| Literature DB >> 34960366 |
Delphin Raj Kesari Mary1, Eunbi Ko2, Seung-Geun Kim3, Sun-Ho Yum1, Soo-Young Shin4, Soo-Hyun Park1,2.
Abstract
Owing to the hasty growth of communication technologies in the Underwater Internet of Things (UIoT), many researchers and industries focus on enhancing the existing technologies of UIoT systems for developing numerous applications such as oceanography, diver networks monitoring, deep-sea exploration and early warning systems. In a constrained UIoT environment, communication media such as acoustic, infrared (IR), visible light, radiofrequency (RF) and magnet induction (MI) are generally used to transmit information via digitally linked underwater devices. However, each medium has its technical limitations: for example, the acoustic medium has challenges such as narrow-channel bandwidth, low data rate, high cost, etc., and optical medium has challenges such as high absorption, scattering, long-distance data transmission, etc. Moreover, the malicious node can steal the underwater data by employing blackhole attacks, routing attacks, Sybil attacks, etc. Furthermore, due to heavyweight, the existing privacy and security mechanism of the terrestrial internet of things (IoT) cannot be applied directly to UIoT environment. Hence, this paper aims to provide a systematic review of recent trends, applications, communication technologies, challenges, security threats and privacy issues of UIoT system. Additionally, this paper highlights the methods of preventing the technical challenges and security attacks of the UIoT environment. Finally, this systematic review contributes much to the profit of researchers to analyze and improve the performance of services in UIoT applications.Entities:
Keywords: Underwater Internet of Things (UIoT); challenges; security and privacy; trends
Mesh:
Year: 2021 PMID: 34960366 PMCID: PMC8706400 DOI: 10.3390/s21248262
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1UIoT Architecture.
Research Goals.
| Queries (Qs) | Discussion |
|---|---|
| UIoT is the growing trend in the current IoT system. Recently, numerous UIoT applications have been developed for the industries. Therefore, Q1 provides the survey based on the latest article and the recently developed UIoT applications. | |
| Challenges include technical challenges, security attacks and privacy issues. Therefore, Q2 discusses the technical challenges based on UIoT channel characteristics and the possible security challenges and privacy issues in UIoT. | |
| In the UIoT system, most of the challenges and security issues are still of concern. Likewise, privacy methodologies are not yet considered for the current UIoT system. Therefore, Q3 highlights the countermeasures taken to overcome the challenges, security attacks and privacy issues of the current UIoT system. | |
| Q4 discusses the findings based on the systematic review and Q5 highlights the future direction of this paper. |
Figure 2Existing applications of UIoT.
Communication technologies of UIoT [2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25].
| Attributes | Acoustic | RF | Optical | MI |
|---|---|---|---|---|
| Channel speed | ≈1500 m/s | ≈3.33 × 108 m/s | ≈3.33 × 108 m/s | ≈3.33 × 108 m/s |
| Communication range | ≈kilometer (km) | ≈10 m | ≈10–100 m | ≈10–100 m |
| Data rate | ≈kbps | ≈Mbps | ≈Gbps | ≈Mbps |
| Signal operation | Audible | Non-visible and non-audible | Visible | Non-visible and non-audible |
| Frequency band | 10−15 kHz | 30−300 Hz | ≈5 × 1014 Hz | - |
| Size of the Antena | ≈0.1 s | ≈0.5 s | ≈0.1 s | ≈0.1 s |
| Channel characteristics dependency | Undersea noise, temperature, pressure, Doppler spread, salinity, etc. | Conductivity | Undersea noise, attenuation, turbidity, scattering, etc. | Conductivity |
| Bandwidth | ≈1–100 Kilohertz (kHz) | ≈Megahertz (MHz) | ≤150 Megahertz (MHz) | ≈Megahertz (MHz) |
| Purpose of each channel | Long-range communication | Surface water communication | Short-range communication | Underground communication in deep sea |
| Transmission power | >10 watts (W) | megawatts (MW)−watts(W) | megawatts (MW)−watts(W) | 10−8 watts (W) |
| Power loss dependency | ≈0.1 dB per meter (m) or per hertz (Hz) | ≈28 dB per kilometer (km) or one million hertz (HZ) | Depending on the turbulence of water | Depending on the permeability of undersea soils |
Figure 3Dynamic topology formation.
