Ts PDF
Ts PDF
On
Submitted
BACHELOR OF TECHNOLOGY
in
Electronics and Communication Engineering
Submitted By
K .HARIKA (16R11A04B9)
ASSOCIATE PROFESSOR
2016-2020
GEETHANJALI COLLEGE OF ENGINEERING AND
TECHNOLOGY
CERTIFICATE
This is to certify that the technical seminar report titled “Under water wireless
communication” submitted by K.HARIKA bearing Hall Ticket number
16R11A04B9, in partial fulfillment of the requirements for the award of the Degree of
Bachelor of Technology in Electronics and Communication Engineering, is a
record of bona-fide work carried out under my guidance and supervision. The results
embodied in this report have not been submitted to any other University for the award
of any degree.
We are very happy for being guided by Dr.V.Sathya Srinivas for his able guidance
given to us to complete our technical seminar successfully.
We are highly greatful in the great personality in the field of Electronics ,none other
than Prof. B .Hari Kumar ,Professor and head of the department of Electronics and
Communication Engineering of GCET for guiding and taking care of our career in
the field.
Above all, we are very much thankful to the management of the Geethanjali college
of Engineering and technology which was established by the high-profile
intellectuals for the cause of technical education in modern era. We wish the GCET
sooner should become a deemed university and produce uncountable young engineers
and present them to the modern technical world
With Regards
K. HARIKA 16R11A04B9
CONTENTS PAGE NO
Abstract i
List of figures ii
Chapter 1 Introduction 1
1.1 what is wireless communication? 1
1.2 acoustic communication 2
1.3 underwater acoustic modem 3
1.4 underwater networking 4
Chapter 2 Wireless communication 5
2.1 underwater communication 5
2.2 types of communication 6
2.3 necessity of underwater wireless 6
Chapter 3 Acoustic communication 7
3.1 acoustic wave 7
3.2 wave properties 8
3.3 acoustic wave equation 8
3.4 types of modulation used in acoustic 9
3.4.1 frequency shift keying 10
3.4.2 phase shift keying 10
3.4.3 orthogonal frequency division multiplexing 11
3.5 factors influencing acoustic 11
3.6 acoustic sensor network 11
Chapter 4 underwater acoustic modem 13
4.1 data transmission in modem 13
4.2 applications 14
4.3 advantages 15
4.4 disadvantages 15
Chapter 5 underwater sensor network 16
5.1 architechture 17
Chapter 6 implementation 21
6.1 attacks on uwens and counter measures 22
6.1.1 jamming 22
6.1.2 wormhole attack 22
6.1.3 sinkhole attack 24
6.1.4 hello flood attack 24
6.1.5 acknowledgement spoofing 24
6.1.6 sybil attack 24
6.2 applications 25
Chapter 7 conclusion 26
References
ABSTRACT
i
LIST OF FIGURES PAGE NO
1.1 wireless communication 2
1.2 acoustic communication 3
3.1 acoustic wave 7
3.2 acoustic sensor network 12
4.1 data transmission of acoustic flow chart 14
4.2 uses of network 14
4.3 advanced modems 15
5.1 underwater sensor network 16
5.2 2D architechture 18
5.3 3D architechture 19
5.4 mobile architechture 19
6.1 wormhole attack 23
6.2 sybil attack 25
ii
Underwater wireless communication
CHAPTER 1
INTRODUCTION
The signals that are used to carry digital information through an underwater
channel are not radio signals as electromagnetic waves propogate over short distances.
Instead acoustic waves are used which can propagate over long distances.
Over the past decades, cabled submersibles were used to discover the remains
of titanic and hydrothermal vents due to the burden and cost of heavy cables that must
be used to establish a high-speed communication between the remote end and the
surface. To overcome such impediments, underwater wireless communication has
come into existence.
➢ satellite communication
➢ Mobile communication
➢ Wireless network communication
➢ Infrared communication
1
Dept. of ece,GCET
Underwater wireless communication
➢ Bluetooth communication
2
Dept. of ece,GCET
Underwater wireless communication
3
Dept. of ece,GCET
Underwater wireless communication
Modern applications range from retrieving data from subsea sensors and navigating
unmanned underwater vehicles to deploying complex underwater sensor networks for
monitoring and exploration.
4
Dept. of ece,GCET
Underwater wireless communication
CHAPTER 2
WIRELESS COMMUNICATION
Earth is largely covered by water. This is largely unexplored area and recently
humans are showing interest towards exploring it Underwater Acoustic Sensor
Networks (UW-ASN) consist of a variable number of sensors that are deployed to
perform the monitoring tasks over a given area. Many disasters that took place in recent
past made humans to greatly monitor the oceanic environments for scientific,
environmental, military needs etc., in order to perform these monitoring task industries
are showing interest towards deploying sensor nodes under water. TWSNs operate in
an environment dominated by RF communication. Yet, RF communication is not an
optimal communication channel for underwater applications because of the extremely
limited RF wave’s propagation underwater. Conductive sea water only at extra low
frequencies (30 ¡ 300 Hz), which require large antennae and high transmission power.
Thus, links in underwater networks are based on acoustic wireless communications
Acoustic communications are the typical physical layer technology in underwater
networks
Communication Systems can be Wired or Wireless and the medium used for
communication can be Guided or Unguided. In Wired Communication, the medium is
a physical path like Co-axial Cables, Twisted Pair Cables and Optical Fiber Links etc.
which guides the signal to propagate from one point to other.
Such type of medium is called Guided Medium. On the other hand, Wireless
Communication doesn’t require any physical medium but propagates the signal through
space. Since, space only allows for signal transmission without any guidance, the
medium used in Wireless Communication is called Unguided Medium.
5
Dept. of ece,GCET
Underwater wireless communication
➢ satellite communication
➢ Mobile communication
➢ Wireless network communication
➢ Infrared communication
➢ Bluetooth communication
• Temporary experiments
• Breaking of wires
• Significant cost of deployment
• Experiment over long distances
• To scope up with above situations, we require underwater wireless
communication
6
Dept. of ece,GCET
Underwater wireless communication
CHAPTER 3
ACOUSTIC COMMUNICATION
Underwater acoustic communication is a technique of sending and receiving
messages below water. There are several ways of employing such communication but
the most common is by using hydrophones. Underwater communication is difficult due
to factors such as multi-path propagation, time variations of the channel, small available
bandwidth and strong signal attenuation, especially over long ranges. Compared to
terrestrial communication, underwater communication has low data rates because it
uses acoustic waves instead of electromagnetic waves.
7
Dept. of ece,GCET
Underwater wireless communication
Acoustic waves are elastic waves that exhibit phenomena like diffraction and
interference note the sound waves on air however don’t have any polarization since
they oscillate along the same direction as they move.
1. wave equation
2. phase
3. propagation speed
4. interference
5. standing wave
6. reflection
7. absorption
The acoustic wave equation describes the propagation of sound waves. The acoustic
wave equation for sound pressure in one dimension is given by
𝛛𝟐 𝐏 𝟏 𝛛𝟐 𝐏
𝟐
− =𝟎
𝛛𝐱 𝐜 𝟐 𝛛𝐭 𝟐
where
P is sound pressure in Pa
X is particle displacement in m
c is speed of sound in m/s
t is time in s
The wave equation for particle velocity has the same shape and is given by
𝝏𝟐 𝒖 𝟏 𝝏𝟐 𝒖
𝟐
− =𝟎
𝝏𝒙 𝒄𝟐 𝝏𝒕𝟐
Where
For lossy media, more intricate models need to be applied in order to take into account
frequency-dependent attenuation and phase speed. Such models include acoustic wave
8
Dept. of ece,GCET
Underwater wireless communication
equations that incorporate fractional derivative terms, see also the acoustic
attenuation article.
D'Alembert gave the general solution for the lossless wave equation. For sound
pressure, a solution would be
where
For the wave becomes a travelling wave moving rightwards, for the wave becomes a
The following is a discussion on the different types of modulation and their utility to
UAC.
9
Dept. of ece,GCET
Underwater wireless communication
FSK is the earliest form of modulation used for acoustic modems. UAC prior to
modems was by percussion of different objects underwater. This method was also used
to measure the speed of sound in water.
FSK usually employs two distinct frequencies to modulate data; for example,
Frequency F1 to indicate bit 0 and frequency F2 to indicate bit 1. Hence a binary string
can be transmitted by alternating these two frequencies depending on whether it is a 0
or 1. The receiver can be as simple as having analogue matched filters to the two
frequencies and a level detector to decide if a 1 or 0 was received. This is a relatively
easy form of modulation and therefore used in the earliest acoustic modems. However
more sophisticated Demodulator using Digital Signal Processors (DSP) can be used in
the present day.
The biggest challenge FSK faces in the UAC is multi-path reflections. With multi-path
(particularly in UAC) several strong reflections can be present at the receiving
hydrophone and the threshold detectors become confused, thus severely limiting the
use of this type of UAC to vertical channels. Adaptive equalization methods have been
tried with limited success. Adaptive equalization tries to model the highly reflective
UAC channel and subtract the effects from the received signal. The success has been
limited due to the rapidly varying conditions and the difficulty to adapt in time.
Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing
(modulating) the phase of a reference signal (the carrier wave). The signal is impressed
into the magnetic field x,y area by varying the sine and cosine inputs at a precise time.
It is widely used for wireless LANs, RFID and Bluetooth communication.
Any digital modulation scheme uses a finite number of distinct signals to represent
digital data. PSK uses a finite number of phases, each assigned a unique pattern of
binary digits. Usually, each phase encodes an equal number of bits. Each pattern of bits
forms the symbol that is represented by the particular phase. The demodulator, which
is designed specifically for the symbol-set used by the modulator, determines the phase
of the received signal and maps it back to the symbol it represents, thus recovering the
original data. This requires the receiver to be able to compare the phase of the received
10
Dept. of ece,GCET
Underwater wireless communication
11
Dept. of ece,GCET
Underwater wireless communication
12
Dept. of ece,GCET
Underwater wireless communication
CHAPTER 4
Modern applications range from retrieving data from subsea sensors and
navigating unmanned underwater vehicles to deploying complex underwater sensor
networks for monitoring and exploration.
When no data is being transmitted, the modem stays in sleep mode, it periodically
wakes up to receive possible data being transmitted by far end modem. This results in
low power consumption. Similarly when the data is to be transmitted , the modem
receives data from its link in sleep mode and then switches to transmit mode and
transmit the data.
13
Dept. of ece,GCET
Underwater wireless communication
4.2 APPLICATIONS
14
Dept. of ece,GCET
Underwater wireless communication
4.3 ADVANTAGES
➢ Can be used to provide early warnings of tsunamis generated by undersea > >
earthquakes.
➢ It avoids data spoofing.
➢ It avoids privacy leakage.
➢ Pollution monitoring.
4.4 DISADVANTAGES
15
Dept. of ece,GCET
Underwater wireless communication
CHAPTER 5
UNDERWATER SENSOR NETWORK
16
Dept. of ece,GCET
Underwater wireless communication
5.1 ARCHITECHTURE
17
Dept. of ece,GCET
Underwater wireless communication
Unlike TWSNs, the hardware of the cluster head node is different from all other nodes,
because it has additional functionalities such as a direct communication link with the
ocean surface. Therefore, a popular TWSN’s cluster head switching feature (which
increases the overall network lifetime by efficiently distributing the power consumption
among nodes) cannot be utilized in UWSNs. Also, the cluster head is potentially the
most security-vulnerable component in UWSNs military applications, because it is a
single point of failure node. Fig. 3 shows an alternative 3D UWSN architecture. Three
dimensional underwater networks are used to detect and observe phenomena that
cannot be adequately observed by means of ocean bottom sensor node, i.e., to perform
cooperative sampling of 3D ocean environment. In 3D architecture, sensor node float
at different depth in order to observe the given phenomenon. In this architecture each
sensor is anchored to the ocean bottom and equipped with a floating buoy that can
inflated by a pump. The buoy pushes the sensor towards the ocean surface. The depth
of sensor then can be regulated by adjusting the length of wire that connect the sensor
to the anchor, by means of an electronically controlled engine that reside on sensor
3D architecture can have all nodes directly communicate to the surface base or can have
only cluster heads communicate directly to the base. In the former case, all nodes are
of the same type, but communication might be more energy intensive than that of the
18
Dept. of ece,GCET
Underwater wireless communication
cluster head approach. The cluster head approach requires only the cluster head to carry
a long-range communication modem. On the other hand, the clustered approach is
vulnerable to single point of failure. Military applications are extremely sensitive to
single point of failure hardware components.
19
Dept. of ece,GCET
Underwater wireless communication
This architecture uses AUVs and UUVs as network nodes. Fig. 4.3 shows an example
of the architecture. The main important factor in this architecture is a mobility of nodes.
Mobile node put extra controlling complexity in the network. In addition the network
consume more power because they consume extra power due to force or movement of
mobile node in water. Moreover the mobile node is less reliable and shorter lifetime.
Both mobile and static architecture has some advantages and disadvantages. In hybrid
architecture that include uses both mobile node and static node by which we can
transmit our sensed data efficiently from floor sensor to surface station. In this this
architecture the mobile node traversing over the static field or static sensor and achieve
the point-to-point communication. The static sensor node transmit the data to water
surface station via mobile node
20
Dept. of ece,GCET
Underwater wireless communication
CHAPTER 6
IMPLEMENTATION
Underwater sensor networks have some similarities with their ground-based
counterparts such as their structure, function, computation and energy limitations.
Radio waves do not propagate well underwater due to the high energy absorption of
water. Therefore, underwater communications are based on acoustic links characterized
by large propagation delays. The propagation speed of acoustic signals in water
(typically 1500 m/s) is five orders of magnitude lower than the radio wave propagation
speed in free space. Acoustic channels have low bandwidth. The link quality in
underwater communication is severely affected by multipath, fading, and the refractive
properties of the sound channel. As a result, the bit error rates of acoustic links are often
high, and losses of connectivity arise. Underwater sensors move with water currents,
and AUVs are mobile. Although certain nodes in underwater applications are anchored
to the bottom of the ocean, other applications require sensors to be suspended at certain
depths or to move freely in the underwater medium. The future development of
geographical routing is very promising in UWCNs due to its scalability and limited
signaling properties. However, it cannot rely on the Global Positioning System (GPS)
because it uses radar waves in the 1.5 GHz band that do not propagate in water.
Underwater communication systems have more stringent power requirements than
terrestrial systems because acoustic communications are more power hungry, and
typical transmission distances in UWCNs are greater; hence, higher transmit power is
required to ensure coverage. The above mentioned characteristics of UWCNs have
several security implications. UWCNs suffer from the following vulnerabilities. High
bit error rates cause packet errors. Consequently, critical security packets can be lost.
Wireless underwater channels can be eavesdropped on. Attackers may intercept the
information transmitted and attempt to modify or drop packets. Malicious nodes can
create out-of band connections via fast radio (above the water surface) and wired links,
which are referred to as wormholes. Since sensors are mobile, their relative distances
vary with time. The dynamic topology of the underwater sensor network not only
facilitates the creation of wormholes but it also complicates their detection.
21
Dept. of ece,GCET
Underwater wireless communication
6.1.1 JAMMING
22
Dept. of ece,GCET
Underwater wireless communication
significantly decrease the propagation delay. In a wormhole attack the malicious node
transfers some selected packets received at one end of the wormhole to the other end
using the out-of-band connection, and reinjects them into the network. The effect is that
false neighbor relationships are created, because two nodes out of each other’s range
can erroneously conclude that they are in proximity of one another due to the
wormhole’s presence. This attack is devastating. Routing protocols choose routes that
contain wormhole links because they appear to be shorter; thus, the adversary can
monitor network traffic and delay or drop packets sent through the wormhole.
Localization protocols can also be affected by these attacks when malicious nodes claim
wrong locations and mislead other nodes.
23
Dept. of ece,GCET
Underwater wireless communication
Since a wormhole contracts the virtual layout at certain regions, some nodes
far away appear to be neighbors, and these contradictions can be detected visualizing
the virtual layout. A wormhole indicator variable is defined to compute the distortion
in angles; the distortion in edge lengths is computed as the difference between the
measured distances among neighboring sensors and the lengths of the reconstructed
connections.
In a sinkhole attack, a malicious node attempts to attract traffic from a particular area
toward it; for example, the malicious node can announce a high-quality route.
Geographic routing and authentication of nodes exchanging routing information are
possible defences against this attack, but geographic routing is still an open research
topic in UWCNs.
A node receiving a HELLO packet from a malicious node may interpret that the
adversary is a neighbor this assumption is false if the adversary uses high power for
transmission. Bidirectional link verification can help protect against this attack,
although it is not accurate due to node mobility and the high propagation delays of
UWCNs. Authentication is also a possible defence.
A malicious node overhearing packets sent to neighbour nodes can use this information
to spoof link layer acknowledgments with the objective of reinforcing a weak link or a
linklocated in a shadow zone. Shadow zones are formed when the acoustic rays are bent
and sound waves cannot penetrate. They cause high bit error rates and loss of
connectivity. This way, the routing scheme is manipulated. A solution to this attack
would be encryption of all packets sent through the network.
24
Dept. of ece,GCET
Underwater wireless communication
verification are methods against this attack, although position verification in UWCNs
is problematic due to mobility.
6.2 APPLICATIONS
Future applications could enhance myriad industries, ranging from the offshore
oil industry to aquaculture to fishing industries, she noted. Additionally,
pollution control, climate recording, ocean monitoring (for prediction of
natural disturbances) and detection of objects on the ocean floor are other areas
that could benefit from enhanced underwater communications.
Environmental monitoring to gathering of oceanographic data
Marine archaeology
Search and rescue missions
Defence
25
Dept. of ece,GCET
Underwater wireless communication
CHAPTER 7
CONCLUSION
This technology gives the overall view of the necessity of underwater wireless
communication and its applications.
Despite much development in this area of the underwater wireless
communication, there is still an immense scope so more research as major part
of the ocean bottom yet remains unexploded.
Advanced versions of the existing applications and innovative inventions have
become a must in this field.
Therefore, the main objective is to imbibe knowledge about this emerging field
and thereby encourage research and implementation of advanced technology to
overcome the present limitations such as the environmental effects on the noise
performance of acoustic systems as mentioned in this paper
26
Dept. of ece,GCET
Underwater wireless communication
REFERENCES
Jaime Lloret 1 ,*, Sandra 1 , Miguel Ardid 1 and Joel J. P. C. Rodrigues “Underwater
Wireless Sensor Communications in the 2.4 GHz ISM Frequency Band”.
• X.Yu ; Link Quest Inc., San Diego, CA, USA “Wireline quality underwater wireless
communication using high speed acoustic modems”.
• M.C. Domingo; Electr Eng. Dept, Barcelona Tech Univ , Barcelona, Spain, “Securing
underwater wireless communication networks”.
27
Dept. of ece,GCET
Underwater wireless communication
𝛿𝑦
𝛿𝑥
28
Dept. of ece,GCET