IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Communication Techniques for Underwater WSNs

Secure Communication Techniques for Underwater WSNs
View Sample PDF
Author(s): Esha Rani (Institute of Integrated and Honors Studies, Kurukshetra University, India)and Vikas Juneja (Seth Jai Parkash Mukand Lal Institute of Engineering and Technology, India)
Copyright: 2021
Pages: 16
Source title: Energy-Efficient Underwater Wireless Communications and Networking
Source Author(s)/Editor(s): Nitin Goyal (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India), Luxmi Sapra (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India)and Jasminder Kaur Sandhu (Chitkara University Institute of Engineering and Technology, Chitkara University, India)
DOI: 10.4018/978-1-7998-3640-7.ch011

Purchase

View Secure Communication Techniques for Underwater WSNs on the publisher's website for pricing and purchasing information.

Abstract

Earth is solitary among the rocky planets revolving in the solar system. It is the only planet that is 3/4 covered with oceans of liquid water. In today's era, wireless sensor network is used in almost places and also is an interesting topic for researchers too. But with the advancement in technology, a network similar to wireless sensor network can be deployed under the water with acoustic signals for data transmission. Because of harsh environment and some more challenges, underwater communication becomes tricky. Underwater wireless sensor networks (UWSNs) is an advanced technology for underwater explorations and have demonstrated their quality in underwater applications. UWSN is a blend of wireless technology with sensor technology that has some extraordinary features like smart sensing, intelligent computing, and communication capabilities. Further, to maintain the secure communication underwater, it becomes more and more tricky. This chapter presents an expansive analysis of challenges, attacks, and security techniques of UWSNs.

Related Content

J. Mangaiyarkkarasi, J. Shanthalakshmi Revathy. © 2024. 34 pages.
Gummadi Surya Prakash, W. Chandra, Shilpa Mehta, Rupesh Kumar. © 2024. 22 pages.
Duygu Nazan Gençoğlan. © 2024. 35 pages.
Smrity Dwivedi. © 2024. 20 pages.
Pallavi Sapkale, Shilpa Mehta. © 2024. 21 pages.
Pardhu Thottempudi, Vijay Kumar. © 2024. 43 pages.
Sathish Kumar Danasegaran, Elizabeth Caroline Britto, S. Dhanasekaran, G. Rajalakshmi, S. Lalithakumari, A. Sivasangari, G. Sathish Kumar. © 2024. 18 pages.
Body Bottom