مهندسی دریا
Seyed Mohammadreza Mousavi Mirkalaei; Masoud Kaveh; Ali Asghar Mehrabi Mahani
Abstract
Recent advances in electronics and wireless communications have enabled the design and manufacture of sensors with low power consumption, small size, reasonable price and various applications. These small sensors, capable of performing functions such as receiving various peripheral information based ...
Read More
Recent advances in electronics and wireless communications have enabled the design and manufacture of sensors with low power consumption, small size, reasonable price and various applications. These small sensors, capable of performing functions such as receiving various peripheral information based on the type of sensor, processing and transmitting that information, have given rise to an idea for the creation and deployment of so-called wireless sensor networks. Due to the unique limitations and unique features of the underwater channel such as low communication bandwidth, high bitrate error, significant propagation delay, etc., these networks can be easily destroyed by malicious attacks. Coordination and transmission of underwater messages between sensors will naturally present security challenges and perspectives. Attack on network protocols, especially communication protocols, can be easily accomplished in underwater wireless sensor networks. Therefore, the purpose of this paper is to present a secure and efficient protocol for communication in underwater sensor networks based solely on lightweight encoder operators with random number generators and cryptographic hash functions. For this purpose, first, a system consisting of a number of sensor nodes and a central node is modeled as receiving information with the presence of nodes or nodes as attackers and then the various steps of the protocol are described in detail. It is further demonstrated that the communication protocol presented in this paper is secure because it is resistant to the all attacks such as message analysis attack, message manipulation attack, relay attack, spoof message injection, insider attack and physical attack. It is also considered as an efficient protocol because it improves communication and computational overheads and memory consumption over previous methods. Statistical tests also show that the encrypted data in the proposed protocol are acceptable randomly and are independent of each other. Finally, in order to make the proposed method more practical in this paper, and to compare the challenges and resources of this method with previous methods for the purpose of hardware implementation, the required cryptographic components are implemented on the FPGA chip.