Next Article in Journal
A FAST-BRISK Feature Detector with Depth Information
Next Article in Special Issue
Underwater Acoustic Target Recognition Based on Supervised Feature-Separation Algorithm
Previous Article in Journal
Yield Visualization Based on Farm Work Information Measured by Smart Devices
Previous Article in Special Issue
An Adaptive Prediction Target Search Algorithm for Multi-AUVs in an Unknown 3D Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks

1
School of Information Science and Electrical Engineering, Shandong Jiaotong University, Jinan 250357, China
2
College of Information Science and Engineering, Ocean University of China, Qingdao 266100, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(11), 3907; https://doi.org/10.3390/s18113907
Submission received: 9 October 2018 / Revised: 2 November 2018 / Accepted: 9 November 2018 / Published: 13 November 2018
(This article belongs to the Special Issue Underwater Sensor Networks: Applications, Advances and Challenges)

Abstract

:
With the advances in technology, there has been an increasing interest from researchers and industrial institutions in the use of underwater wireless sensor networks (UWSNs). Constrained by the open acoustic channel, harsh underwater environment, and their own particularities, UWSNs are vulnerable to a wide class of security threats and malicious attacks. However, most existing research into UWSNs has not taken security into consideration. Moreover, the existing relatively mature security mechanisms for WSNs cannot be directly utilized in UWSNs. For these reasons, this article aims to present a comprehensive overview of the particularities, constraints, attacks, challenges and current security mechanisms of UWSNs. In addition, challenging, open and hot research topics are outlined.

1. Introduction

Underwater wireless sensor networks (UWSNs) have proven strength in various underwater applications of ocean monitoring, resource exploration, surveillance and military use in harsh underwater environments [1,2].
As shown in Figure 1, UWSNs are composed of several components: onshore sink, surface buoy, underwater sink node, and underwater sensor nodes. Moreover, satellite, vessel, and autonomous underwater vehicles (AUVs) can be used to expand the sense and communication range. Underwater sensor nodes monitor physical or environmental conditions, such as pressure, sound, temperature, etc. and cooperatively transmit data to the underwater sink node. The data are transmitted to a surface buoy via wired link, and finally received at an onshore sink or surface sink via radio communication. There are three different architectures for UWSNs. Static two-dimensional architecture: all the nodes are anchored to the ocean floor. The underwater sink node collects data from sensor nodes by the horizontal transceiver. Then, it relays data to surface buoy by the vertical transceiver or wired link. Static three-dimensional architecture: underwater nodes are anchored to the seabed and fitted out with floating buoys. The buoy pays the sensor towards the water surface. The lengths of the cables are different for the required depth of sensor nodes. Three-dimensional architecture with AUVs: as discussed above, AUVs can be used to expand the sense and communication range. The AUVs could be considered as super nodes, which have more energy, can move independently, and could be routers between fixed sensors, managers for network reconfiguration, or even a normal sensor.
In UWSNs, to prolong the lifetime of whole network, cluster-based network architecture is widely used. A cluster-head (CH) node is elected to be the sink-node of the cluster, which aggregates and relays packets intra-cluster and inter-cluster. Hence, the energy consumption of CH is greater than member nodes. Sensor nodes are elected to be the CH in turn to balance the energy consumption and further prolong the lifetime of the whole network. The election protocol may be based on the residual energy [3], the best energy consumption [4], or the optimal number of CHs [5].
Existing research on UWSNs is mainly focused on communication, self-organization, processing capabilities, cover ability, connectivity, adaptability and low energy consumption. Unfortunately, this existing research is constrained in terms of countering security threats in UWSNs because the resources are much more constrained while the security situation is more server-based due to the particularities and networking environments [6].
The contributions of this article are as follows:
  • In this article, the special particularities and constraints of UWSNs and underwater acoustic channels are presented and discussed in detail. Based on the analyses, we conclude that UWSNs are vulnerable to various threats and attacks and security issues should be discussed.
  • Threats and attacks in UWSNs are classified and discussed in this article. In addition, denial of service (DoS) attacks and feasible countermeasures in each layer are analyzed in detail.
  • Compared with WSNs, some especial security requirements of UWSNs are discussed and existing security mechanisms and specific protocols are presented.
The remainder of this paper is organized as follows. In Section 2, the peculiarities of UWSNs and the underwater acoustic network environment are introduced. The threats and challenges in UWSNs are discussed in Section 3. The security requirements and current security researches for UWSNs are presented in Section 4. In Section 5, open research problems and future research topics are outlined. Finally, Section 6 concludes the paper.

2. Particularities and Constraints

As a branch of wireless sensor networks (WSNs), some particularities of UWSNs are similar to WSNs [7,8]. Unfortunately, due to the harsh working environment, there are some special particularities and constraints, which are outlined below.

2.1. Extremely Limited Resources

Underwater sensor nodes are extremely limited in hardware resources, including energy, computational capability and storage space. Due to higher distances and more complex signal processing at the receivers to compensate for the attenuation of the signal, the power consumed for underwater acoustic communication is much higher than in terrestrial radio communication. Underwater sensor nodes are deployed in shallow or deep water, where it is inconvenient to charge or replace the nodes’ battery. In the case of saving energy consumption to prolong the network lifetime, the computational capability and storage space are constricted by the energy consumption problem. Hence, virtually all existing research and technologies for UWSNs focus on saving energy consumption at the expense of capability and security.

2.2. Unreliable Communication Channel

On account of the nature of the transmission medium and physical properties of the environments, underwater acoustic channel is temporally and spatially variable.

2.2.1. Long and Variable Propagation Delay

The propagation speed of underwater acoustic wave is approximately 1.5 × 103 m/s, which is five orders of magnitude lower than the radio propagation speed (3 × 108 m/s) in air. Moreover, the speed is affected by some factors including the temperature, depth, and salinity, which can be calculated by the equations below [9]:
V 1 = 1449.2 + 4.6 T + 0.055 T 2 + 0.00209 T 3 + ( 1.34 0.01 T ) ( S 35 ) + 0.06 D
V 2 = 1449 + 4.6 T + 0.055 T 2 + 0.003 T 3 + ( 1.39 0.012 T ) ( S 35 ) + 0.017 D
V 3 = 1449.2 + 4.6 T 0.055 T 2 + 0.00029 T 3 + ( 1.34 0.01 T ) ( S 35 ) + 0.016 D
V 4 = 1448.96 + 4.591 T 0.05304 T 2 + 0.0002374 T 3 + ( 1.34 0.0102 T ) ( S 35 ) + 0.0163 D + 1.675 × 10 7 D 2 7.139 × 10 13 T D 3
V 5 = 1492.9 + 3 ( T 10 ) 4.6 T 0.006 ( T 10 2 ) 0.04 ( T 18 ) 2 + ( S 35 ) ( 1.39 0.01 T ) + D / 61
where V is acoustic speed in m/s, T is temperature in degrees Celsius, S is salinity in parts per thousand, and D is depth in meter. From the above, using different equations will get different acoustic speed. To simplify analysis and calculation, it is often assumed that the salinity and temperature is constant. Unfortunately, in coastal areas or near rivers, these assumptions are generally invalid making make the acoustic propagation speed variable. Moreover, the propagation delay is long and variable, and can be calculated as follows:
t = d v
where t is propagation delay in second, d is distance between sender and receiver in meter, and v is acoustic speed in m/s. As discussed above, due to a long propagation delay and variable sound speed, the time synchronization and the localization are difficult to achieve in the underwater scenario.

2.2.2. Limited Bandwidth and Low Data Rates

The available bandwidth of underwater acoustic channels is limited and dramatically depends on both transmission range and depth.
As shown in Table 1, for long range communication in deep water, the available bandwidth ranges from 500 Hz to 10 kHz; for medium range communication in shallow water, the available bandwidth ranges from 10 to 100 kHz; and for short range communication in deep water, the available bandwidth ranges from 100 to 500 kHz. The available bandwidth becomes much wider with the decrease of communication range, especially at ranges less than 100 m.
As shown in Table 1, the data rate is also relevant with communication range. For long range communication, the maximum data rate is approximately 10 kb/s. For medium range communication, the maximum data rate is approximately 50 kb/s. For short range communication, the maximum data rate can reach more than 100 kb/s. There is a tradeoff between data rate and channel bandwidth. Because underwater acoustic communication is possible only over limited bandwidths, the data rate of the underwater acoustic channel is much slower than radio channel in the air. In many UWSN applications including AUV control, a larger communication range is more important than a higher transfer rate.

2.2.3. Ambient Noise

Ambient noise is another factor that severely influences the communication in underwater acoustic channel. The ambient noises include: the radiated noises and self-noises from vessels, noises caused by waves and other surface motions; turbulence noise, thermal noise, and the noises that come from marine animals. These ambient noises can be classified into four types that affect acoustic communication at different frequency band, including turbulence noise (Nt, less than 10 Hz), shipping noise (Ns, 10–100 Hz), wind noise (Nw, 100 Hz–100 kHz), and thermal noise (Nth, over 100 kHz) [10]. These ambient noises can be calculated by the following empirical equations in dB, which is a function of frequency:
10 log N t ( f ) = 17 30 log f
10 log N s ( f ) = 40 + 20 ( S 0.5 ) + 26 log f 60 log ( f + 0.03 )
10 log N w ( f ) = 50 + 7.5 w 1 2 + 20 log f 40 log ( f + 0.4 )
10 log N t h ( f ) = 15 + 20 log f
where w is the speed of sea-surface wind in m/s. Based on these four ambient noises, the total noise can be calculated with the following equation:
N ( f ) = N t ( f ) + N s ( f ) + N w ( f ) + N t h ( f )
The ambient noises may cause critical effects upon sonar performance and large fluctuations upon a change in time, location or depth, which may influence the availability of the network.

