EconPapers    
Economics at your fingertips  
 

A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks

Khalid Saeed, Wajeeha Khalil, Ahmad Sami Al-Shamayleh, Sheeraz Ahmed, Adnan Akhunzada (), Salman Z. Alharthi () and Abdullah Gani
Additional contact information
Khalid Saeed: Department of Computer Science, Shaheed Benazir Bhutto University, Sheringal Dir Upper 18000, Pakistan
Wajeeha Khalil: Department of Computer Science & Information Technology, University of Engineering and Technology, Peshawar 25000, Pakistan
Ahmad Sami Al-Shamayleh: Department of Networks and Cybersecurity, Faculty of Information Technology, Al-Ahliyya Amman University, Amman 19328, Jordan
Sheeraz Ahmed: Department of Computer Science, Iqra National University, Peshawar 25000, Pakistan
Salman Z. Alharthi: Department of Information System, College of Computers and Information Systems, Al-Lith Campus, Umm AL-Qura University, P.O. Box 7745, AL-Lith 21955, Saudi Arabia
Abdullah Gani: Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia

Sustainability, 2023, vol. 15, issue 9, 1-27

Abstract: Underwater wireless sensor networks (UWSNs) are comprised of sensor nodes that are deployed under the water having limited battery power and other limited resources. Applications of UWSNs include monitoring the quality of the water, mine detection, environment monitoring, military surveillance, disaster prediction, and underwater navigation. UWSNs are more vulnerable to security attacks as compared to their counterparts such as wireless sensor networks (WSNs). The possible attacks in UWSNs can abrupt the operation of entire network. This research work presents the analysis of relevant research done on security-based schemes in UWSNs. The security-based schemes are categorized into five sub-categories. Each technique in each category is analyzed in detail. The major contribution in each security-based scheme along with technique used, possible future research issues and implementation tool are discussed in detail. The open research issues and future trends identified and presented in this research can be further explored by the research community.

Keywords: security; encryption algorithms; secure routing; key management schemes (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2071-1050/15/9/7198/pdf (application/pdf)
https://www.mdpi.com/2071-1050/15/9/7198/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:15:y:2023:i:9:p:7198-:d:1133240

Access Statistics for this article

Sustainability is currently edited by Ms. Alexandra Wu

More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jsusta:v:15:y:2023:i:9:p:7198-:d:1133240