Underwater and Submerged Wireless Sensor Systems: Security Issues and Solutions

Kübra Kalkan, Albert Levi, Sherali Zeadally

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

This chapter discusses security breaches in underwater wireless sensor systems (UWSSs) and the security solutions that can prevent them. It first presents some background information about UWSSs and discusses some of its design and security-related challenges. The chapter also discusses security issues of UWSSs, and provides some future research challenges and opportunities for security in UWSSs. These challenges are related to security of localization, cross-layer design and time synchronization. UWSSs are similar to terrestrial wireless sensor systems in terms of their functions, structure and energy limitations. Cryptographic mechanisms are used to enforce authentication, data confidentiality and integrity requirements. There are two types of cryptographic mechanism for encryption: asymmetric key cryptography and symmetric key cryptography. Since UWSSs have security vulnerabilities, they are prone to distributed denial of service (DDoS) attacks. The chapter discusses some of these attacks and possible solutions to mitigate them: jamming, power exhaustion, sybil attack, and sinkhole attack.

Original languageEnglish
Title of host publicationWireless Sensor Systems for Extreme Environments
Subtitle of host publicationSpace, Underwater, Underground, and Industrial
Pages311-324
Number of pages14
ISBN (Electronic)9781119126492
DOIs
StatePublished - Jan 1 2017

Bibliographical note

Publisher Copyright:
© 2017 John Wiley & Sons Ltd. All rights reserved.

Keywords

  • cryptographic mechanisms
  • distributed denial of service attacks
  • security issues
  • security‐related challenges
  • terrestrial wireless sensor systems
  • underwater wireless sensor systems

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Underwater and Submerged Wireless Sensor Systems: Security Issues and Solutions'. Together they form a unique fingerprint.

Cite this