Skip to main content

An Energy-Efficient Key Agreement Mechanism for Underwater Sensor Networks

  • Conference paper
  • First Online:
IT Convergence and Security 2017

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 450))

Abstract

The key agreement mechanisms are designed according to different communication links of underwater sensor networks. Combined with the underwater nodes deployment and geographic location information, the key agreement mechanism, which using the elliptic curve point multiplication with lower computational overhead, can support the identity authentication and session key agreements between the nodes on the non-bidirectional links, and resist Sybil attacks, replay attacks, spoofed node attacks, node replication attacks, and so on. Extensive simulations demonstrate that the proposed energy-efficient key agreement mechanism has better security and network performance, especially reducing the energy consumption of low-performance sensor nodes. The underwater sensor networks can achieve high network connectivity, meanwhile guaranteeing that the energy consumption of the cluster-head node and sensor node is less than 20 J and 10 J, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cong, Y., Yang, G., et al.: Security in underwater sensor network. In: Proceedings of the International Conference on Communications and Mobile Computing, pp. 162–168, April 2010

    Google Scholar 

  2. Li, H., He, Y., et al.: Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53(11), 56–62 (2015)

    Article  Google Scholar 

  3. Ren, Y., Wang, J., et al.: Key agreement protocol for wireless sensor networks using self-certified public key system. J. Comput. Res. Dev. 49(2), 304–311 (2012)

    Google Scholar 

  4. Ghoreishi, S., Razak, S., et al.: New secure identity-based and certificateless authenticated Key Agreement protocols without pairings. In: Proceedings of the International Symposium on Biometrics and Security Technologies, pp. 188–192, August 2014

    Google Scholar 

  5. Xue, K., Ma, C., et al.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36(1), 316–323 (2013)

    Article  Google Scholar 

  6. Han, G., Jiang, J., et al.: A survey on mobile anchor node assisted localization in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(3), 2220–2243 (2016)

    Article  Google Scholar 

  7. Wei, Z., Yang, G., et al.: Security of underwater sensor networks. Chin. J. Comput. 35(8), 1594–1606 (2012)

    Article  Google Scholar 

  8. Moradi, S., Alavi, M.: A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks. In: Proceedings of the International Conference on Information and Knowledge Technology, pp. 276–280, September 2016

    Google Scholar 

  9. Dimitriou, T., Alrashed, E., et al.: Imposter detection for replication attacks in mobile sensor networks. Comput. Netw. 108(24), 210–222 (2016)

    Article  Google Scholar 

  10. Xu, J., Song, Y., et al.: Underwater wireless transmission of high-speed QAM-OFDM signals using a compact red-light laser. Opt. Express 24(8), 8097–8109 (2016)

    Article  Google Scholar 

  11. Ramesh, C., Rao, K., et al.: Identity-based cryptosystem based on tate pairing. Glob. J. Comput. Sci. Technol. 16(5), 93–105 (2016)

    Google Scholar 

  12. Pham, C.: Communication performances of IEEE 802.15.4 wireless sensor motes for data-intensive applications: a comparison of WaspMote, Arduino MEGA, TelosB, MicaZ and iMote2 for image surveillance. J. Netw. Comput. Appl. 46(8), 48–59 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Zhao, Y., Tian, B., Chen, Z., Liu, Y., Ding, J. (2018). An Energy-Efficient Key Agreement Mechanism for Underwater Sensor Networks. In: Kim, K., Kim, H., Baek, N. (eds) IT Convergence and Security 2017. Lecture Notes in Electrical Engineering, vol 450. Springer, Singapore. https://doi.org/10.1007/978-981-10-6454-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6454-8_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6453-1

  • Online ISBN: 978-981-10-6454-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics