-
CiteScore
-
Impact Factor
Volume 1, Issue 1, ICCK Transactions on Information Security and Cryptography
Volume 1, Issue 1, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
ICCK Transactions on Information Security and Cryptography, Volume 1, Issue 1, 2025: 25-37

Open Access | Research Article | 18 August 2025
Secure Aware Outlier Detection in Underwater Wireless Sensor Networks using Deep Learning
1 Department of Computing, Abasyn University, Peshawar, Pakistan
* Corresponding Author: Sunbal Rani, [email protected]
Received: 19 June 2025, Accepted: 16 July 2025, Published: 18 August 2025  
Abstract
The emerging field of underwater sensor networks (UWSN) has a vital potential shaping the modern and future landscape that assists in measuring water quality, pollution tracking, and identification of underwater habitats. The challenging conditions in the UWSN environments raise data and security concerns in terms of outliers related to the complicated communication system, poor visibility, and limited resources. The data quality and network efficiency may be affected due to these unwanted conditions, giving rise to certain malicious activities in the network. This study aims to enhance the outlier identification process in terms of security and quality perspectives using the Long Short-Term Memory (LSTM) framework. The focus is to identify the temporal patterns and differentiate between various outliers in critical UWSN conditions. Results reveal that the proposed framework achieved high accuracy up to 95% and surpassed the other traditional machine learning models. It is worth mentioning that underwater sensor data have a complicated pattern that can be more appropriately handled using deep learning models, including LSTM, in comparison to traditional machine learning models.

Graphical Abstract
Secure Aware Outlier Detection in Underwater Wireless Sensor Networks using Deep Learning

Keywords
underwater sensor networks (UWSN)
anomaly detection (AD)
outlier detection (OD)
deep learning (DL)
long short-term memory (LSTM)

