Affiliations 

  • 1 Department of Computer Science, Shaheed Benazir Bhutto University, Sheringal Dir Upper 18000, Pakistan
  • 2 Department of Computer Science & Information Technology, University of Engineering and Technology, Peshawar 25000, Pakistan
  • 3 Department of Networks and Cybersecurity, Faculty of Information Technology, Al-Ahliyya Amman University, Amman 19328, Jordan
  • 4 College of Computing & IT, University of Doha for Science and Technology, Doha P.O. Box 24449, Qatar
  • 5 Department of Information System, College of Computers and Information Systems, Umm AL-Qura University, Al-lith 28434, Saudi Arabia
  • 6 Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia
Sensors (Basel), 2023 Mar 11;23(6).
PMID: 36991755 DOI: 10.3390/s23063044

Abstract

The exponentially growing concern of cyber-attacks on extremely dense underwater sensor networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel research challenges and issues. Primarily, varied protocol evaluation under advanced persistent threats is now becoming indispensable yet very challenging. This research implements an active attack in the Adaptive Mobility of Courier Nodes in Threshold-optimized Depth-based Routing (AMCTD) protocol. A variety of attacker nodes were employed in diverse scenarios to thoroughly assess the performance of AMCTD protocol. The protocol was exhaustively evaluated both with and without active attacks with benchmark evaluation metrics such as end-to-end delay, throughput, transmission loss, number of active nodes and energy tax. The preliminary research findings show that active attack drastically lowers the AMCTD protocol's performance (i.e., active attack reduces the number of active nodes by up to 10%, reduces throughput by up to 6%, increases transmission loss by 7%, raises energy tax by 25%, and increases end-to-end delay by 20%).

* Title and MeSH Headings from MEDLINE®/PubMed®, a database of the U.S. National Library of Medicine.