SlideShare una empresa de Scribd logo
1 de 23
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
          Jnana Sangama, Belgaum, Karnataka-590 014.




                         A Seminar On
“Securing Underwater Wireless Communication Networks”

 By                                     Project Guide
 NAVEENA N (1BT08CS051)                 Mr. KESHAVA M
                                        (Lecturer of CSE department)



           B.T.L INSTITUTE OF TECHNOLOGY
         Department of Computer Science & Engineering
                          2010-11
AGENDA

oAbstract

oUnderwater Wireless Communication Networks

oExisting system

oProposed System

oDrawbacks

oApplications

oConclusion
ABSTRACT
 Underwater      wireless    communication
  networks are particularly vulnerable to
  malicious attacks due to the high bit error
  rates, large and variable propagation
  delays, and low bandwidth of acoustic
  channels.



 (UWCNs) are constituted by sensors and
  autonomous underwater vehicles (AUVs) that
  interact to perform specific applications such
  as underwater monitoring.
ABSTRACT
 Both      intervehicle and     sensor-AUV
  communications can be affected by denial-of-
  service (DoS) attacks.

 We propose several methods to secure
  Underwater  Wireless   Communication
  Networks.

 We design three schemes namely, secure time
  synchronization, localization, and routing in
  UWCNs
ABSTRACT
 Aim of proposed techniques is to enable the
  system to provide secure data transmission.

 Secure time synchronization aims for
  power saving.

 Secure localization aims to provide location
  information and data tagging.

 Secure routing rejects routing paths
  containing malicious nodes.
These techniques are based on following
                     mechanisms
 Secure Time Synchronization
     It is essential in many underwater applications such as
     coordinated sensing tasks. & scheduling algorithms such as
     timedivision multiple access (TDMA).
 SECURE LOCALIZATION
      Localization is a very important issue for data tagging.
      Localization schemes can be classified into two types:
     (i) Range-based schemes (using range or bearing
     information):
     (ii) Range-free schemes (not using range or bearing
     information):
 SECURE ROUTING
     Routing is essential for packet delivery in UWCNs.
Underwater Wireless Communication Networks
Underwater Wireless Communication Networks are constituted by
 sensor nodes, also known as motes or simply nodes are
  small and energy constrained devices that have the
  ability of sensing the surrounding environment.

 The sink, also known as base station, is a more powerful
  node that behaves as an interface between the sensor
  nodes and the clients.

 Autonomous Underwater Vehicles (AUVs) that
  interact to perform specific applications such as
  underwater monitoring
Underwater sensor network with AUV’s
Existing system

 Radio waves do not propagate well underwater due to the high energy
  absorption of water

 Therefore, underwater communications are based on acoustic links
  characterized by large propagation delays. The propagation speed of
  acoustic signals in water (typically 1500 m/s)

 Acoustic channels have low bandwidth As a result, the bit error rates
  of acoustic links are often high, and losses of connectivity arise

 It cannot rely on the Global Positioning System (GPS) because it uses
  radar waves in the 1.5 GHz band that do not propagate in water.
Existing system
 The above mentioned characteristics of UWCNs have several security
  implications.
 High bit error rates cause packet errors. Consequently, critical security
  packets can be lost. Wireless underwater channels can be
  eavesdropped on. Attackers may intercept the information transmitted
  and attempt to modify or drop packets.
 Both intervehicle and sensor-AUV communications can be affected
  by denial-of-service (DoS) attacks. Several attacks are
 Jamming
 Wormhole attack              Acknowledgement spoofing
 Sinkhole attack              Selective forwardiing
                               Sybil attack
 Hello flood attack
Attacks on UWCN’s




  Jamming attack
Attacks on UWCN’s




  Wormhole attack
Attacks on UWCN’s




   Sybil attack
Proposed system
 Secure time synchronization mechanism
Achieving precise time synchronization is especially difficult
in underwater environments due to the characteristics of
UWCNs. For this reason, the time synchronization
mechanisms proposed for ground-based sensor networks
cannot be applied, and new mechanisms have been proposed.
 Secure Localization
Proposed terrestrial localization schemes based on received
signal strength (RSS) are not recommended in UWCNs, since
non-uniform acoustic signal propagation causes signifiant
variations in the RSS. Time of arrival (ToA) and time
difference of arrival (TDoA)
Proposed system(contd)

 Secure routing
 Routing is essential for packet delivery in UWCNs. Proposed
  broadcast authentication methods would cause high communication
  overhead and latency in UWCNs. Multipath routing would cause high
  communication overhead as well.
Advantages

 It avoids data spoofing.

 It avoids privacy leakage.

 Minimize communication and computational cost.

 Maximizes the battery power by preserve the power of
  Underwater sensors.
Drawbacks


 Routing is specially challenging in UWCNs due to the large
  propagation delays, low bandwidth, difficulty of battery refills of
  underwater sensors, and dynamic topologies.



 Schemes is challenging because they do not work well in mobile
  environments.
APPLICATIONS




 Environmental monitoring to gathering of oceanographic
  data
APPLICATIONS




 Search and rescue missions
APPLICATIONS




Marine archaeology
APPLICATIONS




    Defense
CONCLUSION

    Wireless technology will play a vital role in many
    application areas that are not possible in the past. Wireless
    Underwater communication would be one of them.

 The main challenges related to secure time
  synchronization, localization, and routing have been
  surveyed.

 Since the deployment of the proposed system is still in its
  development stage, an account of actual implementation has
  not been provided in this paper.
Thank you…!!!