2.3. Transmission Loss

During spreading, the energy of acoustic signal may be attenuated and absorbed by the medium. The transmission loss includes spreading loss and attenuation loss.
Spreading loss (SL): this is the power loss during the spreading period from source node to destination node. In the spreading period, the acoustic wave front will occupy a larger and larger surface area, and therefore the wave energy in each unit surface becomes less and less. According to the source and working environment, the spreading power loss can be modeled by two methods, including spherical spreading and cylindrical spreading. As shown in Table 2, the acoustic wave loss model includes spherical wave loss model and cylindrical wave loss model.
Spreading loss can be calculated with the following formula:
S L = d × 10 log r
where d is the spreading factor that describes the loss model, and r is the range in meter.
As shown in Table 3, the factor d is commonly set to 2 for spherical wave loss model, and set to 1 for the spherical wave loss model. But for a practical underwater application, the spreading loss is a hybrid of spherical and cylindrical spreading, where d is set to 1.5 [11].
Attenuation loss (AL): during the propagation period, the energy of an acoustic wave would be converted to other forms (e.g., heat) and absorbed by the transmission medium. Moreover, the attenuation loss is dependent on frequency. Hence, the absorption coefficient a(f) can be used to express and calculate the absorption loss, and the f is the frequency of the acoustic wave. The a(f) can be expressed empirically, using Thorp’s formula as [12]:
{ 10 log a ( f ) = 0.11 f 2 1 + f 2 + 44 f 2 4100 + f 2 + 0.000275 f 2 + 0.003 f 0.4 10 log a ( f ) = 0.002 + 0.11 f 2 1 + f 2 + + 0.11 f 2 f < 0.4
where a(f) is in dB/km, and f is in kHz.
The transmission loss TL can be calculated as follows [11]:
T L = S L + A L = d × 10 log r + r × 10 log a ( f )

2.4. Multipath and Doppler Effect

The multipath effect is a phenomenon of a wave from the source node transmitted to the destination node via two or more paths. Moreover, under the right conditions, the two (or more) arriving signals may interfere at the destination node. In UWSNs, the multipath effect is more severe than that in WSNs. In the deep water environment, the medium is homogeneous and surface and bottom reflections may be neglected. But in the shallow underwater environment, the transmission distance is larger than the water depth; moreover, depending on the depth of the water, the factors (e.g., acoustic speed, temperature, salinity, turbidity) are different. Hence, the shallow water environment can be divided into many layers from surface to bottom. The acoustic wave can be transmitted and reflected in many layers, and then the multiple arrivals of the same signal may be received at the receiver, which causes a significant multipath effect.
In WSNs, movement of the sending node or receiving node contribute to the changes in the radio channel response. As a consequence, this will result in frequency shifting as well as additional frequency spreading, and this phenomenon is the Doppler effect. The magnitude of the Doppler effect is proportional to the ratio a = v/c, where v is the relative speed between sending node and receiving node and c is the speed of underwater acoustic wave. As discussed in Section 2.2.1, the speed of the acoustic wave is much slower as compared to the speed of the electromagnetic wave. Hence, the Doppler effect is more severe in UWSNs. This effect causes distortion in two ways: spreading the received signal bandwidth B to (1 + α)B which is referred to as the motion-induced Doppler spreading, and shifting the reception frequency f by an offset of α f which is referred to as Doppler shifting [13]. The Doppler effect and time synchronization can influence localization accuracy.

2.5. Transmission Error

As discussed above, the underwater acoustic channel is significantly affected by many factors such as water temperature, low speed of acoustic wave, ambient noise, transmission loss, multipath effect, and Doppler effect [2]. All these factors may cause delay variance and bit error, which result in high bit error rate and packet loss probability in UWSNs. Moreover, the underwater acoustic channel has the character of an open channel, which is shared by all nodes within the communication range. In this case, an attacker can passively intercept and analysis acoustic signals, and even worse actively disrupt network services such as localization, time synchronization and routing. Hence, it is a great challenge to design an effective secure protocol to protect UWSNs from eavesdropping and other malicious attacks.

2.6. Dynamic Network Topology

While terrestrial sensor nodes are densely deployed, underwater the deployment is deemed to be sparser due to the cost involved and to the challenges associated to deployment itself. The majority of underwater sensor nodes are mobile due to water flow. From empirical observations, underwater objects may move at the speed of 2–3 knots or 36 km/h in a typical underwater condition, which results in a highly dynamic network topology.
As discussed in Section 1, the cluster-based network architecture is widely used in UWSNs. Moreover, to expand the monitoring and communication region, AUVs are widely utilized in many applications. The AUVs may frequently join and exit the cluster or network, which will also result in a highly dynamic topology.
As shown in Figure 2a, to communicate with a surface statin or on-shore sink, the AUV joined Cluster 3 as a member node to transmit packets via Cluster 3. As shown in Figure 2b, due to the movement, the AUV was out of the communication range of Cluster 3, the AUV exited and then joined Cluster 1 as its member node. The movement of the AUV led to variation of the network topology.
As a consequence, these variations of the network topology mentioned above may change routing and influence the accuracy rate of data transmission which can affect the overall performance of the network. In particular, in some underwater applications with AUVs, due to the high mobility of AUVs, cooperation within the nodes and designing adaptive protocols can be a major challenge.

2.7. Insecure Working Environment

For some specific fields of application, for example, underwater security monitoring or target tracking, the working environment of UWSNs may be insecure. The underwater sensor nodes may be deployed to monitor hostile objects in high seas or hostile sea regions. These nodes could become highly vulnerable to threats and malicious attacks. These nodes may be physically destroyed and, even worse, the malicious attackers may compromise nodes to get the data and inject the compromised nodes into the network acting as legitimate node to cause continuous and more serious damage.

2.8. Physical Vulnerability

In general, UWSNs nodes are waterproof, compact and sophisticated in nature. As mentioned above, sensor nodes may be deployed at harsh and unattended sea regions. They could be physically damaged if struck, making them invalid, and are also vulnerable to marine organisms. It is impossible to guard each node from potential physical damage.

3. Threats and Challenges in Underwater Wireless Sensor Networks (UWSNs)

As discussed in Section 2, UWSNs and underwater acoustic channels suffer from many constraints that lead to potential safety hazards. As a consequence, UWSNs are vulnerable to various threats and malicious attacks. In this paper, these threats and attacks were discussed and analyzed in detail.
According to actions taken by the malicious attacker, these attacks can be passive or active. As shown in Figure 3, these threats and attacks can be generally divided into two broad categories, passive attacks and active attacks.

3.1. Passive Attacks

Passive attacks refer to the attempts that are made by malicious nodes to perceive the nature of activities and to obtain data transmitted in the network without disrupting the operation. For example, eavesdropping, interfering, leakage of secret information, impersonation, message replay, and message distortion. As discussed in Section 2.2, the underwater acoustic channel is an open channel. Malicious attackers can easily capture packets transmitted in the channel by using a hydrophone or underwater microphone. Moreover, the attacker may predict the nature of communication by analyzing the packets traffic, observe the exchange of the packets, identify communicating hosts, and determine the location of nodes. Based on these actions, the malicious attacker can launch active attacks to cause more severe damage. Unfortunately, it is difficult to detect these passive attacks, since the network operation is not affected. To prevent this problem, the best solution is encryption mechanisms which make it hard for eavesdroppers to gain any information. Due to the large overhead and high energy consumption, the existing encryption mechanisms that used in WSNs and other wireless networks cannot be directly transplanted into UWSNs. The encryption mechanisms for UWSNs will be described in more detail in the subsequent sections.

3.2. Active Attacks

Active attacks refer to the attacks that attempt to alter, inject, delete or destroy the data transmitted in the network. Active attacks may intercept network data, and even worse, attempt to modify or drop packets to disrupt the communication and the operation of the network. Active attacks can be executed by internal or external malicious attackers. If the attacks are carried out by nodes that do not belong to the network, these kind of attacks are external attacks, which would be easier to detect and defend. Otherwise, if attacks come from an insider node, these kind of attacks are internal attacks, which can cause considerable damage to the network. It is unfeasible to detect a malicious node which is disguised as a normal node and then prevent it from disrupting the network. Even worse, internal attacks may be launched by compromised nodes which are actually legitimate nodes before being compromised. The compromised node has legitimate ID and other privacy data (e.g., secret key, encryption algorithm, trust value), which would act as a legitimate node and cause continuous attacks. From the analyses above, it is obvious that internal attacks are more difficult to detect and may cause more severe damages than external attacks. To prevent this problem, the feasible solution is using security mechanisms such as encryption, authentication and trust management. These security mechanisms suitable for UWSNs will be described in more detail in Section 4.
According to the intention of attacks, active attacks can be classified in the following categories: node compromise attacks, repudiation attacks, packet-oriented attacks, protocol-oriented attacks, and denial of service (Dos) attacks [14].
  • Node compromise attacks: a malicious attacker can tamper with underwater sensor nodes physically. As discussed in Section 2, in some specific fields of applications, underwater sensor nodes may be deployed in unattended and even worse hostile sea regions. Moreover, the network may consist of tens or hundreds of nodes deployed in large scales, which means that it is unable to ensure the safety of all nodes. An attacker can locate the nodes by monitoring the intensity of the acoustic signal and capture them. Worse, if there are no hardware hack-proof technique or other security mechanism, the attacker may easily crack and compromise them to read privacy data (e.g., secret key, encryption algorithm, trust value) and modify these data from internal memory. Moreover, the compromised node may be injected into the network as a legitimate node to monitor or cause continuous attacks. Therefore, in the vast majority of cases, the node compromise attacks are combined with other active attacks to cause more severe damage to disturb communication and cooperation between sensor nodes. To prevent network from these attacks, hardware hack-proof techniques, re-configuring, and trust management mechanisms should be designed and used for UWSNs.
  • Repudiation attacks: in repudiation attacks, malicious nodes deny having any involvement in particular action or communication with other nodes. This refers to the denial by a node involved in a communication of having participated in all or part of the communication, regardless whether that communication is malicious or not.
  • Packet-oriented attacks: in packet-oriented attacks, the malicious adversary lunches attacks that aiming at disrupt packet transmission or destroy the data of the packet. There are some common active attacks including: interception attack, modification attack, and injection attack. An interception attack is to capture packets from an acoustic channel by intercepting. Moreover, the attacker can read and modify the content of the intercepted packets which is called a modification attack. An injection attack is to inject useless or harmful packets into the network to consume nodes’ energy or disrupt the network.
  • Protocol-oriented attacks: the malicious adversary launches attacks that aiming at disrupt the function of some specific protocols. The main categories of this kind of attacks are: routing protocol attacks and media access control (MAC) protocol attacks. Routing protocol attacks can cause packets unable to be transferred to the destination node, and even disrupt the operation of the network. These types of attacks are mounted on the routing protocols, such as routing table overflow, routing table poisoning, packet replication, and rushing attacks. Through these malicious behaviors, attackers can attract packets and analyze or even drop packets at its will. MAC protocol attacks aimed at disrupting the mechanism that control nodes access to channel. Malicious attackers can continuously occupy the channel to deprive legitimate nodes’ chances of sending packets. Moreover, for the request to send/clear to send (RTS/CTS) handshake MAC protocol, continuously sending RTS packets would consume nodes’ battery which is a cheap and easy way to lunch attacks. To defend against these attacks, the feasible solution is using encryption, authentication and trust management mechanisms suitable for UWSNs.
  • DoS attacks: DoS attacks attempt to make resources and services unavailable to the legitimate nodes. To achieve this goal, the attacker tried to prevent legitimate nodes to access services offered by the network. DoS attacks can be passive or active, and can be carried out in many different ways. Combined with other passive or active attacks, it is more difficult to detect and defend against these attacks.
Among these active attacks discussed above, DoS attacks are more destructive, complicated, and hard to detect [15]. To guard UWSNs from DoS attacks, the approaches and features should be comprehended.

