Skip to main content

Secure Data Transmission in Underwater Sensor Network: Survey and Discussion

  • Chapter
  • First Online:
Internet of Things, Smart Computing and Technology: A Roadmap Ahead

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 266))

Abstract

The security of information has become a crucial issue in today’s digital world. The reason being an ever-increasing number of web-based applications and the use of proficient hacking techniques by hackers to gain unauthorized access to confidential information. Digital data can be hacked from two positions, viz. static or dynamic. The dynamic position of digital data is synonymous to data which is in a transmission phase whereas static data is a standalone data in servers, sensors or memory chips. According to physics, developing security protocols for data that is in a dynamic position is always a great challenge as compared to static one. For instance, Alice transmits data packets to Bob with the motive of not just sharing the information but perhaps Alice aims to share the information by providing the highest possible security to the data so that the data is only accessed by authorized personnel (Bob). Data transmission can be divided into two types, namely Terrestrial and Underwater Data Transmission. To date, lots of research has been conducted for securing terrestrial data transmission, but very less research has been done to provide security to data which is transferred underwater. The state of art and its parametric analysis done in chapter proves that underwater data transmission in itself is a great challenge due to various limitations of underwater communication mediums like lower bandwidth, propagation delay, noise, multipath effect, doppler spread, path loss and so on. These challenges make the underwater networks as one of the most vulnerable networks for many different security attacks occurring in different network layer like a wormhole, sybil, homing, sinkhole and many more are presented in the chapter under the heading of, “Attacks in UWSN”. According, to the complete survey and discussion done in this chapter, it can be stated that “Underwater Data Security is the heart of UWSN”. Thus, underwater data security is a necessity as UWSN is prone to various security threats and malicious attacks in addition to problems of dynamic underwater environment and communication mediums. Earth is a water planet and around 71% of the earth’s surface is covered by water. In spite of this water to land ratio of the world the “secure underwater data transmission” is a technologically lesser-explored area. Therefore, this survey work will intrigue many researchers to work on underwater sensor networks and to find innovative solutions for transferring digital data securely in the underwater environment. The proposed future work is to develop an innovative architectural model named “ACOOP UWSN” with a strong security protocol by using both optical and acoustic waves as a medium of data communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dey, N., Hassanien, A.E., Bhatt, C., Ashour, A.S., Satapathy, S.C. (eds.): Internet of Things and Big Data Analytics Toward Next-Generation Intelligence. Springer, Berlin (2018)

    Google Scholar 

  2. Bhatt, C., Dey, N., Ashour, A.S. (eds.): Internet of Things and Big Data Technologies for Next Generation Healthcare (2017)

    Google Scholar 

  3. Kimbahune, V.V., Deshpande, A.V., Mahalle, P.N.: Lightweight key management for adaptive addressing in next generation internet. Int. J. Ambient Comput. Intell. (IJACI) 8(1), 50–69 (2017)

    Article  Google Scholar 

  4. https://raymondpronk.files.wordpress.com/2010/05/oil_spill.jpg

  5. http://theliquidgrid.com/2017/10/24/underwater-data-centers/

  6. Lima, F.H.M.B., Vieira, L.F.M., Vieira, M.A.M.: Water ping: ICMP for the internet of underwater things. Elsevier 1389-1286(19)30024-6 (2019)

    Google Scholar 

  7. Sarowar, M.G., Kamal, M.S., Dey, N.: Internet of Things and its impacts in computing intelligence: a comprehensive review–IoT application for big data. In: Big Data Analytics for Smart and Connected Cities, pp. 103–136. IGI Global (2019)

    Google Scholar 

  8. Schaller, A., Mueller, K.: Motorola’s experiences in designing the internet of things. Inte. J. Ambient Comput. Intell. (IJACI) 1(1), 75–85 (2009)

    Article  Google Scholar 

  9. Dey, N., Ashour, A.S., Bhatt, C.: Internet of things driven connected healthcare. In: Internet of Things and Big Data Technologies for Next Generation Healthcare, pp. 3–12. Springer, Cham (2017)

    Google Scholar 

  10. Elhayatmy, G., Dey, N., Ashour, A.S.: Internet of Things based wireless body area network in healthcare. In: Internet of Things and Big Data Analytics Toward Next Generation Intelligence, pp. 3–20. Springer, Cham (2018)

