Drones in Smart-Cities: Security and Performance
()
About this ebook
Drones in Smart-Cities: Security and Performance is the first book dedicated to drones in smart cities, helping address the many research challenges in bringing UAVs into practice. The book incorporates insights from the latest research in Internet of Things, big data, and cloud computing, 5G, and other communication technologies. It examines the design and implementation of UAV, focusing on data delivery, performability, and security. Intended for researchers, engineers, and practitioners, Drones in Smart-Cities: Security and Performance combines the technical aspects with academic theory to help implement the smart city vision around the globe.
- Addresses UAV and IoT for smart cities applications
- Examines topics as UAV safety, challenges, localization methods. QoS, simulation tools, and more
- Collect the relevant knowledge in one resource, saving research time and effort
Related to Drones in Smart-Cities
Related ebooks
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots Rating: 0 out of 5 stars0 ratingsSmart Cities Cybersecurity and Privacy Rating: 5 out of 5 stars5/55G IoT and Edge Computing for Smart Healthcare Rating: 0 out of 5 stars0 ratingsInternet of Things: Technologies and Applications for a New Age of Intelligence Rating: 0 out of 5 stars0 ratingsSmart Cities and Homes: Key Enabling Technologies Rating: 5 out of 5 stars5/5Cooperative and Cognitive Satellite Systems Rating: 5 out of 5 stars5/5Big Data Analytics for Cyber-Physical Systems: Machine Learning for the Internet of Things Rating: 0 out of 5 stars0 ratingsSmart Sensors Networks: Communication Technologies and Intelligent Applications Rating: 0 out of 5 stars0 ratingsSecuring the Internet of Things Rating: 5 out of 5 stars5/5Advances in Intelligent Vehicles Rating: 0 out of 5 stars0 ratingsBlockchain-Based Smart Grids Rating: 0 out of 5 stars0 ratingsThe Future of Intelligent Transport Systems Rating: 0 out of 5 stars0 ratingsDrones: The Next Generation of Unmanned Flight Rating: 5 out of 5 stars5/5Smart City Governance Rating: 0 out of 5 stars0 ratingsSmart Cities for Technological and Social Innovation: Case Studies, Current Trends, and Future Steps Rating: 0 out of 5 stars0 ratingsDrones Rating: 0 out of 5 stars0 ratingsSmart Cities and Artificial Intelligence: Convergent Systems for Planning, Design, and Operations Rating: 5 out of 5 stars5/5Management of IOT Open Data Projects in Smart Cities Rating: 0 out of 5 stars0 ratingsSmart City Tech Planning Handbook Rating: 0 out of 5 stars0 ratingsBlockchain and IoT Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsUnmanned Aerial Systems: Theoretical Foundation and Applications Rating: 0 out of 5 stars0 ratingsModeling and Simulation of Computer Networks and Systems: Methodologies and Applications Rating: 0 out of 5 stars0 ratingsSmart City A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsArtificial Intelligence for the Internet of Everything Rating: 3 out of 5 stars3/5Smart City Use Cases and Development Notes Rating: 4 out of 5 stars4/5The Ultimate Guide To Drones Rating: 3 out of 5 stars3/5Emerging Smart Technologies Rating: 0 out of 5 stars0 ratingsDeploying Wireless Sensor Networks: Theory and Practice Rating: 5 out of 5 stars5/5Smart Machines: Bridging the gap between the industrial internet of things and the fourth industrial revolution Rating: 0 out of 5 stars0 ratingsAutonomous Drones: Why Autonomous Drones is the Secret Ingredient Rating: 0 out of 5 stars0 ratings
Social Science For You
The Art of Witty Banter: Be Clever, Quick, & Magnetic Rating: 4 out of 5 stars4/5A People's History of the United States Rating: 4 out of 5 stars4/5Questions for Couples: 469 Thought-Provoking Conversation Starters for Connecting, Building Trust, and Rekindling Intimacy Rating: 0 out of 5 stars0 ratingsMy Secret Garden: Women's Sexual Fantasies Rating: 4 out of 5 stars4/5Fervent: A Woman's Battle Plan to Serious, Specific, and Strategic Prayer Rating: 5 out of 5 stars5/5The Like Switch: An Ex-FBI Agent's Guide to Influencing, Attracting, and Winning People Over Rating: 4 out of 5 stars4/5All About Love: New Visions Rating: 4 out of 5 stars4/5The Song of the Cell: An Exploration of Medicine and the New Human Rating: 4 out of 5 stars4/5The Human Condition Rating: 4 