Visible to the public Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks

TitleMitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks
Publication TypeConference Paper
Year of Publication2020
AuthorsChandavarkar, B. R., Gadagkar, Akhilraj V.
Conference Name2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Date PublishedJuly 2020
PublisherIEEE
ISBN Number978-1-7281-6851-7
KeywordsComputational modeling, Cyber physical system, delays, Hash functions, Impersonate, localization, malicious node, Metrics, Open Source Software, pubcrawl, resilience, Resiliency, Routing, Scalability, security, Topology, Underwater Networks, Wireless sensor networks
AbstractThe location information of a node is one of the essential attributes used in most underwater communication routing algorithms to identify a candidate forwarding node by any of the sources. The exact location information of a node exchanged with its neighbours' in plain text and the absence of node authentication results in some of the attacks such as Sybil attack, Blackhole attack, and Wormhole attack. Moreover, the severe consequence of these attacks is Denial of Service (DoS), poor network performance, reduced network lifetime, etc. This paper proposes an anti-Spoof (a-Spoof) algorithm for mitigating localization and neighbour spoofing attacks in UASN. a-Spoof uses three pre-shared symmetric keys to share the location. Additionally, location integrity provided through the hash function. Further, the performance of a-Spoof demonstrated through its implementation in UnetStack with reference to end-to-end packet delay and the number of hops.
URLhttps://ieeexplore.ieee.org/document/9225431
DOI10.1109/ICCCNT49239.2020.9225431
Citation Keychandavarkar_mitigating_2020