Lightweight Security for Underwater IoT

Becoming IoT era, RF communication on terrestrial network gets faster speed and wide communication coverage. However, because of RF has vulnerability on underwater environment, the underwater acoustic is widely adopting for replacing RF. As a result of ef

  • PDF / 475,387 Bytes
  • 5 Pages / 439.37 x 666.142 pts Page_size
  • 24 Downloads / 205 Views

DOWNLOAD

REPORT


Abstract. Becoming IoT era, RF communication on terrestrial network gets faster speed and wide communication coverage. However, because of RF has vulnerability on underwater environment, the underwater acoustic is widely adopting for replacing RF. As a result of efforts, we can suggest ‘underwater IoT’ model and its security challenge by listing UIoT security consideration and comparing underwater security protocols which are presented. Additional, we discuss side channel attack issues. Keywords: UAC

 UIoT  Security  SCA  CCM-UW  UW-AKE

1 Introduction Underwater acoustic sensor network (UWASN) become the most widely suggested communication technique in underwater environment [1]. On the other hand, recently water resource utilization beyond the non-profit areas such as environmental monitoring, exploration of deep sea, becoming more popular in large-scale commercial business for examples “underwater data center” [2], “marine plant”, and “sea farm”. The utilization of information has changed ‘vertical’ to ‘horizontal’ using IoT/M2M. As a result, this will increase interconnectivity between different networks, but it also rises an issue of security. This paper describes the characteristics of Underwater Acoustic Communication (UAC) and define Underwater-IoT (UIoT). In this paper we compared the applicability of the underwater security protocols and explain the considerations of security in UIoT environment. The structure of the paper is as follows. Section 2 is related research which defines the characteristics of UAC and UIoT. Section 3 explains UIoT security consideration points, and compare underwater-based security protocols. In addition, we commented the lack of study on Side-Channel Attacks in Underwater Environment. In conclusions we mentioned the future research directions.

2 Underwater Internet of Things This section defines the feature of UAC and UIoT.

© Springer Nature Singapore Pte Ltd. 2017 J.J. (Jong Hyuk) Park et al. (eds.), Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering 421, DOI 10.1007/978-981-10-3023-9_119

Lightweight Security for Underwater IoT

2.1

775

Underwater Acoustic Communication (UAC)

Radio Frequency is used most widely as a Wireless communication method in the terrestrial area. However, in underwater environment, it is almost impossible because of attenuation. Therefore, acoustic communication is used as an underwater communication method instead of RF [3]. The UAC must overcome the following restrictions to establish a complete communication. (a) Low bandwidth, (b) Long-latency, (c) High bit error, and (d) Multipath.

2.2

Definition of UIoT

(1) UIoT is the expansion of UWASN and defined as the communication network of underwater and provides interconnectivity between other networks, such as ground, and air. (2) According to the latest trend, the data generated from the sensors can be operated to become a meaningful information by applying big data and semantic techniques. Figure 1 is the conceptual diagram of UIoT.

Fig. 1. Concept