out of 5 stars4/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5The Denial of Death Rating: 4 out of 5 stars4/5Women Don't Owe You Pretty Rating: 4 out of 5 stars4/5Living Resistance: An Indigenous Vision for Seeking Wholeness Every Day Rating: 5 out of 5 stars5/5I Don't Want to Talk About It: Overcoming the Secret Legacy of Male Depression Rating: 4 out of 5 stars4/5Just Mercy: a story of justice and redemption Rating: 5 out of 5 stars5/5Dreamland: The True Tale of America's Opiate Epidemic Rating: 4 out of 5 stars4/5The Sun Does Shine: How I Found Life and Freedom on Death Row (Oprah's Book Club Selection) Rating: 4 out of 5 stars4/5Freedom Is a Constant Struggle: Ferguson, Palestine, and the Foundations of a Movement Rating: 4 out of 5 stars4/5Homicide: A Year on the Killing Streets Rating: 4 out of 5 stars4/5Come As You Are: Revised and Updated: The Surprising New Science That Will Transform Your Sex Life Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5Prisoners of Geography: Ten Maps That Explain Everything About the World Rating: 4 out of 5 stars4/5King, Warrior, Magician, Lover: Rediscovering the Archetypes of the Mature Masculine Rating: 4 out of 5 stars4/5
Reviews for Drones in Smart-Cities
0 ratings0 reviews
Book preview
Drones in Smart-Cities - Fadi Al-Turjman
Drones in Smart-Cities
Security and Performance
Edited by
Fadi Al-Turjman
Professor, Department of Artificial Intelligence
Near East University
Nicosia, Mersin 10, Turkey
Contents
Cover
Title page
Copyright
Dedication
Contributors
Preface
Chapter One: Aerial and underwater drone communication: potentials and vulnerabilities
Abstract
1. Introduction
2. Main communication technologies in UWC and UAV
3. Aerial vehicle communication
4. Aerial vehicle control architecture
5. Path planning
6. Machine learning and artificial intelligence technologies
7. Vision-based technologies
8. UAV attacks
9. Phases of UAV networks
10. UAV challenges and main issues in underwater RF communication
11. Discussions and open issues
12. Conclusion and future work
Chapter Two: Machine learning for cyber security frameworks: a review
Abstract
1. Introduction
2. Machine learning tasks
3. Cyber security tasks
4. Machine learning approaches for cyber security
5. The effectiveness of machine learning in cyber security
6. Conclusion
Chapter Three: Emerging use of UAV’s: secure communication protocol issues and challenges
Abstract
1. Introduction
2. Unmanned aerial vehicles (UAVs)
3. Ground control station (GCS)
4. Types of UAVs
5. Communication protocols for UAVs
6. Critical analysis of these protocols
7. Discussion
8. Conclusion
9. Future work
Chapter Four: A survey study on MAC and routing protocols to facilitate energy efficient and effective UAV-based communication systems
Abstract
1. Introduction
2. Routing protocols for UAVs
3. Data delivery models in UAVs
4. MAC protocols for UAVs
5. Conclusion
Chapter Five: UAVs: communication aspects and cellular service provisioning
Abstract
1. Introduction
2. System model
3. Performance analysis
4. Results
5. Conclusion
Chapter Six: AI simulations and programming environments for drones: an overview
Abstract
1. Introduction
2. Why simulators are important in drones
3. Where it is applicable
4. Simulation environments
5. Artificial intelligence types and issues
6. Applications
7. Other assessment methods
8. Open research issues
9. Conclusion
Chapter Seven: Smart agriculture framework using UAVs in the Internet of Things era
Abstract
1. Introduction
2. System model
3. The smart framework
4. Discussions
5. Concluding remark
Chapter Eight: Coastline change determination using UAV technology: a case study along the Konyaaltı coast, Antalya, Turkey
Abstract
1. Introduction
2. Study area
3. Methodology
4. Results and discussion
5. Summary and conclusions
Chapter Nine: Explorative analysis of AUV-aided cluster-based routing protocols for Internet of intelligent underwater sensors
Abstract
1. Introduction
2. Internet of intelligent underwater sensor networks (IoIUSN) application: AUV-aided WQM
3. CBR protocols for UWSN
4. Results and discussion
5. Conclusion
Acknowledgments
Chapter Ten: Physics of stabilization and control for the Drone’s quadrotors
Abstract
1. Introduction
2. Momentum theory of rotors
3. Control techniques
4. Hardware
5. Conclusion