3.3. DoS Attacks

DoS attacks can be launched in different ways that do not exist in other wired or wireless networks and which can be launched at any layer of the protocol stack [16,17]. Even if UWSNs are well protected by encryption technology, they can still be threatened by DoS attacks, which can disrupt communication and cooperation between nodes and decrease availability of the whole network. Moreover, Dos attacks are low cost, deadly, and even worse, hard to detect and defend. Malicious attackers can cause severe damage at very low cost, impersonate as a legitimate node to deceive neighbor nodes, or impose particularly high power cost tasks to legitimate nodes to shorten the nodes lifetime. According to the UWSNs network model, DoS attacks and the corresponding defense technologies are discussed as below.

3.3.1. Physical Layer

The physical layer of UWSNs is in charge of the acoustic communication between nodes in the network. As discussed in Section 3.1 Passive Attacks, the malicious attacker can eavesdrop transmissions, and then predict the nature of communication by analyzing the packets traffic, observe the exchange of the packets, identify communicating hosts, and determine the location of nodes. With this information, the attacker can perform several DoS attacks in the physical layer, including eavesdropping attacks and jamming attacks.

Eavesdropping Attack

An eavesdropping attack is a kind of passive DoS attack that listens for acoustic transmissions between nodes and captures packets transmitted in the channel. If the packets are not encrypted, the attackers could easily read the data and privacy information. As a consequence, it is difficult to detect if eavesdropping is actually occurring since the attacker does not disrupt the normal communication.
In [18], the authors presented an analytical model which investigates the probability of eavesdropping attacks with consideration of underwater acoustic channel conditions, including signal attenuation and ambient noise. The relationship between the eavesdropping success condition and the underwater acoustic signal channel is established. The authors derive the eavesdropping probability from consideration of both isotropic eavesdropper and array eavesdropper, respectively. Moreover, the probability heavily depends on the acoustic signal frequency, spreading factor, wind speed and node density.

Jamming Attack

As shown in Figure 4, in a jamming attack, one or several malicious nodes constantly emit useless or undesired signals, and thus normal communication with other legitimate nodes in the affected region will be interfered with. Worse, the malicious nodes can paralyze the entire network by jamming only a few special nodes such as cluster-head node, root node or base station. These special nodes are responsible for aggregating data, transmitting packets, and managing the network. For example, as shown in Figure 1, the underwater sink node aggregates data from sensor nodes and then sends this data to the on shore base station or surface sink. Jamming attackers can continuously send packets or communication requests to the underwater sink node. In this manner, the underwater sink node is not able to respond to requests from legitimate nodes or receive packets. Moreover, the attacker may simply keep requesting an opportunity to send data to realize the goal. A jamming attack can effectively disrupt localization protocols in an underwater environment.
In [19], the author defined two types of attackers with four different attack methods and introduced the effects of jamming attacks on underwater acoustic networks (UANs). These attacks are evaluated on three commonly used underwater acoustic modems in a real-world experimental testbed in Mansfield Hollow Lake, Mansfield, Connecticut and in a lab testbed. But no feasible solution to defend jamming attack is given in this article.
To defend against jamming attack, the majority of anti-jamming mechanisms used in WSNs cannot be directly used in UWSNs. Spread-spectrum techniques are widely used in underwater acoustic communication. Among these techniques, the frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS) are drawing interest for their good presentation over noise and multipath interference [20]. To an extent, FHSS and DSSS techniques are resistant to interference from jammers. Even if a FHSS technique is used, the jamming attacker can jam a wide band of the spectrum. Worse, the DSSS technique is also vulnerable to a high-power jamming signal. Another way to defend against a jamming attack is that the nodes switch to sleep mode and periodically wake up to check the attack is over. Unfortunately, for some kind of UWSNs, these spread-spectrum techniques are not suitable. In [21], a multi-armed bandit–based acoustic channel access algorithm is proposed to achieve the jamming-resilient cognitive acoustic communication. In [22], the author resorted to jamming-resilient techniques such as multipath transmissions. The results showed that the inherent redundancy of multi-path routing offers an effective shield against excessive packet losses in the presence of strong jamming. In [23], a detection scheme based on a partial-packet for reactive jamming is proposed. The work estimated the probability of high deviation in received signal strength (RSS) using a weak estimation learning scheme. The performance was evaluated through simulation, which showed that the proposed scheme is capable of accurately detecting reactive jamming in UWSNs. In [24], the authors studied the characteristics of jamming in UWSN, and proposed an underwater jamming detection protocol (UWJDP) to detect and mitigate jamming in underwater environments. The results showed that if the packet delivery ratio is less than or equal to 0.8, the mechanism will reach the maximum probability of detecting jamming.

3.3.2. Datalink Layer

Due to the limited bandwidth of the underwater acoustic channel, MAC protocols are utilized to enable multiple devices to share the acoustic channel in an efficient and fair way. But unfortunately, there are several kinds of DoS attacks that can be launched at this layer to consume the battery of legitimate nodes or disturb normal MAC operation, including the Jamming Attack, Collision Attack, Exhaustion Attack, Denial-of-sleep Attack, and Unfairness.

Jamming Attack

A datalink layer jamming attack is similar to that in the physical layer, but in a smarter and more efficient way. The malicious attacker can achieve the goal by just repeatedly sending request to send (RTS) packets. The legitimate nodes are deprived of the chance of accessing the channel. As a consequence, this disrupts the cooperation between nodes and communication of the network. In contention-based MAC protocols, the malicious attacker can give itself the highest priority and occupy the channel all the time. Therefore, scheduled MAC protocols are capable of defending against the attack. Anti-replay protection and link-layer authentication can mitigate these attacks. Unfortunately, receiving large quantities of RTS packets still consume a node’s energy and occupy channels.

Collision Attack

For the RTS/CTS handshake mechanism, in which any node detected either an RTS or a CTS packet from the channel, it should not transmit packets during the time period. However, a malicious node may violate this mechanism, and transmits packets even after detecting a CTS packet destined for a legitimate node, which will cause a collision at the receiver. It is obvious that a change will occur in the collisional data, and the packet will become invalid. Colluding in a collision attack interrupts packets during communication, and a mitigating colluding collision technique can defend against a colluding collision attack [25]. In a manner, an error correcting code is a feasible technique to avoid collision.

Exhaustion Attack

An exhaustion attack refers to keeping the channel busy and exhausting the node’s battery by introducing a malicious node in the network. It can be launched by the intruder, or by a compromised node on which the internal program code was modified by an intruder. Another form of exhaustion attack is that the intruder node sends numerous join-requests or RTS/CTS packets to force the target node to send or receive. The feasible solution is rate limitation on each node in the network. A fuzzy logic based solution against distributed node exhaustion attack is proposed in [26].

Denial-of-Sleep Attack

A denial-of-sleep attack is to prevent the node from going into sleep mode [27]. An attacker might choose to execute a denial-of-sleep attack over a simple jamming-based DoS attack. To permanently disable the network, it may take months to exhaust the targeted node’s batteries. A smarter denial-of-sleep attack that keeps the sensor nodes on working mode would drain the batteries in a very short period (maybe only a few weeks or days). Worse, some denial-of-sleep attackers are not required to constantly send signals, making it more difficult to locate the attacker via its emitted transmissions.

Unfairness

This is a weak form of DoS attack which is performed by attacker to degrade the network performance instead of completely preventing legitimate nodes from accessing the channel. A small frames technique can be used to reduce the amount of time. This technique lessens the effect at the expense of efficiency. Moreover, it is susceptible to further unfairness. For example, an attacker may retransmit at a higher speed instead of randomly delaying.
The majority of datalink layer DoS attacks discussed above can be prevented by using error detection code, rate limitation, and by dividing the packets into small frames.

3.3.3. Network Layer

Network layer is responsible for routing packets from the source node to the destination node. Owing to the particularities and constraints discussed in Section 2, the network layer is vulnerable to many threats and attacks which aim to disturb the routing of the network, including the Replay Attack, Selective Forwarding Attack, Neglect and Greed, Misdirection Attack, Black hole/Gray hole Attack, Sinkhole Attack, Wormhole Attack, Sybil Attack, Hello Flooding Attack, and Homing Attack.

Replay Attack

In a replay attack, the attacker (A) intercepts a message sent by sender (S) to receiver (R), after a short delay, then resends it to R. Even though the packet is received, but the arrival time at R is changed due to the delay by A. As a consequence, the fake propagation time and signal strength result in R receiving imprecise locations and distance between them, which is usually estimated according to signal arrival time or difference in signal strength. Authentication and anti-replay techniques can protect against a replay attack.
In [28], an underwater media access control protocol based on the RTS/CTS mechanism with a cipher block chaining-message authentication code is proposed to provide data confidentiality, authenticity, and replay attack protection. In [29], a secure MAC protocol for cluster-based UWSNs is proposed to ensure the security of data transmission. A random nonce is used to prevent a replay attack, which is updated each time after the message was transmitted. Therefore, the attacker cannot pass the authentication even if the attacker had made a copy of the previous message.

