Abstract
The key agreement mechanisms are designed according to different communication links of underwater sensor networks. Combined with the underwater nodes deployment and geographic location information, the key agreement mechanism, which using the elliptic curve point multiplication with lower computational overhead, can support the identity authentication and session key agreements between the nodes on the non-bidirectional links, and resist Sybil attacks, replay attacks, spoofed node attacks, node replication attacks, and so on. Extensive simulations demonstrate that the proposed energy-efficient key agreement mechanism has better security and network performance, especially reducing the energy consumption of low-performance sensor nodes. The underwater sensor networks can achieve high network connectivity, meanwhile guaranteeing that the energy consumption of the cluster-head node and sensor node is less than 20 J and 10 J, respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cong, Y., Yang, G., et al.: Security in underwater sensor network. In: Proceedings of the International Conference on Communications and Mobile Computing, pp. 162–168, April 2010
Li, H., He, Y., et al.: Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53(11), 56–62 (2015)
Ren, Y., Wang, J., et al.: Key agreement protocol for wireless sensor networks using self-certified public key system. J. Comput. Res. Dev. 49(2), 304–311 (2012)
Ghoreishi, S., Razak, S., et al.: New secure identity-based and certificateless authenticated Key Agreement protocols without pairings. In: Proceedings of the International Symposium on Biometrics and Security Technologies, pp. 188–192, August 2014
Xue, K., Ma, C., et al.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36(1), 316–323 (2013)
Han, G., Jiang, J., et al.: A survey on mobile anchor node assisted localization in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(3), 2220–2243 (2016)
Wei, Z., Yang, G., et al.: Security of underwater sensor networks. Chin. J. Comput. 35(8), 1594–1606 (2012)
Moradi, S., Alavi, M.: A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks. In: Proceedings of the International Conference on Information and Knowledge Technology, pp. 276–280, September 2016
Dimitriou, T., Alrashed, E., et al.: Imposter detection for replication attacks in mobile sensor networks. Comput. Netw. 108(24), 210–222 (2016)
Xu, J., Song, Y., et al.: Underwater wireless transmission of high-speed QAM-OFDM signals using a compact red-light laser. Opt. Express 24(8), 8097–8109 (2016)
Ramesh, C., Rao, K., et al.: Identity-based cryptosystem based on tate pairing. Glob. J. Comput. Sci. Technol. 16(5), 93–105 (2016)
Pham, C.: Communication performances of IEEE 802.15.4 wireless sensor motes for data-intensive applications: a comparison of WaspMote, Arduino MEGA, TelosB, MicaZ and iMote2 for image surveillance. J. Netw. Comput. Appl. 46(8), 48–59 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhao, Y., Tian, B., Chen, Z., Liu, Y., Ding, J. (2018). An Energy-Efficient Key Agreement Mechanism for Underwater Sensor Networks. In: Kim, K., Kim, H., Baek, N. (eds) IT Convergence and Security 2017. Lecture Notes in Electrical Engineering, vol 450. Springer, Singapore. https://doi.org/10.1007/978-981-10-6454-8_20
Download citation
DOI: https://doi.org/10.1007/978-981-10-6454-8_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6453-1
Online ISBN: 978-981-10-6454-8
eBook Packages: EngineeringEngineering (R0)