Chapter Eleven: Critical analysis of security and privacy challenges for the Internet of drones: a survey
Abstract
1. Introduction
2. Related works: security challenges
3. Conclusions and future works
Index
Copyright
Elsevier
Radarweg 29, PO Box 211, 1000 AE Amsterdam, Netherlands
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright © 2020 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
ISBN: 978-0-12-819972-5
For information on all Elsevier publications visit our website at https://www.elsevier.com/books-and-journals
Publisher: Joe Hayton
Acquisitions Editor: Brian Romer
Editorial Project Manager: Ali Afzal-Khan
Production Project Manager: Swapna Srinivasan
Designer: Mark Rogers
Typeset by Thomson Digital
Dedication
To the best parents.
To Sinem and the little beautiful stars.
Love you all.
Fadi Al-Turjman
Contributors
Emmanuel Adewale Adedokun, Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria
Hamit Altiparmak, Department of Computer Engineering, Near East University, Nicosia, Mersin, Turkey
Fadi Al-Turjman, Department of Artificial Intelligence Engineering, Research Centre for AI and IoT, Near East University, Nicosia, Mersin, Turkey
Habeeb Bello-Salau, Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria
Sarfraz Nawaz Brohi, School of Computing and Information Technology (SOCIT), Taylors University, Subang Jaya, Selangor, Malaysia
Bakkiam David Deebak, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India
Kamil Dimililer, Department of Electrical and Electronic Engineering, Research Centre for AI and IoT, Near East University, Nicosia, Cyprus, Mersin, Turkey
Krishna Doddapaneni, Amazon Web Services, San Francisco, CA, United States
Eustace M. Dogo, Institute for Intelligent Systems, University of Johannesburg, Johannesburg, South Africa
Enver Ever, Computer Engineering, Middle East Technical University, Northern Cyprus Campus, Mersin, Turkey
Syed Ali Hassan, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan
Galip Savas Ilgi, Information Systems Engineering Department, Faculty of Engineering, and Research Centre for Artificial Intelligence in IoT, Near East University, Nicosia, Mersin, Turkey
Muhammad Asim Jan, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan
Noor Zaman Jhanjhi, School of Computing and Information Technology (SOCIT), Taylors University, Subang Jaya, Selangor, Malaysia
Haejoon Jung, Department of Information and Telecommunication Engineering, Incheon National University, Incheon, Korea
Navid Ali Khan, School of Computing and Information Technology (SOCIT), Taylors University, Subang Jaya, Selangor, Malaysia
Yoney Kirsal Ever, Software Engineering Department, Faculty of Engineering, and Research Centre for Artificial Intelligence in IoT, Near East University, Nicosia, Mersin, Turkey
Yoney Kirsal-Ever, Research Centre for AI and IoT, Near East University, Nicosia, Cyprus, Mersin, Turkey
Ali Danandeh Mehr, Civil Engineering Department, Antalya Bilim University, Antalya, Turkey
Anand Nayyar, School of Computing and Information Technology (SOCIT), Taylors University, Subang Jaya, Selangor, Malaysia
Ezekiel T. Ogidan, Research Centre for AI and IoT, Near East University, Nicosia, Cyprus, Mersin, Turkey
Oluwaseun Priscilla Olawale, Department of Software Engineering, Research Center for AI and IoT, Near East University, Nicosia, Mersin, Turkey
Bashir Olaniyi Sadiq, Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria
Abdulazeez Femi Salami, Department of Computer Engineering, University of Ilorin, Ilorin, Nigeria
Hanifa Teimourian, Department of Electrical and Electronic Engineering; Department of Artificial Intelligence Engineering, Research Centre for AI and IoT, Near East University, Nicosia, Mersin, Turkey
Rifat Tur, Civil Engineering Department, Akdeniz University, Antalya, Turkey
Levent Uzunsakal, Civil Engineering Department, Akdeniz University, Antalya, Turkey
Preface
Security and Drones have been considered as a complementary package toward realizing the emerging smart-cities paradigm. From this perspective, it is essential to understand the role of these significant components, which will provide a comprehensive vision for the worldwide smart city project in the near future. It is also essential to consider the emerging Drones-based intelligent applications for better lifestyle and more optimized solutions in our daily life.
