Securing Underwater Wireless Communication Networks

  • Authors

    • D Naresh Kumar
    • . .
    2018-04-20
    https://doi.org/10.14419/ijet.v7i2.23.15344
  • UWCN’s, Sensors, Synchronization, Security, Attacks, Underwater communication, Wireless sensor networks.
  • Underwater remote correspondence systems (UWCNs) are especially defenseless against vindictive assaults because of the high piece blunder rates, huge and variable proliferation deferrals, and low data transmission of acoustic channels. The special attributes of the Underwater acoustic correspondence channel and the contrasts between Underwater sensor systems and their ground-based partners require the improvement of productive and solid security instruments. In this class, an entire review of security for UWCNs is exhibited, and the exploration challenge for secure correspondence in this condition is sketched out.

    UWCNs incorporate sensors and self-ruling Underwater vehicles (AUVs) that collaborate to perform particular applications, for example, Underwater observing. Coordination and data sharing amongst sensors and AUVs make the arrangement of security testing.

     

     

     
  • References

    1. [1] D. Naresh Kumar, “Implementation for wideband applications using UWB fractal patch antennaâ€, AIP Conference Proceedings, Volume 1952, Issue 1, April 2018.

      [2] Ian F. Akyildiz , Dario Pompili, Tommasomelodia, “Underwater Acoustic Sensor Networks: Research Challengesâ€, Broadband And Wireless Networking Laboratory, School Of Electrical And Computer Engineering, Georgia Institute Of Technology, Atlanta, Ga 30332, Usa.

      [3] D. Naresh Kumar, “Adaptive Bandwidth Allocation in Wireless Networks with Multilevel Degradable Quality of Serviceâ€, International Journal of Research in Science and Engineering, Vol. 2, Issue 1, pp. 17–21, August 2015.

      [4] D. Naresh Kumar, “Performance Analysis of Modified Round Robin Algorithmâ€, Journal of Chemical and Pharmaceutical Sciences, pp. 39–42, June 2017.

      [5] Weichao Wang, Jiejun Kong, “Visualisation Of Wormholes In Underwater Sensor Networks: A Distributed Approachâ€, Int. J. Security And Networks, Vol. 3, No. 1, 2008.

      [6] “Securing Underwater Wireless Communication Networksâ€, Electrical And Electronics Engg. Seminar Report 2013.

      [7] Ashvini P. And Sivasankaran V., “Securing Underwater Wireless Communication Networks-Literature Reviewâ€, Arpn Journal Of Engineering And Applied Sciences .©2006-2015 Asian Research Publishing Network (Arpn). All Rights Reserved.

      [8] Suraj S. Kasture, Nikhil Gudpelliwar, “Securing Underwater Wireless Communication Networks-Literature Reviewâ€, Ashvini P. And Sivasankaran V. Department Of Electronics And Communication System, Arunai College Of Engineering, Thiruvannamalai, India.

  • Downloads

  • How to Cite

    Naresh Kumar, D., & ., . (2018). Securing Underwater Wireless Communication Networks. International Journal of Engineering & Technology, 7(2.23), 505-509. https://doi.org/10.14419/ijet.v7i2.23.15344