Application or Devices Networking Protocols MAC Protocol, Routing Protocol, Transport Layer Protocol and Cross Layer Protocol Securing Authentication, Availability, Vulnerability, Threat, Defense, etc.
Synopsis (Rough Draft) Every living Human on the planet Earth knows that Earth’s two-third is only water and other one-third is landmass. With today fast moving trends and technology, Humans have come to liking wireless technology.People have covered land, sky and space with this wireless technology, so what’s left now? Water, is left now.
With the active research going on now for nearly a decade e have come up with underwater wireless communications. Underwater Communication is done with help of light and sound i. E. , via, optical and Acoustic waves. This type of communications is known as optical and acoustic communications. Both acoustic and optical waves have their own advantages and disadvantages.
To come unscathed from this emerged the use of electromagnetic waves which made the underwater wireless communication work with electromagnetic waves propagation. Since this communication is quite intriguing to researchers, it has also attracted researchers from the various other fields too like military, industry ND most probably the academics. This attention to Underwater Wireless ha: also compromised its security at many levels.This kind Of communication ca easily be eavesdropped by any unauthorized third party.
It is also vulnerable to malicious attack to it. Though its security is at compromise most of the time, underwater wireless: communication has proved itself many-a-times by producing beneficial outcomes. Underwater Wireless Communication has large potential in future though its decades old but can surprise again and again with its actual potential.