Impersonation Detection in AWGN-limited Underwater Acoustic Sensor Networks

05/31/2018
by   Waqas Aman, et al.
0

This work addresses the problem of impersonation detection in an underwater acoustic sensor network (UWASN). We consider a UWASN consisting of M underwater sensor nodes randomly deployed according to uniform distribution within a vertical half-disc (the so-called trusted zone). The sensor nodes report their sensed data to a sink node on water surface on an additive white gaussian noise (AWGN) reporting channel in a time-division multiple-access (TDMA) fashion. The ongoing communication on the shared reporting channel is at risk of potential impersonation attack by an active-yet-invisible adversary (so-called Eve) present in the close vicinity, who aims to inject malicious data into the system. To this end, this work proposes a novel, two-step method at the sink node to thwart the potential impersonation attack by Eve. We assume that the sink node is equipped with a uniform linear array of hydrophones; and therefore, the estimates of the distance, angle of arrival, and the location of the transmit node are available at the sink node. The sink node exploits these measurements as device fingerprints to carry out a number of binary hypothesis tests (for impersonation attack detection) as well as a number of maximum likelihood hypothesis tests (for transmitter identification when no impersonation is detected). We provide closed-form expressions for the error probabilities (i.e., the performance) of most of the hypothesis tests. Furthermore, extensive simulation results (for various scenarios of Eve's location) are provided, which attest to the efficacy of the proposed scheme.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/04/2018

Secure Routing in OFDM based Multi-Hop Underwater Acoustic Sensor Networks

Consider an OFDM based, multi-hop underwater acoustic sensor network wit...
research
02/12/2020

On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

This paper investigates the impact of authentication on effective capaci...
research
06/07/2018

Cooperative Authentication in Underwater Acoustic Sensor Networks

With the growing use of underwater acoustic communication (UWAC) for bot...
research
04/02/2022

Countering Active Attacks on RAFT-based IoT Blockchain Networks

This paper considers an Internet of Thing (IoT) blockchain network consi...
research
12/06/2019

A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks

Security aspects in underwater wireless networks have not been widely in...
research
07/18/2019

Channel Impulse Response-based Physical Layer Authentication in a Diffusion-based Molecular Communication System

Consider impersonation attack by an active malicious nano node (Eve) on ...
research
09/01/2023

Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach

We present a novel approach to identify ransomware campaigns derived fro...

Please sign up or login with your details

Forgot password? Click here to reset