Trustworthiness in the GUWMANET Protocol for Underwater Acoustic Mobile Ad-Hoc Networks

Alberto Signori, Emanuele Coccolo, Filippo Campagnaro, I. Nissen, M. Zorzi
{"title":"Trustworthiness in the GUWMANET Protocol for Underwater Acoustic Mobile Ad-Hoc Networks","authors":"Alberto Signori, Emanuele Coccolo, Filippo Campagnaro, I. Nissen, M. Zorzi","doi":"10.1145/3491315.3491316","DOIUrl":null,"url":null,"abstract":"Security in underwater networks is a crucial aspect to maintain correct network operations, but has only partially been investigated so far. Most of the applications of an underwater network are related to military or public safety scenarios, which should exhibit a high robustness to attacks and failures in order to avoid disastrous consequences even with simple Denial-of-Service attacks. The defense mechanisms and countermeasures are usually tailored to specific types of attacks. Albeit this procedure allows to obtain very effective defense mechanisms, it requires the development of different countermeasures for each possible attack. Another possible solution is to use reputation systems to identify the attackers; hence, in this paper we design a trust model able to tackle a wide range of attacks. The idea of the trust model is to observe the behavior of the nodes overhearing the neighbors’ transmissions and use this information in a subjective logic framework to assign a trust metric to each of the neighbors. In addition, in order to take into account the unique characteristics of the underwater acoustic channel, which alternates periods of high packet loss to periods with low errors, we include the channel state in the trust model to avoid to erroneously mark as not trustworthy nodes that correctly forwarded the packets, but could not be overheard due to an unreliable channel.","PeriodicalId":191580,"journal":{"name":"Proceedings of the 15th International Conference on Underwater Networks & Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 15th International Conference on Underwater Networks & Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3491315.3491316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Security in underwater networks is a crucial aspect to maintain correct network operations, but has only partially been investigated so far. Most of the applications of an underwater network are related to military or public safety scenarios, which should exhibit a high robustness to attacks and failures in order to avoid disastrous consequences even with simple Denial-of-Service attacks. The defense mechanisms and countermeasures are usually tailored to specific types of attacks. Albeit this procedure allows to obtain very effective defense mechanisms, it requires the development of different countermeasures for each possible attack. Another possible solution is to use reputation systems to identify the attackers; hence, in this paper we design a trust model able to tackle a wide range of attacks. The idea of the trust model is to observe the behavior of the nodes overhearing the neighbors’ transmissions and use this information in a subjective logic framework to assign a trust metric to each of the neighbors. In addition, in order to take into account the unique characteristics of the underwater acoustic channel, which alternates periods of high packet loss to periods with low errors, we include the channel state in the trust model to avoid to erroneously mark as not trustworthy nodes that correctly forwarded the packets, but could not be overheard due to an unreliable channel.
水声移动自组网GUWMANET协议的可信赖性
水下网络的安全是保证网络正常运行的一个重要方面,但目前对安全问题的研究还不够全面。水下网络的应用大多涉及军事或公共安全场景,对于攻击和故障应具有较高的鲁棒性,以避免即使是简单的拒绝服务攻击也会造成灾难性的后果。防御机制和对策通常是针对特定类型的攻击量身定制的。尽管这一程序允许获得非常有效的防御机制,但它需要针对每种可能的攻击制定不同的对策。另一个可能的解决方案是使用信誉系统来识别攻击者;因此,在本文中,我们设计了一个能够处理各种攻击的信任模型。信任模型的思想是观察节点偷听邻居传输的行为,并在主观逻辑框架中使用这些信息为每个邻居分配信任度量。此外,考虑到水声信道在高丢包周期和低错误周期之间交替变化的独特特性,我们在信任模型中加入了信道状态,以避免将正确转发数据包但由于信道不可靠而无法窃听的节点错误标记为不可信节点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信