Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Improvisation of Underwater Wireless Sensor Network’s Efficiency for Secure Communication

Author : Salini kotari 1 Dr. M.B. Mukesh Krishnan 2

Date of Publication :31st December 2017

Abstract: Earth is covered with land and water in that 2/3 rd of the earth is covered by water bodies which include both salt water and fresh water as well. Since water is a major component of the earth, it is necessary to understand about the water bodies and underwater sensors will be helpful for it. Underwater wireless sensor networks are used widely for oceanographic data collection such as abnormalities which cause natural calamities, to track other submarines (navigation and surveillance) and also pollution level in the water. The major limitations of underwater wireless sensor networks are battery power, limited bandwidth, multi-path, fading problems, high bit error rates, propagation delays and also they are more prone to corrosion, foul forming etc., these limitations prove that they have fewer lifetimes compared to TWSN’s. Due to the limitations and requirements of these UWSN’s, are required to use Ultra lightweight components. The major physical layer attacks of underwater wireless sensors are jamming and eavesdropping [4]. Due to eavesdropping data, not only losses confidentiality but further may lead to other malicious attacks which losses both availability and integrity of data. The fundamental problem of underwater wireless sensor networks is to provide security which is highly efficient but uses less space, fewer computations and low bit rates. Therefore the security techniques used for terrestrial wireless sensor networks based on all the above-stated reasons are not at all suitable for UWSN’s. Researchers are still trying to provide better security using an encryption technique with limited computations and less storage space. As far as now the latest efficient ultra lightweight encryption schema provides the better security with lower computations by using chaotic theory to generate the random key but it requires high storage space which is not accurate for underwater sensor network communication. So we do implement basic block cypher with combination of left, right shift, substitution and XOR operations for lower computations with the key generated randomly using Pseudo Random Number Generator in order to reduce the storage space for key spaces and also splitting the process of encryption rounds according to the number of hops required to transmit from the source node to destination node in between the sensor and the base station onshore, provide security for the data communication through underwater wireless sensor networks. Thus for decrypting the data, an attacker needs to know about the number of hops also along with the keys used for encryption which makes the process of encryption better secured than existing in UWASN.

Reference :

    1. Alvarez, R., Caballero-Gil, C., Santonja, J., & Zamora, A. (2017). Algorithms for Lightweight Key Exchange. Sensors, 17(7), 1517
    2. Bansod, G., Patil, A., Sutar, S., & Pisharoty, N. (2016, April). An ultra lightweight encryption design for security in pervasive computing. In Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on (pp. 79-84). IEEE.
    3. Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., & Vikkelsoe, C. (2007, September). PRESENT: An ultra-lightweight block cipher. In CHES (Vol. 4727, pp. 450-466).
    4. Cong, Y., Yang, G., Wei, Z., & Zhou, W. (2010, April). Security in underwater sensor network. In Communications and Mobile Computing (CMC), 2010 International Conference on (Vol. 1, pp. 162-168). IEEE.
    5. DiCarlo, D. F. (2012). Random number generation: Types and techniques.

Recent Article