The objective of this book is to overview the existing Drone-based Smart-cities applications while focusing on security issues/challenges. The main focus is on the Drones-based intelligence aspects that can help in realizing such paradigm in a secured way. The Artificial Intelligent (AI) techniques as well as the new emerging technologies such as the Internet of Things (IoT) accompanied with critical evaluation metrics, constraints, and open research issues are included for discussion. This conceptual book, which is unique in the field, will assist researchers and professionals working in the area to better assess the proposed Drone-based Smart cities paradigms, which have already started to appear in our societies.
Hope you enjoy it...
Fadi Al-Turjman
Chapter One
Aerial and underwater drone communication: potentials and vulnerabilities
Bakkiam David Deebaka
Fadi Al-Turjmanb
a School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India
b Department of Artificial Intelligence Engineering, Research Centre for AI and IoT, Near East University, Nicosia, Mersin, Turkey
Abstract
In the past, unmanned aerial vehicles (UAV) has become a hot topic for the development of research application systems. It has the real-time applications namely surveillance, camerawork in movies, communication, transportation, agriculture, delivery of goods, and for the remote rescue operations in various application scenarios. Navigation tool uses drones to address the challenges of technologies including both hardware and software. Therefore UAV and drone communication is important to study potential uses, strategies, vulnerabilities, and solution. This survey reports the characteristics and requirements of UAV networks to envision the civil applications in use of navigation. It is encompassed of both indoor and outdoor aspects, such as control, hardware, algorithms, path-planning, and communication requirements. This work includes machine learning and artificial intelligence for autonomous drone navigation. They use vision-based navigation like locality sensors and camera to discuss the features of security and safety. In addition, this work presents the review of drone navigation methods and its applications, focusing on modern network platform. Of late, a lot of applications have been developed using aerial vehicles as a pivot. This development provides vast range of support to modern computing applications such as urban computing, Internet of Things, ubiquitous computing, and Internet. These applications use UAV to complete any complex task. However, providing secure communication for aerial vehicles is not an easy task because of its easy customization and synchronization to the wide vast range of computing applications. These communication nodes are prone to coagulation attack, which is derived from the clotting properties of fluids. In this paper, the concept, issues, challenges, and research aspects for coagulation attack is thoroughly studied. In order to monitor different phenomenal activities in an underwater environment, such as environmental impact surveillance, marine life, oil and gas exploration. Underwater Wireless Communication (UWC) is nowadays becoming an important field for optical, acoustic, and electromagnetic waves to transmit the data on UWC. The possible UWC techniques include experimental observation, data collection and analysis, underwater navigation, disaster prevention and early detection warning of a tsunami using wireless communication. Above all, this work presents an overview, main initiatives and up-to-date contributions of UWC techniques, that is, underwater wireless optical communication, underwater wireless acoustic communication, and underwater electromagnetic transmission. In addition, the emerging technologies summarize the challenges of UWC, future research directions and recommendations using sixth generation network.
