Title | Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Chandavarkar, B. R., Gadagkar, Akhilraj V. |
Conference Name | 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) |
Date Published | July 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6851-7 |
Keywords | Computational modeling, Cyber physical system, delays, Hash functions, Impersonate, localization, malicious node, Metrics, Open Source Software, pubcrawl, resilience, Resiliency, Routing, Scalability, security, Topology, Underwater Networks, Wireless sensor networks |
Abstract | The location information of a node is one of the essential attributes used in most underwater communication routing algorithms to identify a candidate forwarding node by any of the sources. The exact location information of a node exchanged with its neighbours' in plain text and the absence of node authentication results in some of the attacks such as Sybil attack, Blackhole attack, and Wormhole attack. Moreover, the severe consequence of these attacks is Denial of Service (DoS), poor network performance, reduced network lifetime, etc. This paper proposes an anti-Spoof (a-Spoof) algorithm for mitigating localization and neighbour spoofing attacks in UASN. a-Spoof uses three pre-shared symmetric keys to share the location. Additionally, location integrity provided through the hash function. Further, the performance of a-Spoof demonstrated through its implementation in UnetStack with reference to end-to-end packet delay and the number of hops. |
URL | https://ieeexplore.ieee.org/document/9225431 |
DOI | 10.1109/ICCCNT49239.2020.9225431 |
Citation Key | chandavarkar_mitigating_2020 |