| Literature DB >> 30428536 |
Guang Yang1, Lie Dai2, Zhiqiang Wei3.
Abstract
With the advances in technology, there has been an increasing interest from researchers and industrial institutions in the use of underwater wireless sensor networks (UWSNs). Constrained by the open acoustic channel, harsh underwater environment, and their own particularities, UWSNs are vulnerable to a wide class of security threats and malicious attacks. However, most existing research into UWSNs has not taken security into consideration. Moreover, the existing relatively mature security mechanisms for WSNs cannot be directly utilized in UWSNs. For these reasons, this article aims to present a comprehensive overview of the particularities, constraints, attacks, challenges and current security mechanisms of UWSNs. In addition, challenging, open and hot research topics are outlined.Entities:
Keywords: UWSNs; security; underwater communication; underwater wireless sensor networks
Year: 2018 PMID: 30428536 PMCID: PMC6263508 DOI: 10.3390/s18113907
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Underwater wireless sensor network (UWSN) architecture.
Communication bandwidth.
| Long Range | Medium Range | Short Range | |
|---|---|---|---|
| Communication Range | 20–2000 km | 1–10 km | <1 km |
| Working Environment | Deep Water | Shallow Water | Deep Water |
| Available Bandwidth | 500 Hz–10 kHz | 10–100 kHz | 100–500 kHz |
| Data Rate | <10 kb/s | <50 kb/s | >100 kb/s |
Acoustic wave loss model.
| Signal Source | Working Environment | Spreading Loss | |
|---|---|---|---|
| Spherical Wave Loss Model | point source | deep water | proportional to the square of the distance |
| Cylindrical Wave Loss Model | long line source | shallow water | proportional to the distance |
Spreading loss model for different communications range.
| Long-Distance | Medium-Distance | Short-Distance | |
|---|---|---|---|
| Spreading Loss Model | cylindrical wave | cylindrical wave and spherical wave | spherical wave |
| Spreading Loss Factor |
Figure 2Cluster UWSNs with autonomous underwater vehicles (AUVs); (a) AUV joins Cluster3; (b) AUV joins Cluster1.
Figure 3Threats and challenges in UWSNs.
Figure 4Jamming attack.
Figure 5Misdirection attack; (a) normal route; (b) misdirection route.
Figure 6Black hole attack; (a) normal route; (b) black hole route.
Figure 7Sinkhole attack.
Figure 8Wormhole attack; (a) normal route; (b) wormhole route.
Figure 9Two methods of wormhole attack; (a) using radio channel; (b) using wired channel.
Figure 10Security architecture of UWSNs.