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Taher, R. J., & Mohsen, K. K. (2024). Underwater wireless sensor networks. BIO Web of Conferences, 97, 00023.
    [CrossRef]   [Google Scholar]
  2. Masood, F., Khan, M. A., Alshehri, M. S., Ghaban, W., Saeed, F., Albarakati, H. M., & Alkhayyat, A. (2024). AI-based wireless sensor IoT networks for energy-efficient consumer electronics using stochastic optimization. IEEE Transactions on Consumer Electronics, 70(4), 6855-6862.
    [CrossRef]   [Google Scholar]
  3. Mohamed, R. E., Saleh, A. I., Abdelrazzak, M., & Samra, A. S. (2018). Survey on wireless sensor network applications and energy efficient routing protocols. Wireless Personal Communications, 101(2), 1019-1055.
    [CrossRef]   [Google Scholar]
  4. Heidemann, J., Stojanovic, M., & Zorzi, M. (2012). Underwater sensor networks: applications, advances and challenges. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 370(1958), 158-175.
    [CrossRef]   [Google Scholar]
  5. Jouhari, M., Ibrahimi, K., Tembine, H., & Ben-Othman, J. (2019). Underwater wireless sensor networks: A survey on enabling technologies, localization protocols, and internet of underwater things. IEEE Access, 7, 96879-96899.
    [CrossRef]   [Google Scholar]
  6. Amoli, P. V. (2016). An overview on current researches on underwater sensor networks: Applications, challenges and future trends. International Journal of Electrical and Computer Engineering, 6(3), 955.
    [CrossRef]   [Google Scholar]
  7. Fattah, S., Gani, A., Ahmedy, I., Idris, M. Y. I., & Targio Hashem, I. A. (2020). A survey on underwater wireless sensor networks: Requirements, taxonomy, recent advances, and open research challenges. Sensors, 20(18), 5393.
    [CrossRef]   [Google Scholar]
  8. Jiang, S. (2018). On securing underwater acoustic networks: A survey. IEEE Communications Surveys & Tutorials, 21(1), 729-752.
    [CrossRef]   [Google Scholar]
  9. Chartres, C., & Varma, S. (2010). Out of water: from abundance to scarcity and how to solve the world's water problems. FT Press.
    [Google Scholar]
  10. Li, S., Qu, W., Liu, C., Qiu, T., & Zhao, Z. (2019). Survey on high reliability wireless communication for underwater sensor networks. Journal of Network and Computer Applications, 148, 102446.
    [CrossRef]   [Google Scholar]
  11. Otero, P., Chowdhry, B. S., Zeng, H., & Aamir, M. (2021). underwater communications and sensors technologies. Wireless Personal Communications, 116(2), 955-961.
    [CrossRef]   [Google Scholar]
  12. Felemban, E., Shaikh, F. K., Qureshi, U. M., Sheikh, A. A., & Qaisar, S. B. (2015). Underwater sensor network applications: A comprehensive survey. International Journal of Distributed Sensor Networks, 11(11), 896832.
    [CrossRef]   [Google Scholar]
  13. Awan, K. M., Shah, P. A., Iqbal, K., Gillani, S., Ahmad, W., & Nam, Y. (2019). Underwater wireless sensor networks: A review of recent issues and challenges. Wireless Communications and Mobile Computing, 2019(1), 6470359.
    [CrossRef]   [Google Scholar]
  14. Gola, K. K., & Gupta, B. (2017). Underwater sensor networks routing (UWSN-R): A comprehensive survey. Sensor Letters, 15(11), 877-890.
    [CrossRef]   [Google Scholar]
  15. Eleftherakis, D., & Vicen-Bueno, R. (2020). Sensors to increase the security of underwater communication cables: A review of underwater monitoring sensors. Sensors, 20(3), 737.
    [CrossRef]   [Google Scholar]
  16. Das, A. P., Thampi, S. M., & Lloret, J. (2020). Anomaly detection in UASN localization based on time series analysis and fuzzy logic. Mobile Networks and Applications, 25(1), 55-67.
    [CrossRef]   [Google Scholar]
  17. Rault, T., Bouabdallah, A., & Challal, Y. (2014). Energy efficiency in wireless sensor networks: A top-down survey. Computer networks, 67, 104-122.
    [CrossRef]   [Google Scholar]
  18. Cao, X., Liu, L., Cheng, Y., & Shen, X. (2017). Towards energy-efficient wireless networking in the big data era: A survey. IEEE Communications Surveys & Tutorials, 20(1), 303-332.
    [CrossRef]   [Google Scholar]
  19. Meleshko, A. V., Desnitsky, V. A., & Kotenko, I. V. (2020). Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems. IOP conference series: materials science and engineering, 709(3), 033034.
    [CrossRef]   [Google Scholar]
  20. Liu, N., Chen, D., Huang, H., Huang, X., Yang, Q., & Xiong, N. N. (2022). Anomaly Detection of Underwater Sensor Data Based on Temporal and Spatial Correlation. International Conference on Artificial Intelligence and Security, 239-252.
    [CrossRef]   [Google Scholar]
  21. Saeed, N., Al-Naffouri, T. Y., & Alouini, M. S. (2018). Outlier detection and optimal anchor placement for 3-D underwater optical wireless sensor network localization. IEEE Transactions on Communications, 67(1), 611-622.
    [CrossRef]   [Google Scholar]
  22. Samara, M. A., Bennis, I., Abouaissa, A., & Lorenz, P. (2022). A survey of outlier detection techniques in IoT: Review and classification. Journal of Sensor and Actuator Networks, 11(1), 4.
    [CrossRef]   [Google Scholar]
  23. Yu, Y., Si, X., Hu, C., & Zhang, J. (2019). A review of recurrent neural networks: LSTM cells and network architectures. Neural computation, 31(7), 1235-1270.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Rani, S., & Rahim, S. S. (2025). Secure Aware Outlier Detection in Underwater Wireless Sensor Networks using Deep Learning. ICCK Transactions on Information Security and Cryptography, 1(1), 25–37. https://doi.org/10.62762/TISC.2025.610386

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 27
PDF Downloads: 11

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
ICCK Transactions on Information Security and Cryptography

ICCK Transactions on Information Security and Cryptography

ISSN: request pending (Online) | ISSN: request pending (Print)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/