Skip to main content

Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT,volume 646)


As maritime and military missions become more and more complex over the years, there has been a high interest in the research and development of Unmanned Underwater Vehicles (UUVs). Latest efforts concern the modeling and simulation of UUVs collaboration within formations of vehicles (swarms), towards obtaining deeper insights related to critical issues related to cybersecurity and interoperability. The research issues which are constantly emerging in this domain are closely related to the communication, interoperability, and secure operation of trustworthy UUVs, as well as to the volume, velocity, variety, and veracity of data transmitted in low bitrate due to the medium i.e., the water. This paper focuses on such issues in the domain of UUVs, emphasizing interoperability and cybersecurity in swarms of trustworthy UUVs in a military/search-and-rescue (SAR) setting. The aim of this paper is to present preliminary work on a semantic modeling and simulation approach that aims to facilitate commanders of military/search-and-rescue operations to effectively support critical and life-saving decision-making, while handling interoperability and cybersecurity issues on the Internet of Underwater Things (IoUT).


  • IoUT
  • UUVs
  • Interoperability
  • Semantics
  • Cybersecurity
  • Simulation

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions


  1. 1.

  2. 2.

  3. 3.


  1. Aggarwal, P., Gonzalez, C., Dutt, V.: HackIt: a real-time simulation tool for studying real-world cyberattacks in the laboratory. In: Gupta, B.B., Perez, G.M., Agrawal, D.P., Gupta, D. (eds.) Handbook of Computer Networks and Cyber Security, pp. 949–959. Springer, Cham (2020).

    CrossRef  Google Scholar 

  2. Ahmad, I., et al.: Analysis of security attacks and taxonomy in underwater wireless sensor networks. Wirel. Commun. Mob. Comput. 2021 (2021).

  3. Bagyalakshmi, G., et al.: Network vulnerability analysis on brain signal/image databases using Nmap and Wireshark tools. IEEE Access 6, 57144–57151 (2018).

    CrossRef  Google Scholar 

  4. Barbie, A., et al.: Developing an underwater network of ocean observation systems with digital twin prototypes - a field report from Baltic sea. IEEE Internet Comput. (2021).

  5. Bhattacharjya, K., De, D.: IoUT: modelling and simulation of edge-drone-based software-defined smart internet of underwater things. Simul. Model. Pract. Theory 109, 102304 (2021).

    CrossRef  Google Scholar 

  6. Bouter, C., Kruiger, H., Verhoosel, J.: Domain-Independent Data Processing in an Ontology Based Data Access Environment Using the SOSA Ontology (2021).

  7. Caldera Description page. Accessed 06 Mar 2022

  8. Centelles, D., Soriano-Asensi, A., Martí, J.V., Marín, R., Sanz, P.J.: Underwater wireless communications for cooperative robotics with UWSim-NET. Appl. Sci. 9(17), 3526 (2019).

    CrossRef  Google Scholar 

  9. Chhokra, A., Barreto, C., Dubey, A., Karsai, G., Koutsoukos, X.: Power-attack: a comprehensive tool-chain for modeling and simulating attacks in power systems (n.d.)

    Google Scholar 

  10. Cornejo-Lupa, M.A., Cardinale, Y., Ticona-Herrera, R., Barrios-Aranibar, D., Andrade, M., Diaz-Amado, J.: OntoSLAM: an ontology for representing location and simultaneous mapping information for autonomous robots. Robotics 10(4), 125 (2021).

    CrossRef  Google Scholar 

  11. Domingo, M.C.: An overview of the internet of underwater things. J. Netw. Comput. Appl. 35(6), 1879–1890 (2012).

    CrossRef  Google Scholar 

  12. Fattah, S., Gani, A., Ahmedy, I., Idris, M.Y.I., Hashem, I.A.T.: A survey on underwater wireless sensor networks: requirements, taxonomy, recent advances, and open research challenges. Sensors 20(18), 1–30 (2020).

    CrossRef  Google Scholar 

  13. Gazebo Github page. Accessed 06 Mar 2022

  14. Gazebo Homepage. Accessed 06 Mar 2022

  15. Infection Monkey. Accessed 06 Mar 2022

  16. Braga, J., Martins, R., Petrioli, C., Petroccia, R., Picari, L.: Cooperation and networking in an underwater network composed by heterogeneous assets. In: OCEANS 2016 MTS/IEEE Monterey, pp. 1–9 (2016).

  17. Janowicz, K., Haller, A., Cox, S.J.D., le Phuoc, D., Lefrançois, M.: SOSA: a lightweight ontology for sensors, observations, samples, and actuators. J. Web Semant. 56, 1–10 (2019).

    CrossRef  Google Scholar 

  18. Jurasky, W., Moder, P., Milde, M., Ehm, H., Reinhart, G.: Transformation of semantic knowledge into simulation-based decision support. Robot. Comput.-Integr. Manuf. 71, 102174 (2021).

