Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao https://doi.org/10.1...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
https://doi.org/10.1109/ucomms...
Article . 2016 . Peer-reviewed
License: STM Policy #29
Data sources: Crossref
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 2 versions
addClaim

Secure underwater acoustic networks: Current and future research directions

Authors: LAL, CHHAGAN; Petroccia, Roberto; CONTI, MAURO; Alves, João;

Secure underwater acoustic networks: Current and future research directions

Abstract

Underwater Acoustic Networks (UANs) are widely used in various applications such as climate change monitoring, pollution control and tracking, tactical surveillance and offshore exploration. However, limited consideration is given to the security of such networks, despite the fact that the unique characteristics of UANs make these networks vulnerable to various malicious attacks. In this paper, we address future aspects of how to improve security in UANs. We start by reviewing and discussing the state-of-the-art security threats for underwater networks along with their existing solutions. We then identify the open research issues and challenges in the design of secure protocols for communication in UANs. We propose innovative approaches based on node cooperation, cross-layering, software-defined cognitive networking and context-aware communication in order to effectively provision new or strengthen existing security frameworks in UANs. By using these approaches, we address the problem of detecting malicious behaviours and rogue nodes in order to address the major security issues in UANs. We also investigate the use of a covert channel based detection mechanism which needs to be considered when monitoring or deploying UANs at sea. We believe that the issues raised and future possible solution approaches proposed in this paper will greatly help the researchers contributing towards fortifying security in an inherently in-secure UAN.

Country
Italy
Keywords

cognitive notworks; context-aware security; cross-layering; DoS attacks; security; software defined underwater networks; Underwater acoustic networks; Computer Networks and Communications; Ocean Engineering; Acoustics and Ultrasonics

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    38
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
38
Top 10%
Top 10%
Top 10%
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!