Keywords
UAV
drone
path planning
autonomous navigation
communication
vision-based 15 navigation
underwater wireless acoustic communication (UWAC)
underwater electromagnetic radio frequency communication (UWRF)
underwater optical communication (UWOC)
5G wireless communication
Chapter outline
1 Introduction
1.1 Motivation
1.2 Modern computing systems: cyberattacks
2 Main communication technologies in UWC and UAV
2.1 Seawater categorization
3 Aerial vehicle communication
4 Aerial vehicle control architecture
5 Path planning
6 Machine learning and artificial intelligence technologies
7 Vision-based technologies
8 UAV attacks
9 Phases of UAV networks
10 UAV challenges and main issues in underwater RF communication
11 Discussions and open issues
11.1 Most common Issues in underwater acoustic communication
11.2 Applicability and applications
11.3 Applications based on machine learning
12 Conclusion and future work
References
1. Introduction
An autonomous-based unmanned aerial vehicles known as drones has gained more attention for boarder surveillance, disaster monitoring, and relay communication [1,2]. An aircraft without pilot on board is particularly aimed to ease deployment complexity, low acquirement and maintenance cost. The development activities address the control issues related to robustness, stability and maneuverability. In general, the autonomous vehicles are capable of minimum user interaction to collaborate with UAV communication system. The vehicular applications connect multiple smart aerials over networks to meet the time critical missions. However, they have limited data payload and energy. They can autonomously fly through flight plans controlled by software or controlled by a remote control. Generally speaking, navigation refers to the activity or process to accurately determine one's position and plans to follow a path routing. Hence, drone navigation can be the field of research focusing on system development to measure the position and lay down an effective path plan for drones. It is the key to develop the next generation autonomous drones. They may be helpful to reach the areas beyond the reach of human being.
In such situations, they are engaged in critical operations such as disaster monitoring [3], surveillance, transportation, agriculture [4], forestry, and environment protection [5]. Farmers use drones to map out their crops in order to check irrigation systems, and also determine which areas of crops are impaired to make proper treatment accordingly. Drones have also been used by many retailers like Amazon to deliver the products. They are also heavily used in movie industries to cover the beautiful cinematic shots. Nowadays, it is easily available for everyone to purchase and access at low prices to boot. Initially, the independent drones are deployed in such situations owing to the advancement in drone and communication technologies. Multiple drones perform the critical operations to experience proper synchronization. More UAV are being employed in civil applications due to high mobility and flexibility.
However, in some complex environments, UAV cannot sense the environment parameters due to limited communication and traditional sensor perception capabilities. Despite many efforts to overcome these weaknesses, it is still necessary to develop more efficient and effective method in order to perform more stability, predictability, and security. Therefore, high performance independent navigation is of great importance to develop the application of UAV as shown in Fig. 1.1. The control of each drone falls on pilot to use visual tracking to determine position and orientation. More advanced drones use global positioning system (GPS) receivers to play a significant role, that is, navigation and control loop. Some smart features include drone memorization to track the position track. The trajectory of the drone can be predetermined to establish GPS waypoints. When this function is executed, the drone will use autopilot to follow this path.
Figure 1.1 High-level design architecture for drone communication.
1.1. Motivation
This paper aims at providing all recent developments in various communication fields of drone navigation on one platform. So as to gain knowledge about developments in the field, we are trying to contribute the state-of-art concepts. The motivation of this work is derived from vast applications to possess. A flying robot can be used to perform data collection and patrolling [3]. Multiple microaerial vehicles (M-MAVs) can be used to extend joint search and rescue after disaster situations [4]. Mini drones can be perceived through the distinct sound and can act as an HCI for navigating visually impaired persons [6]. Mid-air displays can be used in scenarios like controlling large crowds in emergency situations, navigation in crowd gatherings like sports [7]. The paper is divided into eight major domains that together comprise navigation systems of a drone. This includes ML-, AI- and vision-based technologies, control systems, communication systems, path planning, and autonomous navigation [8,9]. Shakhatreh et al. [10] identifies the application areas and its related domain functionalities to signify the key factors of public safety and civil security. From Table 1.1, a comprehensive overview is summarized to realize the deficiency factors of application domains.
