A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks

<p dir="ltr">Underwater wireless sensor networks (UWSNs) are comprised of sensor nodes that are deployed under the water having limited battery power and other limited resources. Applications of UWSNs include monitoring the quality of the water, mine detection, environment monitoring...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Khalid Saeed (8045627) (author)
مؤلفون آخرون: Wajeeha Khalil (17541429) (author), Ahmad Sami Al-Shamayleh (17541495) (author), Sheeraz Ahmed (6990041) (author), Adnan Akhunzada (3134064) (author), Salman Z. Alharthi (17541426) (author), Abdullah Gani (3134076) (author)
منشور في: 2023
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513535756730368
author Khalid Saeed (8045627)
author2 Wajeeha Khalil (17541429)
Ahmad Sami Al-Shamayleh (17541495)
Sheeraz Ahmed (6990041)
Adnan Akhunzada (3134064)
Salman Z. Alharthi (17541426)
Abdullah Gani (3134076)
author2_role author
author
author
author
author
author
author_facet Khalid Saeed (8045627)
Wajeeha Khalil (17541429)
Ahmad Sami Al-Shamayleh (17541495)
Sheeraz Ahmed (6990041)
Adnan Akhunzada (3134064)
Salman Z. Alharthi (17541426)
Abdullah Gani (3134076)
author_role author
dc.creator.none.fl_str_mv Khalid Saeed (8045627)
Wajeeha Khalil (17541429)
Ahmad Sami Al-Shamayleh (17541495)
Sheeraz Ahmed (6990041)
Adnan Akhunzada (3134064)
Salman Z. Alharthi (17541426)
Abdullah Gani (3134076)
dc.date.none.fl_str_mv 2023-04-26T03:00:00Z
dc.identifier.none.fl_str_mv 10.3390/su15097198
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/A_Comprehensive_Analysis_of_Security-Based_Schemes_in_Underwater_Wireless_Sensor_Networks/24717234
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
security
encryption algorithms
secure routing
key management schemes
dc.title.none.fl_str_mv A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p dir="ltr">Underwater wireless sensor networks (UWSNs) are comprised of sensor nodes that are deployed under the water having limited battery power and other limited resources. Applications of UWSNs include monitoring the quality of the water, mine detection, environment monitoring, military surveillance, disaster prediction, and underwater navigation. UWSNs are more vulnerable to security attacks as compared to their counterparts such as wireless sensor networks (WSNs). The possible attacks in UWSNs can abrupt the operation of entire network. This research work presents the analysis of relevant research done on security-based schemes in UWSNs. The security-based schemes are categorized into five sub-categories. Each technique in each category is analyzed in detail. The major contribution in each security-based scheme along with technique used, possible future research issues and implementation tool are discussed in detail. The open research issues and future trends identified and presented in this research can be further explored by the research community.</p><h2>Other Information</h2><p dir="ltr">Published in: Sustainability<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/su15097198" target="_blank">https://dx.doi.org/10.3390/su15097198</a></p>
eu_rights_str_mv openAccess
id Manara2_b0de15c58997b4308c1fc73d08be25a7
identifier_str_mv 10.3390/su15097198
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24717234
publishDate 2023
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor NetworksKhalid Saeed (8045627)Wajeeha Khalil (17541429)Ahmad Sami Al-Shamayleh (17541495)Sheeraz Ahmed (6990041)Adnan Akhunzada (3134064)Salman Z. Alharthi (17541426)Abdullah Gani (3134076)Information and computing sciencesCybersecurity and privacyDistributed computing and systems softwaresecurityencryption algorithmssecure routingkey management schemes<p dir="ltr">Underwater wireless sensor networks (UWSNs) are comprised of sensor nodes that are deployed under the water having limited battery power and other limited resources. Applications of UWSNs include monitoring the quality of the water, mine detection, environment monitoring, military surveillance, disaster prediction, and underwater navigation. UWSNs are more vulnerable to security attacks as compared to their counterparts such as wireless sensor networks (WSNs). The possible attacks in UWSNs can abrupt the operation of entire network. This research work presents the analysis of relevant research done on security-based schemes in UWSNs. The security-based schemes are categorized into five sub-categories. Each technique in each category is analyzed in detail. The major contribution in each security-based scheme along with technique used, possible future research issues and implementation tool are discussed in detail. The open research issues and future trends identified and presented in this research can be further explored by the research community.</p><h2>Other Information</h2><p dir="ltr">Published in: Sustainability<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/su15097198" target="_blank">https://dx.doi.org/10.3390/su15097198</a></p>2023-04-26T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.3390/su15097198https://figshare.com/articles/journal_contribution/A_Comprehensive_Analysis_of_Security-Based_Schemes_in_Underwater_Wireless_Sensor_Networks/24717234CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/247172342023-04-26T03:00:00Z
spellingShingle A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
Khalid Saeed (8045627)
Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
security
encryption algorithms
secure routing
key management schemes
status_str publishedVersion
title A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
title_full A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
title_fullStr A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
title_full_unstemmed A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
title_short A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
title_sort A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
topic Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
security
encryption algorithms
secure routing
key management schemes