IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Firewall in Underwater Wireless Sensor Networks

Firewall in Underwater Wireless Sensor Networks
View Sample PDF
Author(s): Manni Kumar (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India), Osho Gupta (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India)and Shikha Rani (National Institute of Technology, Kurukshetra, India)
Copyright: 2021
Pages: 11
Source title: Energy-Efficient Underwater Wireless Communications and Networking
Source Author(s)/Editor(s): Nitin Goyal (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India), Luxmi Sapra (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India)and Jasminder Kaur Sandhu (Chitkara University Institute of Engineering and Technology, Chitkara University, India)
DOI: 10.4018/978-1-7998-3640-7.ch008

Purchase

View Firewall in Underwater Wireless Sensor Networks on the publisher's website for pricing and purchasing information.

Abstract

In this technological arena, a firewall is a major tool for network security system to predetermine its basic rules so that it can control and monitor incoming and outgoing network traffic. The firewall generally restricts the faulty and unusual data entering the system. It can be categorized as host-based firewalls and network-based firewalls. There are various applications of firewall and how these firewalls can help the underwater wireless sensor network (UWSN) in protecting the sensor nodes where a huge amount of sensitive data is communicated among different countries. Firewall mainly aims to secure the network from different attacking devices and the attackers in a very efficient way. Firewall creates a barrier in which only the authorized data can be passed through after continuously checking by the firewall policies. To protect a local system and network of system from threats which are generally network based firewall is the most effective way. The design of the firewall is required to be accurate as it acts as a filter at higher protocol layer and some levels of IP-packets.

Related Content

J. Mangaiyarkkarasi, J. Shanthalakshmi Revathy. © 2024. 34 pages.
Gummadi Surya Prakash, W. Chandra, Shilpa Mehta, Rupesh Kumar. © 2024. 22 pages.
Duygu Nazan Gençoğlan. © 2024. 35 pages.
Smrity Dwivedi. © 2024. 20 pages.
Pallavi Sapkale, Shilpa Mehta. © 2024. 21 pages.
Pardhu Thottempudi, Vijay Kumar. © 2024. 43 pages.
Sathish Kumar Danasegaran, Elizabeth Caroline Britto, S. Dhanasekaran, G. Rajalakshmi, S. Lalithakumari, A. Sivasangari, G. Sathish Kumar. © 2024. 18 pages.
Body Bottom