Yisa, AG, Dargahi, T
ORCID: https://orcid.org/0000-0002-0908-6483, Belguith, S
ORCID: https://orcid.org/0000-0003-0069-8552 and Hammoudeh, M
2021,
'Security challenges of Internet of Underwater Things : a
systematic literature review'
, Transactions on Emerging Telecommunications Technologies, 32 (3)
, e4203.
Access Information: This is the peer reviewed version of the following article: Yisa, AG, Dargahi, T, Belguith, S, Hammoudeh, M. Security challenges of Internet of Underwater Things: A systematic literature review. Trans Emerging Tel Tech. 2021; 32:e4203., which has been published in final form at https://doi.org/10.1002/ett.4203. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions.
Abstract
Water covers approximately 71% of the earth surface, yet much of the underwater world remains unexplored due to technology limitations. Internet of Underwater
Things (IoUT) is a network of underwater objects that enables monitoring subsea environment remotely. Underwater Wireless Sensor Network (UWSN) is the
main enabling technology for IoUT. UWSNs are characterised by the limitations
of the underlying acoustic communication medium, high energy consumption, lack
of hardware resources to implement computationally intensive tasks and dynamic
network topology due to node mobility. These characteristics render UNWSNs vulnerable to different attacks, such as Wormhole, Sybil, flooding, jamming, spoofing
and Denial of Service (DoS) attacks. This article reviews peer-reviewed literature
that addresses the security challenges and attacks on UWSNs as well as possible
mitigative solutions. Findings show that the biggest contributing factors to security threats in UWSNs are the limited energy supply, the limited communication
medium and the harsh underwater communication conditions. Researchers in this
field agree that the security measures of terrestrial wireless sensor networks are not
directly applicable to UWSNs due to the unique nature of the underwater environment where resource management becomes a significant challenge. This article also
outlines future research directions on security and privacy challenges of IoUT and
UWSN.
Actions (login required)
 |
Edit record (repository staff only) |