ABSTRACT
In this paper we discuss how security of Underwater Acoustic Networks (UANs) could be improved by leveraging the concept of Software Defined Networking (SDN). In particular, we consider a set of realistic network deployment scenarios and security threats. We propose possible approaches towards security countermeasures that employ the SDN paradigm, and that could significantly mitigate the impact of attacks. Furthermore, we discuss those approaches with respect to deployment issues such as routing configuration, nodes trajectory optimization, and management of the node buffers. We believe that the proposed approaches could pave the way to further research in the design of UANs that are more resilient to both attacks and failures.
- IETF ALTO Status Pages.Google Scholar
- I. F. Akyildiz, D. Pompili, and T. Melodia. Underwater Acoustic Sensor Networks: Research Challenges. Ad Hoc Networks, 3:257--279, 2005.Google ScholarCross Ref
- Y. Cong, G. Yang, Z. Wei, and W. Zhou. Security in underwater sensor network. In IEEE CMC 2010. Google ScholarDigital Library
- M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei. Distributed detection of clone attacks in wireless sensor networks. IEEE TDSC, 8(5):685--698, 2011. Google ScholarDigital Library
- R. Masiero, S. Azad, F. Favaro, M. Petrani, G. Toso, F. Guerra, P. Casari, and M. Zorzi. DESERT Underwater: an NS-Miracle-based framework to DEsign, Simulate, Emulate and Realize Test-beds for Underwater network protocols. In IEEE/OES OCEANS 2012.Google ScholarCross Ref
- N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 2008. Google ScholarDigital Library
- D. Munaretto, T. Melia, S. Randriamasy, and M. Zorzi. Online path selection for video delivery over cellular networks. In IEEE Globecom 2012.Google ScholarCross Ref
- T. D. Nadeau and K. Gray. SDN: Software Defined Networks. O'Reilly Media, 2013. Google ScholarDigital Library
- R. Petroccia and D. Spaccini. A back-seat driver for remote control of experiments in underwater acoustic sensor networks. In MTS/IEEE OCEANS 2013.Google ScholarCross Ref
- S. Roy, M. Conti, S. Setia, and S. Jajodia. Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact. IEEE TIFS, 9:681--694, 2014.Google Scholar
- E. M. Sozer, M. Stojanovic, and J. G. Proakis. Underwater acoustic networks. IEEE Journal of Oceanic Engineering, 25(1):72--83, Jan 2000.Google ScholarCross Ref
- G. Toso, I. Calabrese, P. Casari, and M. Zorzi. RECORDS: a remote control framework for underwater networks. In IEEE/IFIP Med-Hoc-Net 2014.Google Scholar
Recommendations
Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks
Recent surges in the development of underwater acoustic networks UANs have lead to a rapid acceptance of this technology in scientific, commercial, and military applications. However, limited work has been performed on developing secure communication ...
Software defined networking: State-of-the-art
In the fast moving space of technology, everything and everyone is on the Internet accessing the world. The creation of large networks and data centers required for managing and analyzing data will increase in the future, so traditional networking ...
Multi-domain Software Defined Networking
A key focus of the transition to next generation computer networking is to improve management of network services thereby enhancing traffic control and flows while simplifying higher-level functionality. Software-defined networking (SDN) is an approach ...
Comments