Underwater Wireless Communication
Underwater Wireless Communication
INTRODUCTION :
Earth is largely covered by water. This is largely unexplored area and recently
humans are showing interest towards exploring it Underwater communication.
Radio Magnetic
Parameter Optical Acoustic Induction
Frequency
Data Transfer
< 1 Gbps < 100 Kbps < 10 Mbps Mbps
Rates
Radio /
Wave Types Light Sound Magnetic
Electromagnetic
14
From 10 Hz to
Frequency 15 100 KHz MHz MHz
10 Hz
Antenna Size 0.1 m 0.1 m 0.5 m Loop antenna
Depending on the application, future underwater networks are likely to evolve in two
directions:centralized and decentralized networks.
In a centralized network, nodes communicate through a base station that covers one
cell. Larger area is covered by more cells whose base stations are connected over a
separatecommunications infrastructure. The base stations can be on the surface and
communicate using radio links, as shown in the figure, or they can be on the bottom,
connected by a cable. Alternatively, the base station can be movable as well.
In a decentralized network, nodes communicate via peer-to-peer, multi-hop
transmission ofdata packets. The packets must be relayed to reach the destination,
and there may be a designatedend node to a surface gateway. Nodes may also form
clusters for a more efficient utilization ofcommunication channel.
Unlike TWSNs, the hardware of the cluster head node is different from all other
nodes, because it has additional functionalities such as a direct communication link
with the ocean surface. Therefore, a popular TWSN’s cluster head switching feature
(which increases the overall network lifetime by efficiently distributing the power
consumption among nodes) cannot be utilized in UWSNs. Also, the cluster head is
potentially the most security-vulnerable component in UWSNs military applications,
because it is a single point of failure node. Following figure shows an alternative 3D
UWSN architecture. Three dimensional underwater networks are used to detect and
observe phenomena that cannot be adequately observed by means of ocean bottom
sensor node, i.e., to perform cooperative sampling of 3D ocean environment. In 3D
architecture, sensor node float at different depth in order to observe the given
phenomenon. In this architecture each sensor is anchored to the ocean bottom and
equipped with a floating buoy that can inflated by a pump. The buoy pushes the
sensor towards the ocean surface. The depth of sensor then can be regulated by
adjusting the length of wire that connect the sensor to the anchor, by means of an
electronically controlled engine that reside on sensor.
3D architecture can have all nodes directly communicate to the surface base or can
have only cluster heads communicate directly to the base. In the former case, all
nodes are of the same type, but communication might be more energy intensive than
that of the cluster head approach. The cluster head approach requires only the
cluster head to carry a long-range communication modem. On the other hand, the
clustered approach is vulnerable to single point of failure. Military applications are
extremely sensitive to single point of failure hardware components.
Fig: 3D Architecture of underwater sensor network
WORMHOLE ATTACK:
SINKHOLE ATTACK:
In a sinkhole attack, a malicious node attempts to attract traffic from a particular area
toward it; for example, the malicious node can announce a high-quality route.
Geographic routing and authentication of nodes exchanging routing information are
possible defences against this attack, but geographic routing is still an open research
topic in UWCNs.
ACKNOWLEDGMENT SPOOFING:
A malicious node overhearing packets sent to neighbour nodes can use this
information to spoof link layer acknowledgments with the objective of reinforcing a
weak link or a link located in a shadow zone. Shadow zones are formed when the
acoustic rays are bent and sound waves cannot penetrate. They cause high bit error
rates and loss of connectivity. This way, the routing scheme is manipulated. A
solution to this attack would be encryption of all packets sent through the network.
SYBIL ATTACK:
An attacker with multiple identities can pretend to be in many places at once.
Geographic routing protocols are also misled because an adversary with multiple
identities can claim to be in multiple places at once Authentication and position
verification are methods against this attack, although position verification in UWCNs
is problematic due to mobility.
Fig : Sybil Attack
APPLICATIONS:
Future applications could enhance myriad industries, ranging from the
offshore oil
industry to aquaculture to fishing industries, she noted. Additionally, pollution
control, climate recording, ocean monitoring (for prediction of natural
disturbances) and detection of objects on the ocean floor are other areas that
could benefit from enhanced underwater communications.
Environmental monitoring to gathering of oceanographic data
Marine archaeology
Search and rescue missions
Defence
DISADVANTAGES:
Battery power is limited and usually batteries cannot be recharged also
because solarenergy cannot be exploited.
The available bandwidth is severly limited.
Channel characteristics including long and variable propagation delays
Multipath and fading problems.
High bit error rate.
MPSK is the most commonly used modulation method. Phase shift is based on the
phase as a variable, and the amplitude and the frequency are as a constant signal
modulation. The MPSK signal can be represented by such a set of signals:
where M represents the number of symbols and the phase interval between two
adjacent signals in the modulation signal is 2π/M. For example, the phase spacing of
the four symbols QPSK is π/2 .
The expression of the MQAM signal is somewhat different from that of MPSK. It is
expressed as
CHANNEL CHARACTERISTICS
Noise observed in the ocean consists of man-made noise and ambient noise. In
deep ocean, ambient noise dominates, while near shores and in the presence of
shipping activity, man-made noise significantly increases the noise level. Most of the
ambient noise sources can be described as having a continuous spectrum and
Gaussian statistics. As a first approximation, the ambient noise power spectral
density is assumed to decay at 20 dB/decade, both in shallow and deep water, over
frequencies of interest to communication systems design.
While typical multipath spreads in the commonly used radio channels are on the
order of several symbol intervals, in the horizontal underwater acoustic channels
they increase to several tens, or a hundred of symbol intervals for moderate to high
data rates. For example, a commonly encountered multipath spread of 10ms in a
medium-range shallow water channel causes the ISI to extend over 100 symbols if
the system is operating at a rate of 10 kilosymbols per second (ksps).
The mechanisms of multipath formation in the ocean are different in deep and
shallow water, and also depend on the frequency and range of transmission.
Depending on the system location, there are several typical ways of multipath
propagation, determined mostly by the water depth. The definition of shallow and
deep water is not a strict one, but usually implies the region of continental shelves,
with depth less than about 100 m, and the region past the continental shelves,
respectively. One mechanism of multipath formation is by reflections off the bottom,
surface and any objects in the water, and this mechanism prevails in shallow water
in addition to a possible direct path. Another mechanism, prevalent in deep water, is
by ray bending which occurs because the rays of sound tend to reach regions of
lower propagation speed. In this way, the sound channel may form by repeated
bending of the rays toward the location where sound speed reaches its minimum,
called the axis of the deep sound channel. Since there is no loss due to reflections,
sound can travel in this way over several thousands of kilometers. Alternatively, the
rays bending upwards in deep water may reach the surface focusing in one point
where they are reflected, and the process is repeated periodically. The region
between two focusing points on the surface is called a convergence zone, and its
typical length is 60 -100 km.
The geometry of multipath propagation and its spatial dependence are important for
communication systems which use array processing to sup-press multipath. The
design of such systems is often ac-companied by the use of a propagation model for
predicting the angular distribution of multipath arrivals. Ray theory and the theory of
normal modes provide basis for such propagation modeling.
Time- Variation
The VERTLINK surface and bottom units are designed around the Analog Devices
2101 Fixed-point DSP chips. Fixed-point, rather than floating-point units, are used
because they require less power and are less expensive. These two factors are
important in underwater communication systems, because they are battery powered
and are often disposable or difficult to retrieve. Although floating-point processors
offer a large numerical dynamic range, this is unnecessary in the application
described here as in most underwater applications. The layout of the DSPs within
the surface and bottom units is illustrated in Figure
Essentially, the surface and bottom units are identical. The only exception is that the
2"d DSP on the surface unit communicates with a personal computer, either directly
or via a radio link. Both units contain two DSPs. These realize the modulation and
demodulation of the data and commands and all data are transferred through the
DSP's using their serial ports (sport 0 and sport l).
