Security challenges of Internet of Underwater Things: A systematic literature review

  • Aliyu Gana Yisa
  • , Tooska Dargahi
  • , Sana Belguith*
  • , Mohammad Hammoudeh
  • *Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

37 Scopus citations

Abstract

Water covers approximately 71% of the earth surface, yet much of the underwater world remains unexplored due to technology limitations. Internet of Underwater Things (IoUT) is a network of underwater objects that enables monitoring subsea environment remotely. Underwater Wireless Sensor Network (UWSN) is the main enabling technology for IoUT. UWSNs are characterised by the limitations of the underlying acoustic communication medium, high energy consumption, lack of hardware resources to implement computationally intensive tasks and dynamic network topology due to node mobility. These characteristics render UNWSNs vulnerable to different attacks, such as Wormhole, Sybil, flooding, jamming, spoofing, and Denial of Service attacks. This article reviews peer-reviewed literature that addresses the security challenges and attacks on UWSNs as well as possible mitigative solutions. Findings show that the biggest contributing factors to security threats in UWSNs are the limited energy supply, the limited communication medium and the harsh underwater communication conditions. Researchers in this field agree that the security measures of terrestrial wireless sensor networks are not directly applicable to UWSNs due to the unique nature of the underwater environment where resource management becomes a significant challenge. This article also outlines future research directions on security and privacy challenges of IoUT and UWSN.

Original languageEnglish
Article numbere4203
JournalTransactions on Emerging Telecommunications Technologies
Volume32
Issue number3
DOIs
StatePublished - Mar 2021
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2020 John Wiley & Sons, Ltd.

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Security challenges of Internet of Underwater Things: A systematic literature review'. Together they form a unique fingerprint.

Cite this