“Securing underwater wireless communication networks” 2
1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY
Jnana Sangama, Belgaum, Karnataka-590 014.
A Seminar On
“Securing Underwater Wireless Communication Networks”
By Project Guide
NAVEENA N (1BT08CS051) Mr. KESHAVA M
(Lecturer of CSE department)
B.T.L INSTITUTE OF TECHNOLOGY
Department of Computer Science & Engineering
2010-11
3. ABSTRACT
Underwater wireless communication
networks are particularly vulnerable to
malicious attacks due to the high bit error
rates, large and variable propagation
delays, and low bandwidth of acoustic
channels.
(UWCNs) are constituted by sensors and
autonomous underwater vehicles (AUVs) that
interact to perform specific applications such
as underwater monitoring.
4. ABSTRACT
Both intervehicle and sensor-AUV
communications can be affected by denial-of-
service (DoS) attacks.
We propose several methods to secure
Underwater Wireless Communication
Networks.
We design three schemes namely, secure time
synchronization, localization, and routing in
UWCNs
5. ABSTRACT
Aim of proposed techniques is to enable the
system to provide secure data transmission.
Secure time synchronization aims for
power saving.
Secure localization aims to provide location
information and data tagging.
Secure routing rejects routing paths
containing malicious nodes.
6. These techniques are based on following
mechanisms
Secure Time Synchronization
It is essential in many underwater applications such as
coordinated sensing tasks. & scheduling algorithms such as
timedivision multiple access (TDMA).
SECURE LOCALIZATION
Localization is a very important issue for data tagging.
Localization schemes can be classified into two types:
(i) Range-based schemes (using range or bearing
information):
(ii) Range-free schemes (not using range or bearing
information):
SECURE ROUTING
Routing is essential for packet delivery in UWCNs.
7. Underwater Wireless Communication Networks
Underwater Wireless Communication Networks are constituted by
sensor nodes, also known as motes or simply nodes are
small and energy constrained devices that have the
ability of sensing the surrounding environment.
The sink, also known as base station, is a more powerful
node that behaves as an interface between the sensor
nodes and the clients.
Autonomous Underwater Vehicles (AUVs) that
interact to perform specific applications such as
underwater monitoring
9. Existing system
Radio waves do not propagate well underwater due to the high energy
absorption of water
Therefore, underwater communications are based on acoustic links
characterized by large propagation delays. The propagation speed of
acoustic signals in water (typically 1500 m/s)
Acoustic channels have low bandwidth As a result, the bit error rates
of acoustic links are often high, and losses of connectivity arise
It cannot rely on the Global Positioning System (GPS) because it uses
radar waves in the 1.5 GHz band that do not propagate in water.
10. Existing system
The above mentioned characteristics of UWCNs have several security
implications.
High bit error rates cause packet errors. Consequently, critical security
packets can be lost. Wireless underwater channels can be
eavesdropped on. Attackers may intercept the information transmitted
and attempt to modify or drop packets.
Both intervehicle and sensor-AUV communications can be affected
by denial-of-service (DoS) attacks. Several attacks are
Jamming
Wormhole attack Acknowledgement spoofing
Sinkhole attack Selective forwardiing
Sybil attack
Hello flood attack
14. Proposed system
Secure time synchronization mechanism
Achieving precise time synchronization is especially difficult
in underwater environments due to the characteristics of
UWCNs. For this reason, the time synchronization
mechanisms proposed for ground-based sensor networks
cannot be applied, and new mechanisms have been proposed.
Secure Localization
Proposed terrestrial localization schemes based on received
signal strength (RSS) are not recommended in UWCNs, since
non-uniform acoustic signal propagation causes signifiant
variations in the RSS. Time of arrival (ToA) and time
difference of arrival (TDoA)
15. Proposed system(contd)
Secure routing
Routing is essential for packet delivery in UWCNs. Proposed
broadcast authentication methods would cause high communication
overhead and latency in UWCNs. Multipath routing would cause high
communication overhead as well.
16. Advantages
It avoids data spoofing.
It avoids privacy leakage.
Minimize communication and computational cost.
Maximizes the battery power by preserve the power of
Underwater sensors.
17. Drawbacks
Routing is specially challenging in UWCNs due to the large
propagation delays, low bandwidth, difficulty of battery refills of
underwater sensors, and dynamic topologies.
Schemes is challenging because they do not work well in mobile
environments.
22. CONCLUSION
Wireless technology will play a vital role in many
application areas that are not possible in the past. Wireless
Underwater communication would be one of them.
The main challenges related to secure time
synchronization, localization, and routing have been
surveyed.
Since the deployment of the proposed system is still in its
development stage, an account of actual implementation has
not been provided in this paper.