Professional Documents
Culture Documents
11 - Chapter 8
11 - Chapter 8
The area of Underwater Wireless Sensor Networks being an unexplored field, offers a variety
of research options. But as less worked upon, it has numerous challenges, like limited
bandwidth, energy conservation, mobility, attenuation, path loss, propagation speed, noise
and most importantly security. Due to the characteristics of underwater channel, these types
of senor networks are vulnerable to malicious attacks. Being battery powered, energy is an
important and critical factor to be considered for underwater sensor networks, along with
maintaining the security of data. This chapter presents a review of the security issues being
faced in Underwater Wireless Sensor Networks and further analyzing the energy consumed
by cryptographic algorithms, applied in routing data in a clustered manner.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 96
harvesting is almost unavailable in the ocean [2]; therefore, optimizing the amount of energy
used for data transmission becomes an important issue in underwater communication. More
efficient routing protocols in underwater networks should be developed to ensure reliable
data delivery while optimizing energy consumption. On the same hand, it is also necessary to
apply useful cryptographic techniques in the communication channel in UWSNs.
One of the most important challenge i.e. security of such networks has been analyzed
along with the need of security in UWSNs. The reasons behind the degradation of underwater
sensor networks, including the natural causes and the types of hostile attacks have been
reviewed and the measures that can be applied to improve security in UWSNs have also been
mentioned in brief in this chapter along with analyzing the energy consumed by
cryptographic algorithms, applied in routing data in these networks.
8.2.1. Authentication
Authentication is necessary as it ensures that the data or the information is send by an
authorized user only and not by some malicious attacker.
8.2.2. Availability
Data must be available when needed by the user. For example, the network must be
prevented from the Denial of Service (DOS) attack.
8.2.3. Confidentiality
Confidentiality justifies that the information transmitted through the network is accessible
only by the intended user.
8.2.4. Integrity
Integrity is required to ensure that the message has not been altered during transmission or
afterwards.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 97
8.2.5. Updation
The recent data must be transmitted, i.e. the data must be updated with time.
8.3.2. Attacks
The intended attacks may be caused on the sensor networks under the water. Such attacks are
classified into following categories:
1) Jamming Attack: A jamming attack refers to interfering with the acoustic channel by
introducing carriers on the frequencies used by neighbour nodes to communicate [4].
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 98
attacks when malicious nodes claim wrong locations and mislead other nodes [4]. In the
wormhole attack, an attacker records packets at one location in the network, tunnels them
to another location and retransmits them into the network [5,6].
3) Sinkhole Attack: In a sinkhole attack, a malicious node tries to deviate packets towards
itself [7].
4) Sybil Attack: Sybil attack is based on a device taking multiple identities [7]. An attacker
with multiple identities can pretend to be in many places at once [4].
5) Selective Flooding: Malicious nodes drop certain messages instead of forwarding them to
hinder routing [4].
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 99
8.4.3. Securing the Network Protocols
To the underwater routing schemes, efficient cryptographic algorithms may be incorporated
to enforce secure routing in the network.
Encryption Decryption
X Y
Y X
K K
SOURCE DESTINATION
Asymmetric, or public key cryptography uses two keys, either of which may be used
to encrypt a message. The encrypted data may then only be decrypted by means of the other
key [8]. Figure 8.2 shows how the asymmetric key cryptography works.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 100
Encryption Decryption
X Y
Y X
K K
2 1
@
SOURCE DESTINATION
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 101
8.5.3. Rivest - Shamir - Adleman Algorithm Algorithm
In the introductory chapter about RSA, the authors [11] suggested a method to implement
cryptosystem based on public key whose security is dependent upon the difficulty to factor
large prime numbers. This technique makes it possible to encrypt data and to create digital
signatures. The encryption scheme uses RSA and signature of the fact that: med ≡ m(mod n)
for m integer.
The decryption works because cd ≡ (me)d ≡ m(mod n) . The defense lies in the
difficulty of computing a clear text m from a cipher text c and the public parameters n(e).
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 102
Total Energy = EReception + ETransmission
= [l(EElectronic )+ Pr.(l/B.h)] + [l(EElectronic + d1m . EAmplifier) + Pt .(l/B.h)] (8.2)
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 103
Total Energy = EReception + EKeyTransmission
= [l(EElectronic) + Pr.(l/B.h)] + [k(EElectronic + d3m . EAmplifier) + Pt .(k/B.h)] (8.6)
Here,
d1 is distance between sensor and CH
d2 is distance between CH and BS
d3 is distance between BS and sensor
l is message length
m is coefficient for multipath fading
ETransmission is data transmission energy
EReception is data reception energy
EKeyTransmission is energy required for key transmission
EKeyReception is energy required for key reception
EElectronic is electronic energy of the transmitter/receiver
EAmplifier is energy required for amplification
Pt is transmission power
Pr is reception power
B is bandwidth
k is key size
Besides, the communication energy, the other parameters or types of energies which
must be considered are:
1) Encryption Energy
2) Decryption Energy
Encryption and Decryption Energies depend upon the number of clock cycles per bytes
(CC/B) used in the process in any cryptographic algorithm.
3) Data Fusion or Aggregation Energy
4) Data De-fusion Energy
It is the energy required for compressing and decompressing the data received from
different sensors at CH and from CH to BS respectively.
5) Key Generation/Setup Energy
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 104
6) Data Sensing/Capture Energy
7) Data Processing Energy, if any
8) Broadcasting messages between sensors, CHs and BS
14 Bandwidth 4x109microHz
The following are the key sizes of the three algorithms considered as shown in Table 8.2.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 105
Table 8.2. Key Sizes
S. No. Type of Algorithm Algorithm Key Size
DES 64 bits
As of 2003, RSA security claims that 1024-bit RSA keys are equivalent in strength to 80-bit
symmetric keys, 2048-bit RSA keys to 112-bit symmetric keys and 3072-bit RSA keys to
128-bit symmetric keys [12].
8.7.2. Analysis
The chapter has given analysis for energy consumption at sensor node, CH and BS by using
both symmetric and asymmetric cryptography techniques on the basis of equations formed in
section 8.6.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 106
2) Energy Consumed at Cluster Head: As shown in Equation (8.2), the energy required for
secure communication at CH depends upon data reception and transmission energy. Hence,
both symmetric cryptography algorithms consume same amount of energy as depicted in
Figure 8.4.
3) Energy Consumed at Base Station: As shown in Equation (8.3), the energy required for
secure communication at BS depends upon data reception and key reception energy. On
comparing Blowfish and DES algorithm, it has been noted that the former one consumes less
energy at BS. The results are shown in Figure 8.5.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 107
8.7.2.2. Energy Consumption for Secure Communication using Asymmetric Key
Cryptography
1) Energy Consumed at Sensor Node: As depicted in Equation (8.4), the computations are
given for asymmetric cryptographic algorithms.
It can be observed in Figure 8.6 that RSA algorithm has been taken and compared in
two variations with key size as 512 and 1024. The smaller key leads to less energy
consumption.
2) Energy Consumed at Cluster Head: As shown in Equation (8.5), the energy required for
secure communication at CH depends upon data reception and transmission energy.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 108
Figure 8.7. Energy Consumption at Cluster Head in Asymmetric Algorithms
3) Energy Consumed at Base Station: As per Equation (8.6), the two variants of RSA
algorithm shows difference in energy consumption at BS due to difference in key size. The
results are depicted in Figure 8.8.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 109
depicts that the symmetric algorithms consume less energy as compared to the asymmetric
ones. The same has been shown with the help of bar graph in Figure 8.9.
Figure 8.9. Total Energy Consumption in Secure Communication in Symmetric and Asymmetric Cryptography
Algorithms
8.8. CONCLUSION
The chapter aimed at analyzing the energy consumption by cryptographic algorithms applied
in routing data in a clustered manner in Underwater Wireless Sensor Networks. The not so
convenient environment offers a large number of characteristics, difficulties and needs to be
taken care of. One of the needs is that of securing the data while communicating it from one
end to another in wireless network. Another important consideration is that of energy saving
routing. Both symmetric and asymmetric cryptographic techniques have been applied to the
Underwater Wireless Sensor Networks and calculated the energy consumption depending
upon the key and data transmission and reception at sensors, Cluster Heads and Base Stations
in the network. The results show that the symmetric key cryptography consumes less energy
if Blowfish algorithm is taken in comparison to DES algorithm but RSA algorithm takes
more energy in communication, being asymmetric key cryptography algorithm.
REFERENCES
[1] Kim, Ji Eon, et al. "Security in underwater acoustic sensor network: focus on suitable
encryption mechanisms." AsiaSim 2012. Springer, 2012. 160-168.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 110
[2] Sozer, Ethem M., Milica Stojanovic, and John G. Proakis. "Underwater acoustic
networks." IEEE Journal of Oceanic Engineering 25.1 (2000): 72-83.
[3] Dong, Yangze, and Pingxiang Liu. "Security considerations of underwater acoustic
networks." Proceedings of the International Congress on Acoustics, 2010.
[5] Padmavathi, Dr G., and Mrs Shanmugapriya. "A survey of attacks, security
mechanisms and challenges in wireless sensor networks." arXiv preprint
arXiv:0909.0576 (2009).
[6] Karlof, Chris, and David Wagner. "Secure routing in wireless sensor networks: Attacks
and countermeasures." Ad hoc Networks 1.2-3 (2003): 293-315.
[7] Climent, Salvador, et al. "Underwater acoustic wireless sensor networks: advances and
future trends in physical, MAC and routing layers." Sensors 14.1 (2014): 795-833.
[10] Minier, Marine, and Raphael C-W. Phan. "Energy-Efficient cryptographic engineering
paradigm." Open Problems in Network Security. Springer. 2012. 78-88.
[11] Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital
signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978):
120-126.
[12] Kaliski, B. "TWIRL and RSA Key Size, RSA Laboratories, Tech." 2003.
Modelling Energy Efficient Secure Communication in Underwater Wireless Sensor Networks Page 111