The sampling of the analogue signal at the input of the analogue-to-digital converter
is controlled by the first processor using the internal timer. This is done using its
internal timer, which generates interrupts after a pre-defined number of processor
cycles. The sampling frequency is limited by the speed at which the processor
operates. The maximum sampling frequency that can be achieved is equal to one
over the sampling period, T, which can be found by determining the number of
operations executed by the processor for each sample multiplied by the processor
cycle, Tcp. T= n Tcp .
For each interrupt the processor reads the data sample at the output of the
analogue-to-digital converter and starts the next data sample conversion. The
analogue-to-digital converter is uni-polar and generates an output between 0 and 1.
This signal is made bi-polar by subtracting 0.5 and then scaling up by 2. This gives a
dynamic range from -1 to +I.
In the 1'' DSP each sample is multiplied by local in-phase and quadrature (sine and
cosine) values. The result of these operations are filtered using Finite Impulse
Response (FIR) digital filters to produce the in-phase (I) and the quadrature (Q).
phase components. To achieve optimum performance the VERTLINK system is
designed to work at a number of different frequencies [3]. The choice of frequency
depends on the operation depth. The FIR parameters can be modified to achieve the
required pass-band boundaries and stop-band attenuation. For example, the filter
characteristics for a 50kHz carrier are given in Table :
Table : FIR parameters for 50kHz – carrier operation at 10kbps symbol rate
The order of the digital filter determines the number of operations needed to
implement the filter (the number of processor cycles needed to implement an FIR
filter is equal to the order of that filter plus six processor cycles). The samples at the
output of these filters are sent to the second processor using the serial ports. All the
programs running on the DSPs are interrupt driven, as follows:
1. The start interrupt is used to boot up the processor.
2. The IRQ2 interrupt generated externally by the hardware.
3. The sport interrupts (up to 4), include input and output interrupts for each
sport. These generate interrupts after receiving or transmitting data.
Depending on the configuration of the serial ports interrupts can be generated
after a single word (from 3 to 16 bits) or after buffer of data has been
transmitted or received (using the autobuffering capability of the processor).
4. The timer interrupt is generated by the internal timer after a number of
processor cycles.
5. Depending on the configuration of the DSP's control registers the second
serial port (sport 1) can be configured as a proper serial port or as two
additional external interrupts (IRQI, IRQ2).
TECHNIQUES OF LOCALIZATION
There have been many proposals to localize UWSNs but some of the methods excel
in specific ways. Some of the technique of localization are: A. Localization of Multi-
AUV in Underwater Acoustic Sensor Network. This method includes the use of multi-
autonomous underwater vehicles (AUVs).In this approach, the position and time is
broadcasted by each AUV which are similar to global satellite navigation satellite.
The message is received by the nodes which is in the range of its communication
and the range differences are detected between sensor nodes and four AUVs. And
after that the position is calculated using trilateration method. Multi-AUV Localization
Scheme consists of two phases: There is time synchronization among AUVs and
from that AUVs the messages are received. It includes the detection of difference
between various arrival time of signal between the nodes and the four AUVs and the
difference of ranges are calculated. Phase 1: Using trilateration the nodes calculates
their position using the position of AUVs and their range differences. The four AUVs
exist, their locations are known. Each AUV consist of the acoustic transmitter which
has been a fixed communication range. Every AUV runs on network and at every t
sec, it broadcasts and that times be tA, tB, tC, tD. The message received by the
target node at t’A, t’B, t’C, t’D and time from A to T is Δ ti = t’i – ti . Where i = {A, B,
C, D}.
A message containing location information is broadcasted by the AUV node
periodically. When an unusual event is detected by the Target node, it accepts the
broadcast message. The format of the broadcast packet is as shown in below figure.
For localizing the A-node the data available from the S-node are geographic
coordinates, TOA, time of transmission, depth measurements and AOA. When the
S-node receives packet, the location computation phase will start. A-node is an
important node because the computation of the location is dependent on the
successful reception of A-node’s packet. If the packet is not available or is corrupted,
the situation is treated as the fault. S-node will initialize the fault tolerant procedure
and it will determine the corrupted packet. The location is estimated using
Equirectangular Approximation (EA). Compared to other techniques based on
cylindrical projection, it is more efficient in terms of computation. The TOA
measurements are used for calculating the range between A-node and S-node.