scholarly journals Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Irfan Ahmad ◽  
Taj Rahman ◽  
Asim Zeb ◽  
Inayat Khan ◽  
Inam Ullah ◽  
...  

Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, and open acoustic channel, it is also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researchers design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues.

Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3907 ◽  
Author(s):  
Guang Yang ◽  
Lie Dai ◽  
Zhiqiang Wei

With the advances in technology, there has been an increasing interest from researchers and industrial institutions in the use of underwater wireless sensor networks (UWSNs). Constrained by the open acoustic channel, harsh underwater environment, and their own particularities, UWSNs are vulnerable to a wide class of security threats and malicious attacks. However, most existing research into UWSNs has not taken security into consideration. Moreover, the existing relatively mature security mechanisms for WSNs cannot be directly utilized in UWSNs. For these reasons, this article aims to present a comprehensive overview of the particularities, constraints, attacks, challenges and current security mechanisms of UWSNs. In addition, challenging, open and hot research topics are outlined.


Author(s):  
Al-Salti Faiza A. ◽  
Al-Zeidi Nasser M. ◽  
Day Khaled ◽  
Arafeh Bassel ◽  
Touzene Abderezak

With the recent advances in underwater sensor devices and technologies, underwater wireless sensor networks (UWSNs) enable a variety of applications such as underwater exploration and monitoring, disaster prevention, and military surveillance and reconnaissance. However, these kinds of networks faces a number of challenges induced by the nature of the underwater environment and its influence on the physical media. Therefore, new routing protocols are proposed specifically for such networks to mitigate these challenges. This paper surveys some of the recent routing protocols for UWSNs. Specifically, the idea of each protocol is presented as well as its advantages and disadvantages. Furthermore, the presented protocols are classified into different categories. The paper is concluded with some open research issues.


Energies ◽  
2019 ◽  
Vol 12 (22) ◽  
pp. 4263 ◽  
Author(s):  
Junaid Qadir ◽  
Anwar Khan ◽  
Mahdi Zareei ◽  
Cesar Vargas-Rosales

Owing to the harsh and unpredictable behavior of the sea channel, network protocols that combat the undesirable and challenging properties of the channel are of critical significance. Protocols addressing such challenges exist in literature. However, these protocols consume an excessive amount of energy due to redundant packets transmission or have computational complexity by being dependent on the geographical positions of nodes. To address these challenges, this article designs two protocols for underwater wireless sensor networks (UWSNs). The first protocol, depth and noise-aware routing (DNAR), incorporates the extent of link noise in combination with the depth of a node to decide the next information forwarding candidate. However, it sends data over a single link and is, therefore, vulnerable to the harshness of the channel. Therefore, routing in a cooperative fashion is added to it that makes another scheme called cooperative DNAR (Co-DNAR), which uses source-relay-destination triplets in information advancement. This reduces the probability of information corruption that would otherwise be sent over a single source-destination link. Simulations-backed results reveal the superior performance of the proposed schemes over some competitive schemes in consumed energy, packet advancement to destination, and network stability.


Sensors ◽  
2018 ◽  
Vol 18 (5) ◽  
pp. 1619 ◽  
Author(s):  
Anwar Khan ◽  
Ihsan Ali ◽  
Abdullah Ghani ◽  
Nawsher Khan ◽  
Mohammed Alsaqer ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document