Secure Data Transmission in Underwater Sensor Network: Survey and Discussion

  • Pooja A. Shelar
  • Parikshit N. Mahalle
  • Gitangali Shinde
Part of the Studies in Systems, Decision and Control book series (SSDC, volume 266)


The security of information has become a crucial issue in today’s digital world. The reason being an ever-increasing number of web-based applications and the use of proficient hacking techniques by hackers to gain unauthorized access to confidential information. Digital data can be hacked from two positions, viz. static or dynamic. The dynamic position of digital data is synonymous to data which is in a transmission phase whereas static data is a standalone data in servers, sensors or memory chips. According to physics, developing security protocols for data that is in a dynamic position is always a great challenge as compared to static one. For instance, Alice transmits data packets to Bob with the motive of not just sharing the information but perhaps Alice aims to share the information by providing the highest possible security to the data so that the data is only accessed by authorized personnel (Bob). Data transmission can be divided into two types, namely Terrestrial and Underwater Data Transmission. To date, lots of research has been conducted for securing terrestrial data transmission, but very less research has been done to provide security to data which is transferred underwater. The state of art and its parametric analysis done in chapter proves that underwater data transmission in itself is a great challenge due to various limitations of underwater communication mediums like lower bandwidth, propagation delay, noise, multipath effect, doppler spread, path loss and so on. These challenges make the underwater networks as one of the most vulnerable networks for many different security attacks occurring in different network layer like a wormhole, sybil, homing, sinkhole and many more are presented in the chapter under the heading of, “Attacks in UWSN”. According, to the complete survey and discussion done in this chapter, it can be stated that “Underwater Data Security is the heart of UWSN”. Thus, underwater data security is a necessity as UWSN is prone to various security threats and malicious attacks in addition to problems of dynamic underwater environment and communication mediums. Earth is a water planet and around 71% of the earth’s surface is covered by water. In spite of this water to land ratio of the world the “secure underwater data transmission” is a technologically lesser-explored area. Therefore, this survey work will intrigue many researchers to work on underwater sensor networks and to find innovative solutions for transferring digital data securely in the underwater environment. The proposed future work is to develop an innovative architectural model named “ACOOP UWSN” with a strong security protocol by using both optical and acoustic waves as a medium of data communication.


Underwater sensor network (UWSN) Underwater acoustic sensor network (UASN) Underwater data transmission Autonomous underwater vehicle (AUV) Remotely operated vehicle (ROV) security protocols Acoustic communication 


  1. 1.
    Dey, N., Hassanien, A.E., Bhatt, C., Ashour, A.S., Satapathy, S.C. (eds.): Internet of Things and Big Data Analytics Toward Next-Generation Intelligence. Springer, Berlin (2018)Google Scholar
  2. 2.
    Bhatt, C., Dey, N., Ashour, A.S. (eds.): Internet of Things and Big Data Technologies for Next Generation Healthcare (2017)Google Scholar
  3. 3.
    Kimbahune, V.V., Deshpande, A.V., Mahalle, P.N.: Lightweight key management for adaptive addressing in next generation internet. Int. J. Ambient Comput. Intell. (IJACI) 8(1), 50–69 (2017)CrossRefGoogle Scholar
  4. 4.
  5. 5.
  6. 6.
    Lima, F.H.M.B., Vieira, L.F.M., Vieira, M.A.M.: Water ping: ICMP for the internet of underwater things. Elsevier 1389-1286(19)30024-6 (2019)Google Scholar
  7. 7.
    Sarowar, M.G., Kamal, M.S., Dey, N.: Internet of Things and its impacts in computing intelligence: a comprehensive review–IoT application for big data. In: Big Data Analytics for Smart and Connected Cities, pp. 103–136. IGI Global (2019)Google Scholar
  8. 8.
    Schaller, A., Mueller, K.: Motorola’s experiences in designing the internet of things. Inte. J. Ambient Comput. Intell. (IJACI) 1(1), 75–85 (2009)CrossRefGoogle Scholar
  9. 9.
    Dey, N., Ashour, A.S., Bhatt, C.: Internet of things driven connected healthcare. In: Internet of Things and Big Data Technologies for Next Generation Healthcare, pp. 3–12. Springer, Cham (2017)Google Scholar
  10. 10.
    Elhayatmy, G., Dey, N., Ashour, A.S.: Internet of Things based wireless body area network in healthcare. In: Internet of Things and Big Data Analytics Toward Next Generation Intelligence, pp. 3–20. Springer, Cham (2018)Google Scholar
  11. 11.
    Han, G., Jiang, J., Sun, N., Shu, L.: Secure communication for underwater acoustic sensor networks. In: IEEE Security & Privacy in Emerging Networks in 2015Google Scholar
  12. 12.
    Rafiqul Islam, Md., Azad, S., Monzur Morshed, Md.: A secure communication suite for cluster-based underwater surveillance networks. IEEE Trans. Inf. Commun. Technol. (2014)Google Scholar
  13. 13.
    Jiang, J., Capossele, A., Gjanci, P., et al.: SecFUN: security framework for underwater acoustic sensor networks (2015). IEEE 978-1-4799-87368/15/Google Scholar
  14. 14.
    Lal, C., Petroccia, R., Conti, M., Alves, J.: Secure underwater acoustic networks: current and future research directions. In: IEEE NATO STO Centre for Maritime Research and Experimentation, La Spezia, Italy (2016)Google Scholar
  15. 15.
    Dini, G., Duca, A.L.: SeFLOOD: A secure network discovery protocol for underwater acoustic networks (2011). IEEE 978-1-4577-0681-3/11/Google Scholar
  16. 16.
    Wan, C., Phoha, V.V., Tang, Y., Hu, A.: Non-interactive identity-based underwater data transmission with anonymity and zero-knowledge. IEEE Trans. Veh. Technol. (2015)Google Scholar
  17. 17.
    Souza, E., Wong, H.C., et al.: End-to-end authentication in under water sensor networks (2013). IEEE 978-1-4799-3755-4/13Google Scholar
  18. 18.
    Luo, Y., Pu, L., Peng, Z., Shi, Z.: RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements. In: IEEE Underwater Wireless Communications and Networks: Theory and Application (2016)Google Scholar
  19. 19.
    Yuan, C., Chen, W., et al.: A low computational complexity authentication scheme in underwater wireless sensor network. In: IEEE in 11th International Conference on Mobile Ad-hoc and Sensor Networks (2015)Google Scholar
  20. 20.
    Huang, Y., Zhou, S., Shi, Z., Lai, L.: Channel frequency response based secret key generation in underwater acoustic systems. IEEE Trans. Wirel. Commun. (2016)Google Scholar
  21. 21.
    Kulhandjian, H., Melodia, T., Koutsonikolas, D.: Securing underwater acoustic communications through analog network coding (2014). IEEE 978-1-4799-4657-0/14Google Scholar
  22. 22.
    Yun, C.-W., Lee, J.-H., Yi, O., et al.: Ticket-based authentication protocol for underwater wireless sensor network. In: IEEE in Development of the Wide-Band Underwater Mobile Communication Systems (2016)Google Scholar
  23. 23.
    Martin, R., Rajasekaran, S.: Data centric approach analyzing security threats in underwater sensor networks (2016). IEEE 978-15090-1537-5/16Google Scholar
  24. 24.
    Ahmed, M.R., Aseeris, M., Shamim Kaisert, M., Zenia, N.Z., Chowdhury, Z.I.: A Novel Algorithm for Malicious Attack Detection in UWSN (2015). IEEE 978-1-4673-6676-2/15Google Scholar
  25. 25.
    Chang, H., Feng, J., Duan, C.: Reinforcement learning-based data forwarding in underwater wireless sensor networks with passive mobility. MDPI Sens. (2019). Scholar
  26. 26.
    Basagni, S., Di Valerio, V., Gjanci, P., Petrioli, C.: MARLIN-Q: multi-modal communications for reliable and low-latency data delivery. Elsevier 1570-8705(18)30555-9 (2018)Google Scholar
  27. 27.
    Petrioli, C., Petroccia, R., Potter, J.R., Spaccini, D.: The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks. Ad Hoc Netw. Spec. Issue Adv. Underw. Commun. Netw. (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Pooja A. Shelar
    • 1
  • Parikshit N. Mahalle
    • 1
  • Gitangali Shinde
    • 1
  1. 1.Department of Computer EngineeringSmt. Kashibai Navale College of Engineering (Savitribai Phule Pune University)PuneIndia

Personalised recommendations