Selective Forwarding Attack

In this attack, malicious nodes behave like legitimate nodes, but selectively drop packets, and refuse to forward the received packets. However, there is a risk that the neighbor node may find other paths to route the packet to the destination node. Hence, in order to avoid being detected it selectively forwards certain packets and drops certain packets. The attacker interested in suppressing and modifying a packet originating from few selected nodes can reliably forward the remaining and limit suspicion of its wrongdoing [30].
To detect a selective forwarding attack, pre-defined watchdog mechanism can be used for WSN, which have pre-defined rules for raising intrusion alerts. In this mechanism, attacks can be detected by allowing nodes to listen to the next hop nodes in a broadcasting transmission [31]. Unfortunately, the pre-defined watchdog mechanism is unsuitable for UWSN. This mechanism will fail in the case of a collision due to uncertainty ambiguity in the receiver, inadequate transmission power, fake misbehavior, and partial packet dropping. In [32], evidential evaluation is used to identify the selective forwarding attacks, which utilize the Dempster–Shafer theory of combined multiple evidences. Hop-by-hop cooperative detection scheme was proposed in [33] to detect and mitigate the selective forwarding misbehaviors for WSN. The trust management and reputation mechanisms based on behavior evaluation can be used to detect these attackers and then isolate them from the network [34,35].

Neglect and Greed

This attack is a special case of selective forwarding attack, as the malicious attacker may randomly drop the received packets but still acknowledge the source node (Neglect attack), or give excessive priority to its own packets (Greed attack). The protocols which are based on dynamic source routing are the most vulnerable to this attack [36].
The feasible solution to this kind of attack is to declare alternative routing paths, and using redundant messages is another feasible solution. But in exchange, more energy will be consumed, which is the most severe resource constraints for UWSNs.

Misdirection Attack

In a misdirection attack, the malicious attacker forwards packets to incorrect paths by modifying routes or misdirecting packets to a malicious node. As illustrated in Figure 5a, the normal route should be from Node1 to Node4, but the malicious attacker (M) modified the route to Node6.
This attack can be protected by amending the route path which consists of source-routes in each packet. Authorization, egress filtering, trust-aware routing, and monitoring of routes are feasible techniques for defending against a misdirection attack. In [37], a defense mechanism is proposed for the detection and isolation of the misdirection attack in WSNs. The proposed technique is based on node localization, in which delay per hop is counted. The node that is increasing delay maximum times would be detected as a malicious node. Unfortunately, it is hard to get nodes’ precise positions and the distances between nodes in the underwater environment, which means that the mechanism is not suitable for UWSNs.

Black Hole/Gray Hole Attack

In this attack, an attacker acts as a black hole by broadcasting forged routing information with the lowest cost or shortest path toward destination. The victim nodes would select this path as the optimum route which actually goes through the attacker. As a consequence, the attacker can attract and pull in all the traffic of the network. Moreover, the attacker may analyze, modify, or even drop packets at will. If the attacker drops all data packets, this attack is known as a black hole attack. If it selectively drops some critical packets, it is known as a gray hole attack.
As illustrated in Figure 6a, based on the location information, the packets from Node1 will be relayed by Node2 and Node3 to Node4. A black hole node will broadcast its false location to disguise itself as the node nearest to the sink node. As illustrated in Figure 6b, nodes in the network mistake the black hole node as the best choice to relay packets to the sink node. Hence, all the packets would be captured by the black hole node.
This type of attack is harmful for sensor nodes that are deployed considerably far from the sink node. In a smarter way, the attacker may drop critical packets during a certain time period or with a certain percentage, making it more difficult to be detected. Some existing work has addressed this attack and feasible countermeasures have been proposed. In [38], an efficient and trust-based distributed intrusion detection system is proposed to defend against single and cooperative gray hole and black hole attacks. A secure routing protocol based on elliptic curve cryptography (ECC) is proposed in [39] to detect and defend false reports and gray hole attacks. A trust-based clustering protocol is proposed to detect the gray hole and prevent compromised nodes from becoming cluster head [40].

Sinkhole Attack

The sinkhole attack is a particular black hole attack that prevents the legitimate sink node from obtaining data transmitted by underwater sensor nodes, and it will cause serious threats to higher-layer protocols and applications. To gain the goal, the attacker manages to attract almost all traffic that is destined to the sink node, which appears more attractive to neighboring nodes by disguising them as the shortest hop count path. Then, the attacker may drop the packets or get privacy data from them. As illustrated in Figure 7, the ideal location for such an attacker is near the legitimate sink node.
AODV (Ad hoc On-demand Distance Vector Routing)-based secure routing algorithm with mobile agent is proposed to detect malicious node in network [41]. In [42], an intrusion detection system (IDS) against sinkhole attacks is proposed, in which the network area is divided into a flat grid of cells. The signature-based technique was used to detect and remove fake sink nodes. The proposed IDS considered two types of sink mobility: periodic and random. Geographic routing [43,44] and authentication are feasible countermeasures against this attack. Unfortunately, geographic routing protocols are also a challenging research topic in UWSN.

Wormhole Attack

In a wormhole attack, two distant malicious nodes are commonly involved, which constitute a wormhole attack tunnel. As illustrated in Figure 8a, A malicious attacker (labeled as W1) captures packets from source node N1 and uses a faster tunnel to send the packets to another attacker node (labeled as W2) which delivers the packets to the destination node N4.
As shown in Figure 9, the wormhole tunnel can be a RF link (above the water surface) or wired link, which is much faster than underwater acoustic channel [45]. This attack can prevent the source node from discovering and selecting other legitimate routes and thus disrupts network functionality. Similar to the black hole attack, a wormhole attack can attract packets forwarding and severely disturb normal routing. Wormhole attack detection and countermeasures have attracted many research studies. In [46], a wormhole attack was simulated in NS 2. The work selected the existing wired object link in the NS 2 wired simulation package to simulate the “tunnel” by copying the local packets and directly sending them to the wormhole object installed in a remote node. A secure localization algorithm for UWSNs is brought out in [47], which is based on the constraints of propagation distance and reputation values. The anchor nodes evaluated the reputation of paths to other anchor nodes and broadcast these reputation values to the network, and unknown nodes select credible anchor nodes with a high reputation. In [48], a two-tier localization scheme is proposed to identify short-range wormholes instantly, and long-haul wormholes within a limited latency. A distributed approach to detect and mitigate wormhole attacks is identified in [49], and an analytical model is provided to capture the interactions between various contributing parameters. In [50], a distributed visualization of wormhole is proposed to detect wormhole attacks. However, it is not feasible for large-scale or high-density UWSNs, since the reconstruction of the network would cause large energy consumption.

Sybil Attack

In the Sybil attack, an attacker may forge multiple identities and pretend to be in multiple places at the same time. The basic goal of these false identities is to deny the information passing procedure. These multiple identities can be occupied by fabricating faults or stealing the identities of legitimate nodes. Hence, the Sybil attack can also cause severe damage to distance-based or location-based routing protocols. Moreover, the attacker can behave as a base station or receiver, which sends acknowledgment packets to sensor nodes to avoid retransmission.
Authentication and position verification are feasible countermeasures, but position verification is difficult owing to mobility. The author of [51] presented a robust and lightweight scheme to detect a Sybil attack, which is based on received signal strength indicator (RSSI) readings of messages. Another countermeasure is the random key pre-distribution [52], which relies on cryptographic principles and is easy to analyze. In [53], a Sybil attack detection scheme based on state information of the nodes is proposed, which assume the availability of beacon nodes. But, this scheme assumes that each node is stationary and has the same transmission range over bidirectional links, and depends on the density of legitimate neighboring nodes.

Hello Flooding Attack

In some routing protocols of UWSNs, nodes broadcast hello messages to inform the presence to one-hop neighbors. An adversary may launch attacks by recording the hello packets and sending them from a super node with higher transmit power and larger communication range. These replayed hello packets can reach nodes which are out of communication range of the source node. Any node that uses the source node as the next hop in a route but that is out of that node’s communication range will be unable to forward packets.
Pairwise authentication and geographic routing protocols are feasible countermeasures for this attack. In pairwise authentication schemes, nodes can verify bidirectional links before constructing routes. Geographic routing protocols [54] that let nodes discount hello messages from nodes without communication range can also prevent UWSN from this attack. Geographic protocols require each node to know its location and be able to communicate that location to other nodes. However, precise positioning is also a challenging research topic in UWSNs.

Homing Attack

In a homing attack, malicious attacker may analyze the traffic to identify and target nodes that have special responsibilities, such as cluster heads or sinkhole node. Moreover, the attacker may launch other DoS attacks to jam or destroy these special nodes.
Header encryption is a common countermeasure, but it does not completely prevent analyzing traffic. It might be enough to identify the location of these special nodes by simply analyzing the volume of traffic in various portions of the network. In [55], an anti-traffic analysis strategy is proposed to help disguise the location of the base station from eavesdroppers by using “dummy packets”. Unfortunately, these dummy packets significantly consume nodes’ energy, especially for UWSNs. Hence, it can be used only when it is of utmost importance to prevent traffic analyzing.

3.3.4. Transport Layer

The transport layer of UWSNs is responsible for the reliable transport of packets. Typical DoS attacks at this layer include the desynchronization attack and synchronization flooding attack.

Desynchronization Attack

In a desynchronization attack, a malicious attacker interrupts active connections between nodes by transmitting forged packets with bogus sequence numbers or control flags that desynchronize endpoints. For UWSNs, synchronization is very important and difficult, moreover, the global positioning system (GPS) is not suitable [2]. Hence, GPS-free synchronization mechanisms are used. A malicious attacker may forge messages carrying wrong sequence numbers to disturb synchronization between nodes, which can affect the accuracy of the synchronized clocks and the efficiency of scheduled operations. Worse, all GPS-free time synchronization schemes are vulnerable to wormhole attacks. If the attacker combined a desynchronization attack with a wormhole attack, it could severely disrupt communication and cooperation of the whole network. For example, wormhole, Sybil, or replay attacks may cause fake measurement results on ranges or round-trip time (RTT) between legitimate nodes, which are important parameters for time reference alignment. Header or full packet authentication can defeat such an attack.

Synchronization Flooding Attack

When a protocol is required to maintain a state it becomes vulnerable to memory exhaustion through flooding. An attacker may repeatedly make new connection requests until the resources required by each connection are exhausted or reach a maximum limit. A very common form of DoS attack involves sending a large number of common packets, e.g., transmission control protocol (TCP), internet control message protocol (ICMP), and user datagram protocol (UDP), which aimed at a single destination. The huge traffic deluge caused by these packets leads the network to no longer be able to distinguish between legitimate and malicious traffic.
Using connectionless transport protocols is a feasible countermeasure, but at the expense of lack of necessary transport-layer functionality to applications. The primary defense against this attack is synchronize sequence numbers (SYN) cookies [56], which encode information from the client’s TCP SYN message and return it to the client to avoid maintaining state at the server. Unfortunately, this technique calls for high computational capacity and causes extra messages overhead, which makes it undesirable for UWSNs.

4. Security Issues of UWSNs

4.1. Security Requirements

As discussed in Section 3, UWSNs are vulnerable to various attacks. Hence, UWSNs should meet some security requirements in actual applications. As a branch of WSNs, the security requirements of UWSNs are similar to terrestrial WSNs [7]. But due to the particularities and constraints of UWSNs discussed in Section 2, there are also some special security requirements.
(1) Confidentiality
This concerns preventing unauthorized nodes from understanding the contents of the sensitive data (e.g., security credentials and secret keys). Confidentiality is not restricted only to the survivability of a user’s information (e.g., strategic or tactical military information), but also to the survivability of the MAC, routing information, etc. These sensitive data should be prevented from reading or tampering by a malicious attacker. Confidentiality can be achieved by applying a low power-efficient encryption technique which is suitable for UWSNs. The cipher text stealing technique [57] is a lightweight typical encryption technique used in UWSNs.
(2) Authentication
As discussed above, the acoustic channel is open and, moreover, the malicious attacker can easily capture and modify packets if there is no encryption technique. Hence, receiving node needs to identify the source of the data in order to filter malicious attacks. Only authorized nodes have the right to access and share channel, services, applications and data on that network. Intrusion detection and a trust management mechanism can be utilized to identify abnormal activities to remove malicious nodes from the network. These mechanisms ensure that only the authorized nodes have permission to perform in the network.
(3) Integrity
Data integrity is to ensure that the received data is not modified, removed, or corrupted in transition by unauthorized nodes either by radio failure or malicious attack. This is most essential in circumstances such as military operations and equipment controls where such changes could cause serious damage. The message authentication code [58] for data authentication has been widely applied in WSNs and UWSNs, which has good scalability, low latency, reliability, adaptability and ease of implementation.
(4) Freshness
Freshness is to ensure that the received data is fresh and it is not the retransmission of legacy data. Routing updates should be delivered in real time. The delay of the update messages might reflect the wrong state of the network and lead to a large loss in information.
(5) Availability
Availability is to ensure that the network must be robust enough. Even if some nodes fail or the system is attacked, it will still be able to provide services. Proper redundancy tactics and self-adaptive tactics can supply availability for UWSNs.
(6) Isolation
Isolation is to ensure that nodes should be able to identify abnormal activities and isolate malicious nodes. Moreover, MAC protocols and routing protocols should be immune to malicious attacks. Proper trust management and lightweight cryptography algorithms can be used to isolate malicious nodes.
(7) Self-stabilization
Self-stabilization is to ensure that nodes should be able to recover from attacks independently in real time without intervention. If a node is self-stabilizing to malicious attacks, it can automatically recover its normal state, even if the attacker remained in the network.
(8) Survivability
This is the capability of the system to fulfill its mission in a timely manner, in the presence of accident, failure, intrusion or malicious attacks. It is to ensures that the network can restore and maintain essential services during and after malicious attacks, even if part of the network had been destroyed.

4.2. Security Mechanisms

To achieve the objectives of the security requirements mentioned above, a set of security mechanisms and technologies should be utilized to enforce these security requirements and prevent UWSNs from attacks.
To provide a comprehensive solution, according to the open system interconnection (OSI) network, the security issues of UWSNs are logically divided into separate secure components. As shown in Figure 10, the security architecture of UWSNs can be divided into four layers: physical layer, link layer, transport network layer, and application layer.
The security issues that are applied in UWSNs include: key management, intrusion detection, trust management, secure localization, secure synchronization, secure MAC, and secure routing.

4.2.1. Key Management

Cryptographic and key management play very important roles in ensuring confidentiality, authentication, integrity, and non-repudiation. Cryptography enables sensitive information to be stored or delivered in unsecure networks such as the underwater acoustic channel so that it cannot be read or modified by unauthorized users. Due to the particularities and constraints of UWSNs discussed in Section 2, the encryption and key management mechanisms for WSNs are unsuitable for UWSNs. In these traditional public key cryptography (PKC) schemes, a public key infrastructure (PKI)-based method needs the certificate authority (CA) to manage the certificate and key distribution, which result in high communication and computation cost. It is not affordable for resource-constrained UWSNs [59,60]. In identity-based encryption (IBE) schemes, there is no need for PKI, and the public keys are computed according to the node ID. Hence, an IBE scheme avoids the resource cost for storing and granting certificate, which makes it a feasible scheme for public key encryption in WSN. However, distribution of a private key by PKG will cause high communication costs, which is a heavy burden for UWSNs.
Related research has been presented for UWSNs in recent years [61,62,63,64,65,66,67,68]. Unfortunately, the existing cryptography and key management mechanisms are suffering from some problems, including cipher text expansion and computational complexity.
Message padding and codes increase the length of messages after applying cryptography and cause more energy consumption on transmission and computation. For instance, with the standardized AES encryption, the block size is 128 bits, and the message expansion due to padding is around 18% for a typical UWSN message of 720 bits [69].
A digital signature is usually used for message authentication. A digest is appended to an authenticated message that will cause expansion and communication overhead. For example, the size of a digest produced by SHA-256 is 256 bits, which can cause an overhead up to around 35% of an average UWAN message [70].

4.2.2. Intrusion Detection

Intrusion detection mechanisms are to detect, identify and isolate malicious attackers from the network, including internal or external intruders. However, intrusion detection mechanisms usually work after the malicious attacks take effect and have been discovered. It is difficult to detect malicious intruders the first time that attacks occur. Hence real-time detection mechanisms need to be researched and improved. Alternatively, intrusion tolerance mechanisms can be used to protect networks while allowing the existence of malicious intruders, which is considered to be an efficient security mechanism. Moreover, algorithms, technologies and IDS have been proposed to further improve UWSNs security.
Standalone IDS: there is no data exchanged between nodes; each node runs IDS and detects attacks independently.
Distributed and Cooperative IDS: every node participates in intrusion detection by having local and global detection decision-making.
Hierarchical IDS: this is suitable for multilayered UWSNs. Cluster head nodes in clusters perform the task of IDS and act as checkpoints such as routers in wired networks.
Among these types of IDS, the hierarchical IDS is suitable for UWSNs which are based on a cluster structure.

4.2.3. Trust Management

As an important complement to security defense, a cryptography-based trust management mechanism has significant advantages in intrusion detection. Due to the particularities and constraints of UWSNs discussed in Section 2, the research on trust management mechanisms in UWSNs faces challenges [71].
The existing trust management mechanisms can be classified into three categories: centralized scheme, distributed scheme, and hierarchical scheme.
Centralized Scheme: in a centralized scheme, a root node or a base station supply trust management for each node in the network. The centralized schemes are inappropriate for UWSNs, because the energy consumption of trust values exchanging between sensor nodes and the base station is an expensive burden.
Distributed Scheme: in a distributed scheme, each node needs to compute and maintain the trust values of entire network. But it is impossible for UWSNs, as discussed in Section 2, as underwater sensor nodes are extremely limited in hardware resources. Hence, the distributed schemes are also inappropriate for UWSNs.
Hierarchical Schemes: this kind of trust management scheme is used by the PKI. There is a root CA which is directly trusted. The CA may certify certificates themselves, or may certify certificates that certify other certificates (trusted introducer) down some chain. The hierarchical scheme is represented as a tree structure. The leaf certificate’s validity is verified by tracing backwards from its issuer to other issuers, until a directly trusted root (CA) certificate is found.
As discussed above, it is obvious that neither pure centralized nor pure distributed schemes are suitable for UWSNs. In hierarchical schemes, the computation and transmission of trust value is implemented in a hierarchical way. The trust values are passed and merged from a lower layer to an upper layer. Therefore, the hierarchical schemes are more appropriate for cluster-based topology which was widely used in UWSNs. In order to broadcast control information and retrieve the readings from underwater sensor nodes, the sink node must be able to authenticate itself. Moreover, in most applications the sink node acts as an interface between the UWSN and the land network.

4.2.4. Localization Security

Location estimation is a vital component in the source detection and tracking applications. The underwater sensor nodes get the location information and speed of mobile nodes during the localization phase. The location and motion information would be used in the routing protocol to select the best relay node to forward data. Without the location information, the sink node cannot identify where the received data comes from.
Due to the characteristics of the underwater channel (long propagation delays, Doppler effect, limited bandwidth, node mobility and multipath), localization protocols proposed for WSNs cannot work in underwater applications. With regard to the mechanisms used for location estimation, underwater localization algorithms can be classified into three categories: range-based schemes, range-free schemes, and hierarchical schemes [72]. In the range-based location algorithms, distance or angle estimates with neighbors will be used for calculating node locations. In the range-free location algorithms, due to the energy consumption and hardware limitation, the neighbor distances or angle information are assumed to be unavailable for positioning. The hierarchical schemes consist of four types of nodes, which are surface buoys, detachable elevator transceivers (DETs), anchor nodes and ordinary nodes. A surface buoy is assumed to be equipped with GPS on the water surface. A DET is attached to a surface buoy and can rise and down to broadcast its position. The anchor nodes can compute their positions based on the position information from the DETs and the measurement of distance to the DETs.
Some localization-specific attacks e.g., Sybil attack, black hole attack and wormhole attack can cause great damage by utilizing or modifying the localization information. Most of the existing localization protocols do not take security issues into account when being designed. The secure localization scheme should be able to determine the location of sensors even in the presence of Sybil and wormhole attacks, and the scheme should be able to node mobility in UWSNs. To defend against injecting false localization information in UWSNs, effective and efficient cryptographic algorithms need to be developed [73,74,75,76].

4.2.5. Synchronization Security

As discussed in Section 4, synchronization is essential in many underwater applications and scheduling MAC protocols. As discussed in Section 2, due to the characteristics of UWSNs, synchronization security protocols proposed for WSNs are unsuitable for UWSNs. Moreover, it is especially difficult to achieve precise time synchronization in underwater environments.
Although it is critical among the UWSN issues, none of existing time synchronization schemes [77,78,79] take security in consideration. Proper cryptographic techniques can be used to defend time synchronization attacks (e.g., masquerade, replay and manipulation attacks). However, the countermeasures against delay attacks for WSNs [80,81,82] are not applicable to UWSNs.

4.2.6. Routing Security

Routing security consists of basic transports and connectivity security mechanisms which are applied to routing protocols as well as the individual nodes. Moreover, nodes must exchange information with their neighbors to construct the network topology in order to apply one of the routing protocols (proactive, reactive and hybrid).
Routing security involves two aspects: secure routing and secure data forwarding. In secure routing, nodes are required to cooperate in order to share correct routing information, thus keeping the network connected efficiently, whereas in secure data forwarding, data packets must be protected from tampering, dropping, and altering by any unauthorized party. In recent years, many research papers have been presented to supply routing security for UWSNs [83,84,85,86,87,88].

4.3. Security Systems

With the development of technology, security issues have been taken more seriously. Much research on specific security issues has been undertaken, and moreover, relatively mature security systems for WSNs have been proposed. To the best of our knowledge, security protocols for sensor networks (SPINS) [89] is the first security system for WSNs, which was proposed by Perrig A on 2002. SPINS can provide data authentication, replay protection, and communication cost is low. Based on SPINS, extended security frameworks were proposed [90,91]. TinySec [92] is another lightweight link layer security architecture for WSN, which can provide authentication, integrity and confidentiality. Some research utilized [93] or extended [94] TinySec for WSNs. Beyond these two widely used security systems, there are also some other security systems, such as Minisec [95] and SHARP [96].
Although much security research mentioned above has been undertaken for UWSNs, almost all of them focused on a specific issue and have not been empirically verified. In [62], the existing secure communication protocols were discussed and compared carefully in detail.
As far as we can ascertain, there is still no practical, system-level security system for UWSNs. Hence, this will be a challenging topic and new trend for UWSNs.

5. Discussion and Future Research Topics

As discussed in previous sections, due to UWSNs’ particularities and constraints, mature technologies and systems cannot be directly utilized in them. Even though some security technologies have been investigated to secure UWANs, but almost of them are still in the theory stage, and empirical research is rare. Moreover, few proposals addressed several security issues systematically. UWSNs security research is still in its early stage, and moreover, several important issues have not been solved adequately.
In addition, network security is a complex cross-layer issue, and an optimal utilization of various security technologies among these layers is most important to minimize extra resource consumption, especially for severe resource-constrained UWSNs.
As discussed above, UWSNs are deployed underwater, and it is difficult to protect each underwater node and detect compromised nodes. The security schemes are pre-installed in the sensor nodes. If the node is compromised and rejected in the network, it will cause more severe damage. In this case, it is necessary to reconfigure security systems periodically, while the design and realization of such reconfiguring systems is also a challenge and important issue.

6. Conclusions

In this article, the challenges, threats and security issues in UWSNs are reviewed. Firstly, a brief introduction about UWSNs is presented. In the second part, the peculiarities and constraints of UWSNs and underwater environments are analyzed. Due to these particularities and constraints, UWSNs are vulnerable to a wide range of security threats and malicious attacks, which were discussed in Section 3. These attacks can severely disturb the communication and cooperation of the network. To avoid these attacks and guarantee the formal function of the network, the security requirements of UWSNs are introduced in Section 4. Furthermore, some specific security technologies and security schemes are discussed and analyzed. In Section 5, we discussed the existing security technologies and security systems, and introduced the new trend and challenging topics for UWSNs.
As discussed in this article, it is not easy to secure UWANs due to their peculiarities and constraints as well as the high cost of network deployment and maintenance. On the other hand, the particularities of UWANs also impose challenges, and should be leveraged in the design of security schemes. Moreover, applications may have different requirements in terms of security, and excessive security schemes will be a heavy burden in terms of energy consumption. Hence, how to take into account these features in security scheme design is also an important issue in future research.

Author Contributions

G.Y. and L.D. classified and analyzed the original literatures; Z.W. proposed this work and guided the writing; G.Y. and L.D. did the search and revised the paper. G.Y. wrote the paper.

Funding

This work was funded by the National Natural Science Foundation of China (Grant No. 61601264) and A Project of Shandong Province Higher Educational Science and Technology Program (Grant No. J15LN13) and Shandong Province Natural Science Foundation (ZR2015FL013).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cui, J.H.; Kong, J.; Gerla, M.; Zhou, S. Challenges: Building scalable and distributed Underwater Wireless Sensor Networks (UWSNs) for aquatic applications. Channels 2005, 45, 22–35. [Google Scholar]
  2. Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  3. Li, X.; Fang, S.; Zhang, Y. The study on clustering algorithm of the underwater acoustic sensor networks. In Proceedings of the 14th IEEE International Conference on Mechatronics and Machine Vision in Practice (M2VIP 2007), Xiamen, China, 4–6 December 2007; pp. 78–81. [Google Scholar]
  4. Wang, P.; Li, C.; Zheng, J. Distributed minimum-cost clustering protocol for underwater sensor networks (UWSNs). In Proceedings of the IEEE International Conference on Communications (ICC’07), Glasgow, UK, 24–28 June 2007; pp. 3510–3515. [Google Scholar]
  5. McGlynn, M.J.; Borbash, S.A. Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Long Beach, CA, USA, 4–5 October 2001; pp. 137–145. [Google Scholar]
  6. Heidemann, J.; Ye, W.; Wills, J.; Syed, A.; Li, Y. Research challenges and applications for underwater sensor networking. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, NV, USA, 3–6 April 2006; Volume 1, pp. 228–235. [Google Scholar]
  7. Lopez, J.; Roman, R.; Alcaraz, C. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of Security Analysis and Design V; Springer: Berlin/Heidelberg, Germany, 2009; pp. 289–338. [Google Scholar]
  8. Perrig, A.; Stankovic, J.; Wagner, D. Security in wireless sensor networks. Commun. ACM 2004, 47, 53–57. [Google Scholar] [CrossRef]
  9. Etter, P.C. Underwater Acoustic Modeling: Principles, Techniques and Application; Elsevier Applied Science: London, UK; New York, NY, USA, 1991. [Google Scholar]
  10. Burrowes, G.E.; Khan, J.Y. Investigation of a short-range underwater acoustic communication channel for MAC protocol design. In Proceedings of the 2010 4th IEEE International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, Australia, 13–15 December 2010; pp. 1–8. [Google Scholar]
  11. Stojanovic, M. On the relationship between capacity and distance in an underwater acoustic communication channel. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2007, 11, 34–43. [Google Scholar] [CrossRef]
  12. Brekhovskikh, L.M.; Lysanov, Y.P.; Lysanov, J.P. Fundamentals of Ocean Acoustics; Springer Science & Business Media: Berlin, Germany, 2003. [Google Scholar]
  13. Stojanovic, M. Underwater acoustic communications: Design considerations on the physical layer. In Proceedings of the IEEE Fifth Annual Conference on Wireless on Demand Network Systems and Services (WONS 2008), Garmisch-Partenkirchen, Germany, 23–25 January 2008; pp. 1–10. [Google Scholar]
  14. Wood, A.D.; Stankovic, J.A. Denial of service in sensor networks. Computer 2002, 35, 54–62. [Google Scholar] [CrossRef] [Green Version]
  15. Raymond, D.R.; Midkiff, S.F. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Comput. 2008, 7, 74–81. [Google Scholar] [CrossRef]
  16. Yang, G.; Dai, L.E.; Si, G.N.; Wang, S.X.; Wang, S.Q. Challenges and Security Issues in Underwater Wireless Sensor Networks. In Proceedings of the International Conference on Identification, Information & Knowledge in the Internet of Things, Beijing, China, 19–21 October 2018. in press. [Google Scholar]
  17. Ahuja, H.; Gupta, E.J. Analysis of Malicious Data in Underwater Sensor Network. Analysis 2012, 2, 967–971. [Google Scholar]
  18. Wang, Q.; Dai, H.N.; Li, X.; Wang, H.; Xiao, H. On modeling eavesdropping attacks in underwater acoustic sensor networks. Sensors 2016, 16, 721. [Google Scholar] [CrossRef] [PubMed]
  19. Zuba, M.E. Denial-of-Service Attacks and Countermeasures in Underwater Acoustic Networks. Ph.D. Thesis, University of Connecticut, Storrs, CT, USA, 2014. [Google Scholar]
  20. Lanbo, L.; Shengli, Z.; Jun-Hong, C. Prospects and problems of wireless communication for underwater sensor networks. Wirel. Commun. Mob. Comput. 2008, 8, 977–994. [Google Scholar] [CrossRef] [Green Version]
  21. Wang, Z.; Zhen, F.; Zhang, S.; Liu, M.; Zhang, Q. Jamming-resilient algorithm for underwater cognitive acoustic networks. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef]
  22. Goetz, M.; Azad, S.; Casari, P.; Nissen, I.; Zorzi, M. Jamming-Resistant Multi-path Routing for Reliable Intruder Detection in Underwater Networks. In Proceedings of the Sixth ACM International Workshop on Underwater Networks, Seattle, WA, USA, 1–2 December 2011. [Google Scholar]
  23. Khatua, M.; Misra, S. Exploiting partial-packet information for reactive jamming detection: Studies in UWSN environment. In Proceedings of the International Conference on Distributed Computing and Networking, Mumbai, India, 3–6 January 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 118–132. [Google Scholar]
  24. Misra, S.; Dash, S.; Khatua, M.; Vasilakos, A.V.; Obaidat, M.S. Jamming in underwater sensor networks: Detection and mitigation. IET Commun. 2012, 6, 2178–2188. [Google Scholar] [CrossRef]
  25. Pu, C.; Lim, S.; Jung, B.; Min, M. Mitigating stealthy collision attack in energy harvesting motivated networks. In Proceedings of the 2017 IEEE Military Communications Conference (MILCOM 2017), Baltimore, MD, USA, 23–25 October 2017; pp. 539–544. [Google Scholar]
  26. Kamalesh, S.; Kumar, P.G. Fuzzy Based Secure Intrusion Detection System for Authentication in Wireless Sensor Networks. J. Comput. Theor. Nanosci. 2017, 14, 2465–2472. [Google Scholar] [CrossRef]
  27. Stajano, F.; Anderson, R.J. The resurrecting duckling. In Proceedings of the 7th International Workshop on Security Protocols, Cambridge, UK, 19–21 April 1999. [Google Scholar]
  28. Ibragimov, M.; Lee, J.H.; Kalyani, M.; Namgung, J.I.; Park, S.H.; Yi, O.; Lim, Y.K. CCM-UW security modes for low-band underwater acoustic sensor networks. Wirel. Pers. Commun. 2016, 89, 479–499. [Google Scholar] [CrossRef]
  29. Xu, M.; Liu, G.; Guan, J. Towards a secure medium access control protocol for cluster-based underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 325474. [Google Scholar] [CrossRef]
  30. Pandarinath, P. Secure localization with defense against selective forwarding attacks in wireless sensor networks. In Proceedings of the 2011 IEEE 3rd International Conference on Electronics Computer Technology (ICECT), Kanyakumari, India, 8–10 April 2011; Volume 5, pp. 112–117. [Google Scholar]
  31. Zhou, P.; Jiang, S.; Irissappane, A.; Zhang, J.; Zhou, J.; Teo, J.C.M. Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Trans. Inf. Forensics Secur. 2015, 10, 613–625. [Google Scholar] [CrossRef]
  32. Ahmed, M.R.; Aseeri, M.; Kaiser, M.S.; Zenia, N.Z.; Chowdhury, Z.I. A novel algorithm for malicious attack detection in uwsn. In Proceedings of the 2015 IEEE International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), Dhaka, Bangladesh, 21–23 May 2015; pp. 1–6. [Google Scholar]
  33. Lim, S.; Huie, L. Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks. In Proceedings of the 2015 IEEE International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA, 16–19 February 2015; pp. 315–319. [Google Scholar]
  34. Jiang, J.; Han, G.; Zhu, C.; Chan, S.; Rodrigues, J.J. A trust cloud model for underwater wireless sensor networks. IEEE Commun. Mag. 2017, 55, 110–116. [Google Scholar] [CrossRef]
  35. Prasan, U.D.; Murugappan, S.A. Combinatorial Multi-Objective Trust Model for Efficient and Secured Routing in UWSN. Int. J. Eng. Trends Technol. 2012, 22, 259–264. [Google Scholar] [CrossRef]
  36. Ioannou, C.; Vassiliou, V. The Impact of Network Layer Attacks in Wireless Sensor Networks. In Proceedings of the 2016 IEEE International Workshop on Secure Internet of Things (SIoT), Heraklion, Greece, 26–30 September 2016; pp. 20–28. [Google Scholar]
  37. Saini, M.; Kumar, R. To Propose a Novel Technique for Detection and Isolation of Misdirection Attack in Wireless Sensor Network. Indian J. Sci. Technol. 2016, 9. [Google Scholar] [CrossRef] [Green Version]
  38. Dongare, S.P.; Mangrulkar, R.S. Implementing energy efficient technique for defense against Gray-Hole and Black-Hole attacks in wireless sensor networks. In Proceedings of the 2015 IEEE International Conference on Advances in Computer Engineering and Applications (ICACEA), Ghaziabad, India, 19–20 March 2015; pp. 167–173. [Google Scholar]
  39. Sakharkar, S.M.; Mangrulkar, R.S.; Atique, M. A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks. In Proceedings of the 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 1–2 March 2014; pp. 1–5. [Google Scholar]
  40. Dongare, S.P.; Mangrulkar, R.S. Optimal cluster head selection based energy efficient technique for defending against gray hole and black hole attacks in wireless sensor networks. Procedia Comput. Sci. 2016, 78, 423–430. [Google Scholar] [CrossRef]
  41. Taylor, V.F.; Fokum, D.T. Mitigating black hole attacks in wireless sensor networks using node-resident expert systems. In Proceedings of the IEEE Wireless Telecommunications Symposium (WTS), Washington, DC, USA, 9–11 April 2014; pp. 1–7. [Google Scholar]
  42. Guerroumi, M.; Derhab, A.; Saleem, K. Intrusion detection system against sink hole attack in wireless sensor networks with mobile sink. In Proceedings of the 2015 12th IEEE International Conference on Information Technology-New Generations (ITNG), Las Vegas, NV, USA, 13–15 April 2015; pp. 307–313. [Google Scholar]
  43. Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Loureiro, A.A.F. Geographic and opportunistic routing for underwater sensor networks. IEEE Trans. Comput. 2016, 65, 548–561. [Google Scholar] [CrossRef]
  44. Souiki, S.; Feham, M.; Feham, M.; Labraoui, N. Geographic routing protocols for underwater wireless sensor networks: A survey. arXiv, 2014; arXiv:1403.3779. [Google Scholar]
  45. El-Rabaie, S.; Nabil, D.; Mahmoud, R.; Alsharqawy, M.A. Underwater wireless sensor networks (UWSN), architecture, routing protocols, simulation and modeling tools, localization, security issues and some novel trends. Netw. Commun. Eng. 2015, 7, 335–354. [Google Scholar]
  46. Xiao, L.; Zhu, Y. Modeling the wormhole attack in underwater sensor network. In Proceedings of the 2012 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 21–23 September 2012; pp. 1–4. [Google Scholar]
  47. Liu, Z.; Deng, X.; Li, J. A secure localization algorithm based on reputation against wormhole attack in UWSNS. In Proceedings of the 2017 IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Xiamen, China, 6–9 November 2017; pp. 695–700. [Google Scholar]
  48. Kong, J.; Ji, Z.; Wang, W.; Gerla, M.; Bagrodia, R. On Wormhole Attacks in Under-Water Sensor Networks: A Two-Tier Localization Approach; Technical Report; UCLA Computer Science Department: Los Angeles, CA, USA, 2004. [Google Scholar]
  49. Dargahi, T.; Javadi HH, S.; Shafiei, H. Securing Underwater Sensor Networks against Routing Attacks. Wirel. Pers. Commun. 2017, 96, 2585–2602. [Google Scholar] [CrossRef]
  50. Wang, W.; Kong, J.; Bhargava, B.; Gerla, M.; Bagrodia, R.; Bhargava, B. Visualisation of wormholes in underwater sensor networks: A distributed approach. Int. J. Secur. Netw. 2008, 3, 10–23. [Google Scholar] [CrossRef]
  51. Demirbas, M.; Song, Y. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, Washington, DC, USA, 26–29 January 2006; pp. 564–570. [Google Scholar]
  52. Yavuz, F.; Zhao, J.; Yagan, O.; Gligor, V. On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme. In Proceedings of the 2014 IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, USA, 29 June–4 July 2014; pp. 2381–2385. [Google Scholar]
  53. Li, X.; Han, G.; Qian, A.; Shu, L.; Rodrigues, J. Detecting Sybil attack based on state information in underwater wireless sensor networks. In Proceedings of the 2013 21st IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Primosten, Croatia, 18–20 September 2013; pp. 1–5. [Google Scholar]
  54. Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Shu, L.; Rodrigues, J. GEDAR: Geographic and opportunistic routing protocol with depth adjustment for mobile underwater sensor networks. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; pp. 251–256. [Google Scholar]
  55. Chen, H.; Lou, W. On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive Mob. Comput. 2015, 16, 36–50. [Google Scholar] [CrossRef]
  56. Shah, D.; Kumar, V. TCP SYN Cookie Vulnerability. arXiv, 2018; arXiv:1807.08026. [Google Scholar]
  57. Law, Y.W.; Doumen, J.; Hartel, P. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. 2006, 2, 65–93. [Google Scholar] [CrossRef] [Green Version]
  58. Bellare, M.; Canetti, R.; Krawczyk, H. Keying hash functions for message authentication. In Advances in Cryptology–CRYPTO’96; Springer: Berlin/Heidelberg, Germany, 1996; pp. 1–15. [Google Scholar]
  59. Teguig, E.H.; Touati, Y.; Ali-Cherif, A. ECC Based-Approach for Keys Authentication and Security in WSN. In Proceedings of the 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain, 8–11 May 2017; pp. 1–4. [Google Scholar]
  60. Simplicio, M.A., Jr.; Silva MV, M.; Alves RC, A.; Shibata, T.K. Lightweight and escrow-less authenticated key agreement for the internet of things. Comput. Commun. 2017, 98, 43–51. [Google Scholar] [CrossRef]
  61. Jiang, S.M. On securing underwater acoustic networks: A survey. IEEE Commun. Surv. Tutor. 2018. [Google Scholar] [CrossRef]
  62. Han, G.; Jiang, J.; Sun, N.; Shu, L. Secure communication for underwater acoustic sensor networks. IEEE Commun. Mag. 2015, 53, 54–60. [Google Scholar] [CrossRef]
  63. Luo, Y.; Pu, L.; Peng, Z.; Shi, Z. RSS-based secret key generation in underwater acoustic networks: Advantages, challenges, and performance improvements. IEEE Commun. Mag. 2016, 54, 32–38. [Google Scholar] [CrossRef]
  64. Peng, C.; Du, X.; Li, K.; Li, M. An ultra-lightweight encryption scheme in underwater acoustic networks. J. Sens. 2016, 2016, 8763528. [Google Scholar] [CrossRef]
  65. Yuan, C.; Chen, W.; Li, D. A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network. In Proceedings of the China Conference on Wireless Sensor Networks, Tianjin, China, 13–15 October 2017; Springer: Singapore, 2017; pp. 44–54. [Google Scholar]
  66. Hamid, M.A.; Abdullah-Al-Wadud, M.; Hassan, M.M.; Almogren, A.; Alamri, A.; Kamal, A.R.M.; Mamun-Or-Rashid, M. A key distribution scheme for secure communication in acoustic sensor networks. Futur. Gener. Comput. Syst. 2018, 86, 1209–1217. [Google Scholar] [CrossRef]
  67. Ateniese, G.; Capossele, A.; Gjanci, P.; Petrioli, C.; Spaccini, D. SecFUN: Security framework for underwater acoustic sensor networks. In Proceedings of the MTS/IEEE OCEANS, Genoa, Italy, 18–21 May 2015; pp. 1–9. [Google Scholar]
  68. Capossele, A.; Petrioli, C.; Saturni, G.; Spaccini, D.; Venturi, D. Securing Underwater Communications: Key Agreement based on Fully Hashed MQV. In Proceedings of the ACM International Conference on Underwater Networks & Systems, Halifax, NS, Canada, 6–8 November 2017; p. 12. [Google Scholar]
  69. Dini, G.; Lo Duca, A. A secure communication suite for underwater acoustic sensor networks. Sensors 2012, 12, 15133–15158. [Google Scholar] [CrossRef] [PubMed]
  70. Jiang, S. Wireless Networking Principles: From Terrestrial to Underwater Acoustic; Springer: Singapore, 2018. [Google Scholar]
  71. Goyal, N.; Dave, M.; Verma, A.K. Trust model for cluster head validation in underwater wireless sensor networks. Underw. Technol. 2017, 34, 107–114. [Google Scholar] [CrossRef]
  72. Luo, J.; Fan, L.; Wu, S.; Yan, X. Research on localization algorithms based on acoustic communication for underwater sensor networks. Sensors 2018, 18, 67. [Google Scholar] [CrossRef] [PubMed]
  73. Zhang, Y.; Jin, Z.G.; Luo, Y.M.; Du, X. Node secure localization algorithm in underwater sensor network based on trust mechanism. J. Comput. Appl. 2013, 33, 1208–1211. [Google Scholar] [CrossRef]
  74. Han, G.; Liu, L.; Jiang, J.; Shu, L.; Rodrigues, J.J. A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 2016, 16, 229. [Google Scholar] [CrossRef] [PubMed]
  75. Das, A.P.; Thampi, S.M. Fault-resilient localization for underwater sensor networks. Ad Hoc Netw. 2017, 55, 132–142. [Google Scholar] [CrossRef]
  76. Varadharajan, K. Secure localization using coordinated gradient descent technique for underwater wireless sensor networks. ICTACT J. Commun. Technol. 2018, 9, 1716–1720. [Google Scholar]
  77. Liu, J.; Zhou, Z.; Peng, Z.; Cui, J.H.; Zuba, M.; Fiondella, L. Mobi-sync: Efficient time synchronization for mobile underwater sensor networks. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 406–416. [Google Scholar] [CrossRef]
  78. Liu, J.; Wang, Z.; Zuba, M.; Peng, Z.; Cui, J.H.; Zhou, S. DA-Sync: A Doppler-assisted time-synchronization scheme for mobile underwater sensor networks. IEEE Trans. Mob. Comput. 2014, 13, 582–595. [Google Scholar] [CrossRef]
  79. Mortazavi, E.; Javidan, R.; Dehghani, M.J.; Kavoosi, V. A robust method for underwater wireless sensor joint localization and synchronization. Ocean Eng. 2017, 137, 276–286. [Google Scholar] [CrossRef]
  80. Vaseghi, B.; Pourmina, M.A.; Mobayen, S. Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control. Nonlinear Dyn. 2017, 89, 1689–1704. [Google Scholar] [CrossRef]
  81. He, J.; Chen, J.; Cheng, P.; Cao, X. Secure time synchronization in wireless sensor networks: A maximum consensus-based approach. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1055–1065. [Google Scholar] [CrossRef]
  82. Vaseghi, B.; Pourmina, M.A.; Mobayen, S. Finite-time chaos synchronization and its application in wireless sensor networks. Trans. Inst. Meas. Control 2017. [Google Scholar] [CrossRef]
  83. Dini, G.; Duca, A.L. SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks. In Proceedings of the 2011 IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece, 28 June–1 July 2011; pp. 636–638. [Google Scholar]
  84. Porkodi, K.P.; Zubair Rahman, A.M.J.M. Enhanced Underwater Wireless Sensor Networks Security with Tic-Tac-Toe Ai-Minimax Algorithm in Game Theory. Available online: http://www.tagajournal.com/gallery/v14.22.pdf (accessed on 20 October 2018).
  85. Peng, C.; Du, X. SDBR: A Secure Depth-Based Anonymous Routing Protocol in Underwater Acoustic Networks. Int. J. Perform. Eng. 2017, 13, 731–741. [Google Scholar] [CrossRef]
  86. Aman, W.; Rahman MM, U.; Qadir, J. Secure Routing in OFDM based Multi-Hop Underwater Acoustic Sensor Networks. arXiv, 2018; arXiv:1807.01556. [Google Scholar]
  87. Shen, J.; Tan, H.W.; Wang, J.; Wang, J.W.; Lee, S.Y. A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 2015, 16, 171–178. [Google Scholar]
  88. Han, S.Y.; Chen, Y.H.; Tang, G.Y. Fault diagnosis and fault-tolerant tracking control for discrete-time systems with faults and delays in actuator and measurement. J. Frankl. Inst. 2017, 354, 4719–4738. [Google Scholar] [CrossRef]
  89. Perrig, A.; Szewczyk, R.; Tygar, J.D.; Wen, V.; Culler, D.E. SPINS: Security protocols for sensor networks. Wirel. Netw. 2002, 8, 521–534. [Google Scholar] [CrossRef]
  90. Abdullah, K.M.; Houssein, E.H.; Zayed, H.H. Extended SPINS Framework for Security Wireless Sensor Network. Int. J. Comput. Sci. Issues 2017, 14, 58. [Google Scholar]
  91. Kadlikoppa, P.; Umarji, I.; Patil, S. Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN. Int. J. Recent Innov. Trends Comput. Commun. 2017, 5, 142–149. [Google Scholar]
  92. Karlof, C.; Sastry, N.; Wagner, D. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, 3–5 November 2004; pp. 162–175. [Google Scholar]
  93. Basu, S.; Pushpalatha, M. Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks. In Proceedings of the 2013 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS), Kattankulathur, India, 15–18 December 2013; pp. 1–6. [Google Scholar]
  94. Iqbal, U.; Intikhab, S. Re-keying mechanism for TinySec using ECC and Hash chains. In Proceedings of the 2017 4th IEEE International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017; pp. 1–5. [Google Scholar]
  95. Luk, M.; Mezzour, G.; Perrig, A.; Gligor, V. MiniSec: A secure sensor network communication architecture. In Proceedings of the 6th IEEE International Symposium on Information Processing in Sensor Networks (IPSN 2007), Cambridge, MA, USA, 25–27 April 2007; pp. 479–488. [Google Scholar]
  96. Sharma, K.; Ghose, M.K. Security model for hierarchical clustered wireless sensor networks. Int. J. Comput. Sci. Secur. 2011, 5, 85–97. [Google Scholar]
Figure 1. Underwater wireless sensor network (UWSN) architecture.
Figure 1. Underwater wireless sensor network (UWSN) architecture.
Sensors 18 03907 g001
Figure 2. Cluster UWSNs with autonomous underwater vehicles (AUVs); (a) AUV joins Cluster3; (b) AUV joins Cluster1.
Figure 2. Cluster UWSNs with autonomous underwater vehicles (AUVs); (a) AUV joins Cluster3; (b) AUV joins Cluster1.
Sensors 18 03907 g002
Figure 3. Threats and challenges in UWSNs.
Figure 3. Threats and challenges in UWSNs.
Sensors 18 03907 g003
Figure 4. Jamming attack.
Figure 4. Jamming attack.
Sensors 18 03907 g004
Figure 5. Misdirection attack; (a) normal route; (b) misdirection route.
Figure 5. Misdirection attack; (a) normal route; (b) misdirection route.
Sensors 18 03907 g005
Figure 6. Black hole attack; (a) normal route; (b) black hole route.
Figure 6. Black hole attack; (a) normal route; (b) black hole route.
Sensors 18 03907 g006
Figure 7. Sinkhole attack.
Figure 7. Sinkhole attack.
Sensors 18 03907 g007
Figure 8. Wormhole attack; (a) normal route; (b) wormhole route.
Figure 8. Wormhole attack; (a) normal route; (b) wormhole route.
Sensors 18 03907 g008
Figure 9. Two methods of wormhole attack; (a) using radio channel; (b) using wired channel.
Figure 9. Two methods of wormhole attack; (a) using radio channel; (b) using wired channel.
Sensors 18 03907 g009
Figure 10. Security architecture of UWSNs.
Figure 10. Security architecture of UWSNs.
Sensors 18 03907 g010
Table 1. Communication bandwidth.
Table 1. Communication bandwidth.
Long RangeMedium RangeShort Range
Communication Range20–2000 km1–10 km<1 km
Working EnvironmentDeep WaterShallow WaterDeep Water
Available Bandwidth500 Hz–10 kHz10–100 kHz100–500 kHz
Data Rate<10 kb/s<50 kb/s>100 kb/s
Table 2. Acoustic wave loss model.
Table 2. Acoustic wave loss model.
Signal SourceWorking EnvironmentSpreading Loss
Spherical Wave Loss Modelpoint sourcedeep waterproportional to the square of the distance
Cylindrical Wave Loss Modellong line sourceshallow waterproportional to the distance
Table 3. Spreading loss model for different communications range.
Table 3. Spreading loss model for different communications range.
Long-DistanceMedium-DistanceShort-Distance
Spreading Loss Modelcylindrical wavecylindrical wave and spherical wavespherical wave
Spreading Loss Factord = 1d = 1.5d = 2

Share and Cite

MDPI and ACS Style

Yang, G.; Dai, L.; Wei, Z. Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks. Sensors 2018, 18, 3907. https://doi.org/10.3390/s18113907

AMA Style

Yang G, Dai L, Wei Z. Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks. Sensors. 2018; 18(11):3907. https://doi.org/10.3390/s18113907

Chicago/Turabian Style

Yang, Guang, Lie Dai, and Zhiqiang Wei. 2018. "Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks" Sensors 18, no. 11: 3907. https://doi.org/10.3390/s18113907

APA Style

Yang, G., Dai, L., & Wei, Z. (2018). Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks. Sensors, 18(11), 3907. https://doi.org/10.3390/s18113907

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop