0% found this document useful (0 votes)
126 views35 pages

Ts PDF

The document discusses underwater wireless communication. It covers acoustic communication which uses acoustic waves instead of radio waves to transmit signals underwater over long distances. Underwater wireless communication enables applications like oceanographic data collection and monitoring by autonomous underwater vehicles without heavy cables. Challenges include effectively transmitting video and audio signals in real-time from remote underwater locations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views35 pages

Ts PDF

The document discusses underwater wireless communication. It covers acoustic communication which uses acoustic waves instead of radio waves to transmit signals underwater over long distances. Underwater wireless communication enables applications like oceanographic data collection and monitoring by autonomous underwater vehicles without heavy cables. Challenges include effectively transmitting video and audio signals in real-time from remote underwater locations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Technical Seminar Report

On

UNDER WATER WIRELESS COMMUNICATION

Submitted

in partial fulfillment of the requirements for the award of the degree of

BACHELOR OF TECHNOLOGY
in
Electronics and Communication Engineering
Submitted By

K .HARIKA (16R11A04B9)

Under the Guidance of


Dr.V.Satya Srinivas

ASSOCIATE PROFESSOR

Department of Electronics & Communication Engineering


GEETHANJALI COLLEGE OF ENGINEERING AND
TECHNOLOGY,
Cheeryal (V), Keesara (M), Medchal Dist, Hyderabad– 501 301 (Autonomous)

2016-2020
GEETHANJALI COLLEGE OF ENGINEERING AND
TECHNOLOGY

Department of Electronics and Communication Engineering

CERTIFICATE

This is to certify that the technical seminar report titled “Under water wireless
communication” submitted by K.HARIKA bearing Hall Ticket number
16R11A04B9, in partial fulfillment of the requirements for the award of the Degree of
Bachelor of Technology in Electronics and Communication Engineering, is a
record of bona-fide work carried out under my guidance and supervision. The results
embodied in this report have not been submitted to any other University for the award
of any degree.

Internal Guide Prof. B.


HariKumar
Dr.V.Satya Srinivas HOD , ECE
( Associate Professor)

INTERNAL EXAMINAR EXTERNAL EXAMINAR


ACKNOWLEDGEMENT

We are very happy for being guided by Dr.V.Sathya Srinivas for his able guidance
given to us to complete our technical seminar successfully.

We are highly greatful in the great personality in the field of Electronics ,none other
than Prof. B .Hari Kumar ,Professor and head of the department of Electronics and
Communication Engineering of GCET for guiding and taking care of our career in
the field.

We, the students of ECE department of Geethanjali college of Engineering and


technology , would like to convey heartfelt thanks to Dr .S .Udaya Kumar ,Principal
of the college for the wonderful guidance and encouragement given to us to move
ahead in the execution of this project.

Above all, we are very much thankful to the management of the Geethanjali college
of Engineering and technology which was established by the high-profile
intellectuals for the cause of technical education in modern era. We wish the GCET
sooner should become a deemed university and produce uncountable young engineers
and present them to the modern technical world

With Regards

K. HARIKA 16R11A04B9
CONTENTS PAGE NO
Abstract i
List of figures ii
Chapter 1 Introduction 1
1.1 what is wireless communication? 1
1.2 acoustic communication 2
1.3 underwater acoustic modem 3
1.4 underwater networking 4
Chapter 2 Wireless communication 5
2.1 underwater communication 5
2.2 types of communication 6
2.3 necessity of underwater wireless 6
Chapter 3 Acoustic communication 7
3.1 acoustic wave 7
3.2 wave properties 8
3.3 acoustic wave equation 8
3.4 types of modulation used in acoustic 9
3.4.1 frequency shift keying 10
3.4.2 phase shift keying 10
3.4.3 orthogonal frequency division multiplexing 11
3.5 factors influencing acoustic 11
3.6 acoustic sensor network 11
Chapter 4 underwater acoustic modem 13
4.1 data transmission in modem 13
4.2 applications 14
4.3 advantages 15
4.4 disadvantages 15
Chapter 5 underwater sensor network 16
5.1 architechture 17
Chapter 6 implementation 21
6.1 attacks on uwens and counter measures 22
6.1.1 jamming 22
6.1.2 wormhole attack 22
6.1.3 sinkhole attack 24
6.1.4 hello flood attack 24
6.1.5 acknowledgement spoofing 24
6.1.6 sybil attack 24
6.2 applications 25
Chapter 7 conclusion 26
References
ABSTRACT

Underwater wireless communication is a flourishing research area in the field


of wireless communications. Underwater wireless communications play an
important role in marine activities such as environmental monitoring, underwater
exploration, and scientific data collection. Underwater wireless communications still
remain quite challenging, due to the unique and harsh conditions that characterize
underwater channels. These conditions include for example severe attenuation,
multipath dispersion, and limited resource utilization. The signals that are used to
carry digital information through an underwater channel are not radio signals as
electromagnetic waves propagate over short distances. Instead acoustic waves are
used which can propagate over long distances. Underwater acoustics is the study of
the propagation of sound in water and the interaction of the mechanical waves that
constitute sound with the water, its contents and its boundaries. The water may be in
the ocean, a lake, a river or a tank. Typical frequencies associated with underwater
acoustics are between 10 Hz and 1 MHz. Over the past decades, cabled submersibles
were used to discover the remains of titanic and hydrothermal vents due to the burden
and cost of heavy cables that must be used to establish a high-speed communication
between the remote end and the surface. To overcome such impediments, underwater
wireless communication has come into existence.

Applications till date, like oceanographic data collection, AUVs (autonomous


underwater vehicles), underwater radio etc.., future challenges like effective
transmission of video and audio signals by real time monitoring have been
emphasized with a view to overcome the present limitation.

i
LIST OF FIGURES PAGE NO
1.1 wireless communication 2
1.2 acoustic communication 3
3.1 acoustic wave 7
3.2 acoustic sensor network 12
4.1 data transmission of acoustic flow chart 14
4.2 uses of network 14
4.3 advanced modems 15
5.1 underwater sensor network 16
5.2 2D architechture 18
5.3 3D architechture 19
5.4 mobile architechture 19
6.1 wormhole attack 23
6.2 sybil attack 25

ii
Underwater wireless communication

CHAPTER 1
INTRODUCTION

Wireless is a term used to describe the telecommunication in which the


electromagnetic waves carry the signal over part or all of the communication path.

The signals that are used to carry digital information through an underwater
channel are not radio signals as electromagnetic waves propogate over short distances.
Instead acoustic waves are used which can propagate over long distances.

Over the past decades, cabled submersibles were used to discover the remains
of titanic and hydrothermal vents due to the burden and cost of heavy cables that must
be used to establish a high-speed communication between the remote end and the
surface. To overcome such impediments, underwater wireless communication has
come into existence.

1.1 WHAT IS WIRELESS COMMUNICATION?

Wireless communications is a type of data communication that is performed and


delivered wirelessly. This is a broad term that incorporates all procedures and forms of
connecting and communicating between two or more devices using a wireless signal
through wireless communication technologies and devices.

Wireless communication generally works through electromagnetic signals that are


broadcast by an enabled device within the air, physical environment or atmosphere. The
sending device can be a sender or an intermediate device with the ability to propagate
wireless signals. The communication between two devices occurs when the destination
or receiving intermediate device captures these signals, creating a wireless
communication bridge between the sender and receiver device. Wireless
communication has various forms, technology and delivery methods including

➢ satellite communication
➢ Mobile communication
➢ Wireless network communication
➢ Infrared communication

1
Dept. of ece,GCET
Underwater wireless communication

➢ Bluetooth communication

Although all of these communication technologies have different underlying


architecture, they all lack a physical or wired connection between their respective
devices to initiate and execute communication.

Fig 1.1 wireless communication

1.2 ACOUSTIC COMMUNICATION

Underwater acoustic communication is a technique of sending and receiving


messages below water. There are several ways of employing such communication but
the most common is by using hydrophones. Underwater communication is difficult due
to factors such as multi-path propagation, time variations of the channel, small available
bandwidth and strong signal attenuation, especially over long ranges. Compared to
terrestrial communication, underwater communication has low data rates because it
uses acoustic waves instead of electromagnetic waves.

At the beginning of the 20th century, some ships communicated by underwater


bells, the system being competitive with the primitive Maritime radio navigation
service of the time. The later Fessenden oscillator allowed communication with
submarines.

2
Dept. of ece,GCET
Underwater wireless communication

Fig 1.2 acoustic communication

1.3 UNDERWATER ACOUSTIC MODEM

underwater acoustic modems provide full-duplex digital communication using


the patented S2C (Sweep-Spread Carrier) technology, delivering an excellent
performance, resistant to the challenges of a dynamic subsea environment. Self-
adaptive algorithms adjust the S2C parameters to maintain the highest bit rate possible
in current conditions.

The spread-spectrum communication technology stems from bionic concepts


and over the years evolved into a whole ecosystem of products. This includes several
series of underwater acoustic modems, modular underwater positioning systems
(USBL, LBL, SBL), as well as a framework for developers in both networking and
hardware design.

Every EvoLogics underwater acoustic modem was designed as a reliable tool to


solve multiple communication tasks: it implements advanced data delivery algorithms,
supports several data management options, is capable of addressing and networking

3
Dept. of ece,GCET
Underwater wireless communication

and is easy to control with a comprehensive set of commands and software-configurable


settings.

Modern applications range from retrieving data from subsea sensors and navigating
unmanned underwater vehicles to deploying complex underwater sensor networks for
monitoring and exploration.

1.4 UNDERWATER NETWORKING

A recent survey on research in underwater protocol development presents a


good overview of the subject (Akyildiz et al., 2006). The state of the art in current
underwater networking technology is oriented towards a setup as shown in Figure 3.1.
The network consists of a set of underwater local area networks (UW-LAN, also known
as clusters or cells), connected to each other via gateway nodes. A gateway node
provides administration, security and routing between multiple UW-LANs and other
wireless or wired networks. In a cluster, the exact choice of physical layer protocol may
depend on factors such as specific channel conditions, security reasons, processing
capability, data rate requirements and energy efficiency. In view of the limited
bandwidth underwater, a high level of cross layer optimizations or transcending of
traditional layer boundaries may be needed to provide high data rates. We now review
some of the recent work and future challenges. The key focus of our review will be on
the data link layer (DLL) and network topology.

4
Dept. of ece,GCET
Underwater wireless communication

CHAPTER 2

WIRELESS COMMUNICATION

Earth is largely covered by water. This is largely unexplored area and recently
humans are showing interest towards exploring it Underwater Acoustic Sensor
Networks (UW-ASN) consist of a variable number of sensors that are deployed to
perform the monitoring tasks over a given area. Many disasters that took place in recent
past made humans to greatly monitor the oceanic environments for scientific,
environmental, military needs etc., in order to perform these monitoring task industries
are showing interest towards deploying sensor nodes under water. TWSNs operate in
an environment dominated by RF communication. Yet, RF communication is not an
optimal communication channel for underwater applications because of the extremely
limited RF wave’s propagation underwater. Conductive sea water only at extra low
frequencies (30 ¡ 300 Hz), which require large antennae and high transmission power.
Thus, links in underwater networks are based on acoustic wireless communications
Acoustic communications are the typical physical layer technology in underwater
networks

2.1 UNDERWATER COMMUNICATION

Communication Systems can be Wired or Wireless and the medium used for
communication can be Guided or Unguided. In Wired Communication, the medium is
a physical path like Co-axial Cables, Twisted Pair Cables and Optical Fiber Links etc.
which guides the signal to propagate from one point to other.

Such type of medium is called Guided Medium. On the other hand, Wireless
Communication doesn’t require any physical medium but propagates the signal through
space. Since, space only allows for signal transmission without any guidance, the
medium used in Wireless Communication is called Unguided Medium.

5
Dept. of ece,GCET
Underwater wireless communication

Wireless communications is a type of data communication that is performed and


delivered wirelessly. This is a broad term that incorporates all procedures and forms of
connecting and communicating between two or more devices using a wireless signal
through wireless communication technologies and devices.

Wireless communication generally works through electromagnetic signals that are


broadcast by an enabled device within the air, physical environment or atmosphere. The
sending device can be a sender or an intermediate device with the ability to propagate
wireless signals. The communication between two devices occurs when the destination
or receiving intermediate device captures these signals, creating a wireless
communication bridge between the sender and receiver device. Wireless
communication has various forms, technology and delivery methods including

2.2 TYPES OF COMMUNICATION

➢ satellite communication
➢ Mobile communication
➢ Wireless network communication
➢ Infrared communication
➢ Bluetooth communication

Although all of these communication technologies have different underlying


architecture, they all lack a physical or wired connection between their respective
devices to initiate and execute communication.

2.3 NECESSITY OF UNDERWATER WIRELESS

Wired underwater is not feasible in all situations as shown below :-

• Temporary experiments
• Breaking of wires
• Significant cost of deployment
• Experiment over long distances
• To scope up with above situations, we require underwater wireless
communication

6
Dept. of ece,GCET
Underwater wireless communication

CHAPTER 3

ACOUSTIC COMMUNICATION
Underwater acoustic communication is a technique of sending and receiving
messages below water. There are several ways of employing such communication but
the most common is by using hydrophones. Underwater communication is difficult due
to factors such as multi-path propagation, time variations of the channel, small available
bandwidth and strong signal attenuation, especially over long ranges. Compared to
terrestrial communication, underwater communication has low data rates because it
uses acoustic waves instead of electromagnetic waves.

At the beginning of the 20th century, some ships communicated by underwater


bells, the system being competitive with the primitive Maritime radio navigation
service of the time. The later Fessenden oscillator allowed communication with
submarines.

3.1 ACOUSTIC WAVES

Acoustic waves are a type of energy propagation through a medium by means


of adiabatic compression and decompression. Important quantities for describing
acoustic waves are acoustic pressure, particle velocity, particle
displacement and acoustic intensity. Acoustic waves travel with a characteristic
acoustic velocity that depends on the medium they're passing through. Some examples
of acoustic waves are audible sound from a speaker (waves traveling through air at
the speed of sound), ground movement from an earthquake (waves traveling through
the earth), or ultrasound used for medical imaging (waves traveling through the body).

Fig3.1 acoustic wave

7
Dept. of ece,GCET
Underwater wireless communication

3.2 WAVE PROPERTIES

Acoustic waves are elastic waves that exhibit phenomena like diffraction and
interference note the sound waves on air however don’t have any polarization since
they oscillate along the same direction as they move.

1. wave equation
2. phase
3. propagation speed
4. interference
5. standing wave
6. reflection
7. absorption

3.3 ACOUSTIC WAVE EQUATION

The acoustic wave equation describes the propagation of sound waves. The acoustic
wave equation for sound pressure in one dimension is given by

𝛛𝟐 𝐏 𝟏 𝛛𝟐 𝐏
𝟐
− =𝟎
𝛛𝐱 𝐜 𝟐 𝛛𝐭 𝟐

where

P is sound pressure in Pa

X is particle displacement in m
c is speed of sound in m/s
t is time in s

The wave equation for particle velocity has the same shape and is given by

𝝏𝟐 𝒖 𝟏 𝝏𝟐 𝒖
𝟐
− =𝟎
𝝏𝒙 𝒄𝟐 𝝏𝒕𝟐

Where

u is particle velocity in m/s

For lossy media, more intricate models need to be applied in order to take into account
frequency-dependent attenuation and phase speed. Such models include acoustic wave

8
Dept. of ece,GCET
Underwater wireless communication

equations that incorporate fractional derivative terms, see also the acoustic
attenuation article.

D'Alembert gave the general solution for the lossless wave equation. For sound
pressure, a solution would be

P = R𝐜𝐨𝐬(𝒘𝒕 − 𝒌𝒙) + (𝟏 − 𝑹) 𝐜𝐨𝐬(𝒘𝒕 + 𝒌𝒙)

where

w is angular frequency in rad/s


t is time in s
k is wave number in rad·m−1
R is a coefficient without unit

For the wave becomes a travelling wave moving rightwards, for the wave becomes a

travelling wave moving leftwards. A standing wave can be obtained by .

3.4 TYPES OF MODULATION USED IN ACOUSTIC

In general the modulation methods developed for radio communication can be


adopted for underwater acoustic communications (UAC). However some of the
modulation schemes are more suited to the unique underwater acoustic communication
channel than others. Some of the modulation methods used for UAC are as follows:

• Frequency shift keying (FSK)


• Phase shift keying (PSK)
• Frequency hopped spread spectrum (FHSS)
• Direct sequence spread spectrum (DSSS)
• Frequency and pulse-position modulation (FPPM and PPM)
• Multiple frequency shift keying (MFSK)
• Orthogonal frequency-division multiplexing (OFDM)

The following is a discussion on the different types of modulation and their utility to
UAC.

9
Dept. of ece,GCET
Underwater wireless communication

3.4.1 FREQUENCY SHIFT KEYING

FSK is the earliest form of modulation used for acoustic modems. UAC prior to
modems was by percussion of different objects underwater. This method was also used
to measure the speed of sound in water.

FSK usually employs two distinct frequencies to modulate data; for example,
Frequency F1 to indicate bit 0 and frequency F2 to indicate bit 1. Hence a binary string
can be transmitted by alternating these two frequencies depending on whether it is a 0
or 1. The receiver can be as simple as having analogue matched filters to the two
frequencies and a level detector to decide if a 1 or 0 was received. This is a relatively
easy form of modulation and therefore used in the earliest acoustic modems. However
more sophisticated Demodulator using Digital Signal Processors (DSP) can be used in
the present day.

The biggest challenge FSK faces in the UAC is multi-path reflections. With multi-path
(particularly in UAC) several strong reflections can be present at the receiving
hydrophone and the threshold detectors become confused, thus severely limiting the
use of this type of UAC to vertical channels. Adaptive equalization methods have been
tried with limited success. Adaptive equalization tries to model the highly reflective
UAC channel and subtract the effects from the received signal. The success has been
limited due to the rapidly varying conditions and the difficulty to adapt in time.

3.4.2 PHASE SHIFT KEYING

Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing
(modulating) the phase of a reference signal (the carrier wave). The signal is impressed
into the magnetic field x,y area by varying the sine and cosine inputs at a precise time.
It is widely used for wireless LANs, RFID and Bluetooth communication.

Any digital modulation scheme uses a finite number of distinct signals to represent
digital data. PSK uses a finite number of phases, each assigned a unique pattern of
binary digits. Usually, each phase encodes an equal number of bits. Each pattern of bits
forms the symbol that is represented by the particular phase. The demodulator, which
is designed specifically for the symbol-set used by the modulator, determines the phase
of the received signal and maps it back to the symbol it represents, thus recovering the
original data. This requires the receiver to be able to compare the phase of the received

10
Dept. of ece,GCET
Underwater wireless communication

signal to a reference signal — such a system is termed coherent (and referred to as


CPSK).

Alternatively, instead of operating with respect to a constant reference wave, the


broadcast can operate with respect to itself. Changes in phase of a single broadcast
waveform can be considered the significant items. In this system, the demodulator
determines the changes in the phase of the received signal rather than the phase (relative
to a reference wave) itself. Since this scheme depends on the difference between
successive phases, it is termed differential phase-shift keying (DPSK). DPSK can be
significantly simpler to implement than ordinary PSK since there is no need for the
demodulator to have a copy of the reference signal to determine the exact phase of the
received signal (it is a non-coherent scheme). In exchange, it produces more erroneous
demodulation.

3.4.3 ORTHOGONAL FREQUENCY-DIVISION MULTIPLEXING

Orthogonal frequency-division multiplexing (OFDM) is a digital multi-carrier


modulation scheme. OFDM conveys data on several parallel data channel by
incorporating closely spaced orthogonal sub-carrier signals

OFDM is a favorable communication scheme in underwater acoustic communications


thanks to its resilience against frequency selective channels with long delay spreads.

3.5 FACTORS INFLUNCING ACOUSTIC

> Path loss: Due to attenuation and geometric spreading.


> Noise: Man-made noise and ambient noise(due to hydrodynamics)
> Multi-path propogate
> High propogation delay
> Doppler frequency spread

3.6 ACOUSTIC SENSOR NETWORK


> Group of sensors and vehicles deployed underwater and networked via acoustic links,
performing collaborative tasks.
> Equipment
- Autonomous Underwater Vehicles (AUVs)
- Underwater sensors (UW-ASN)

11
Dept. of ece,GCET
Underwater wireless communication

Fig 3.2 acoustic sensor networking

12
Dept. of ece,GCET
Underwater wireless communication

CHAPTER 4

UNDERWATER ACOUSTIC MODEM


underwater acoustic modems provide full-duplex digital communication using
the patented S2C (Sweep-Spread Carrier) technology, delivering an excellent
performance, resistant to the challenges of a dynamic subsea environment. Self-
adaptive algorithms adjust the S2C parameters to maintain the highest bit rate possible
in current conditions.

The spread-spectrum S2C communication technology stems from bionic


concepts and over the years evolved into a whole ecosystem of products. This includes
several series of underwater acoustic modems, modular underwater positioning systems
(USBL, LBL, SBL), as well as a framework for developers in both networking and
hardware design.

Every EvoLogics underwater acoustic modem was designed as a reliable tool to


solve multiple communication tasks: it implements advanced data delivery algorithms,
supports several data management options, is capable of addressing and networking
and is easy to control with a comprehensive set of commands and software-configurable
settings.

Modern applications range from retrieving data from subsea sensors and
navigating unmanned underwater vehicles to deploying complex underwater sensor
networks for monitoring and exploration.

4.1 DATA TRANSMISSION IN MODEM

When no data is being transmitted, the modem stays in sleep mode, it periodically
wakes up to receive possible data being transmitted by far end modem. This results in
low power consumption. Similarly when the data is to be transmitted , the modem
receives data from its link in sleep mode and then switches to transmit mode and
transmit the data.

13
Dept. of ece,GCET
Underwater wireless communication

Fig 4.1 data transmission of acoustic flowchart

4.2 APPLICATIONS

1. Ocean currents monitoring


2. Equipment monitoring and control
3. Autonomous Underwater Vehicles (AUV)
4. Remotely operated vehicle(ROV)
5. Acoustic navigation technology for multiple AUVs.
6. Solar Powered AUVs
7. Seismic monitoring.

Fig 4.2 uses of network

14
Dept. of ece,GCET
Underwater wireless communication

4.3 ADVANTAGES

➢ Can be used to provide early warnings of tsunamis generated by undersea > >
earthquakes.
➢ It avoids data spoofing.
➢ It avoids privacy leakage.
➢ Pollution monitoring.
4.4 DISADVANTAGES

 ADVANCED Battery power is limited and usually batteries cannot be


recharged also because solar energy cannot be exploited .
 The available bandwidth is severely limited.
 Channel characteristics including long and variable propagation delays.
 Multipath and fading problems.
 High bit error rate.
ADVANCED MODEMS AVALIABLE

fig 4.3 advanced modems

15
Dept. of ece,GCET
Underwater wireless communication

CHAPTER 5
UNDERWATER SENSOR NETWORK

Underwater wireless communication networks (UWCNs) are constituted by sensors


and autonomous underwater vehicles (AUVs) that interact to perform specific
applications such as underwater monitoring. Coordination and sharing of information
between sensors and AUVs make the provision of security challenging. The aquatic
environment is particularly vulnerable to malicious attacks due to the high bit error
rates, large and variable propagation delays, and low bandwidth of acoustic channels.
Achieving reliable inter vehicle and sensor-AUV communication is especially difficult
due to the mobility of AUVs and the movement of sensors with water currents. The
unique characteristics of the underwater acoustic channel and the differences between
underwater sensor networks and their ground based counterparts require the
development of efficient and reliable security mechanisms.

Fig5.1 underwater sensor network

16
Dept. of ece,GCET
Underwater wireless communication

5.1 ARCHITECHTURE

UWSN architectures can be classified in various ways. One classification discriminates


between static, semi mobile and mobile architectures. Another popular UWSN
classification method is to divide UWSNs into two dimensional (cover ocean floor) and
three-dimensional (includes depth as a dimension). UWSN can also be single-hop,
multi-hop, or hybrid (single-hop individual sensors, multi-hop clusters). Architectures
can be grouped into short-tem, time-critical applications, and long-term, non-time-
critical applications. RF, optical, and acoustic wave based architectures are another way
to look at the available UWSNs. Fig. 4.1 shows the most common UWSN architecture.
The individual nodes are anchored at the ocean floor. They are usually smaller in size,
battery operated, and they mostly transmit data via acoustic modems. The cluster heads
are also anchored to the ocean floor. In addition to having acoustic modems. Cluster
heads are equipped with two acoustic transceivers, namely a vertical and a horizontal
transceiver. The horizontal transceiver is used by the cluster head or uwsink to
communicate with the sensor nodes in order to send commands and configuration data
to the sensors. This communication will happening between underwater sinker cluster
head to sensors. Collect monitored data. This communication will happening between
sensors to cluster head or sink. Cluster heads communicate via horizontal acoustic
modes with all other individual nodes within the cluster. The data transfer from node to
cluster head can be single-hop (each node communicated to the cluster head directly or
multi-hop. In case of multi-hop paths, as in terrestrial sensor networks, the data
produced by a source sensor is relayed by intermediate sensors until it reaches the uw-
sink. This results in energy savings and increased network capacity but increases the
complexity of the routing functionality as well. The vertical trans receiver is used by
the uw-sinks to relay data to a surface station. Vertical transceivers must be long range
transceivers for deep water applications as the ocean can be as deep as 10 km. The
surface station is equipped with an acoustic transceiver that is able to handle multiple
parallel communications with the deployed uw-sinks. Finally base or surface station
will send the sensed data to on-shore base station via RF signal.

17
Dept. of ece,GCET
Underwater wireless communication

Fig 5.2 2d architechture

Unlike TWSNs, the hardware of the cluster head node is different from all other nodes,
because it has additional functionalities such as a direct communication link with the
ocean surface. Therefore, a popular TWSN’s cluster head switching feature (which
increases the overall network lifetime by efficiently distributing the power consumption
among nodes) cannot be utilized in UWSNs. Also, the cluster head is potentially the
most security-vulnerable component in UWSNs military applications, because it is a
single point of failure node. Fig. 3 shows an alternative 3D UWSN architecture. Three
dimensional underwater networks are used to detect and observe phenomena that
cannot be adequately observed by means of ocean bottom sensor node, i.e., to perform
cooperative sampling of 3D ocean environment. In 3D architecture, sensor node float
at different depth in order to observe the given phenomenon. In this architecture each
sensor is anchored to the ocean bottom and equipped with a floating buoy that can
inflated by a pump. The buoy pushes the sensor towards the ocean surface. The depth
of sensor then can be regulated by adjusting the length of wire that connect the sensor
to the anchor, by means of an electronically controlled engine that reside on sensor

3D architecture can have all nodes directly communicate to the surface base or can have
only cluster heads communicate directly to the base. In the former case, all nodes are
of the same type, but communication might be more energy intensive than that of the

18
Dept. of ece,GCET
Underwater wireless communication

cluster head approach. The cluster head approach requires only the cluster head to carry
a long-range communication modem. On the other hand, the clustered approach is
vulnerable to single point of failure. Military applications are extremely sensitive to
single point of failure hardware components.

Fig 5.3 3d architechtue

Since in 3D underwater networks there is no notion of uw-sink, sensors should be able


to relay information to the surface station via multi hop paths. Thus, network devices
should coordinate their depths such a way that the network topology always connected,
i.e., at least one path from every sensor to the surface station always exists.

Fig 5.4 mobile Architechture

19
Dept. of ece,GCET
Underwater wireless communication

This architecture uses AUVs and UUVs as network nodes. Fig. 4.3 shows an example
of the architecture. The main important factor in this architecture is a mobility of nodes.
Mobile node put extra controlling complexity in the network. In addition the network
consume more power because they consume extra power due to force or movement of
mobile node in water. Moreover the mobile node is less reliable and shorter lifetime.
Both mobile and static architecture has some advantages and disadvantages. In hybrid
architecture that include uses both mobile node and static node by which we can
transmit our sensed data efficiently from floor sensor to surface station. In this this
architecture the mobile node traversing over the static field or static sensor and achieve
the point-to-point communication. The static sensor node transmit the data to water
surface station via mobile node

20
Dept. of ece,GCET
Underwater wireless communication

CHAPTER 6

IMPLEMENTATION
Underwater sensor networks have some similarities with their ground-based
counterparts such as their structure, function, computation and energy limitations.
Radio waves do not propagate well underwater due to the high energy absorption of
water. Therefore, underwater communications are based on acoustic links characterized
by large propagation delays. The propagation speed of acoustic signals in water
(typically 1500 m/s) is five orders of magnitude lower than the radio wave propagation
speed in free space. Acoustic channels have low bandwidth. The link quality in
underwater communication is severely affected by multipath, fading, and the refractive
properties of the sound channel. As a result, the bit error rates of acoustic links are often
high, and losses of connectivity arise. Underwater sensors move with water currents,
and AUVs are mobile. Although certain nodes in underwater applications are anchored
to the bottom of the ocean, other applications require sensors to be suspended at certain
depths or to move freely in the underwater medium. The future development of
geographical routing is very promising in UWCNs due to its scalability and limited
signaling properties. However, it cannot rely on the Global Positioning System (GPS)
because it uses radar waves in the 1.5 GHz band that do not propagate in water.
Underwater communication systems have more stringent power requirements than
terrestrial systems because acoustic communications are more power hungry, and
typical transmission distances in UWCNs are greater; hence, higher transmit power is
required to ensure coverage. The above mentioned characteristics of UWCNs have
several security implications. UWCNs suffer from the following vulnerabilities. High
bit error rates cause packet errors. Consequently, critical security packets can be lost.
Wireless underwater channels can be eavesdropped on. Attackers may intercept the
information transmitted and attempt to modify or drop packets. Malicious nodes can
create out-of band connections via fast radio (above the water surface) and wired links,
which are referred to as wormholes. Since sensors are mobile, their relative distances
vary with time. The dynamic topology of the underwater sensor network not only
facilitates the creation of wormholes but it also complicates their detection.

21
Dept. of ece,GCET
Underwater wireless communication

6.1 ATTACKS ON UWENS AND COUNTER MEASURES

6.1.1 JAMMING

A jamming attack consists of interfering with the physical channel by putting up


carriers on the frequencies neighbor nodes use to communicate. Since underwater
acoustic frequency bands are narrow, UWCNs are vulnerable to narrowband jamming.
Localization is affected by the replay attack when the attacker jams the communication
between a sender and a receiver, and later replays the same message with stale
information posing as the sender. Spread spectrum is the most common defence against
jamming. Frequency hopping spread spectrum (FHSS) and direct sequence spread
spectrum (DSSS) in underwater communications are drawing attention for their good
performance under noise and multipath interference. These schemes are resistant to
interference from attackers, although not infallible. An attacker can jam a wide band of
the spectrum or follow the precise hopping sequence when an FHSS scheme is used. A
high-power wideband jamming signal can be used to attack a DSSS scheme.
Underwater sensors under a jamming attack should try to preserve their power. When
jamming is continuous, sensors can switch to sleep mode and wake up periodically to
check if the attack is over. When jamming is intermittent, sensors can buffer data
packets and only send high-power high priority messages to report the attack when a
gap in jamming occurs. In groundbased sensor networks, other sensors located along
the edge of the area under normal background noise and report intrusion to outside
nodes. That will cause any further traffic to be rerouted around the jammed region.
However, this solution cannot be applied to UWCNs, since nodes underwater are
usually sparsely deployed, which means there would not be enough sensors to delimit
the jammed region accurately and reroute traffic around it. Another solution proposed
for ground-based sensor networks against jamming is to use alternative technologies
for communication such as infrared or optical. However, this solution cannot be applied
either, since optical and infrared waves are severely attenuated under water.

6.1.2 WORMHOLE ATTACK

A wormhole is an out-of-band connection created by the adversary between two


physical locations in a network with lower delay and higher bandwidth than ordinary
connections. This connection uses fast radio (above the sea surface) or wired links to

22
Dept. of ece,GCET
Underwater wireless communication

significantly decrease the propagation delay. In a wormhole attack the malicious node
transfers some selected packets received at one end of the wormhole to the other end
using the out-of-band connection, and reinjects them into the network. The effect is that
false neighbor relationships are created, because two nodes out of each other’s range
can erroneously conclude that they are in proximity of one another due to the
wormhole’s presence. This attack is devastating. Routing protocols choose routes that
contain wormhole links because they appear to be shorter; thus, the adversary can
monitor network traffic and delay or drop packets sent through the wormhole.
Localization protocols can also be affected by these attacks when malicious nodes claim
wrong locations and mislead other nodes.

