltage Scale Based Protocol Low Power Underwater Secure Communications on Sensor Network," Journal of the Korea Institute of Information and Communication Engineering, Vol. 18, No. 3, pp. 586-594, 2014. https://doi.org/10.6109/jkiice.2014.18.3.586
  9. H. Li, Y. He, X. Cheng, H. Zhu, and L. Sun, “Security and Privacy in Localization for Underwater Sensor Networks,” IEEE Communications Magazine, Vol. 53, No. 11, pp. 56-62, 2015. https://doi.org/10.1109/MCOM.2015.7321972
  10. S.J. Lee, D.H. Shin, and C.H. Kim, "Improvement of Verified Neighbor Discovery Protocol Based on Directional Antenna to Detect Wormhole in Underwater Acoustic Sensor Networks," Proceeding of the 2017 World Congress on Information Technology Applications and Services, pp. 1-8, 2017.
  11. M.H. Park, Y. Kim, and O.Y. Yi, “Light Weight Authentication and Key Establishment Protocol for Underwater Acoustic Sensor Networks,” Journal of the Korea Institute of Information and Communication Engineering B, Vol. 39, No. 6, pp. 360-369, 2014.
  12. A.H. Moon, U. Iqbal, and G.M. Bhat, "Light Weight Authentication Framework for WSN," Proceeding of International Conference on Electrical, Electronics, and Optimization Techniques, pp. 3099-2105, 2016.
  13. C.W. Yun, J.H. Lee, O.Y. Yi, S.Y. Shin, and S.H. Park, "Analysis of the Cryptographic Algorithms's Performance on Various Devices Suitable for Underwater Communications", Korea Information Proceesing Society Transaction on Computer and Communications System, Vol. 5, No. 3, pp. 71-78, 2016.