Abstract
The security of information has become a crucial issue in today’s digital world. The reason being an ever-increasing number of web-based applications and the use of proficient hacking techniques by hackers to gain unauthorized access to confidential information. Digital data can be hacked from two positions, viz. static or dynamic. The dynamic position of digital data is synonymous to data which is in a transmission phase whereas static data is a standalone data in servers, sensors or memory chips. According to physics, developing security protocols for data that is in a dynamic position is always a great challenge as compared to static one. For instance, Alice transmits data packets to Bob with the motive of not just sharing the information but perhaps Alice aims to share the information by providing the highest possible security to the data so that the data is only accessed by authorized personnel (Bob). Data transmission can be divided into two types, namely Terrestrial and Underwater Data Transmission. To date, lots of research has been conducted for securing terrestrial data transmission, but very less research has been done to provide security to data which is transferred underwater. The state of art and its parametric analysis done in chapter proves that underwater data transmission in itself is a great challenge due to various limitations of underwater communication mediums like lower bandwidth, propagation delay, noise, multipath effect, doppler spread, path loss and so on. These challenges make the underwater networks as one of the most vulnerable networks for many different security attacks occurring in different network layer like a wormhole, sybil, homing, sinkhole and many more are presented in the chapter under the heading of, “Attacks in UWSN”. According, to the complete survey and discussion done in this chapter, it can be stated that “Underwater Data Security is the heart of UWSN”. Thus, underwater data security is a necessity as UWSN is prone to various security threats and malicious attacks in addition to problems of dynamic underwater environment and communication mediums. Earth is a water planet and around 71% of the earth’s surface is covered by water. In spite of this water to land ratio of the world the “secure underwater data transmission” is a technologically lesser-explored area. Therefore, this survey work will intrigue many researchers to work on underwater sensor networks and to find innovative solutions for transferring digital data securely in the underwater environment. The proposed future work is to develop an innovative architectural model named “ACOOP UWSN” with a strong security protocol by using both optical and acoustic waves as a medium of data communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dey, N., Hassanien, A.E., Bhatt, C., Ashour, A.S., Satapathy, S.C. (eds.): Internet of Things and Big Data Analytics Toward Next-Generation Intelligence. Springer, Berlin (2018)
Bhatt, C., Dey, N., Ashour, A.S. (eds.): Internet of Things and Big Data Technologies for Next Generation Healthcare (2017)
Kimbahune, V.V., Deshpande, A.V., Mahalle, P.N.: Lightweight key management for adaptive addressing in next generation internet. Int. J. Ambient Comput. Intell. (IJACI) 8(1), 50–69 (2017)
https://raymondpronk.files.wordpress.com/2010/05/oil_spill.jpg
http://theliquidgrid.com/2017/10/24/underwater-data-centers/
Lima, F.H.M.B., Vieira, L.F.M., Vieira, M.A.M.: Water ping: ICMP for the internet of underwater things. Elsevier 1389-1286(19)30024-6 (2019)
Sarowar, M.G., Kamal, M.S., Dey, N.: Internet of Things and its impacts in computing intelligence: a comprehensive review–IoT application for big data. In: Big Data Analytics for Smart and Connected Cities, pp. 103–136. IGI Global (2019)
Schaller, A., Mueller, K.: Motorola’s experiences in designing the internet of things. Inte. J. Ambient Comput. Intell. (IJACI) 1(1), 75–85 (2009)
Dey, N., Ashour, A.S., Bhatt, C.: Internet of things driven connected healthcare. In: Internet of Things and Big Data Technologies for Next Generation Healthcare, pp. 3–12. Springer, Cham (2017)
Elhayatmy, G., Dey, N., Ashour, A.S.: Internet of Things based wireless body area network in healthcare. In: Internet of Things and Big Data Analytics Toward Next Generation Intelligence, pp. 3–20. Springer, Cham (2018)
Han, G., Jiang, J., Sun, N., Shu, L.: Secure communication for underwater acoustic sensor networks. In: IEEE Security & Privacy in Emerging Networks in 2015
Rafiqul Islam, Md., Azad, S., Monzur Morshed, Md.: A secure communication suite for cluster-based underwater surveillance networks. IEEE Trans. Inf. Commun. Technol. (2014)
Jiang, J., Capossele, A., Gjanci, P., et al.: SecFUN: security framework for underwater acoustic sensor networks (2015). IEEE 978-1-4799-87368/15/
Lal, C., Petroccia, R., Conti, M., Alves, J.: Secure underwater acoustic networks: current and future research directions. In: IEEE NATO STO Centre for Maritime Research and Experimentation, La Spezia, Italy (2016)
Dini, G., Duca, A.L.: SeFLOOD: A secure network discovery protocol for underwater acoustic networks (2011). IEEE 978-1-4577-0681-3/11/
Wan, C., Phoha, V.V., Tang, Y., Hu, A.: Non-interactive identity-based underwater data transmission with anonymity and zero-knowledge. IEEE Trans. Veh. Technol. (2015)
Souza, E., Wong, H.C., et al.: End-to-end authentication in under water sensor networks (2013). IEEE 978-1-4799-3755-4/13
Luo, Y., Pu, L., Peng, Z., Shi, Z.: RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements. In: IEEE Underwater Wireless Communications and Networks: Theory and Application (2016)
Yuan, C., Chen, W., et al.: A low computational complexity authentication scheme in underwater wireless sensor network. In: IEEE in 11th International Conference on Mobile Ad-hoc and Sensor Networks (2015)
Huang, Y., Zhou, S., Shi, Z., Lai, L.: Channel frequency response based secret key generation in underwater acoustic systems. IEEE Trans. Wirel. Commun. (2016)
Kulhandjian, H., Melodia, T., Koutsonikolas, D.: Securing underwater acoustic communications through analog network coding (2014). IEEE 978-1-4799-4657-0/14
Yun, C.-W., Lee, J.-H., Yi, O., et al.: Ticket-based authentication protocol for underwater wireless sensor network. In: IEEE in Development of the Wide-Band Underwater Mobile Communication Systems (2016)
Martin, R., Rajasekaran, S.: Data centric approach analyzing security threats in underwater sensor networks (2016). IEEE 978-15090-1537-5/16
Ahmed, M.R., Aseeris, M., Shamim Kaisert, M., Zenia, N.Z., Chowdhury, Z.I.: A Novel Algorithm for Malicious Attack Detection in UWSN (2015). IEEE 978-1-4673-6676-2/15
Chang, H., Feng, J., Duan, C.: Reinforcement learning-based data forwarding in underwater wireless sensor networks with passive mobility. MDPI Sens. (2019). https://doi.org/10.3390/s19020256
Basagni, S., Di Valerio, V., Gjanci, P., Petrioli, C.: MARLIN-Q: multi-modal communications for reliable and low-latency data delivery. Elsevier 1570-8705(18)30555-9 (2018)
Petrioli, C., Petroccia, R., Potter, J.R., Spaccini, D.: The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks. Ad Hoc Netw. Spec. Issue Adv. Underw. Commun. Netw. (2014)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Shelar, P.A., Mahalle, P.N., Shinde, G. (2020). Secure Data Transmission in Underwater Sensor Network: Survey and Discussion. In: Dey, N., Mahalle, P., Shafi, P., Kimabahune, V., Hassanien, A. (eds) Internet of Things, Smart Computing and Technology: A Roadmap Ahead. Studies in Systems, Decision and Control, vol 266. Springer, Cham. https://doi.org/10.1007/978-3-030-39047-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-39047-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39046-4
Online ISBN: 978-3-030-39047-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)