Internet of Underwater things (IoUT): A Systematic Review Research
DOI:
https://doi.org/10.70454/JRICST.2025.20109Keywords:
Internet of Underwater Things , data security, sensor, Water Sensing, IoUT, SecurityAbstract
The development of intelligent systems for the monitoring, exploration, and administration of underwater environments is made possible by the Internet of Underwater Things (IoUT), which is a revolutionary development in marine and environmental research. This thorough research examines the advancements, challenges, and promise of IoUT with a focus on its applications in domains such as resource extraction, the science of oceanography underwater tracking, and tracking the environment. IoUT systems require customised approaches in processing information, conservation of energy, connectivity, and sensor that is being tested design because to the particular difficulties of underwater settings. The new protocols and methods designed for underwater applications—such as acoustic, optical, and electromagnetic communications—as well as the incorporation of artificial intelligence (AI) and machine learning (ML) technologies for improved data processing and taking decisions are covered in this study. Furthermore, we draw attention to the urgent issues surrounding data security, environmentally friendly interaction, and installation expenses while providing suggestions for future lines of inquiry and technical advancements.
References
[1] Domingo, M. C. (2012). An overview of the internet of underwater things. Journal of Network and Computer Applications, 35(6), 1879-1890, https://doi.org/10.1016/j.jnca.2012.07.012.
[2] Khalil, R. A., Saeed, N., Babar, M. I., & Jan, T. (2020). Toward the internet of underwater things: Recent developments and future challenges. IEEE Consumer Electronics Magazine, 10(6), 32-37, https://doi.org/10.1109/MCE.2020.2988441.
[3]Kao, C. C., Lin, Y. S., Wu, G. D., & Huang, C. J. (2017). A comprehensive study on the internet of underwater things: applications, challenges, and channel models. Sensors, 17(7), 1477, https://doi.org/10.3390/s17071477.
[4] Bhattacharya, S., Victor, N., Chengoden, R., Ramalingam, M., Selvi, G. C., Maddikunta, P. K. R., &Gadekallu, T. R. (2022). Blockchain for internet of underwater things: State-of-the-art, applications, challenges, and future directions. Sustainability, 14(23), 15659, https://doi.org/10.3390/su142315659.
[5] Ali, E. S., Saeed, R. A., Eltahir, I. K., &Khalifa, O. O. (2023). A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps. Journal of Network and Computer Applications, 213, 103594, https://doi.org/10.1016/j.jnca.2023.103594.
[6] K. M, D. R., Lee, J., Ko, E., Shin, S. Y., Namgung, J. I., Yum, S. H., & Park, S. H. (2020). Underwater network management system in internet of underwater things: open challenges, benefits, and feasible solution. Electronics, 9(7), 1142, https://doi.org/10.3390/electronics9071142.
[7] Mohsan, S. A. H., Mazinani, A., Othman, N. Q. H., &Amjad, H. (2022). Towards the internet of underwater things: A comprehensive survey. Earth Science Informatics, 15(2), 735-764, https://doi.org/10.1007/s12145-021-00762-8.
]8] Lima, F. H., Vieira, L. F., Vieira, M. A., Vieira, A. B., &Nacif, J. A. M. (2019). Water ping: ICMP for the internet of underwater things. Computer Networks, 152, 54-63,https://doi.org/10.1016/j.comnet.2019.01.009
[9] Mohsan, S. A. H., Mazinani, A., Othman, N. Q. H., &Amjad, H. (2022). Towards the internet of underwater things: A comprehensive survey. Earth Science Informatics, 15(2), 735-764, https://doi.org/10.1007/s12145-021-00762-8
[10] Bello, O., &Zeadally, S. (2022). Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities. Ad Hoc Networks, 135, 102933, https://doi.org/10.1016/j.adhoc.2022.102933.
11. Bello, O., &Zeadally, S. (2022). Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities. Ad Hoc Networks, 135, 102933, https://doi.org/10.1016/j.adhoc.2022.102933
[12] Razzaq, A., Mohsan, S. A. H., Li, Y., &Alsharif, M. H. (2023). Architectural framework for underwater iot: Forecasting system for analyzing oceanographic data and observing the environment. Journal of Marine Science and Engineering, 11(2), 368, https://doi.org/10.3390/jmse11020368.
13. Vuran, M. C., Salam, A., Wong, R., & Irmak, S. (2018). Internet of underground things in precision agriculture: Architecture and technology aspects. Ad Hoc Networks, 81, 160-173, https://doi.org/10.1016/j.adhoc.2018.07.017
[14] Mohsan, S. A. H., Li, Y., Sadiq, M., Liang, J., & Khan, M. A. (2023). Recent advances, future trends, applications and challenges of internet of underwater things (iout): A comprehensive review. Journal of Marine Science and Engineering, 11(1), 124, https://doi.org/10.3390/jmse11010124.
[15] Mary, D. R. K., Ko, E., Kim, S. G., Yum, S. H., Shin, S. Y., & Park, S. H. (2021). A systematic review on recent trends, challenges, privacy and security issues of underwater internet of things. Sensors, 21(24), 8262,https://doi.org/10.3390/s21248262.
[16] Yeom, S. H., Namgung, J. I., Shin, S. Y., & Park, S. H. (2017). Lightweight Security for Underwater IoT. In Advances in Computer Science and Ubiquitous Computing: CSA-CUTE2016 8 (pp. 774-778), https://doi.org/10.1007/978-981-10-3023-9_119.
[17] Khalil, R. A., Saeed, N., Babar, M. I., & Jan, T. (2020). Toward the internet of underwater things: Recent developments and future challenges. IEEE Consumer Electronics Magazine, 10(6), 32-37, https://doi.org/10.1109/MCE.2020.2988441.
[18] Mohsan, S. A. H., Li, Y., Sadiq, M., Liang, J., & Khan, M. A. (2023). Recent advances, future trends, applications and challenges of internet of underwater things (iout): A comprehensive review. Journal of Marine Science and Engineering, 11(1), 124, https://doi.org/10.3390/jmse11010124.
[19] Qiu T, Zhao Z, Zhang T, Chen C, Chen CLP. Underwater internet of things in smart ocean: system architecture and open issues. IEEE Trans Ind Inform. 2020;16(7):4297-4307. https://doi.org/10.1109/TII.2019.2946618.
[20] Mrabet, H., Belguith, S., Alhomoud, A., &Jemai, A. (2020). A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors, 20(13), 3625, https://doi.org/10.3390/s20133625.
[21] Shahapur, S. S., &Khanai, R. (2016, March). Localization, routing and its security in UWSN—A survey. In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 1001-1006). IEEE, https://doi.org/10.1109/ICEEOT.2016.7754836.
[22] Dargahi, T., Javadi, H. H., &Shafiei, H. (2017). Securing underwater sensor networks against routing attacks. Wireless Personal Communications, 96, 2585-2602, https://doi.org/10.1007/s11277-017-4313-1.
[23] Yunus, F., Ariffin, S. H., &Zahedi, Y. (2010, May). A survey of existing medium access control (MAC) for underwater wireless sensor network (UWSN). In 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation (pp. 544-549). IEEE, https://doi.org/10.1109/AMS.2010.110.
[24] Yisa, A. G., Dargahi, T., Belguith, S., &Hammoudeh, M. (2021). Security challenges of internet of underwater things: A systematic literature review. Transactions on Emerging Telecommunications Technologies, 32(3), e4203, https://doi.org/10.1002/ett.4203.
[25] Singh, K. J., &Kapoor, D. S. (2017). Create your own Internet of things: A survey of IoT platforms. IEEE Consumer Electronics Magazine, 6(2), 57-68, https://doi.org/10.1109/MCE.2016.2640718.
[26] Mohanty, S. P., Choppali, U., &Kougianos, E. (2016). Everything you wanted to know about smart cities: The Internet of things is the backbone. IEEE consumer electronics magazine, 5(3), 60-70, https://doi.org/10.1109/MCE.2016.255687.
[27] Khalil, R. A., Saeed, N., Babar, M. I., & Jan, T. (2020). Toward the internet of underwater things: Recent developments and future challenges. IEEE Consumer Electronics Magazine, 10(6), 32-37, https://doi.org/10.1109/MCE.2020.2988441.
[28] Saeed, N., Celik, A., Al-Naffouri, T. Y., &Alouini, M. S. (2019). Underwater optical wireless communications, networking, and localization: A survey. Ad hoc networks, 94, 101935, https://doi.org/10.1016/j.adhoc.2019.101935.
[29] Akyildiz, I. F., Wang, P., & Sun, Z. (2015). Realizing underwater communication through magnetic induction. IEEE Communications Magazine, 53(11), 42-48, https://doi.org/10.1109/MCOM.2015.7321970.
[30] Dini, G., & Lo Duca, A. (2012). A secure communication suite for underwater acoustic sensor networks. Sensors, 12(11), 15133-15158,https://doi.org/10.3390/s121115133.
[31] Khanam, S., Ahmedy, I. B., Idris, M. Y. I., Jaward, M. H., &Sabri, A. Q. B. M. (2020). A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE access, 8, 219709-219743, https://doi.org/10.1109/ACCESS.2020.3037359.
[32] Alsamani, B., &Lahza, H. (2018, March). A taxonomy of IoT: Security and privacy threats. In 2018 International Conference on Information and Computer Technologies (ICICT) (pp. 72-77). IEEE, https://doi.org/10.1109/INFOCT.2018.8356843.
[33] Raymond, D. R., &Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74-81, https://doi.org/10.1109/MPRV.2008.6.
[34] Gorlatova, M.A.; Mason, P.C.; Wang, M.; Lamont, L.; Liscano, R. Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis. In Proceedings of the MILCOM 2006—2006 IEEE Military Communications Conference, Washington, DC, USA, 23–25 October 2006; pp. 1–7.
[35] Kong, J., Ji, Z., Wang, W., Gerla, M., Bagrodia, R., &Bhargava, B. (2004). On wormhole attacks in under-water sensor networks: A two-tier localization approach. UCLA Computer Science Department Technical Report, 4005, https://citeseerx.ist.psu.edu/document? repid=rep1&type=pdf&doi=9d3775780ba92112cfcca6d3fb7d6dcc10a951f0.
[36] Jen, S. M., Laih, C. S., &Kuo, W. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors, 9(6), 5022-5039, https://doi.org/10.3390/s90605022.
[37] Wang, W., Kong, J., Bhargava, B., &Gerla, M. (2008). Visualisation of wormholes in underwater sensor networks: a distributed approach. International Journal of Security and Networks, 3(1), 10-23, https://doi.org/10.1504/IJSN.2008.016198.
[38] Kaur, P., &Gurm, J. S. (2016). Detect and prevent HELLO FLOOD attack using centralized technique in WSN. Int. J. Comput. Sci. Eng. Technol, 7(8), 379-381,http://ijcset.com/docs/IJCSET16-07-08-023.pdf
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Pawan Kumar, prashant, Shashank Jha, Ritik Kumar Singh (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.