Issues in Underwater Cables Deploymentby Risk Analysis

Issues in Underwater Cables Deploymentby Risk Analysis

Jitender Grover (École de technologie supérieure (ÉTS), Canada)
DOI: 10.4018/978-1-7998-3640-7.ch018
OnDemand PDF Download:
No Current Special Offers


Underwater cable deployment facilitates the coverage and speed of internet all over the world for various applications like international trade, various communication transfers, and other daily end user requirements. Also, critical network infrastructure below the water remains largely unexplored to end users because they are not directly related with its development. However, the risk of damage or destruction by unintentional underwater accident or intentional malicious threats leads to costly and communications disruptions. This chapter solves two primary goals. The first is to highlight the issues in underwater cable deployment that may be seen or unseen leads to various potential risks that could interrupt cable-supported services. The second goal is to explore the various possibilities for securing the organization to ensure business continuity.
Chapter Preview

Issues In Underwater Cable Deployment

The application backbone of underwater communication network is the submarine cables, these cables are laid almost around the world. It helps to communicate and transfer data between different countries. But researchers investigated that these submarine cables are becoming risky day by day because the attackers nowadays becoming more vulnerable as they can access the data transfer within the cables (Goyal et al., 2017c). Similarly in UWSN the security of these networks is shrinking day by day, as each sensor node contains important data that cannot be shared, although this data is available in decrypted form (Burnett, 2018; Qiu, 2011; US Report, 2018). In today’s world, the attackers are also using prominent technologies and methods to get into it or to access the link which connects the adjoining sensor nodes with other nodes. The link between the nodes should be deployed in a safe manner as it is only path to transfer data from main substation to a receiver point (Bimbaum, 2017; Goyal et al., 2019; Young, 2018).

Complete Chapter List

Search this Book: