A Reliable Error Detection Mechanism in Underwater Acoustic Sensor Networks

  • Imtiaz Ahmed Khan
  • Nam-Yeol Yun
  • Sardorbek Muminov
  • Soo-Hyun Park
Conference paper
Part of the Proceedings in Information and Communications Technology book series (PICT, volume 4)


Underwater Acoustic Sensor Networks (UWASNs) are not secure due to various characteristics of underwater environments. The error rate is very high in underwater environment due to factors such as long propagation delay, fading, multi-path and noises. Moreover, malicious attacks to the network add one more threat to reliable data transport problems. With respect to terrestrial sensor network, UWASNs are very different in nature. Reliable and faster data communication is our main issue. As the signal has to travel inside a noisy wireless acoustic channel so the processing of the signal is also take to measure. Moreover, we know the error rate is always high in underwater, so detecting the error and correcting them is the main key to secure the communication among nodes. The energy efficiency as well as the performance of any mechanism depends on collusion free data transmission and reception among sensors. Data link layer plays a crucial part in the Media Access Control (MAC) operation by detecting errors. For secure communication it is necessary to detect the errors during the transmission and reception. Especially in data link layer, the error detection and correction used some techniques like Cyclic Redundancy Check (CRC), checksum, parity bit, Forward Error Correction (FEC) and different error-correcting codes like Humming code, Reed Solomon code, binary convolution code and others tailored made program. In UWASNs data throughput depends on the packet size and the MAC protocols, where different protocols perform differently. A valid packet size has a great effect on the network. The ideal packet sizes depend on the specific application and the pattern of message it generates. We have to use small size packets which do help faster communication and higher data throughput in UWASNs. In this paper, depends on our practical experience, instead of using any kind of FEC techniques, we used CRC-8 because the process of data transmission usually contains the risk of unwanted modification as the channel is open. Signals arrive to the physical layer at different power and delay due to acoustic effects. So packets need to recheck for reliable data communication in UWASNs.


Medium Access Control Medium Access Control Protocol Forward Error Check Cyclic Redundancy Check Reed Solomon Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dong, Y., Liu, P.: Security Considerations of Underwater Acoustic Networks. In: Proceedings of 20th International Congress on Acoustics, ICA 2010 (August 2010)Google Scholar
  2. 2.
    Tanenbaum, A.S., Wetherall, D.J.: Computer Networks, 5th edn.Google Scholar
  3. 3.
    Koopman, P., Chakaravarty, T.: Cyclic Redundancy Code (CRC) Polynomial Selection for Embedded Networks. In: The International Conference on Dependable System and Networks (July 2004)Google Scholar
  4. 4.
    Ramabadran, T.V., Gaitonde, S.S.: A tutorial on CRC Computations. IEEE Micro. 8(4) (August 1988)Google Scholar
  5. 5.
    Akyildiz, I.F., Pompili, D., Melodia, Y.: Underwater acoustic sensor networks: research challenges. Ad Hoc Networks 3(3), 257–279 (2005)CrossRefGoogle Scholar
  6. 6.
    Ovaliadis, K., Savage, N., Kanakaris, V.: Energy efficiency in underwater sensor networks: A research review. Journal of Engineering Science and Technology Review 3(1) (2010)Google Scholar
  7. 7.
    Chitre, M., Shahabudeen, S., Potter, J., Freitag, L., Sozer, E., Stojanovic, M.: An Architecture of Underwater networks. In: OCEANS 2006 – Asia Pacific (2006)Google Scholar
  8. 8.
    Zhang, Z.: Some recent progresses in network error correction coding theory. In: The Fourth Workshop on Network Coding, Theory and Applications 2008 (January 2008)Google Scholar
  9. 9.
    Labrador, Y., Karimi, M., Pan, D., Mille, J.: Modulation and Error Correction in the Underwater Acoustic Communication Channel. IJCSNS International Journal of Computer Science and Network Security 9(7) (July 2009)Google Scholar
  10. 10.
    Stone, J., Greenwald, M., Partridge, C., Hughes, J.: Performance of Checksums and CRC’s over Real Data. IEEE/ACM Transactions on Networking 6(5) (October 1998)Google Scholar

Copyright information

© Springer Tokyo 2012

Authors and Affiliations

  • Imtiaz Ahmed Khan
    • 1
  • Nam-Yeol Yun
    • 1
  • Sardorbek Muminov
    • 1
  • Soo-Hyun Park
    • 1
  1. 1.Ubiquitous System Lab, Graduate School of Business ITKookmin UniversityKorea

Personalised recommendations