Figure 4Challenges in adapting FCAPSC functionality.
Figure 5Goals and classification of security attacks in the UIoT environment.
Figure 6Types of DoS attacks in the UIoT environment.
Figure 7Jamming attack in the UIoT environment.
Figure 8Battery-oriented attack.
Figure 9Sybil attack in UIoT environment.
Figure 10Wormhole attack in the UIoT environment.
Figure 11Hello flooding attack in the UIoT environment.
Figure 12(a) Selective forwarding attack, (b) black hole attack in the UIoT environment.
Systematic analysis on UIoT applications.
| Main Clause | Subclause | Paper Count | References Number |
|---|---|---|---|
| Environmental monitoring | Pollution monitoring | 3 | [ |
| Water quality monitoring | 11 | [ | |
| Monitoring depth, temperature, pressure, and pH level. | 9 | [ | |
| Fish farm and fish growth monitoring | 22 | [ | |
| Resource exploration | Finding the lost treasure | 4 | [ |
| Underwater object tracking | 9 | [ | |
| Natural resource finding (Coral reefs, minerals, manganese, etc.) | 13 | [ | |
| Disaster prevention | Earthquakes, Tsunami warning system | 7 | [ |
| Landslide detection and prevention | 9 | [ | |
| Naval applications | Submarine detection | 2 | [ |
| Mine detection | 4 | [ | |
| Surveillance | 3 | [ | |
| Others | Aquathlon (Scuba-diving, underwater hockey, underwater wrestling, etc.) | 6 | [ |
| Navigation assistance | 9 | [ | |
| Localization | 15 | [ |
Systematic analysis of the technical challenges in UIoT networks.
| Problems | Solutions and Effective Methods | Paper Count | References Number |
|---|---|---|---|
| Transmission issues | Methods to preventing path loss and data loss in UIoT networks. | 17 | [ |
| Environmental issues | Methods to solve unreliable channel conditions in UIoT networks. | 10 | [ |
| Methods to solve limited resources in UIoT networks. | 15 | [ | |
| Insecure environment issues | Methods used to support trust management, security management, hardware protection, etc., in UIoT networks. | 19 | [ |
| Cost issues | Lost cost design approaches for UIoT networks | 15 | [ |
| Channel noise issues | Methods to prevent ambient noise, mammals noise, other environmental noise in UIoT networks. | 12 | [ |
| Damages in UIoT devices | Methods to prevent internal or external damages of UIoT devices. | 9 | [ |
| Device or network configuration issues | Methods supporting self-configuration or auto-configuration mechanism for devices in UIoT networks. | 4 | [ |
Systematic analysis of security issues and management in UIoT networks.
| Main Clause | Subclause | Paper Count | References Number |
|---|---|---|---|
| Key focus on security attacks and management | Papers discussing privacy and security attacks on UIoT networks. | 10 | [ |
| Papers discussing attack prevention methods and management in UIoT networks. | 19 | [ | |
| Papers discussing message authentication techniques in UIoT networks. | 6 | [ | |
| Papers discussing localization security in UIoT networks. | 10 | [ | |
| Papers discussing key management in UIoT networks. | 6 | [ | |
| Papers discussing information management in UIoT networks. | 3 | [ | |
| Papers discussing trust management in UIoT networks. | 19 | [ |
Figure 13Results based on the systematic analysis of UIoT applications.
Figure 14Results based on the systematic analysis of mitigation methods to overcome the technical challenges in UIoT.
Figure 15Results based on the systematic analysis of security attacks and management.