Replay-Attack Countermeasures for Underwater Acoustic Networks
2020
https://doi.org/10.1109/IEEECONF38699.2020.9389259Abstract
Security is an important service of Underwater Acoustic Networks (UANs). In this work, we investigate the impact of four different replay attacks and propose two counteracting methods. The first method is based on the observation of the packet generation timestamp and the second method uses the HASH value of the packet generation timestamp combined with the address of the source node. These two methods are implemented between the routing and Media Access Control (MAC) layers of the DESERT communications protocol stack. Our simulation results show that the proposed countermeasures almost neutralise the attacks for two different network topologies.
References (26)
- C. Lal, R. Petroccia, K. Pelekanakis, M. Conti, and J. Alves, "Towards the development of secure underwater acoustic networks," IEEE Journal of Oceanic Engineering, vol. 42, no. 4, pp. 1075-1087, October 2007.
- G. Yang, L. Dai, and Z. Wei, "Challenges, threats, security issues and new trends of underwater wireless sensor networks," Sensors, vol. 18, no. 11, p. 3907, Nov. 2018.
- F. Chiariotti, C. Pielli, N. Laurenti, A. Zanella, and M. Zorzi, "A game- theoretic analysis of energy-depleting jamming attacks with a learn- ing counterstrategy," ACM Transactions on Sensor Networks (TOSN), vol. 16, no. 1, pp. 1-25, Nov. 2019.
- E. C. H. Ngai, J. Liu, and M. R. Lyu, "On the intruder detection for sinkhole attack in wireless sensor networks," in IEEE International Conference on Communications, vol. 8, 2006, pp. 3383-3389.
- M. M. Zuba, Z. Shi, Z. Peng, and J.-H. Cui, "Launching denial-of- service jamming attacks in underwater sensor networks," in Proceedings of the Sixth ACM International Workshop on Underwater Networks, ser. WUWNet'11, Seattle, Washington, USA, 1-2 December 2011.
- M. Goetz, S. Azad, P. Casari, I. Nissen, and M. Zorzi, "Jamming- resistant multi-path routing for reliable intruder detection in underwater networks," in Proceedings of the Sixth ACM International Workshop on Underwater Networks, ser. WUWNet'11, Seattle, Washington, USA, 1-2 December 2011.
- A. Signori, C. Pielli, F. Chiariotti, F. Campagnaro, M. Giordani, N. Lau- renti, and M. Zorzi, "Jamming the underwater: a game-theoretic analysis of energy-depleting jamming attacks," in ACM International Conference on Underwater Networks & Systems (WuwNet), Oct. 2019.
- W. Wang, J. Kong, B. Bhargava, and M. Gerla, "Visualisation of wormholes in underwater sensor networks: A distributed approach," International Journal of Security and Networks, vol. 3, no. 1, pp. 10-23, January 2008.
- R. Zhang and Y. Zhang, "Wormhole-resilient secure neighbor discovery in underwater acoustic networks," in Proceedings of 29th IEEE Inter- national Conference on Computer Communications, ser. INFOCOM'10, San Diego, CA, USA, 15-19 March 2010, pp. 1-9.
- G. Dini and A. L. Duca, "A secure communication suite for underwater acoustic sensor networks," Sensors, vol. 12, no. 11, pp. 15 133-15 158, November 2012.
- A. Caiti, V. Calabro, G. Dini, A. Lo Duca, and A. Munafo, "Secure cooperation of autonomous mobile sensors using an underwater acoustic network," Sensors, vol. 12, no. 2, pp. 1967-1989, February 2012.
- Y. Liu, J. Jing, and J. Yang, "Secure underwater acoustic communication based on a robust key generation scheme," in Proceedings of the 9th International Conference on Signal Processing, ser. ICSP'08, Leipzig, Germany, 10-11 May 2008, pp. 1838-1841.
- G. Ateniese, A. Capossele, P. Gjanci, C. Petrioli, and D. Spaccini, "Sec- FUN: Security Framework for Underwater acoustic sensor Networks," in Proceedings of MTS/IEEE OCEANS 2015, Genova, Italy, 18-21 May 2015, pp. 1-9.
- F. Campagnaro et al., "The DESERT underwater framework v2: Im- proved capabilities and extension tools," in Proc. UComms, Lerici, Italy, Sep. 2016.
- P. Syverson, "A taxonomy of replay attacks [cryptographic protocols]," in Proc. The Computer Security Foundations Workshop VII, Franconia, NH, USA, Jun. 1994, pp. 187-191.
- K. Murakami, H. Suemitsu, and T. Matsuo, "Classification of repeated replay-attacks and its detection monitor," in IEEE 6th Global Conference on Consumer Electronics (GCCE), 2017, pp. 1-2.
- Y. Mo and B. Sinopoli, "Secure control against replay attacks," in 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009, pp. 911-918.
- S. Malladi, J. Alves-Foss, and R. Heckendorn, "On preventing replay at- tacks on security protocols," Proc. International Conference on Security and Management, 06 2002.
- D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols," Commun. ACM, vol. 24, no. 8, p. 533-536, Aug. 1981. [Online]. Available: https://doi.org/10.1145/358722.358740
- F. Farha and H. Ning, "Enhanced timestamp scheme for mitigating replay attacks in secure zigbee networks," in IEEE International Con- ference on Smart Internet of Things (SmartIoT), 2019, pp. 469-473.
- F. Farha, H. Ning, S. Yang, J. Xu, W. Zhang, and K. R. Choo, "Times- tamp scheme to mitigate replay attacks in secure zigbee networks," IEEE Transactions on Mobile Computing, Jul. 2020, Early Access.
- D. Jinwala, D. Patel, S. Patel, and K. S. Dasgupta, "Replay protection at the link layer security in wireless sensor networks," in WRI World Congress on Computer Science and Information Engineering, vol. 1, March 2009, pp. 160-165.
- M. Stojanovic, "On the relationship between capacity and distance in an underwater acoustic communication channel," ACM Mobile Comput. and Commun. Review, vol. 11, no. 4, pp. 34-43, Oct. 2007.
- N. Benvenuto and M. Zorzi, Principles of Communications Networks and Systems, 1st ed. Wiley, 2011.
- "The World Ocean Simulation System -WOSS," Last time accessed: Aug 2020. [Online]. Available: http://telecom.dei.unipd.it/ns/woss/
- P. Casari, F. Campagnaro, E. Dubrovinskaya, R. Francescon, A. Dagan, S. Dahan, M. Zorzi, and R. Diamant, "ASUNA: A topology dataset for underwater network emulation," IEEE Journal of Oceanic Engineering, March 2020, Early Access.