A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks

12/06/2019
by   Alberto Signori, et al.
0

Security aspects in underwater wireless networks have not been widely investigated so far, despite the critical importance of the scenarios in which these networks can be employed. For example, an attack to a military underwater network for enemy targeting or identification can lead to serious consequences. Similarly, environmental monitoring applications such as tsunami prevention are also critical from a public safety point of view. In this work, we assess a scenario in which a malicious node tries to perform a jamming attack, degrading the communication quality of battery-powered underwater nodes. The legitimate transmitter may use packet level coding to increase the chances of correctly delivering packets. Because of the energy limitation of the nodes, the jammer's objective is twofold: disrupting the communication and reducing the lifetime of the victim by making it send more redundancy. We model the jammer and the transmitter as players in a multistage game, deriving the optimal strategies. We evaluate the performance in a model-based scenario and using real experimental data, performing a sensitivity analysis to evaluate the performance of the strategies if the real channel model is different from the one they use.

READ FULL TEXT

page 1

page 2

page 7

research
06/07/2018

Cooperative Authentication in Underwater Acoustic Sensor Networks

With the growing use of underwater acoustic communication (UWAC) for bot...
research
07/02/2020

An Implementation of Partial Transmit Sequences to Design Energy Efficient Underwater Acoustic OFDM Communication System

In this article we research about underwater acoustics transceivers. As ...
research
05/31/2018

Impersonation Detection in AWGN-limited Underwater Acoustic Sensor Networks

This work addresses the problem of impersonation detection in an underwa...
research
01/12/2023

Jamming Attacks on Decentralized Federated Learning in General Multi-Hop Wireless Networks

Decentralized federated learning (DFL) is an effective approach to train...
research
07/16/2018

Wireless Powered Communication Networks: TDD or FDD?

In this paper, we compare two common modes of duplexing in wireless powe...
research
05/26/2021

Wireless Charging Power Side-Channel Attacks

This paper shows that today's wireless charging interface is vulnerable ...
research
10/28/2022

Enhanced Energy-Saving Mechanisms in TSCH Networks for the IIoT: the PRIL Approach

Lifetime of motes in wireless sensor networks can be enlarged by decreas...

Please sign up or login with your details

Forgot password? Click here to reset