SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 4th ACM workshop on Wireless security
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
Prospects and problems of wireless communication for underwater sensor networks
Wireless Communications & Mobile Computing - Underwater Sensor Networks: Architectures and Protocols
The challenges of building mobile underwater wireless networks for aquatic applications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Recent surges in the development of Underwater Sensor Networks (UWSNs) have lead to a rapid acceptance of this technology in scientific, commercial, and military applications. However, there is limited work on secure communication mechanisms and techniques to protect these networks. Security mechanisms are widely studied in terrestrial networks and various defense mechanisms have been developed as safeguards. Due to the difference in communication mediums and physical environments, the existing solutions for terrestrial networks cannot be directly applied for UWSNs. In this paper, we study the effects of denial-of-service jamming attacks on UWSNs in real-world field tests. We develop our own jammer hardware and signals in order to analyze the characteristics of different jamming attack models on a network. Our tests are performed on existing commercial brand acoustic modems and an OFDM modem prototype. We show that UWSNs can be easily jammed using carefully timed attacks which are energy efficient.