A Secure Routing Algorithm for Underwater Wireless Sensor Networks


1 Department of Computer Engineering, Karaj Branch, Islamic Azad University, Karaj, Iran

2 Department of Computer Engineering, Shahr-e-Qods Branch, Islamic Azad University, Tehran, Iran


Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet delivery. A few researches have been done on secure routing in UWSNs. In this article, a new secure routing algorithm called Secure Routing Algorithm for Underwater (SRAU) sensor networks is proposed to resist against wormhole and sybil attacks. The results indicate acceptable performance in terms of increasing the packet delivery ratio regarding the wormhole and sybil attacks, increasing network lifetime through balancing the network energy consumption, high detection rates against the attacks, and decreasing the end to end delay.


1.     Ribeiro, F.J.L., Pedroza, A.d.C.P. and Costa, L.H.M.K., "Underwater monitoring system for oil exploration using acoustic sensor networks", Telecommunication Systems,  Vol. 58, No. 1, (2015), 91-106.
2.     Li, X., Han, G., Qian, A., Shu, L. and Rodrigues, J., "Detecting sybil attack based on state information in underwater wireless sensor networks", in Software, Telecommunications and Computer Networks (SoftCOM), 2013 21st International Conference on, IEEE., (2013), 1-5.
3.     Du, X., Peng, C. and Li, K., "A secure routing scheme for underwater acoustic networks", International Journal of Distributed Sensor Networks,  Vol. 13, No. 6, (2017), doi: 10.1177/1550147717713643.
4.     Bharamagoudra, M.R. and Manvi, S.S., "Agent‐based secure routing for underwater acoustic sensor networks", International Journal of Communication Systems,  Vol. 30, No. 13, (2017), e3281.
5.     Dargahi, T., Javadi, H.H. and Shafiei, H., "Securing underwater sensor networks against routing attacks", Wireless Personal Communications,  Vol. 96, No. 2, (2017), 2585-2602.
6.     Ateniese, G., Capossele, A., Gjanci, P., Petrioli, C. and Spaccini, D., "Secfun: Security framework for underwater acoustic sensor networks", in Proceedings of MTS/IEEE OCEANS. (2015), 1-9.
7.     Basagni, S., Petrioli, C., Petroccia, R. and Spaccini, D., "Carp: A channel-aware routing protocol for underwater acoustic wireless networks", Ad Hoc Networks,  Vol. 34, (2015), 92-104.
8.     Gomathi, R. and Manickam, J.M.L., "Energy efficient shortest path routing protocol for underwater acoustic wireless sensor network", Wireless Personal Communications,  Vol. 98, No. 1, (2018), 843-856.
9.     Bu, R., Wang, S. and Wang, H., "Fuzzy logic vector–based forwarding routing protocol for underwater acoustic sensor networks", Transactions on Emerging Telecommunications Technologies,  Vol. 29, No. 3, (2018), doi: 10.1002/ett.3252.
10.   Taghizadeh, S. and Mohammadi, S., "Lebrp-a lightweight and energy balancing routing protocol for energy-constrained wireless ad hoc networks", International Journal of Engineering-Transactions A: Basics,  Vol. 27, No. 1, (2013), 33-38.
11.   Pouyan, A. and Yadollahzadeh Tabari, M., "Estimating reliability in mobile ad-hoc networks based on monte carlo simulation", International Journal of Engineering,  Vol. 7, No. 5, (2014), 739-746.
12.   Zhang, R., Sun, J., Zhang, Y. and Huang, X., "Jamming-resilient secure neighbor discovery in mobile ad hoc networks", IEEE Trans. Wireless Communications,  Vol. 14, No. 10, (2015), 5588-5601.
13.   Zhang, Y., Liu, W., Lou, W. and Fang, Y., "Location-based compromise-tolerant security mechanisms for wireless sensor networks", IEEE Journal on Selected Areas in Communications,  Vol. 24, No. 2, (2006), 247-260.
14.   Heinzelman, W.R., Chandrakasan, A. and Balakrishnan, H., "Energy-efficient communication protocol for wireless microsensor networks", in System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on, IEEE., (2000), doi: 10.1109/HICSS.2000.926982.