Security challenges of Internet of Underwater Things: A systematic literature review

Water covers approximately 71% of the earth surface, yet much of the underwater world remains unexplored due to technology limitations. Internet of Underwater Things (IoUT) is a network of underwater objects that enables monitoring subsea environment remotely. Underwater Wireless Sensor Network (UWSN) is the main enabling technology for IoUT. UWSNs are characterised by the limitations of the underlying acoustic communication medium, high energy consumption, lack of hardware resources to implement computationally intensive tasks and dynamic network topology due to node mobility. These characteristics render UNWSNs vulnerable to different attacks, such as Wormhole, Sybil, flooding, jamming, spoofing and Denial of Service (DoS) attacks. This article reviews peer-reviewed literature that addresses the security challenges and attacks on UWSNs as well as possible mitigative solutions. Findings show that the biggest contributing factors to security threats in UWSNs are the limited energy supply, the limited communication medium and the harsh underwater communication conditions. Researchers in this field agree that the security measures of terrestrial wireless sensor networks are not directly applicable to UWSNs due to the unique nature of the underwater environment where resource management becomes a significant challenge. This article also outlines future research directions on security and privacy challenges of IoUT and UWSN.

[1]  Wang Jian,et al.  Classification of DoS Attacks in Smart Underwater Wireless Sensor Network , 2019, Wireless Personal Communications.

[2]  Manas Kumar Mishra,et al.  Enhance the Lifespan of Underwater Sensor Network Through Energy Efficient Hybrid Data Communication Scheme , 2020, 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC).

[3]  Iyad Dayoub,et al.  A Comparative Study of Asynchronous and Synchronous OCDMA Systems , 2021, IEEE Systems Journal.

[4]  Fazirulhisyam Hashim,et al.  Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network , 2020, IEEE Access.

[5]  Mari Carmen Domingo,et al.  Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.

[6]  M. Shamim Kaiser,et al.  Malicious attack detection in underwater wireless sensor network , 2015, 2015 IEEE International Conference on Telecommunications and Photonics (ICTP).

[7]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .

[8]  Sheetal Bagali,et al.  Efficient Channel Access Model for Detecting Reactive Jamming for Underwater Wireless Sensor Network , 2019, 2019 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET).

[9]  Yonghua Zhu,et al.  Modeling the Wormhole Attack in Underwater Sensor Network , 2012 .

[10]  Arshad Iqbal,et al.  Two hop verification for avoiding void hole in underwater wireless sensor network using SM‐AHH‐VBF and AVH‐AHH‐VBF routing protocols , 2020, Trans. Emerg. Telecommun. Technol..

[11]  Tooska Dargahi,et al.  Securing Underwater Sensor Networks Against Routing Attacks , 2017, Wirel. Pers. Commun..

[12]  I. Srinivasa Rao,et al.  Retraction Note to: Power Budget Analysis of an Ultra-Dense Coherent MB-OFDM WDM Metro-Access Networks , 2021, Wirel. Pers. Commun..

[13]  Reza Ghazizadeh,et al.  Gradient descent approach to secure localization for underwater wireless sensor networks , 2016, 2016 24th Iranian Conference on Electrical Engineering (ICEE).

[14]  Anil Kumar Verma,et al.  SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs , 2020, Wireless Personal Communications.

[15]  Haiyan Zhao,et al.  Privacy preserving solution for the asynchronous localization of underwater sensor networks , 2020, IEEE/CAA Journal of Automatica Sinica.

[16]  C. L. Philip Chen,et al.  Underwater Internet of Things in Smart Ocean: System Architecture and Open Issues , 2020, IEEE Transactions on Industrial Informatics.

[17]  Rajashri Khanai,et al.  Localization, routing and its security in UWSN — A survey , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[18]  Emad Felemban,et al.  A Survey on Current Underwater Acoustic Sensor Network Applications , 2014 .

[19]  M. Shamim Kaiser,et al.  A novel algorithm for malicious attack detection in UWSN , 2015, 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT).

[20]  Bharat K. Bhargava,et al.  Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.

[21]  Sabu M. Thampi,et al.  Secure communication in mobile underwater wireless sensor networks , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[22]  Faisal Karim Shaikh,et al.  Underwater Sensor Network Applications: A Comprehensive Survey , 2015, Int. J. Distributed Sens. Networks.

[23]  Abderrazak Jemai,et al.  A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis , 2020, Sensors.

[24]  Kamal Kumar Gola,et al.  Robust data aggregation, encryption and data transfer in UWSNs , 2015, 2015 1st International Conference on Next Generation Computing Technologies (NGCT).

[25]  Sanguthevar Rajasekaran,et al.  Data centric approach to analyzing security threats in Underwater Sensor Networks , 2016, OCEANS 2016 MTS/IEEE Monterey.

[26]  Guangjie Han,et al.  A Trust Cloud Model for Underwater Wireless Sensor Networks , 2017, IEEE Communications Magazine.

[27]  Yuan Li,et al.  Research challenges and applications for underwater sensor networking , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[28]  Liang Xiao,et al.  Jamming Games in Underwater Sensor Networks with Reinforcement Learning , 2014, GLOBECOM 2014.

[29]  Dinesh K Anvekar,et al.  Secure Localization for Underwater Wireless Sensor Networks Based on Probabilistic Approach , 2018, 2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC).

[30]  Albert Levi,et al.  Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks , 2014, Peer-to-Peer Netw. Appl..

[31]  Mohammad Hammoudeh,et al.  Analysis of attribute-based cryptographic techniques and their application to protect cloud services , 2019, Trans. Emerg. Telecommun. Technol..

[32]  Sabu M. Thampi,et al.  Fault-resilient localization for underwater sensor networks , 2017, Ad Hoc Networks.

[33]  Wei Zhou,et al.  Security in Underwater Sensor Network , 2010, 2010 International Conference on Communications and Mobile Computing.

[34]  Guang Yang,et al.  A secure and energy balanced clustering protocol for underwater wireless sensor networks , 2018, 2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).

[35]  Nadeem Javaid,et al.  NADEEM: Neighbor node approaching distinct energy‐efficient mates for reliable data delivery in underwater WSNs , 2019, Trans. Emerg. Telecommun. Technol..

[36]  Deying Li,et al.  A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[37]  Sheetal Bagali,et al.  Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network , 2020 .

[38]  Michael Zuba,et al.  Launching denial-of-service jamming attacks in underwater sensor networks , 2011, WUWNet '11.

[39]  Liang Xiao,et al.  Spoofing detection games in underwater sensor networks , 2015, OCEANS 2015 - MTS/IEEE Washington.

[40]  Athanasios V. Vasilakos,et al.  Jamming in underwater sensor networks: detection and mitigation , 2012, IET Commun..

[41]  Guang Yang,et al.  Challenges and Security Issues in Underwater Wireless Sensor Networks , 2018, IIKI.

[42]  Md. Mustafizur Rahman,et al.  ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks , 2019, 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE).

[43]  Ming Xu,et al.  SenseVault: A Three-tier Framework for Securing Mobile Underwater Sensor Networks , 2018, IEEE Transactions on Mobile Computing.

[44]  Yasser Zahedi,et al.  A Survey of Existing Medium Access Control (MAC) for Underwater Wireless Sensor Network (UWSN) , 2010, 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation.