Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2021 Dec 10;21(24):8262.
doi: 10.3390/s21248262.

A Systematic Review on Recent Trends, Challenges, Privacy and Security Issues of Underwater Internet of Things

Affiliations

A Systematic Review on Recent Trends, Challenges, Privacy and Security Issues of Underwater Internet of Things

Delphin Raj Kesari Mary et al. Sensors (Basel). .

Abstract

Owing to the hasty growth of communication technologies in the Underwater Internet of Things (UIoT), many researchers and industries focus on enhancing the existing technologies of UIoT systems for developing numerous applications such as oceanography, diver networks monitoring, deep-sea exploration and early warning systems. In a constrained UIoT environment, communication media such as acoustic, infrared (IR), visible light, radiofrequency (RF) and magnet induction (MI) are generally used to transmit information via digitally linked underwater devices. However, each medium has its technical limitations: for example, the acoustic medium has challenges such as narrow-channel bandwidth, low data rate, high cost, etc., and optical medium has challenges such as high absorption, scattering, long-distance data transmission, etc. Moreover, the malicious node can steal the underwater data by employing blackhole attacks, routing attacks, Sybil attacks, etc. Furthermore, due to heavyweight, the existing privacy and security mechanism of the terrestrial internet of things (IoT) cannot be applied directly to UIoT environment. Hence, this paper aims to provide a systematic review of recent trends, applications, communication technologies, challenges, security threats and privacy issues of UIoT system. Additionally, this paper highlights the methods of preventing the technical challenges and security attacks of the UIoT environment. Finally, this systematic review contributes much to the profit of researchers to analyze and improve the performance of services in UIoT applications.

Keywords: Underwater Internet of Things (UIoT); challenges; security and privacy; trends.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
UIoT Architecture.
Figure 2
Figure 2
Existing applications of UIoT.
Figure 3
Figure 3
Dynamic topology formation.
Figure 4
Figure 4
Challenges in adapting FCAPSC functionality.
Figure 5
Figure 5
Goals and classification of security attacks in the UIoT environment.
Figure 6
Figure 6
Types of DoS attacks in the UIoT environment.
Figure 7
Figure 7
Jamming attack in the UIoT environment.
Figure 8
Figure 8
Battery-oriented attack.
Figure 9
Figure 9
Sybil attack in UIoT environment.
Figure 10
Figure 10
Wormhole attack in the UIoT environment.
Figure 11
Figure 11
Hello flooding attack in the UIoT environment.
Figure 12
Figure 12
(a) Selective forwarding attack, (b) black hole attack in the UIoT environment.
Figure 13
Figure 13
Results based on the systematic analysis of UIoT applications.
Figure 14
Figure 14
Results based on the systematic analysis of mitigation methods to overcome the technical challenges in UIoT.
Figure 15
Figure 15
Results based on the systematic analysis of security attacks and management.

References

    1. NOAA, America’s Coastal & Ocean Agency How Much Water Is in the Ocean? [(accessed on 28 October 2021)]; Available online: https://oceanservice.noaa.gov/facts/oceanwater.html.
    1. Awan K.M., Shah P.A., Iqbal K., Gillani S., Ahmad W., Nam Y. Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges. Wirel. Commun. Mob. Comput. 2019;2019:6470359. doi: 10.1155/2019/6470359. - DOI
    1. Yang G., Dai L., Si G., Wang S., Wang S. Challenges and Security Issues in Underwater Wireless Sensor Networks. Procedia Comput. Sci. 2019;147:210–216. doi: 10.1016/j.procs.2019.01.225. - DOI
    1. Gussen C.M.G., Diniz P.S.R., Campos M.L.R., Martins W.A., Costa F.M., Gois J.N. A Survey of Underwater Wireless Communication Technologies. J. Commun. Inf. Syst. 2016;31:242–255. doi: 10.14209/jcis.2016.22. - DOI
    1. Zoksimovski A., Sexton D., Stojanovic M., Rappaport C. Underwater electromagnetic communications using conduction—Channel characterization. Ad Hoc Netw. 2015;34:42–51. doi: 10.1016/j.adhoc.2015.01.017. - DOI

Publication types

LinkOut - more resources