Securing Underwater Wireless Communication Networks
DOI:
https://doi.org/10.14419/ijet.v7i2.23.15344Published:
2018-04-20Keywords:
UWCN’s, Sensors, Synchronization, Security, Attacks, Underwater communication, Wireless sensor networks.Abstract
Underwater remote correspondence systems (UWCNs) are especially defenseless against vindictive assaults because of the high piece blunder rates, huge and variable proliferation deferrals, and low data transmission of acoustic channels. The special attributes of the Underwater acoustic correspondence channel and the contrasts between Underwater sensor systems and their ground-based partners require the improvement of productive and solid security instruments. In this class, an entire review of security for UWCNs is exhibited, and the exploration challenge for secure correspondence in this condition is sketched out.
UWCNs incorporate sensors and self-ruling Underwater vehicles (AUVs) that collaborate to perform particular applications, for example, Underwater observing. Coordination and data sharing amongst sensors and AUVs make the arrangement of security testing.
References
[1] D. Naresh Kumar, “Implementation for wideband applications using UWB fractal patch antennaâ€, AIP Conference Proceedings, Volume 1952, Issue 1, April 2018.
[2] Ian F. Akyildiz , Dario Pompili, Tommasomelodia, “Underwater Acoustic Sensor Networks: Research Challengesâ€, Broadband And Wireless Networking Laboratory, School Of Electrical And Computer Engineering, Georgia Institute Of Technology, Atlanta, Ga 30332, Usa.
[3] D. Naresh Kumar, “Adaptive Bandwidth Allocation in Wireless Networks with Multilevel Degradable Quality of Serviceâ€, International Journal of Research in Science and Engineering, Vol. 2, Issue 1, pp. 17–21, August 2015.
[4] D. Naresh Kumar, “Performance Analysis of Modified Round Robin Algorithmâ€, Journal of Chemical and Pharmaceutical Sciences, pp. 39–42, June 2017.
[5] Weichao Wang, Jiejun Kong, “Visualisation Of Wormholes In Underwater Sensor Networks: A Distributed Approachâ€, Int. J. Security And Networks, Vol. 3, No. 1, 2008.
[6] “Securing Underwater Wireless Communication Networksâ€, Electrical And Electronics Engg. Seminar Report 2013.
[7] Ashvini P. And Sivasankaran V., “Securing Underwater Wireless Communication Networks-Literature Reviewâ€, Arpn Journal Of Engineering And Applied Sciences .©2006-2015 Asian Research Publishing Network (Arpn). All Rights Reserved.
[8] Suraj S. Kasture, Nikhil Gudpelliwar, “Securing Underwater Wireless Communication Networks-Literature Reviewâ€, Ashvini P. And Sivasankaran V. Department Of Electronics And Communication System, Arunai College Of Engineering, Thiruvannamalai, India.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-07-09
Published 2018-04-20