Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
review-article

Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks

Published: 01 January 2021 Publication History

Abstract

Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, and open acoustic channel, it is also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researchers design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues.

References

[1]
X. Xiao, H. Huang, and W. Wang, “Underwater wireless sensor networks: an energy-efficient clustering routing protocol based on data fusion and genetic algorithms,” Applied Sciences, vol. 11, no. 1, p. 312, 2021.
[2]
R. Mhemed, F. Comeau, W. Phillips, and N. Aslam, “Void avoidance opportunistic routing protocol for underwater wireless sensor networks,” Sensors, vol. 21, no. 6, p. 1942, 2021.
[3]
S. Khisa and S. Moh, “Survey on recent advancements in energy-efficient routing protocols for underwater wireless sensor networks,” IEEE Access, vol. 9, pp. 55045–55062, 2021.
[4]
J. Xiang, Z. Zhou, L. Shu, T. Rahman, and Q. Wang, “A mechanism filling sensing holes for detecting the boundary of continuous objects in hybrid sparse wireless sensor networks,” IEEE Access, vol. 5, pp. 7922–7935, 2017.
[5]
D. Zhao, G. Lun, R. Xue, and Y. Sun, “Cross-layer-aided opportunistic routing for sparse underwater wireless sensor networks,” Sensors, vol. 21, no. 9, p. 3205, 2021.
[6]
X. Du, Z. Zhou, Y. Zhang, and T. Rahman, “Energy-efficient sensory data gathering based on compressed sensing in IoT networks,” Journal of Cloud Computing, vol. 9, pp. 1–16, 2020.
[7]
D. B. Kilfoyle and A. B. Baggeroer, “The state of the art in underwater acoustic telemetry,” IEEE Journal of Oceanic Engineering, vol. 25, no. 1, pp. 4–27, 2000.
[8]
M. Stojanovic, “Acoustic (underwater) communications,” in Encyclopedia of Telecommunications, Wiley, Hoboken, NJ, USA, 2019.
[9]
K. M. Awan, P. A. Shah, K. Iqbal, S. Gillani, W. Ahmad, and Y. Nam, “Underwater wireless sensor networks: a review of recent issues and challenges,” Wireless Communications and Mobile Computing, vol. 2019, 20 pages, 2019.
[10]
H. Ping, Z. Zhou, T. Rahman, and Y. Duan, “Localization and tracking of continuous objects boundary area leveraging planarization algorithms in duty-cycled wireless sensor networks,” in 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, 2017.
[11]
G. Han, C. Zhang, L. Shu, N. Sun, and Q. Li, “A survey on deployment algorithms in underwater acoustic sensor networks,” International Journal of Distributed Sensor Networks, vol. 9, no. 12, 2013.
[12]
J. Vilela, Z. Kashino, R. Ly, G. Nejat, and B. A. Benhabib, “A dynamic approach to sensor network deployment for mobile-target detection in unstructured, expanding search areas,” IEEE Sensors Journal, vol. 16, no. 11, pp. 4405–4417, 2016.
[13]
T. Rahman, Z. Zhou, and H. Ning, “Energy efficient and accurate tracking and detection of continuous objects in wireless sensor networks,” in IEEE International Conference on Smart Internet of Things (SmartIoT), Xi'an, China, 2018.
[14]
B. Wang, Coverage Control in Sensor Networks, Springer Science & Business Media, Berlin, Germany, 2010.
[15]
J. Wan, S. Tang, Z. Shu, S. W. Di Li, M. Imran, and A. V. Vasilakos, “Software-defined industrial internet of things in the context of industry 4.0,” IEEE Sensors Journal, vol. 16, pp. 7373–7380, 2016.
[16]
R. W. Coutinho, A. Boukerche, L. F. Vieira, and A. A. Loureiro, “On the design of green protocols for underwater sensor networks,” IEEE Communications Magazine, vol. 54, no. 10, pp. 67–73, 2016.
[17]
T. G. Leighton, The Acoustic Bubble, vol. 96, no. 4, Academic Press, London, UK, 1994.
[18]
Y. Yang, W. Zhao, and X. Xiao, “The upper temperature limit of life under high hydrostatic pressure in the deep biosphere,” in Deep Sea Research Part I, vol. 176, Oceanographic Research Papers, 2021.
[19]
A. A. Syed, W. Ye, J. Heidemann, and B. Krishnamachari, “Understanding spatio-temporal uncertainty in medium access with ALOHA protocols,” in Proceedings of the Second Workshop on Underwater Networks, pp. 41–48, Montréal, QC, Canada, September 2007.
[20]
I. Azam, N. Javaid, A. Ahmad, W. Abdul, A. Almogren, and A. Alamri, “Balanced load distribution with energy hole avoidance in underwater WSNs,” IEEE Access, vol. 5, pp. 15206–15221, 2017.
[21]
F. Al Salti, N. Alzeidi, and B. R. Arafeh, “EMGGR: an energy-efficient multipath grid-based geographic routing protocol for underwater wireless sensor networks,” Wireless Networks, vol. 23, no. 4, pp. 1301–1314, 2017.
[22]
S. Rani, S. H. Ahmed, J. Malhotra, and R. Talwar, “Energy efficient chain based routing protocol for underwater wireless sensor networks,” Journal of Network and Computer Applications, vol. 92, pp. 42–50, 2017.
[23]
R. Hou, L. He, S. Hu, and J. Luo, “Energy-balanced unequal layering clustering in underwater acoustic sensor networks,” IEEE Access, vol. 6, pp. 39685–39691, 2018.
[24]
N. Javaid, M. R. Jafri, Z. A. Khan, U. Qasim, T. A. Alghamdi, and M. Ali, “IAMCTD: improved adaptive mobility of courier nodes in threshold-optimized dbr protocol for underwater wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 10, no. 11, 2014.
[25]
Y. D. Chen, D. R. Wu, W. Chen, and K. P. Shih, “A self-adaptive cooperative routing protocol for underwater acoustic sensor networks,” in Proceedings of the OCEANS’15 MTS/IEEE Washington, pp. 1–5, Washington, DC, USA, October 2015.
[26]
Z. Jin, Y. Ma, Y. Su, S. Li, and X. Fu, “A Q-learning-based delay-aware routing algorithm to extend the lifetime of underwater sensor networks,” Sensors, vol. 17, no. 7, p. 1660, 2017.
[27]
R. W. Coutinho, A. Boukerche, L. F. Vieira, and A. A. Loureiro, “EnOR: energy balancing routing protocol for underwater sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC), pp. 1–6, Paris, France, May 2017.
[28]
M. R. Bharamagoudra, S. S. Manvi, and B. Gonen, “Event driven energy depth and channel aware routing for underwater acoustic sensor networks: agent oriented clustering based approach,” Computers and Electrical Engineering, vol. 58, pp. 1–19, 2017.
[29]
F. Muhammad, G. Tuna, and V. C. Gungor, “QERP: quality-of-service (QoS) aware evolutionary routing protocol for underwater wireless sensor networks,” IEEE Systems Journal, vol. 12, pp. 2066–2073, 2018.
[30]
Y. Jing, X. Yang, X. Luo, and C. Chen, “Energy-efficient data collection over AUV-assisted underwater acoustic sensor network,” IEEE Systems Journal, vol. 99, pp. 1–12, 2018.
[31]
B. Fatma, C. Zidi, and R. Boutaba, “Joint routing and energy management in underwater acoustic sensor networks,” IEEE Transactions on Network and Service Management, vol. 14, no. 2, pp. 456–471, 2017.
[32]
R. W. L. Coutinho, A. Boukerche, and A. A. F. Loureiro, “PCR: a power control-based opportunistic routing for underwater sensor networks,” in Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 173–180, Montreal, QC, Canada, November 2018.
[33]
Z. Jin, Z. Ji, and Y. Su, “An evidence theory based opportunistic routing protocol for underwater acoustic sensor networks,” IEEE Access, vol. 6, pp. 71038–71047, 2018.
[34]
N. Javaid, S. Hussain, A. Ahmad, M. Imran, A. Khan, and M. Guizani, “Region based cooperative routing in underwater wireless sensor networks,” Journal of Network and Computer Applications, vol. 92, pp. 31–41, 2017.
[35]
L. E. Emokpae, Z. Liu, G. F. Edelmann, and M. A. Younis, “Cross-stack QoS routing approach for underwater acoustic sensor networks,” in Proceedings of the 2018 Fourth Underwater Communications and Networking Conference (UComms), pp. 1–5, Lerici, Italy, August 2018.
[36]
G. Han, L. Liu, N. Bao, J. Jiang, W. Zhang, and J. J. P. C. Rodrigues, “Arep: an asymmetric link-based reverse routing protocol for underwater acoustic sensor networks,” Journal of Network and Computer Applications, vol. 92, pp. 51–58, 2017.
[37]
T. Al-Subhi, B. Arafeh, N. Alzeidi, K. Day, and A. Touzene, “A void avoidance scheme for grid-based multipath routing in underwater wireless sensor networks,” Wireless Sensor Network, vol. 10, no. 7, pp. 131–156, 2018.
[38]
A. Bereketli, M. Tümçakır, and B. Yeni, “P-AUV: position aware routing and medium access for ad hoc AUV networks,” Journal of Network and Computer Applications, vol. 125, pp. 146–154, 2019.
[39]
M. Ali, A. Khan, K. Aurangzeb, I. Ali, H. Mahmood, S. I. Haider, and N. Bhatti, “CoSiM-RPO: cooperative routing with sink mobility for reliable and persistent operation in underwater acoustic wireless sensor networks,” Sensors, vol. 19, no. 5, p. 1101, 2019.
[40]
E. Felemban, F. K. Shaikh, U. M. Qureshi, A. A. Sheikh, and S. B. Qaisar, “Underwater sensor network applications: a comprehensive survey,” International Journal of Distributed Sensor Networks, vol. 11, no. 11, 2015.
[41]
Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga, “Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols,” ACM Transactions on Sensor Networks (TOSN), vol. 5, no. 1, pp. 1–38, 2009.
[42]
S. Misra, M. Dash, A. V. Khatua, and M. S. O. Vasilakos, “Jamming in underwater sensor networks: detection and mitigation,” IET Communications, vol. 6, no. 14, pp. 2178–2188, 2012.
[43]
M. Zuba, Z. Shi, Z. Peng, J. H. Cui, and S. Zhou, “Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks,” Security and Communication Networks, vol. 8, no. 16, 2645 pages, 2015.
[44]
R. Martin and S. Rajasekaran, “Data centric approach to analyzing security threats in underwater sensor networks,” in Proceedings of the OCEANS 2016 MTS/IEEE Monterey, pp. 1–6, Monterey, CA, USA, September 2016.
[45]
G. Han, L. Liu, J. Jiang, L. Shu, and J. J. Rodrigues, “A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks,” Sensors, vol. 16, p. 229, 2016.
[46]
J. Jiang, G. Han, C. Zhu, S. Chan, and J. J. Rodrigues, “A trust cloud model for underwater wireless sensor networks,” IEEE Communications Magazine, vol. 55, no. 3, pp. 110–116, 2017.
[47]
C. Peng, X. Du, K. Li, and M. Li, “An ultra-lightweight encryption scheme in underwater acoustic networks,” Journal of Sensors, vol. 2016, 10 pages, 2016.
[48]
Y. Luo, L. Pu, Z. Peng, and Z. Shi, “RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements,” IEEE Communications Magazine, vol. 54, no. 2, pp. 32–38, 2016.
[49]
A. G. Lazaropoulos, “Designing the undersea internet of things (IoT) and machine-to-machine (M2M) communications using underwater acoustic MIMO networks,” Trends Renew. Energy, vol. 2, pp. 13–50, 2016.
[50]
A. Majid, I. Azam, A. Waheed, M. Zain-ul Abidin, T. Hafeez, Z. A. Khan, U. Qasim, and N. Javaid, “An energy efficient and balanced energy consumption cluster based routing protocol for underwater wireless sensor networks,” in Proceedings of the IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 324–333, Crans-Montana, Switzerland, March 2016.
[51]
W. Lin, D. Li, Y. Tan, J. Chen, and T. Sun, “Architecture of underwater acoustic sensor networks: a survey,” in Proceedings of the First International Conference on Intelligent Networks and Intelligent Systems, pp. 155–159, Wuhan, China, November 2008.
[52]
H. Saeed, S. Ali, S. Rashid, S. Qaisar, and E. Felemban, “Reliable monitoring of oil and gas pipelines using wireless sensor network (WSN)—REMONG,” in Proceedings of the 2014 9th International Conference on System of Systems Engineering (SOSE), pp. 230–235, Adelade, Australia, June 2014.
[53]
M. Z. Abbas, K. A. Bakar, M. A. Arshad, M. Tayyab, and M. H. Mohamed, “Scalable nodes deployment algorithm for the monitoring of underwater pipeline,” Telkomnika, vol. 14, no. 3, pp. 1183–1191, 2016.
[54]
L. A. Abdul-Rahaim and A. M. A. Ali, “Remote wireless automation and monitoring of large farm using wireless sensors networks and internet,” International Journal of Computer Science & Engineering Technology (IJCSET), vol. 6, pp. 118–137, 2015.
[55]
Y. Taniguchi, “Experimental evaluation of effect of turbidity on the performance of visible light communication in an underwater environment,” International Journal of Simulation: Systems, Science and Technology, vol. 17, pp. 1–4, 2016.
[56]
G. Antonelli, A. Caffaz, G. Casalino, N. C. Volpi, I. B. De Jong, D. De Palma, H. Duarte, J. Grimsdale, G. Indiveri, S. Jesus, and K. Kebkal, “The widely scalable mobile underwater sonar technology (WiMUST) H2020 project: first year status,” in Proceedings of the OCEANS 2016-Shanghai, pp. 1–8, Shanghai, China, April 2016.
[57]
S. Kumar, A. Perry, C. Moeller, D. Skvoretz, M. Ebbert, R. Ostrom, S. Bennett, and P. Czipott, “Real-time tracking magnetic gradiometer for underwater mine detection,” in In Proceedings of the Oceans’04 MTS/IEEE Techno-Ocean’04, vol. 2, pp. 874–878, Kobe, Japan, November 2004.
[58]
S. Kamalesh and P. G. Kumar, “Fuzzy based secure intrusion detection system for authentication in wireless sensor networks,” Journal of Computational and Theoretical Nanoscience, vol. 14, no. 5, pp. 2465–2472, 2017.
[59]
S. Kemna, M. J. Hamilton, D. T. Hughes, and K. D. LePage, “Adaptive autonomous underwater vehicles for littoral surveillance,” Intelligent Service Robotics, vol. 4, no. 4, pp. 245–258, 2011.
[60]
Q. Wang, H. N. Dai, X. Li, and H. Wang, “On modeling eavesdropping attacks in underwater acoustic sensor networks,” Sensors, vol. 16, no. 5, p. 721, 2016.
[61]
I. Butun, Prevention and Detection of Intrusions in Wireless Sensor Networks, [Ph.D. thesis], University of South Florida, 2013.
[62]
F. Hu and N. K. Sharma, “Security considerations in ad hoc sensor networks,” Ad Hoc Networks, vol. 3, no. 1, pp. 69–89, 2005.
[63]
F. Stajano and R. Anderson, “The resurrecting duckling: security issues for ubiquitous computing,” Computer, vol. 35, no. 4, pp. supl22–supl26, 2002.
[64]
T. Borgohain, U. Kumar, and S. Sanyal, “Survey of security and privacy issues of internet of things,” 2015, https://arxiv.org/abs/1501.02211.
[65]
W. Znaidi, M. Minier, and J.-P. Babau, An Ontology for Attacks in Wireless Sensor Networks, [Ph.D. Thesis], INRIA, 2008.
[66]
C. Pu, S. Lim, B. Jung, and M. Min, “Mitigating stealthy collision attack in energy harvesting motivated networks,” in Proceedings of the 2017 IEEE Military Communications Conference (MILCOM 2017), pp. 539–544, Baltimore, MD, USA, October 2017.
[67]
F. Stajano and R. J. Anderson, “The resurrecting duckling,” in Proceedings of the 7th International Workshop on Security Protocols, Cambridge, UK, April 1999.
[68]
P. Pandarinath, “Secure localization with defense against selective forwarding attacks in wireless sensor networks,” in Proceedings of the 2011 IEEE 3rd International Conference on Electronics Computer Technology (ICECT), vol. 5, pp. 112–117, Kanyakumari, India, April 2011.
[69]
M. R. Ahmed, M. Aseeri, M. S. Kaiser, N. Z. Zenia, and Z. I. Chowdhury, “A novel algorithm for malicious attack detection in uwsn,” in Proceedings of the 2015 IEEE International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pp. 1–6, Dhaka, Bangladesh, May 2015.
[70]
C. Ioannou and V. Vassiliou, “The impact of network layer attacks in wireless sensor networks,” in Proceedings of the 2016 IEEE International Workshop on Secure Internet of Things (SIoT), pp. 20–28, Heraklion, Greece, September 2016.
[71]
I. Khan, M. A. Khan, S. Khusro, and M. Naeem, “Vehicular lifelogging: issues, challenges, and research opportunities,” Journal of Information Communication Technologies and Robotics Applications, vol. 8, no. 2, pp. 30–37, 2017.
[72]
M. Demirbas and Y. Song, “An RSSI-based scheme for Sybil attack detection in wireless sensor networks,” in Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 564–570, Washington, DC, USA, January 2006.
[73]
I. Khan and S. Khusro, “Towards the design of context-aware adaptive user interfaces to minimize drivers’ distractions,” Mobile Information Systems, vol. 2020, 23 pages, 2020.
[74]
F. Yavuz, J. Zhao, O. Yagan, and V. Gligor, “On secure and reliable communications in wireless sensor networks: towards k-connectivity under a random pairwise key pre-distribution scheme,” in Proceedings of the 2014 IEEE International Symposium on Information Theory (ISIT), pp. 2381–2385, Honolulu, HI, USA, July 2014.
[75]
H. Chen and W. Lou, “On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks,” Pervasive and Mobile Computing, vol. 16, pp. 36–50, 2015.
[76]
I. Ahmad, M. S. Niazy, R. A. Ziar, and S. Khan, “Survey on IoT: security threats and applications,” Journal of Robotics and Control (JRC), vol. 2, no. 1, pp. 42–46, 2021.
[77]
I. F. Akyildiz, D. Pompili, and T. Melodia, “Underwater acoustic sensor networks: research challenges,” Ad Hoc Networks, vol. 3, no. 3, pp. 257–279, 2005.
[78]
D. Muhammed, M. Anisi, M. Zareei, C. Vargas-Rosales, and A. Khan, “Game theory-based cooperation for underwater acoustic sensor networks: taxonomy, review, research challenges and directions,” Sensors, vol. 18, no. 2, p. 425, 2018.
[79]
Y. Chen, F. Ji, Q. Guan, Y. Wang, F. Chen, and H. Yu, “Adaptive RTO for handshaking-based MAC protocols in underwater acoustic networks,” Future Generation Computer Systems, vol. 86, pp. 1185–1192, 2017.
[80]
H. Li, Y. He, X. Cheng, H. Zhu, and L. Sun, “Security and privacy in localization for underwater sensor networks,” IEEE Communications Magazine, vol. 53, no. 11, pp. 56–62, 2015.
[81]
I. Khan, S. Khusro, N. Ullah, and S. Ali, “AutoLog: toward the design of a vehicular lifelogging framework for capturing, storing, and visualizing LifeBits,” IEEE Access, vol. 8, pp. 136546–136559, 2020.

Cited By

View all
  • (2024)Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directionsThe Journal of Supercomputing10.1007/s11227-023-05646-w80:4(5163-5196)Online publication date: 1-Mar-2024
  • (2022)A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image EncryptionSecurity and Communication Networks10.1155/2022/42608042022Online publication date: 1-Jan-2022
  • (2022)Energy-Efficient Cluster Formation in IoT-Enabled Wireless Body Area NetworkComputational Intelligence and Neuroscience10.1155/2022/25585902022Online publication date: 1-Jan-2022

Index Terms

  1. Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Wireless Communications & Mobile Computing
          Wireless Communications & Mobile Computing  Volume 2021, Issue
          2021
          14355 pages
          This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

          Publisher

          John Wiley and Sons Ltd.

          United Kingdom

          Publication History

          Published: 01 January 2021

          Qualifiers

          • Review-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 11 Feb 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directionsThe Journal of Supercomputing10.1007/s11227-023-05646-w80:4(5163-5196)Online publication date: 1-Mar-2024
          • (2022)A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image EncryptionSecurity and Communication Networks10.1155/2022/42608042022Online publication date: 1-Jan-2022
          • (2022)Energy-Efficient Cluster Formation in IoT-Enabled Wireless Body Area NetworkComputational Intelligence and Neuroscience10.1155/2022/25585902022Online publication date: 1-Jan-2022

          View Options

          View options

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media