CFP last date
22 September 2025
Call for Paper
October Edition
IJCA solicits high quality original research papers for the upcoming October edition of the journal. The last date of research paper submission is 22 September 2025

Submit your paper
Know more
Random Articles
Reseach Article

A Comprehensive Survey of Security Challenges and Modern Solutions in Underwater Wireless Sensor Networks

by Nour Zahra, Souheil Khawatmi, Bader Aldin Kassab
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 32
Year of Publication: 2025
Authors: Nour Zahra, Souheil Khawatmi, Bader Aldin Kassab
10.5120/ijca2025925570

Nour Zahra, Souheil Khawatmi, Bader Aldin Kassab . A Comprehensive Survey of Security Challenges and Modern Solutions in Underwater Wireless Sensor Networks. International Journal of Computer Applications. 187, 32 ( Aug 2025), 24-33. DOI=10.5120/ijca2025925570

@article{ 10.5120/ijca2025925570,
author = { Nour Zahra, Souheil Khawatmi, Bader Aldin Kassab },
title = { A Comprehensive Survey of Security Challenges and Modern Solutions in Underwater Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2025 },
volume = { 187 },
number = { 32 },
month = { Aug },
year = { 2025 },
issn = { 0975-8887 },
pages = { 24-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number32/a-comprehensive-survey-of-security-challenges-and-modern-solutions-in-underwater-wireless-sensor-networks/ },
doi = { 10.5120/ijca2025925570 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-08-20T21:35:27.394472+05:30
%A Nour Zahra
%A Souheil Khawatmi
%A Bader Aldin Kassab
%T A Comprehensive Survey of Security Challenges and Modern Solutions in Underwater Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 32
%P 24-33
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This survey highlights the critical importance of security in Underwater Wireless Sensor Networks (UWSNs), which are being increasingly deployed in sensitive marine applications, such as environmental monitoring and resource exploration. This paper systematically reviews the unique security challenges faced by these networks, including cyberattacks, data breaches, and communication interception. It analyzes fundamental security requirements such as confidentiality, authentication, integrity, and availability, and evaluates key security solutions, including encryption algorithms, secure routing protocols, and intrusion detection systems. By examining recent research (2020–2025), this survey highlights innovative approaches such as machine learning-based security models, lightweight encryption, and dynamic trust management. The findings suggest that integrating advanced technologies (e.g., artificial intelligence and adaptive algorithms) is essential to counter evolving threats in underwater environments. Lastly, the study identifies research gaps and future directions to guide further developments in UWSN security.

References
  1. Emad Felemban, Faisal Karim Shaikh, UmairMujtaba Qureshi, Adil A. Sheikh, and Saad Bin Qaisar, " Underwater Sensor Network Applications: A Comprehensive Survey," Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, 14 pages, Volume 2015.
  2. Guang Yang, Lie Dai, Guannan Si, Shuxin Wang, Shouqiang Wang, “Challenges and Security Issues in Underwater Wireless Sensor Networks,” Procedia Computer Science, pp. 210–216, 2019, DOI: 10.1016/j.procs.2019.01.225.
  3. Salmah Fattah, Abdullah Gani, Ismail Ahmedy, Mohd Yamani Idna Idris and Ibrahim Abaker Targio Hashem, “A Survey on UnderwaterWireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges,” Journal of MDPI, pp. 1–30, 2020, DOI: 10.3390/s20185393.
  4. Ayman Alharbi, “DBSR: A Depth-Based Secure Routing Protocol for Underwater Sensor Networks,” (IJACSA) International Journal of Advanced Computer Science and Applications, pp. 628- 634, Vol. 11, No. 9, 2020.
  5. Fozia Hanif, Urooj Waheed, Samia Masood, Rehan Shams and Syed Inayatullah, “An Energy Efficient Crypto Suit for Secure Underwater Sensor Communication using Genetic Algorithm,” Sukkur IBA Journal of Emerging Technologies, pp. 1 – 17, Vol. 4, No. 2, July – December 2021.
  6. S. B. Goyal, Renjith V. Ravi, Chaman Verma, Maria Simona Raboaca, Florentina Magda Enescu, “A Lightweight Cryptographic Algorithm for Underwater Acoustic Networks,” Procedia Computer Science, pp. 266–273, 215 (2022), DOI: 10.1016/j.procs.2022.12.029.
  7. Ziyuan Wang, Jun Du, Zhaoyue Xia, Chunxiao Jiang, Zhengru Fang and Yong Ren, “Secure Routing in Underwater Acoustic Sensor Networks based on AFSA-ACOA Fusion Algorithm,” IEEE International Conference on Communications, pp. 1409-1414, 16-20 May 2022, DOI: 10.1109/ICC45855.2022.9838802.
  8. Salma S Shahapur, Rajashri Khanai, D A Torse, Chinmay Abhay Nerurkar and H P Rajani, “Secure Fuzzy Simple Shortest Path Routing Protocol (SF_SSP) for Underwater Communication,” Indian Journal of Science and Technology, pp. 4016-4025, 16(44), 2023, DOI: doi.org/10.17485/IJST/v16i44.2009.
  9. Guangjie Han, Fellow, IEEE, Ru Xia, Hao Wang, and Aohan Li, “Source Location Privacy Protection Algorithm Based on Polyhedral Phantom Routing in Underwater Acoustic Sensor Networks,” IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 5, 1 MARCH 2024, DOI: 10.1109/JIOT.2023.3318567.
  10. A. Shenbagharaman and B. Paramasivan, “Secure and energy efficient routing protocol for underwater wireless sensor network using running city game optimization with XGBoost algorithm,” Elsevier Applied Soft Computing, Volume 169, January 2025, DOI://doi.org/10.1016/j.asoc.2024.112615.
  11. Tejaswini R Murgod and Dr. S Meenakshi Sundaram, “Cluster based Detection and Reduction Techniques to Identify Wormhole Attacks in Underwater Wireless Sensor Networks,” (IJACSA) International Journal of Advanced Computer Science and Applications, pp. 58-63, Vol. 11, No. 7, 2020.
  12. Turki Ali Alghamdi, “Underwater Wireless Sensor Network Route Optimization using BIHH Technique,” (IJACSA) International Journal of Advanced Computer Science and Applications, pp. 343- 349, Vol. 11, No. 6, 2020.
  13. Ayman Alharbi, Alaa M. Abbas and Saleh Ibrahim, “Securing localization-free underwater routing protocols against depth-spoofing attacks,” Elsevier Array, Volume 13, March 2022, DOI: 10.1016/j.array.2021.100117.
  14. Rui Zhang, Jing Zhang, Qiqi Wang and Hehe Zhang, “DOIDS: An Intrusion Detection Scheme Based on DBSCAN for Opportunistic Routing in Underwater Wireless Sensor Networks,” Journal of Sensors, pp. 1-21, 2023, DOI: doi.org/10.3390/s23042096.
  15. Soumadeep Das, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark, Chintan Patel, and Biplab Sikdar, “AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks,” IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 32, NO. 2, APRIL 2024,
  16. Nitin Goyal · Mayank Dave and Anil Kumar Verma, “SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs,” Springer Wireless Personal Communications, pp. 1-15 2020, DOI: 10.1007/s11277-020-07175-8.
  17. Samuel Kofi Erskine, Hongmei Chi and Abdelrahman Elleithy, “SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network,” Journal of Sensors, pp. 1-20, 2023, DOI: doi.org/10.3390/s23115270.
  18. BeibeiWang, Xiufang Yue, Yonglei Liu, Kun Hao, Zhisheng Li and Xiaofang Zhao, “A Dynamic Trust Model for Underwater Sensor Networks Fusing Deep Reinforcement Learning and Random Forest Algorithm,” Journal of MDPI, pp. 1-21,2024, DOI: doi.org/10.3390/app14083374.
Index Terms

Computer Science
Information Sciences

Keywords

Underwater Wireless Sensor Networks (UWSNs) Cybersecurity Lightweight Encryption Secure Routing Intrusion Detection Trust Management Cyberattacks and Data Protection