Underwater Wireless Sensor Network
Ticket-based Authentication Protocol
for Underwater Wireless Sensor Network
[pdf-embedder url=”http://wellapets.com/wp-content/uploads/2019/06/Ticket-based-Authentication-Protocol.pdf” title=”Ticket-based Authentication Protocol”]
Abstract— Underwater wireless communication is used to obtain information in various studies such as marine resources and disaster prevention. However, standards relating to security and authentication protocol for the Underwater Wireless Sensor Network (UWSN) are incomplete. In this paper, we analyze selected tickets used in the authentication protocol for the Wireless Sensor Network (WSN) and design a suitable ticket-based authentication protocol for the UWSN.
Underwater wireless communication is used to obtain information in various studies such as marine resources and disaster prevention. In underwater communication, data is transmitted using sound waves, because of the properties of underwater environments. Although sound waves underwater travel three to four times faster than in air, the process is still slower than using electric wave communication .
The two types of network topologies suggested for underwater acoustic network unit by  are based on the cluster-head and ad-hoc networks. A cluster-head based network is shown in Fig.1.(a) and an ad-hoc based network is depicted in Fig.1.(b).
As the applicable authentication protocol diversity is insufficient for use with the Underwater Wireless Sensor Network (UWSN), in this paper, we analyze selected authentication protocol tickets used in the Wireless Sensor
Network (WSN) and design a suitable ticket-based authentication protocol for use with the UWSN. The remainder of this paper is organized as follows. Section 2 defines security requirements and describes two selected protocols according to the cluster-head based network topology in the WSN. In Section 3, we propose a ticket-based authentication protocol for UWSN in relation to the clusterhead based network. This protocol considers the poor
conditions in underwater environments and endeavors to reduce the amount of communication required and to shorten the transmission data length. The paper is concluded in Section 4, and we present an outline of our proposed future work.