    CrossRef  Google Scholar 

  19. Kamoun-Abid, F., Rekik, M., Meddeb-Makhlouf, A., Zarai, F.: Secure architecture for Cloud/Fog computing based on firewalls and controllers. Procedia Comput. Sci. 192, 822–833 (2021).

    CrossRef  Google Scholar 

  20. Kutzke, D.T., Carter, J.B., Hartman, B.T.: Subsystem selection for digital twin development: a case study on an unmanned underwater vehicle. Ocean Eng. 223, 108629 (2021).

    CrossRef  Google Scholar 

  21. LHN Infection Monkey page. Accessed 06 Mar 2022

  22. LinkedIn page. Accessed 06 Mar 2022

  23. Madan, B.B., Banik, M., Bein, D.: Securing unmanned autonomous systems from cyber threats. J. Defense Model. Simul. 16(2), 119–136 (2019).

    CrossRef  Google Scholar 

  24. Mary, D.R.K., Ko, E., Kim, S.-G., Yum, S.-H., Shin, S.-Y., Park, S.-H.: A systematic review on recent trends, challenges, privacy and security issues of underwater internet of things. Sensors 21(24), 8262 (2021).

    CrossRef  Google Scholar 

  25. Menaka, D., Gauni, S., Manimegalai, C.T., Kalimuthu, K.: Vision of IoUT: advances and future trends in optical wireless communication. J. Opt. 50 (n.d.).

  26. Migueláñez, E., Patrón, P., Brown, K.E., Petillot, Y.R., Lane, D.M.: Semantic knowledge-based framework to improve the situation awareness of autonomous underwater vehicles. IEEE Trans. Knowl. Data Eng. 23(5), 759–773 (2011).

    CrossRef  Google Scholar 

  27. MITRE ATT&CK Description page for Caldera. Accessed 06 Mar 2022

  28. MITRE ATT&CK Homepage. Accessed 06 Mar 2022

  29. Nayyar, A., Balas, V.E.: Analysis of simulation tools for underwater sensor networks (UWSNs). In: Bhattacharyya, S., Hassanien, A.E., Gupta, D., Khanna, A., Pan, I. (eds.) International Conference on Innovative Computing and Communications. LNNS, vol. 55, pp. 165–180. Springer, Singapore (2019).

    CrossRef  Google Scholar 

  30. NS-3 Introduction page. html/introduction.html. Accessed 06 Mar 2022

  31. Oceanic Engineering Society (U.S.): Autonomous Underwater Vehicles 2016: AUV 2016: 6–9 November 2016, IIS, the University of Tokyo, Tokyo, Japan (n.d.)

    Google Scholar 

  32. Potter, J., Alves, J., Green, D., Zappa, G., McCoy, K., Nissen, I.: The JANUS underwater communications standard. In: 2014 Underwater Communications and Networking, UComms 2014 (2014).

  33. Prats, M., Perez, J., Fernandez, J.J., Sanz, P.J.: An open-source tool for simulation and supervision of underwater intervention missions. In: IEEE International Conference on Intelligent Robots and Systems, pp. 2577–2582 (2012).

  34. Public Affairs Office: NATO STO-CMRE Science and Technology Organization Centre for Maritime Research and Experimentation (2020)

    Google Scholar 

  35. Syed, R.: Cybersecurity vulnerability management: a conceptual ontology and cyber intelligence alert system. Inf. Manag. 57(6), 103334 (2020).

    CrossRef  Google Scholar 

  36. Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: A Unified Cybersecurity Ontology (n.d.).

  37. Velu, A., Thangavelu, M.: Ontology based ocean knowledge representation for semantic information retrieval. Comput. Mater. Contin. 70(3), 4707–4724 (2022).

  38. Wikipedia page. Accessed 06 Mar 2022

  39. Wikipedia page for ARP spoofing. Accessed 06 Mar 2022

  40. Wireshark Home page. Accessed 06 Mar 2022

  41. Wu, J., Yang, Y., Cheng, X.U.N., Zuo, H., Cheng, Z.: The development of digital twin technology review. In: Proceedings - 2020 Chinese Automation Congress, CAC 2020, pp. 4901–4906 (2020).

  42. Zachila, K., Kotis, K., Paparidis, E., Ladikou, S., Spiliotopoulos, D.: Facilitating semantic interoperability of trustworthy IoT entities in cultural spaces: the smart museum ontology. IoT 2(4), 741–760 (2021).

    CrossRef  Google Scholar 

  43. Zhao, Y., Wang, Y., Zhang, H., Zhang, C., Yang, C.: Agent-based Network Security Simulator Nessi2 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Konstantinos Kotis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Stavrinos, S., Kotis, K., Kalloniatis, C. (2022). Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things. In: Maglogiannis, I., Iliadis, L., Macintyre, J., Cortez, P. (eds) Artificial Intelligence Applications and Innovations. AIAI 2022. IFIP Advances in Information and Communication Technology, vol 646. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08332-7

  • Online ISBN: 978-3-031-08333-4

  • eBook Packages: Computer ScienceComputer Science (R0)