2021
DOI: 10.1007/s42979-021-00754-x
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Layer Design Approaches in Underwater Wireless Sensor Networks: A Survey

Abstract: The research in Underwater Wireless Sensor Networks (UWSNs) has gained momentum over the last two decades owing to the vast applications it supports like environmental monitoring, underwater exploration, disaster prevention, military, navigation assistance, etc. The sensor nodes deployed underwater have limited battery capacity. The main challenge is to design energy-efficient protocols facing the constraints due to peculiar characteristics and harsh underwater environment. The traditional layered approach is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 72 publications
0
8
0
Order By: Relevance
“…The currently available list of various routing protocols and its taxonomy, comparison and discussion are presented in [24]. The design applications are discussed in [25], different modes of underwater communications in [26], a comprehensive list of localization optimization algorithms in [27]. Moreover the BC oriented scheme for sybil attack of UWSN, bio-inspired algorithms in [28] and a dynamic trust-based evolution of hidden Markov models cooperate, and opportunistic routing protocols and there design guideline are listed in [26][27][28].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The currently available list of various routing protocols and its taxonomy, comparison and discussion are presented in [24]. The design applications are discussed in [25], different modes of underwater communications in [26], a comprehensive list of localization optimization algorithms in [27]. Moreover the BC oriented scheme for sybil attack of UWSN, bio-inspired algorithms in [28] and a dynamic trust-based evolution of hidden Markov models cooperate, and opportunistic routing protocols and there design guideline are listed in [26][27][28].…”
Section: Related Workmentioning
confidence: 99%
“…The d are discussed in [25], different modes of underwater communications hensive list of localization optimization algorithms in [27]. Moreove scheme for sybil attack of UWSN, bio-inspired algorithms in [28] an based evolution of hidden Markov models cooperate, and opportunisti and there design guideline are listed in [26][27][28]. A New kernelized approach to WSN localization…”
Section: Ref One Sentence Summerymentioning
confidence: 99%
See 3 more Smart Citations