Underwater Wireless Sensor Networks (UWSNs) face significant security challenges, particularly Sybil attacks that compromise node authentication and data integrity. This research proposes a hybrid Sybil attack detection model that integrates blockchain technology with anomaly-based detection to ensure secure communication among legitimate nodes. Blockchain provides a tamper-resistant ledger for transaction validation, while the anomaly detection mechanism flags suspicious behavior based on communication patterns. The proposed model was simulated in MATLAB and evaluated against key performance metrics—Packet Delivery Ratio (PDR), Throughput, Energy Consumption, and End-to-End Delay. Results show a notable improvement over baseline and existing models, achieving higher PDR and throughput, and reduced delay and energy usage, validating the model’s effectiveness in enhancing UWSN security.
Irfan Ullah “Enhancing Sybil Attack Detection and Prevention in Underwater Wireless Sensor Network Vol. 12 Issue 08 PP. 126-131 August 2025. https:// doi.org/10.5281/zenodo.16741992.
Taher, Kazi Abu. "A novel authentication mechanism for securing underwater wireless sensors from sybil attack." 2021 5th International Conference on Electrical Engineering and Information Communication Technology (ICEEICT). IEEE, 2021.
[2] Xiao, Xingxing, Haining Huang, and Wei Wang. "Underwater wireless sensor networks: An energy-efficient clustering routing protocol based on data fusion and genetic algorithms." Applied Sciences 11.1 (2020): 312.
[3] Mhemed, Rogaia, et al. "Void avoidance opportunistic routing protocol for underwater wireless sensor networks." Sensors 21.6 (2021): 1942.
[4] Khisa, Shreya, and Sangman Moh. "Survey on recent advancements in energy-efficient routing protocols for underwater wireless sensor networks." IEEE Access 9 (2021): 55045-55062.
[5] Zhao, Danfeng, et al. "Cross-layer-aided opportunistic routing for sparse underwater wireless sensor networks." Sensors 21.9 (2021): 3205.
[6] Du, Xinxin, et al. "Energy-efficient sensory data gathering based on compressed sensing in IoT networks." Journal of Cloud Computing 9 (2020): 1-16.
[7] Yang, Yi, Weishu Zhao, and Xiang Xiao. "The upper temperature limit of life under high hydrostatic pressure in the deep biosphere." Deep Sea Research Part I: Oceanographic Research Papers 176 (2021): 103604.
[8] Yang, Guang, et al. "Challenges and security issues in underwater wireless sensor networks." Procedia Computer Science 147 (2019): 210-216.
[10] Nithiyanandam, N., and Latha Parthiban. "An efficient voting based method to detect sink hole in wireless acoustic sensor networks." International Journal of Speech Technology 23.2 (2020): 343-354.