Security in underwater networks is a crucial aspect to maintain correct network operations, but has only partially been investigated so far. Most of the applications of an underwater network are related to military or public safety scenarios, which should exhibit a high robustness to attacks and failures in order to avoid disastrous consequences even with simple Denial-of-Service attacks. The defense mechanisms and countermeasures are usually tailored to specific types of attacks. Albeit this procedure allows to obtain very effective defense mechanisms, it requires the development of different countermeasures for each possible attack. Another possible solution is to use reputation systems to identify the attackers; hence, in this paper we design a trust model able to tackle a wide range of attacks. The idea of the trust model is to observe the behavior of the nodes overhearing the neighbors' transmissions and use this information in a subjective logic framework to assign a trust metric to each of the neighbors. In addition, in order to take into account the unique characteristics of the underwater acoustic channel, which alternates periods of high packet loss to periods with low errors, we include the channel state in the trust model to avoid to erroneously mark as not trustworthy nodes that correctly forwarded the packets, but could not be overheard due to an unreliable channel.
Trustworthiness in the GUWMANET Protocol for Underwater Acoustic Mobile Ad-Hoc Networks
Alberto Signori;Emanuele Coccolo;Filippo Campagnaro;Michele Zorzi
2021
Abstract
Security in underwater networks is a crucial aspect to maintain correct network operations, but has only partially been investigated so far. Most of the applications of an underwater network are related to military or public safety scenarios, which should exhibit a high robustness to attacks and failures in order to avoid disastrous consequences even with simple Denial-of-Service attacks. The defense mechanisms and countermeasures are usually tailored to specific types of attacks. Albeit this procedure allows to obtain very effective defense mechanisms, it requires the development of different countermeasures for each possible attack. Another possible solution is to use reputation systems to identify the attackers; hence, in this paper we design a trust model able to tackle a wide range of attacks. The idea of the trust model is to observe the behavior of the nodes overhearing the neighbors' transmissions and use this information in a subjective logic framework to assign a trust metric to each of the neighbors. In addition, in order to take into account the unique characteristics of the underwater acoustic channel, which alternates periods of high packet loss to periods with low errors, we include the channel state in the trust model to avoid to erroneously mark as not trustworthy nodes that correctly forwarded the packets, but could not be overheard due to an unreliable channel.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.