Más contenido relacionado

La actualidad más candente

Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
Srija Kumar
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
AneeshGKumar
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
jaisica
 

La actualidad más candente (20)

Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,
 
Underwater wireless communication
Underwater wireless communication Underwater wireless communication
Underwater wireless communication
 
Underwater acoustic 1
Underwater acoustic 1Underwater acoustic 1
Underwater acoustic 1
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
Implementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelImplementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channel
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
UNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASEDUNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASED
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 

Destacado

Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
asharanick
 
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
Kevin Ma
 
"Click here" to build your UAV
"Click here" to build your UAV"Click here" to build your UAV
"Click here" to build your UAV
Dirk Gorissen
 
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
Michele Cocco
 
Stormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone TrialStormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone Trial
Pramod Janardhanan
 

Destacado (13)

Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)
 
Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)
 
The Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesThe Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface Vehicles
 
Underwater Welding
Underwater WeldingUnderwater Welding
Underwater Welding
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
 
Advantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsAdvantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVs
 
"Click here" to build your UAV
"Click here" to build your UAV"Click here" to build your UAV
"Click here" to build your UAV
 
Merging Technology Ui2009
Merging Technology Ui2009Merging Technology Ui2009
Merging Technology Ui2009
 
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
 
Stormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone TrialStormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone Trial
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defense
 

Similar a “Securing underwater wireless communication networks” 2

Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
IJRAT
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
IJRAT
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
IJRAT
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
Iaetsd Iaetsd
 

Similar a “Securing underwater wireless communication networks” 2 (20)

Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a survey
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Fs2410401044
Fs2410401044Fs2410401044
Fs2410401044
 
50120140502016
5012014050201650120140502016
50120140502016
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...
 
Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture
 
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
 

Más de Naveena N (7)

Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
 
A review of cloud computing for transportation system
A review of cloud computing for transportation systemA review of cloud computing for transportation system
A review of cloud computing for transportation system
 
Multithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processorMultithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processor
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networks
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

“Securing underwater wireless communication networks” 2

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014. A Seminar On “Securing Underwater Wireless Communication Networks” By Project Guide NAVEENA N (1BT08CS051) Mr. KESHAVA M (Lecturer of CSE department) B.T.L INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering 2010-11
  • 2. AGENDA oAbstract oUnderwater Wireless Communication Networks oExisting system oProposed System oDrawbacks oApplications oConclusion
  • 3. ABSTRACT  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels.  (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring.
  • 4. ABSTRACT  Both intervehicle and sensor-AUV communications can be affected by denial-of- service (DoS) attacks.  We propose several methods to secure Underwater Wireless Communication Networks.  We design three schemes namely, secure time synchronization, localization, and routing in UWCNs
  • 5. ABSTRACT  Aim of proposed techniques is to enable the system to provide secure data transmission.  Secure time synchronization aims for power saving.  Secure localization aims to provide location information and data tagging.  Secure routing rejects routing paths containing malicious nodes.
  • 6. These techniques are based on following mechanisms  Secure Time Synchronization It is essential in many underwater applications such as coordinated sensing tasks. & scheduling algorithms such as timedivision multiple access (TDMA).  SECURE LOCALIZATION Localization is a very important issue for data tagging. Localization schemes can be classified into two types: (i) Range-based schemes (using range or bearing information): (ii) Range-free schemes (not using range or bearing information):  SECURE ROUTING Routing is essential for packet delivery in UWCNs.
  • 7. Underwater Wireless Communication Networks Underwater Wireless Communication Networks are constituted by  sensor nodes, also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment.  The sink, also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients.  Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring
  • 9. Existing system  Radio waves do not propagate well underwater due to the high energy absorption of water  Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s)  Acoustic channels have low bandwidth As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise  It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water.
  • 10. Existing system  The above mentioned characteristics of UWCNs have several security implications.  High bit error rates cause packet errors. Consequently, critical security packets can be lost. Wireless underwater channels can be eavesdropped on. Attackers may intercept the information transmitted and attempt to modify or drop packets.  Both intervehicle and sensor-AUV communications can be affected by denial-of-service (DoS) attacks. Several attacks are  Jamming  Wormhole attack  Acknowledgement spoofing  Sinkhole attack  Selective forwardiing  Sybil attack  Hello flood attack
  • 11. Attacks on UWCN’s  Jamming attack
  • 12. Attacks on UWCN’s Wormhole attack
  • 13. Attacks on UWCN’s Sybil attack
  • 14. Proposed system  Secure time synchronization mechanism Achieving precise time synchronization is especially difficult in underwater environments due to the characteristics of UWCNs. For this reason, the time synchronization mechanisms proposed for ground-based sensor networks cannot be applied, and new mechanisms have been proposed.  Secure Localization Proposed terrestrial localization schemes based on received signal strength (RSS) are not recommended in UWCNs, since non-uniform acoustic signal propagation causes signifiant variations in the RSS. Time of arrival (ToA) and time difference of arrival (TDoA)
  • 15. Proposed system(contd)  Secure routing  Routing is essential for packet delivery in UWCNs. Proposed broadcast authentication methods would cause high communication overhead and latency in UWCNs. Multipath routing would cause high communication overhead as well.
  • 16. Advantages  It avoids data spoofing.  It avoids privacy leakage.  Minimize communication and computational cost.  Maximizes the battery power by preserve the power of Underwater sensors.
  • 17. Drawbacks  Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies.  Schemes is challenging because they do not work well in mobile environments.
  • 18. APPLICATIONS  Environmental monitoring to gathering of oceanographic data
  • 19. APPLICATIONS  Search and rescue missions
  • 21. APPLICATIONS  Defense
  • 22. CONCLUSION  Wireless technology will play a vital role in many application areas that are not possible in the past. Wireless Underwater communication would be one of them.  The main challenges related to secure time synchronization, localization, and routing have been surveyed.  Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided in this paper.