{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:06:14Z","timestamp":1774541174505,"version":"3.50.1"},"reference-count":119,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62102264 and 52171341"],"award-info":[{"award-number":["62102264 and 52171341"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Young Expert Project of Taishan Scholar","award":["tsqnz20230602"],"award-info":[{"award-number":["tsqnz20230602"]}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"crossref","award":["ZR2023LZH010"],"award-info":[{"award-number":["ZR2023LZH010"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Youth Innovation University Team Project in Shandong","award":["2022KJ062"],"award-info":[{"award-number":["2022KJ062"]}]},{"name":"Independent Innovation Fund of China University of Petroleum","award":["22CX06056A"],"award-info":[{"award-number":["22CX06056A"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>The Internet of Underwater Things (IoUT) pertains to a system that utilizes technology of Internet of Things (IoT) for data collection, communication, and control in the underwater environment. The monitoring and management of various parameters in the underwater domain are gathered through the deployment of underwater sensors, communication devices, and controllers. It is crucial in emerging ocean engineering. However, due to the instability of the underwater environment and the particularity of the underwater communication transmission medium, it is vulnerable to security threats, which may damage the system or cause data errors. In this survey, we will discuss the challenges, solutions, and future directions of IoUT from security and reliability, respectively. To ensure the normal operation of IoUT, we analyze the underwater security problems and solutions of the IoUT. Then, we discuss the reliability issue and improved strategies of IoUT system in detail. Finally, we come up with our views about the theories, challenges, and future prospects of IoUT security after the comparative analysis.<\/jats:p>","DOI":"10.1145\/3700640","type":"journal-article","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T11:41:51Z","timestamp":1729165311000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Security and Reliability of Internet of Underwater Things: Architecture, Challenges, and Opportunities"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4044-885X","authenticated-orcid":false,"given":"Bin","family":"Jiang","sequence":"first","affiliation":[{"name":"College of Oceanography and Space Information, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3955-0199","authenticated-orcid":false,"given":"Jiacheng","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Oceanography and Space Information, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2326-9518","authenticated-orcid":false,"given":"Xuerong","family":"Cui","sequence":"additional","affiliation":[{"name":"College of Oceanography and Space Information, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6043-6971","authenticated-orcid":false,"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Tennessee at Martin, Martin, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4527-8623","authenticated-orcid":false,"given":"Yongxin","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Embry-Riddle Aeronautical University, Daytona Beach, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of Maryland, Baltimore County, Baltimore, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,11,11]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107950"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106869"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Abeer Almutairi Ying He and Steven Furnell. 2022. A multi-level trust framework for the internet of underwater things. In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE 370\u2013375.","DOI":"10.1109\/CSR54599.2022.9850334"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103114"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2016.2613958"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Ahmad A. Aziz El-Banna Ahmed B. Zaky Basem M. ElHalawany Joshua Zhexue Huang and Kaishun Wu. 2019. Machine learning based dynamic cooperative transmission framework for IoUT networks. In 2019 16th Annual IEEE International Conference on Sensing Communication and Networking (SECON). IEEE 1\u20139.","DOI":"10.1109\/SAHCN.2019.8824858"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102933"},{"key":"e_1_3_1_9_2","unstructured":"Xiangming Cai Luyao Hu Weikai Xu and Lin Wang. 2021. Design of an OFDM-based differential cyclic-shifted DCSK system for underwater acoustic communications. In 2021 26th IEEE Asia-Pacific Conference on Communications (APCC). 304\u2013309."},{"key":"e_1_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Jianrui Chen Jingjing Wang Chunxiao Jiang Zhongxiang Wei and Yong Ren. 2022. Underwater covert communications relying on bargaining game theory. In ICC 2022 - IEEE International Conference on Communications. 1403\u20131408.","DOI":"10.1109\/ICC45855.2022.9838649"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3197936"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2021.107911"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2021.108479"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2022.111257"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Rodolfo W. L. Coutinho and Azzedine Boukerche. 2019. PCon: A novel opportunistic routing protocol for duty-cycled internet of underwater things. In 2019 IEEE Symposium on Computers and Communications (ISCC). 1\u20136.","DOI":"10.1109\/ISCC47284.2019.8969725"},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Anjana P. Das and Sabu M. Thampi. 2015. Secure communication in mobile underwater wireless sensor networks. In 2015 International Conference on Advances in Computing Communications and Informatics (ICACCI). 2164\u20132173.","DOI":"10.1109\/ICACCI.2015.7275937"},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Abhashri Deshmukh Sayali Deo and B. R. Chandavarkar. 2021. Mitigating neighborship attack in underwater sensor networks. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). 1\u20136.","DOI":"10.1109\/ICCCNT51525.2021.9580054"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2886896"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Roee Diamant Paolo Casari and Stefano Tomasin. 2021. Topology-based secret key generation for underwater acoustic networks. In 2021 Fifth Underwater Communications and Networking Conference (UComms). 1\u20135.","DOI":"10.1109\/UComms50339.2021.9598062"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3157621"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101912"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Wei Fang Zhangbing Zhou Lei Shu Xiaolei Wang Dengbiao Tu and Yongping Xiong. 2016. Prediction-based event determination in underwater wireless sensor networks. In 2016 International Conference on Identification Information and Knowledge in the Internet of Things (IIKI). 370\u2013373.","DOI":"10.1109\/IIKI.2016.86"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3088279"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3049239"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Zhang Gangqiang Dong Yangze and He Xudong. 2015. Simulation research on underwater acoustic network MAC layer protocol attack. In 2015 Fifth International Conference on Instrumentation and Measurement Computer Communication and Control (IMCCC). 1558\u20131561.","DOI":"10.1109\/IMCCC.2015.330"},{"key":"e_1_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Hossein Ghannadrezaii and Jean-Fran\u00e7ois Bousquet. 2018. Securing a Janus-based flooding routing protocol for underwater acoustic networks. In OCEANS 2018 MTS\/IEEE Charleston. 1\u20137.","DOI":"10.1109\/OCEANS.2018.8604858"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3131332"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2022.3195700"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3178379"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3124492"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2939179"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2402120"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900478"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2020.3003634"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988733"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103703"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/JOE.2021.3066780"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2572106"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2906545"},{"key":"e_1_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Al Amin Islam and Kazi Abu Taher. 2021. A novel authentication mechanism for securing underwater wireless sensors from Sybil attack. In 2021 5th International Conference on Electrical Engineering and Information Communication Technology (ICEEICT). 1\u20136.","DOI":"10.1109\/ICEEICT53905.2021.9667810"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2024.3424252"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2510226"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2018.09.026"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2021.108626"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2864127"},{"key":"e_1_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Zhang Junqing Zhang Gangqiang and Liu Junkai. 2021. Wormhole attack detecting in underwater acoustic communication networks. In 2021 OES China Ocean Acoustics (COA). 647\u2013650.","DOI":"10.1109\/COA50123.2021.9519987"},{"key":"e_1_3_1_47_2","doi-asserted-by":"crossref","unstructured":"Muhammad Khalid Ruiqin Zhao and Xin Wang. 2020. Node authentication in underwater acoustic sensor networks using time-reversal. In Global Oceans 2020: Singapore \u2013 U.S. Gulf Coast. 1\u20134.","DOI":"10.1109\/IEEECONF38699.2020.9389366"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.10.012"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108309"},{"key":"e_1_3_1_50_2","doi-asserted-by":"crossref","unstructured":"S. S. Nagamuthu Krishnan. 2018. Defending selective forwarding attacks in underwater acoustic networks applying trust model. In 2018 Second International Conference on Electronics Communication and Aerospace Technology (ICECA). 1567\u20131571.","DOI":"10.1109\/ICECA.2018.8474693"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2021.101388"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103409"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102650"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.168430"},{"key":"e_1_3_1_55_2","doi-asserted-by":"crossref","unstructured":"Chhagan Lal Roberto Petroccia Mauro Conti and Jo\u00e3o Alves. 2016. Secure underwater acoustic networks: Current and future research directions. In 2016 IEEE Third Underwater Communications and Networking Conference (UComms). 1\u20135.","DOI":"10.1109\/UComms.2016.7583425"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/JOE.2017.2716599"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2018.2809139"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102446"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2018.07.006"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2945803"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2897610"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107191"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2018.8394494"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.01.010"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072920"},{"key":"e_1_3_1_66_2","doi-asserted-by":"crossref","unstructured":"Yulin Liu Guangjie Han Hao Wang and Jinfang Jiang. 2021. FPTSA-SLP: A fake packet time slot assignment-based source location privacy protection scheme in underwater acoustic sensor networks. In 2021 Computing Communications and IoT Applications (ComComAp). 307\u2013311.","DOI":"10.1109\/ComComAp53641.2021.9652976"},{"key":"e_1_3_1_67_2","doi-asserted-by":"crossref","unstructured":"Yao Liu Luyu Li Rong Fan Suya Ma Xuan Liu and Yishan Su. 2021. A physical layer security mechanism based on cooperative jamming in underwater acoustic sensor networks. In 2021 IEEE\/CIC International Conference on Communications in China (ICCC Workshops). 239\u2013243.","DOI":"10.1109\/ICCCWorkshops52231.2021.9538851"},{"key":"e_1_3_1_68_2","doi-asserted-by":"crossref","unstructured":"Hung-Yi Lo James S. Lehnert and Phuong T. Tran. 2019. Secrecy capacity for an underwater acoustic channel with a dominant noise source. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). 0783\u20130787.","DOI":"10.1109\/CCWC.2019.8666553"},{"key":"e_1_3_1_69_2","doi-asserted-by":"crossref","unstructured":"M. Phil Lowney Hong Liu and Eugene Chabot. 2018. Trust management in underwater acoustic MANETs based on cloud theory using multi-parameter metrics. In 2018 International Carnahan Conference on Security Technology (ICCST). 1\u20135.","DOI":"10.1109\/CCST.2018.8585499"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842060"},{"key":"e_1_3_1_71_2","doi-asserted-by":"crossref","unstructured":"Lu Ma Cheng Fan Wei Sun and Gang Qiao. 2018. Comparison of jamming methods for underwater acoustic DSSS communication systems. In 2018 2nd IEEE Advanced Information Management Communicates Electronic and Automation Control Conference (IMCEC). 1340\u20131344.","DOI":"10.1109\/IMCEC.2018.8469430"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3158892"},{"key":"e_1_3_1_73_2","doi-asserted-by":"crossref","unstructured":"Varun Menon Divya Midhunchakkaravarthy Sandeep Verma Aaromal Sujith and Manju Manju. 2021. Enabling reliable communication in internet of underwater things: Applications challenges and future directions. In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC). 296\u2013301.","DOI":"10.1109\/ICSCCC51823.2021.9478081"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110430"},{"key":"e_1_3_1_75_2","doi-asserted-by":"crossref","unstructured":"T. S. N. Murthy G. Satish Reddyka and K. Padmaraju. 2017. Adaptive secret key generation in underwater acoustic system. In 2017 IEEE International Conference on Power Control Signals and Instrumentation Engineering (ICPCSI). 698\u2013702.","DOI":"10.1109\/ICPCSI.2017.8391804"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.050"},{"key":"e_1_3_1_77_2","doi-asserted-by":"crossref","unstructured":"Sanjana Palisetti B. R. Chandavarkar and Akhilraj V. Gadagkar. 2021. Intrusion detection of sinkhole attack in underwater acoustic sensor networks. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). 1\u20137.","DOI":"10.1109\/ICCCNT51525.2021.9580148"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3054745"},{"key":"e_1_3_1_79_2","doi-asserted-by":"crossref","unstructured":"Zheng Peng Xu Han and Yun Ye. 2021. Enhancing underwater sensor network security with coordinated communications. In ICC 2021 - IEEE International Conference on Communications. 1\u20136.","DOI":"10.1109\/ICC42927.2021.9500758"},{"key":"e_1_3_1_80_2","doi-asserted-by":"crossref","unstructured":"Roberto Petroccia. 2016. A distributed ID assignment and topology discovery protocol for underwater acoustic networks. In 2016 IEEE Third Underwater Communications and Networking Conference (UComms). 1\u20135.","DOI":"10.1109\/UComms.2016.7583425"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.23919\/OCEANS.2011.6106900"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2021.101288"},{"key":"e_1_3_1_83_2","doi-asserted-by":"crossref","unstructured":"Huma Hasan Rizvi Rabia Noor Enam Sadiq Ali Khan and Jawaid Akram. 2020. A survey on internet of underwater things: Perspective on protocol design for routing. In 2020 Global Conference on Wireless and Optical Technologies (GCWOT). 1\u20138.","DOI":"10.1109\/GCWOT49901.2020.9391628"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2875083"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.07.016"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103647"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176374"},{"key":"e_1_3_1_88_2","doi-asserted-by":"crossref","unstructured":"Alberto Signori Filippo Campagnaro Kim-Fabian Wachlin Ivor Nissen and Michele Zorzi. 2020. On the use of conversation detection to improve the security of underwater acoustic networks. (2020) 1\u20138.","DOI":"10.1109\/IEEECONF38699.2020.9389231"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2982613"},{"key":"e_1_3_1_90_2","doi-asserted-by":"crossref","unstructured":"George Sklivanitis Jonathan Ashdown Konstantinos Tountas and Dimitris A. Pados. 2018. Sparse waveform design for secure LPD\/LPI underwater acoustic communications. In OCEANS 2018 MTS\/IEEE Charleston. 1\u20136.","DOI":"10.1109\/OCEANS.2018.8604506"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988313"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109307"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2019.2899732"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2019.2960131"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102953"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2020.3012502"},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100241"},{"key":"e_1_3_1_98_2","doi-asserted-by":"crossref","unstructured":"Khamdamboy Urunov Soo-Young Shin Jeong-Il Namgung and Soo-Hyun Park. 2018. High-level architectural design of management system for the internet of underwater things. In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN). 326\u2013331.","DOI":"10.1109\/ICUFN.2018.8437002"},{"key":"e_1_3_1_99_2","doi-asserted-by":"crossref","unstructured":"Khamdamboy Urunov Soo-Young Shin and Soo-Hyun Park. 2017. The unique reliable identity system of enabling lightweight device management in NMS mechanism for the U-IoT. In 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS). 411\u2013414.","DOI":"10.1109\/APNOMS.2017.8094161"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109070"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2601281"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2022.108665"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3135438"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3085586"},{"key":"e_1_3_1_105_2","doi-asserted-by":"crossref","unstructured":"Qiu Wang and Hong-Ning Dai. 2017. On modeling of eavesdropping behavior in underwater acoustic sensor networks. In 2017 IEEE 18th International Symposium on A World of Wireless Mobile and Multimedia Networks (WoWMoM). 1\u20133.","DOI":"10.1109\/WoWMoM.2017.7974301"},{"key":"e_1_3_1_106_2","doi-asserted-by":"crossref","unstructured":"Qiu Wang Hong-Ning Dai Xuran Li and Hao Wang. 2015. Eavesdropping attacks in underwater acoustic networks. In 2015 10th International Conference on Information Communications and Signal Processing (ICICS). 1\u20135.","DOI":"10.1109\/ICICS.2015.7459921"},{"key":"e_1_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/JOE.2021.3085098"},{"key":"e_1_3_1_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2877317"},{"key":"e_1_3_1_109_2","doi-asserted-by":"crossref","unstructured":"Lu Xiao and Yonghua Zhu. 2012. Modeling the wormhole attack in underwater sensor network. In 2012 8th International Conference on Wireless Communications Networking and Mobile Computing. 1\u20134.","DOI":"10.1109\/WiCOM.2012.6478576"},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.23919\/OCEANS.2009.5422081"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068298"},{"issue":"1","key":"e_1_3_1_112_2","first-page":"168","article-title":"Feedback-based target localization in underwater sensor networks: A multisensor fusion approach","volume":"5","author":"Yan Jing","year":"2019","unstructured":"Jing Yan, Ziqiang Xu, Xiaoyuan Luo, Cailian Chen, and Xinping Guan. 2019. Feedback-based target localization in underwater sensor networks: A multisensor fusion approach. IEEE Trans. Signal Inf. Process. Netw. 5, 1 (2019), 168\u2013180.","journal-title":"IEEE Trans. Signal Inf. Process. Netw."},{"key":"e_1_3_1_113_2","doi-asserted-by":"crossref","unstructured":"Abbas Yazdinejad Reza M. Parizi Gautam Srivastava Ali Dehghantanha and Kim-Kwang Raymond Choo. 2019. Energy efficient decentralized authentication in internet of underwater things using blockchain. In 2019 IEEE Globecom Workshops (GC Wkshps). 1\u20136.","DOI":"10.1109\/GCWkshps45667.2019.9024475"},{"key":"e_1_3_1_114_2","doi-asserted-by":"crossref","unstructured":"Chae-Won Yun Jae-Hoon Lee Okyeon Yi and Soo-Hyun Park. 2016. Ticket-based authentication protocol for underwater wireless sensor network. In 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN). 215\u2013217.","DOI":"10.1109\/ICUFN.2016.7537019"},{"key":"e_1_3_1_115_2","doi-asserted-by":"crossref","unstructured":"Dhruvi Zala Dhaval Thummar and B. R. Chandavarkar. 2021. Mitigating blackhole attack of underwater sensor networks. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). 1\u20138.","DOI":"10.1109\/ICCCNT51525.2021.9579473"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2021.3110496"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3058216"},{"key":"e_1_3_1_118_2","doi-asserted-by":"crossref","unstructured":"Lan Zhang Wei Feng Jianlong Li and Huijie Zhu. 2021. Link reliability prediction for long-range underwater acoustic communications between gliders. In 2021 IEEE\/CIC International Conference on Communications in China (ICCC Workshops). 256\u2013260.","DOI":"10.1109\/ICCCWorkshops52231.2021.9538882"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3389728"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pquantelec.2020.100274"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:28Z","timestamp":1750295848000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":119,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3700640"],"URL":"https:\/\/doi.org\/10.1145\/3700640","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"2023-06-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}