    Google Scholar 

  11. Han, G., Jiang, J., Sun, N., Shu, L.: Secure communication for underwater acoustic sensor networks. In: IEEE Security & Privacy in Emerging Networks in 2015

    Google Scholar 

  12. Rafiqul Islam, Md., Azad, S., Monzur Morshed, Md.: A secure communication suite for cluster-based underwater surveillance networks. IEEE Trans. Inf. Commun. Technol. (2014)

    Google Scholar 

  13. Jiang, J., Capossele, A., Gjanci, P., et al.: SecFUN: security framework for underwater acoustic sensor networks (2015). IEEE 978-1-4799-87368/15/

    Google Scholar 

  14. Lal, C., Petroccia, R., Conti, M., Alves, J.: Secure underwater acoustic networks: current and future research directions. In: IEEE NATO STO Centre for Maritime Research and Experimentation, La Spezia, Italy (2016)

    Google Scholar 

  15. Dini, G., Duca, A.L.: SeFLOOD: A secure network discovery protocol for underwater acoustic networks (2011). IEEE 978-1-4577-0681-3/11/

    Google Scholar 

  16. Wan, C., Phoha, V.V., Tang, Y., Hu, A.: Non-interactive identity-based underwater data transmission with anonymity and zero-knowledge. IEEE Trans. Veh. Technol. (2015)

    Google Scholar 

  17. Souza, E., Wong, H.C., et al.: End-to-end authentication in under water sensor networks (2013). IEEE 978-1-4799-3755-4/13

    Google Scholar 

  18. Luo, Y., Pu, L., Peng, Z., Shi, Z.: RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements. In: IEEE Underwater Wireless Communications and Networks: Theory and Application (2016)

    Google Scholar 

  19. Yuan, C., Chen, W., et al.: A low computational complexity authentication scheme in underwater wireless sensor network. In: IEEE in 11th International Conference on Mobile Ad-hoc and Sensor Networks (2015)

    Google Scholar 

  20. Huang, Y., Zhou, S., Shi, Z., Lai, L.: Channel frequency response based secret key generation in underwater acoustic systems. IEEE Trans. Wirel. Commun. (2016)

    Google Scholar 

  21. Kulhandjian, H., Melodia, T., Koutsonikolas, D.: Securing underwater acoustic communications through analog network coding (2014). IEEE 978-1-4799-4657-0/14

    Google Scholar 

  22. Yun, C.-W., Lee, J.-H., Yi, O., et al.: Ticket-based authentication protocol for underwater wireless sensor network. In: IEEE in Development of the Wide-Band Underwater Mobile Communication Systems (2016)

    Google Scholar 

  23. Martin, R., Rajasekaran, S.: Data centric approach analyzing security threats in underwater sensor networks (2016). IEEE 978-15090-1537-5/16

    Google Scholar 

  24. Ahmed, M.R., Aseeris, M., Shamim Kaisert, M., Zenia, N.Z., Chowdhury, Z.I.: A Novel Algorithm for Malicious Attack Detection in UWSN (2015). IEEE 978-1-4673-6676-2/15

    Google Scholar 

  25. Chang, H., Feng, J., Duan, C.: Reinforcement learning-based data forwarding in underwater wireless sensor networks with passive mobility. MDPI Sens. (2019). https://doi.org/10.3390/s19020256

    Article  Google Scholar 

  26. Basagni, S., Di Valerio, V., Gjanci, P., Petrioli, C.: MARLIN-Q: multi-modal communications for reliable and low-latency data delivery. Elsevier 1570-8705(18)30555-9 (2018)

    Google Scholar 

  27. Petrioli, C., Petroccia, R., Potter, J.R., Spaccini, D.: The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks. Ad Hoc Netw. Spec. Issue Adv. Underw. Commun. Netw. (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shelar, P.A., Mahalle, P.N., Shinde, G. (2020). Secure Data Transmission in Underwater Sensor Network: Survey and Discussion. In: Dey, N., Mahalle, P., Shafi, P., Kimabahune, V., Hassanien, A. (eds) Internet of Things, Smart Computing and Technology: A Roadmap Ahead. Studies in Systems, Decision and Control, vol 266. Springer, Cham. https://doi.org/10.1007/978-3-030-39047-1_15

Download citation

Publish with us

Policies and ethics