Cyber Attacks and Cyber Security in Underwater Communication

Cyber Attacks and Cyber Security in Underwater Communication

Sachin Umrao
DOI: 10.4018/978-1-7998-3640-7.ch012
OnDemand:
(Individual Chapters)
Available
$29.50
No Current Special Offers
TOTAL SAVINGS: $29.50

Abstract

This chapter is structured around the concepts of risk analysis due to underwater deployment of the cables for data transfer. Most of the organizations have deployed their networks below the water for shortening the distances between peers and also to reduce the physical destruction cost of cables. Furthermore, some organizations like Google kept their servers below the water because it reduced the cost of getting it cool, which in turn increases the efficiency. However, security consultants around the world in recent past expressed their considerations that a cyber-attack on these servers or cables might result in miserable economic collision. This might be overstated but there are infrequent situations in which cable breakage could be riotous. Although organizations cannot rule the threat of attacks on these apparatuses, there are fewer check measures that could reduce the possible attack chances in underwater communication.
Chapter Preview
Top

Introduction

Previously, cybersecurity remained measured as the work of IT people only. But now days, cybersecurity is the responsibility of one and all. In 2019 cybersecurity is at the highest primacies for an organization. Detectable correspondence system are the good channel and errand well over less separations, still they are unprotected to assault and can undoubtedly be compacted. The organization NATO in 2016 for Underwater Communications, ebb and flow condition of-workmanship and network gathering talked about the close term difficulties, as work by a group of Italian who have created secure submerged remote interchanges and marketed it with the goal that it can achieve 10Mb/s at a scope of 32 feet, in harbour aquatic circumstances(Zhong et al., 2019; Salama and Abdelrahman, 2019).In 1977, the examination vessel Alvin dove 2500 meters underneath the sea waves empowering geologists to see legitimately, in the absolute first time, the peculiar lifeforms that run about the hot outlets at the planet's mid-sea edges. After forty years, new types of exceptional beasts watch these profundities. Utilized in mine chasing, frame investigate, ecological observing, port watch, and different capacities, submerged unmanned underwater vehicles (UUV's) are currently so unique and countless in their plan and strategic the US has built up an innovation guide which is directly in its third form for coordinating the innovation into standard peacetime and war fighting missions (Lehto et al., 2019).

Various telecommunication industries had undergone through deep transformation resulting into exponential growth in recent past. Cable deployment technology is still the primary network deployment strategy for infrastructure development and communication medium, resulting in higher bandwidth for current and evolving technologies. With the increasing demand according to new technology and services, cable deployment also promise a scalable and flexible network platform with higher capacity. But many times cable cuts results in failure and network outages. This chapter investigates the categories of cyber-attacks during underwater communication, with emphasis on maritime security recommending the appropriate solutions as well. Fiber deployment management in Ghana is threatened by the Lack of regulatory guidelines and policies. Various security officials around the world have expressed concern regarding cyber-attack on these deployed cables and can result in great economic impact too. As shown in figure 1 the submarine cables are deployed globally and covering vast area below the water (Umrao, 2020).

Figure 1.

Global map of submarine cables

978-1-7998-3640-7.ch012.f01

This chapter consists of 4 sections mainly with section II to categorize the cyber-attacks during underwater communication. Further in section III cyber risks along with cyber security measures are discussed. Furthermore the chapter leads to the conclusion of these parameters.

Top

Categories Of Cyber Attacks During Underwater Communication

Some of the most common categories of attacks that can happen underwater also are as (Hummelholm, 2019; Wanglai 2018; Davidovic et al., 2019; Silverajan, 2018):

Complete Chapter List

Search this Book:
Reset