Table 1.1
GD, Goods Delivery/ Logistics; INT, Surveillance; RS, Remote Sensing; RTM, Real Time Monitoring; SAR, Search and Rescue; SI, Structural Inspection; WAN, Wide Area Network
M-MAV provides diversity to observe and sense the environment, which improves data reliability and fault tolerance. The design challenges are highly extended to meet the goals of civil applications. Some research challenges are associated with on-board sensors, embedded hardware and software that exchange the data over wireless channel. Importantly, communication networks have been a source of interconnected systems for effective data sharing. Modern day networks have extended their limits for effective data transmission. UAVs have gained a lot of attention over a decade. These vehicles use UAV as network nodes to represent a real-world case study to investigate distributed and centralized approaches [17]. The applications of existing network envision to illustrate the time-critical applications, that is, for real-time support. In cooperative mode, multiple UAVs have further introduced as new network node that behaves as traditional networks to operate.
1.2. Modern computing systems: cyberattacks
Modern computing applications such as Urban Computing, Internet of Things, Ubiquitous Computing, and the Internet for All have sought applications of UAVs to attain complex tasks [18–21]. However, the rapid usage and its related issues could not ensure better robustness and fault-free networks. Security is one of the major issues for all types of aerial networks. A lot of network attacks have been addressed for vulnerability assessments that may be cooperative to identify the possible threats on an aerial network [22–25]. Security has always been a concern for UAV. Trustworthy and secure communication system is the major demand of unmanned aerial vehicle systems [26,27]. In the past, the concept of attacks in UAVs has been studied for cyber-physical systems. UAVs incorporate cyber systems to analyze various possible attacks and countermeasures [28]. Cyber attacks can heavily impact the operations of regular aerial vehicles affecting process of autopilot systems [29]. In autopilot systems, vulnerability may cause severe devastation effects resulting in fatal incidents [30]. False data injection is the major defect of cyberattacks that may influence a crucial issue with drone delivery system [31].
The cyberattacks can damage the entire business model to transform the aerial vehicles as potential attackers [32]. This paper introduces a new attack that proves as an intruder for the whole networks. This attack is termed as antidrone cyberattacks for target systems. The attack derives its name from both cyber and physical system properties. With an ease of reconfigurability and availability, this type of attack has full possibilities to affect the whole networks. In this paper, the concept of antidrone cyberattacks, issues in handling them, various research aspects and simulative case study have been discussed that focus on robust and fault-free connectivity over networked UAVs. Of late, global warming has become an open issue that gradually unfreezes the polar ice caps causing rise of sea level. Underwater Wireless Communication (UWC) provides a support for surveillance of boarder security especially for military purposes and commercially useful for the detection of natural resources in underwater.
Moreover, it is helpful to map and discover the unobserved underwater region. Nowadays, it is using for experimental observation, data collection, and analysis, underwater navigation, disaster prevention, and early detection warning of tsunami [33]. Optical, acoustic and radio frequency (RF) wireless carriers are considered to envisage UWC in underwater applications. Deploying UWC techniques in an unexplored water medium are highly challenging as compared to terrestrial wireless communication [34]. However, quality and reliability of data transmission in shallow and deep water completely depends on physical characteristics of water medium [35]. The UWC quality of service (QoS) depends on water medium and physical characteristic of electromagnetic radio frequency, optical and acoustic waves. UWC plays a significant role in underwater application on wireless communication network.
The deployment of configurations in underwater system consist of fixed and anchored sensor nodes with the sea bed, floating unmanned under-water vehicle nodes or autonomous underwater vehicle, signal receiver processing towers, floating devices (buoy) submarines, ship, and onshore base station [36]. Underwater wireless optical communication (UWOC) has less explored and rather difficult to deploy than acoustic propagation in underwater [37]. The existing underwater wireless acoustic communication (UWAC) has limited performance of low bandwidth, latency and multipath propagation in water medium [38]. Electromagnetic (EM) waves, in RF 3 Hz–3 kHz ranges are capable for high data acquisition and transformation