Fig 6.1 wormhole attack

One proposed method for wormhole detection in ground-based sensor networks


consists of estimating the real physical distance between two nodes to check their
neighbour relationship. If the measured distance is longer than the nodes’
communication range, it is assumed that the nodes are connected through a wormhole.
However, accurate distance estimation depends on precise localization (geographical
packet leashes, wormhole detection using position information of anchors), tight clock
synchronization (temporal packet leashes), or use of specific hardware (directional
antennas). In underwater communications accurate localization and time
synchronization are still challenging.

23
Dept. of ece,GCET
Underwater wireless communication

Since a wormhole contracts the virtual layout at certain regions, some nodes
far away appear to be neighbors, and these contradictions can be detected visualizing
the virtual layout. A wormhole indicator variable is defined to compute the distortion
in angles; the distortion in edge lengths is computed as the difference between the
measured distances among neighboring sensors and the lengths of the reconstructed
connections.

6.1.3 SINKHOLE ATTACK

In a sinkhole attack, a malicious node attempts to attract traffic from a particular area
toward it; for example, the malicious node can announce a high-quality route.
Geographic routing and authentication of nodes exchanging routing information are
possible defences against this attack, but geographic routing is still an open research
topic in UWCNs.

6.1.4 HELLO FLOOD ATTACK

A node receiving a HELLO packet from a malicious node may interpret that the
adversary is a neighbor this assumption is false if the adversary uses high power for
transmission. Bidirectional link verification can help protect against this attack,
although it is not accurate due to node mobility and the high propagation delays of
UWCNs. Authentication is also a possible defence.

6.1.5 ACKNOWLEDGMENT SPOOFING

A malicious node overhearing packets sent to neighbour nodes can use this information
to spoof link layer acknowledgments with the objective of reinforcing a weak link or a
linklocated in a shadow zone. Shadow zones are formed when the acoustic rays are bent
and sound waves cannot penetrate. They cause high bit error rates and loss of
connectivity. This way, the routing scheme is manipulated. A solution to this attack
would be encryption of all packets sent through the network.

6.1.6 SYBIL ATTACK

An attacker with multiple identities can pretend to be in many places at once.


Geographic routing protocols are also misled because an adversary with multiple
identities can claim to be in multiple places at once Authentication and position

24
Dept. of ece,GCET
Underwater wireless communication

verification are methods against this attack, although position verification in UWCNs
is problematic due to mobility.

Fig 6.2 sybil attack

6.2 APPLICATIONS

 Future applications could enhance myriad industries, ranging from the offshore
oil industry to aquaculture to fishing industries, she noted. Additionally,
pollution control, climate recording, ocean monitoring (for prediction of
natural disturbances) and detection of objects on the ocean floor are other areas
that could benefit from enhanced underwater communications.
 Environmental monitoring to gathering of oceanographic data
 Marine archaeology
 Search and rescue missions
 Defence

25
Dept. of ece,GCET
Underwater wireless communication

CHAPTER 7

CONCLUSION
 This technology gives the overall view of the necessity of underwater wireless
communication and its applications.
 Despite much development in this area of the underwater wireless
communication, there is still an immense scope so more research as major part
of the ocean bottom yet remains unexploded.
 Advanced versions of the existing applications and innovative inventions have
become a must in this field.
 Therefore, the main objective is to imbibe knowledge about this emerging field
and thereby encourage research and implementation of advanced technology to
overcome the present limitations such as the environmental effects on the noise
performance of acoustic systems as mentioned in this paper

26
Dept. of ece,GCET
Underwater wireless communication

REFERENCES

Jaime Lloret 1 ,*, Sandra 1 , Miguel Ardid 1 and Joel J. P. C. Rodrigues “Underwater
Wireless Sensor Communications in the 2.4 GHz ISM Frequency Band”.

• X.Yu ; Link Quest Inc., San Diego, CA, USA “Wireline quality underwater wireless
communication using high speed acoustic modems”.

• M.P. Malumbres1 , P. Pablo Garrido1 , Carlos T. Calafate2 and Jose Oliver2,


“Underwater Wireless Networking Technologies”.

• Milica Stojanovic Massachusetts Institute of Technology, “Wireless Underwater


Communications and Networks: Current Achievements and Future Research
Challenges”.

• JOHN HEIDEMANN1, MILICA STOJANOVIC AND MICHELE ZORZI,


“Underwater sensor networks: applications, advances and challenges”.

• M.C. Domingo; Electr Eng. Dept, Barcelona Tech Univ , Barcelona, Spain, “Securing
underwater wireless communication networks”.

27
Dept. of ece,GCET
Underwater wireless communication

𝛿𝑦
𝛿𝑥

28
Dept. of ece,GCET

You might also like