Next Article in Journal
Travel Mode Detection with Varying Smartphone Data Collection Frequencies
Next Article in Special Issue
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Previous Article in Journal
Matrix Completion Optimization for Localization in Wireless Sensor Networks for Intelligent IoT
Previous Article in Special Issue
Model-Driven Approach for Body Area Network Application Development
Article Menu

Export Article

Open AccessArticle
Sensors 2016, 16(5), 721; doi:10.3390/s16050721

On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks

1
Faculty of Information Technology, Macau University of Science and Technology, Macau
2
Big Data Lab, Faculty of Engineering and Natural Sciences, Norwegian University of Science & Technology in Aalesund, 6009 Aalesund, Norway
3
Faculty of Computer, Guangdong University of Technology, Guangzhou 510006, China
This paper is an extended version of our paper published in Wang, Q.; Dai, H.N.; Li, X.; Wang, H. Eavesdropping attacks in underwater acoustic networks. In Proceedings of the 10th International Conference on Information, Communications and Signal Processing (ICICS), Singapore, 2–4 December 2015.
*
Author to whom correspondence should be addressed.
Academic Editor: Rongxing Lu
Received: 17 March 2016 / Revised: 4 May 2016 / Accepted: 11 May 2016 / Published: 18 May 2016
(This article belongs to the Special Issue Security and Privacy in Sensor Networks)
View Full-Text   |   Download PDF [971 KB, uploaded 18 May 2016]   |  

Abstract

The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities. This paper proposes an analytical model to investigate the eavesdropping attacks in underwater acoustic sensor networks. Our analytical framework considers the impacts of various underwater acoustic channel conditions (such as the acoustic signal frequency, spreading factor and wind speed) and different hydrophones (isotropic hydrophones and array hydrophones) in terms of network nodes and eavesdroppers. We also conduct extensive simulations to evaluate the effectiveness and the accuracy of our proposed model. Empirical results show that our proposed model is quite accurate. In addition, our results also imply that the eavesdropping probability heavily depends on both the underwater acoustic channel conditions and the features of hydrophones. View Full-Text
Keywords: security; eavesdropping; underwater acoustic sensor networks; isotropic hydrophones; array hydrophones security; eavesdropping; underwater acoustic sensor networks; isotropic hydrophones; array hydrophones
Figures

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Wang, Q.; Dai, H.-N.; Li, X.; Wang, H.; Xiao, H. On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks. Sensors 2016, 16, 721.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top