Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks

被引:5
|
作者
Saeed, Khalid [1 ]
Khalil, Wajeeha [2 ]
Al-Shamayleh, Ahmad Sami [3 ]
Ahmad, Iftikhar [2 ]
Akhunzada, Adnan [4 ]
ALharethi, Salman Z. [5 ]
Gani, Abdullah [6 ]
机构
[1] Shaheed Benazir Bhutto Univ, Dept Comp Sci, Sheringal 18000, Pakistan
[2] Univ Engn & Technol, Dept Comp Sci & Informat Technol, Peshawar 25000, Pakistan
[3] Al Ahliyya Amman Univ, Fac Informat Technol, Dept Networks & Cybersecur, Amman 19328, Jordan
[4] Univ Doha Sci & Technol, Coll Comp & IT, POB 24449, Doha, Qatar
[5] Umm AL Qura Univ, Coll Comp & Informat Syst, Dept Informat Syst, Al Lith 28434, Saudi Arabia
[6] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
关键词
security attack; active attack; routing attack; attacker nodes; malicious nodes; SYSTEM;
D O I
10.3390/s23063044
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The exponentially growing concern of cyber-attacks on extremely dense underwater sensor networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel research challenges and issues. Primarily, varied protocol evaluation under advanced persistent threats is now becoming indispensable yet very challenging. This research implements an active attack in the Adaptive Mobility of Courier Nodes in Threshold-optimized Depth-based Routing (AMCTD) protocol. A variety of attacker nodes were employed in diverse scenarios to thoroughly assess the performance of AMCTD protocol. The protocol was exhaustively evaluated both with and without active attacks with benchmark evaluation metrics such as end-to-end delay, throughput, transmission loss, number of active nodes and energy tax. The preliminary research findings show that active attack drastically lowers the AMCTD protocol's performance (i.e., active attack reduces the number of active nodes by up to 10%, reduces throughput by up to 6%, increases transmission loss by 7%, raises energy tax by 25%, and increases end-to-end delay by 20%).
引用
收藏
页数:15
相关论文
共 50 条
  • [1] AMCTD: Adaptive Mobility of Courier nodes in Threshold-optimized DBR Protocol for Underwater Wireless Sensor Networks
    Jafri, M. R.
    Ahmed, S.
    Javaid, N.
    Ahmad, Z.
    Qureshi, R. J.
    2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013), 2013, : 93 - 99
  • [2] Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol Attack
    O'Mahony, George D.
    Harris, Philip J.
    Murphy, Colin C.
    2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 177 - 181
  • [3] Analyzing the Performance of Channel in Underwater Wireless Sensor Networks(UWSN)
    Gu Xiang-ping
    Yang yan
    Hu Rong-lin
    CEIS 2011, 2011, 15
  • [4] Analyzing the Multi hop Connectivity Performance in Brownian Underwater Wireless Sensor Networks
    Trong-Minh Hoang
    Tuan-Nguyen Lang
    Thi Nguyen
    PROCEEDINGS OF THE SEVENTH SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2016), 2016, : 210 - 215
  • [5] An Investigation of the Impact of Mobility on the Protocol Performance in Wireless Sensor Networks
    Ghassemian, Mona
    Aghvami, Hamid
    2008 24TH BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2008, : 310 - +
  • [6] Analyzing the Impact of Transmission Strategies on Localization Performance in Wireless Sensor Networks
    Turan, Ismail Hakki
    Yildiz, Dogan
    Demirci, Sercan
    Sayit, Muge
    IEEE ACCESS, 2025, 13 : 37673 - 37689
  • [7] A Clustered Routing Protocol for Underwater Wireless Sensor Networks
    Zhang Ying
    Sun Hongliang
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7665 - 7670
  • [8] An adaptive forwarding protocol for underwater wireless sensor networks
    The Second Artillery Engineering University, Xi'an
    710025, China
    不详
    101416, China
    不详
    710072, China
    Xibei Gongye Daxue Xuebao, 1 (165-170):
  • [9] SIMULATING AND ANALYZING RREQ FLOODING ATTACK IN WIRELESS SENSOR NETWORKS
    Moon, Ayaz Hassan
    Iqbal, Ummer
    Bhat, G. Mohiuddin
    Iqbal, Zaffar
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3374 - 3377
  • [10] Analyzing the Performance of Localization Algorithms in Underwater Sensor Networks
    Han, Guangjie
    Xia, Jun
    Chao, Jia
    Liu, Tongqing
    Shu, Lei
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 499 - 504