Review Article

Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks

Table 1

Shows the current routing protocols based on its features.

ProtocolsConcentration pointsSink (multiple/single)MobilityMultihopLocation knownVoid avoidance

BLOAD [20]Balanced energy consumption, energy holes avoidanceSingleYesNoYesNo
EMGGR [21]Void avoidance, reliabilitySingleYesYesYesYes
ECBCCP [22]Reliability, energy conservationMultipleYesYesYesNo
EULC [23]Balanced energy dissipation, improved network lifetime, hot spot mitigationSingleYesYesYesYes
iAMCTD [24]Packet delivery ratio, energy efficiencyMultipleYesNoNoNo
SACRP [25]Packet delivery ratio, energy efficiency, clusteringSingleNoYesYesNo
QL-EEBDG [26]Packet delivery ratio, energy efficiency, clusteringMultipleYesNoYesNo
EnOR [27]Packet delivery ratio, energy efficiency, improved network lifetimeSingleNoYesYesNo
EECAR-AC [28]Network lifetime, void avoidanceMultipleYesYesYesYes
QERP [29]End-to-end delay, improve network energy consumption, and packet delivery ratio (PDR)SingleYesNoYesYes
EEDC-AA [30]Prolong underwater network lifetime, and balance energy consumptionMultipleYesNoYesNo
JREM [31]Energy holes and balancing energy consumption, and increase network lifetime by avoidingSingleNoYesYesYes
PCR [32]Energy efficient data, opportunistic routing, and reliabilityMultipleNoYesYesYes
EBOR [33]Network lifetime, reliability, PDR, energy consumptionMultipleNoYesYesNo
RBCRP [34]Reduce outage probability, load balancingMultipleYesYesYesNo
CSQSR [35]Network lifetime, application-specific QoSN/ANoNoYesNo
AREP [36]Link asymmetry, void handlingSingleYesNoYesYes
VA-GMPR [37]Void avoidance, load balancing, reliabilitySingleYesYesYesYes
P-AUV [38]Low latency, energy efficiencyMultipleYesYesYesNo
RPO [39]Reliability, energy efficiencyMultipleNoN/AYesN/A