The Internet of Underwater Things (IoUT) are emerging as a critical technology for applications such as oceanographic monitoring, offshore oilfield exploration, disaster prevention, and military surveillance. These networks, made up of sensor nodes deployed below the surface to collect and transmit data, offer transformative capabilities.
However, ToUT also face complex and unique security challenges due to the hostile and resource-constrained nature of the underwater environment [1].
IoUT differ significantly from traditional terrestrial wireless networks. Their reliance on acoustic communication introduces several inherent limitations:
Acoustic Communication Medium: IoUTs primarily use acoustic signals instead of radio waves. Acoustic signals suffer from low bandwidth, high latency, high error rates, and vulnerability to interception and interference [1].
Harsh and Remote Deployment: Nodes are often deployed in physically inaccessible locations, making physical maintenance and tamper-resistance extremely difficult [3].
Energy Constraints: Sensor nodes are battery-powered with very limited recharging options, making energy conservation critical to network longevity [2].
Node Mobility and Environmental Impact: Ocean currents and waves cause continuous node movement, which complicates network topology and routing [3].
These challenges make IoUT more susceptible to attacks and less adaptable to traditional security mechanisms.
Several novel approaches are being explored to address these issues while maintaining energy efficiency and performance in UWSNs.
Given the limited processing and energy capacity of sensor nodes, researchers are focusing on symmetric-key cryptographic methods and lightweight key pre-distribution schemes. These methods reduce overhead while maintaining a baseline level of data confidentiality and integrity [2].
Machine learning models are being used to analyse node behaviour and traffic patterns for anomaly detection. These AI-based IDS solutions can dynamically adapt to environmental changes and identify attacks such as spoofing and routing anomalies with minimal false positives [4].
Authentication schemes that combine device credentials with physical location verification—through signal propagation delays or motion patterns—are gaining traction for detecting Sybil attacks and unauthorized access [3].
Security mechanisms are now being integrated into routing decisions using multi-objective optimization approaches. For instance, protocols that apply the Analytic Hierarchy Process (AHP) help balance the trade-off between trust, energy efficiency, and latency [2].
Although still in experimental phases, blockchain has been proposed to provide decentralized, tamper-resistant records of node behaviour and trust scores in UWSNs. This approach can help prevent collusion and ensure long-term data integrity [4].
The security of The Internet of Underwater Things is vital to their continued adoption in critical applications. The underwater environment introduces unique challenges that require customized, lightweight, and adaptive security mechanisms. Ongoing research combining cybersecurity, AI, and marine systems engineering is key to building robust, resilient IoUT. As this field continues to mature, innovative trust-based protocols, intelligent IDS systems, and decentralized trust frameworks will define the future of secure underwater networking.
I. F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: research challenges," Ad Hoc Networks, vol. 3, no. 3, pp. 257–279, May 2005, doi: 10.1016/j.adhoc.2005.01.004.
A. Shenbagharaman and B. Paramasivan, “Secure and energy efficient routing protocol for underwater wireless sensor network using running city game optimization with XGBoost algorithm,” Applied Soft Computing, vol. 169, p. 112615, Dec. 2024, doi: https://doi.org/10.1016/j.asoc.2024.112615.
H.-P. Tan, R. Diamant, W. K. G. Seah, and M. T. A. Waldmeyer, "A survey of techniques and challenges in underwater localization," Ocean Eng., vol. 38, no. 14–15, pp. 1663–1676, Oct. 2011, doi: 10.1016/j.oceaneng.2011.07.014.
A. M. Khasawneh et al., “An Efficient Void Aware Framework for Enabling Internet of Underwater Things,” Journal of Marine Science and Engineering, vol. 9, no. 11, pp. 1219–1219, Nov. 2021, doi: https://doi.org/10.3390/jmse9111219.