Next Article in Journal
Travel Mode Detection with Varying Smartphone Data Collection Frequencies
Next Article in Special Issue
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Previous Article in Journal
Matrix Completion Optimization for Localization in Wireless Sensor Networks for Intelligent IoT
Previous Article in Special Issue
Model-Driven Approach for Body Area Network Application Development
Open AccessArticle

On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks

Faculty of Information Technology, Macau University of Science and Technology, Macau
Big Data Lab, Faculty of Engineering and Natural Sciences, Norwegian University of Science & Technology in Aalesund, 6009 Aalesund, Norway
Faculty of Computer, Guangdong University of Technology, Guangzhou 510006, China
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Wang, Q.; Dai, H.N.; Li, X.; Wang, H. Eavesdropping attacks in underwater acoustic networks. In Proceedings of the 10th International Conference on Information, Communications and Signal Processing (ICICS), Singapore, 2–4 December 2015.
Academic Editor: Rongxing Lu
Sensors 2016, 16(5), 721;
Received: 17 March 2016 / Revised: 4 May 2016 / Accepted: 11 May 2016 / Published: 18 May 2016
(This article belongs to the Special Issue Security and Privacy in Sensor Networks)
The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities. This paper proposes an analytical model to investigate the eavesdropping attacks in underwater acoustic sensor networks. Our analytical framework considers the impacts of various underwater acoustic channel conditions (such as the acoustic signal frequency, spreading factor and wind speed) and different hydrophones (isotropic hydrophones and array hydrophones) in terms of network nodes and eavesdroppers. We also conduct extensive simulations to evaluate the effectiveness and the accuracy of our proposed model. Empirical results show that our proposed model is quite accurate. In addition, our results also imply that the eavesdropping probability heavily depends on both the underwater acoustic channel conditions and the features of hydrophones. View Full-Text
Keywords: security; eavesdropping; underwater acoustic sensor networks; isotropic hydrophones; array hydrophones security; eavesdropping; underwater acoustic sensor networks; isotropic hydrophones; array hydrophones
Show Figures

Figure 1

MDPI and ACS Style

Wang, Q.; Dai, H.-N.; Li, X.; Wang, H.; Xiao, H. On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks. Sensors 2016, 16, 721.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop