SlideShare una empresa de Scribd logo
1 de 27
SECURING UNDERWATER
WIRELESS
COMMUNICATION

NISHA MENON K
ROLL NO: 16
M-TECH
COMMUNICATION ENGINEERING
1

11/15/2013
OUTLINE
• Introduction
• Underwater Wireless Communication Network
• Attacks and counter measures
• Security requirements
• Proposed security mechanisms
• Conclusion
• Reference

2

11/15/2013
Introduction
(UWCNs) are constituted by sensors , sink and autonomous
underwater vehicles (AUVs) that interact to perform specific
applications such as underwater monitoring.

3

11/15/2013
Sensor nodes

also known as motes or simply
nodes are small and energy constrained devices that
have the ability of sensing the surrounding
environment.

Sink also known as base station, is a more powerful
node that behaves as an interface between the sensor
nodes and the clients.

Autonomous Underwater Vehicles
(AUVs) that interact to perform specific applications
such as underwater monitoring

4

11/15/2013
Underwater Wireless
Communication System
 Radio waves do not propagate well underwater due to the high
energy absorption of water

 Therefore, underwater communications are based on acoustic

links characterized by large propagation delays. The propagation
speed of acoustic signals in water (typically 1500 m/s)

 Acoustic channels have low bandwidth . As a result, the bit error

rates of acoustic links are often high, and losses of connectivity arise

 It cannot rely on the Global Positioning System (GPS) because it uses
radar waves in the 1.5 GHz band that do not propagate in water.
5

11/15/2013
Underwater Wireless
Communication System
 Underwater wireless communication networks are particularly

vulnerable to malicious attacks due to the high bit error rates, large
and variable propagation delays, and low bandwidth of acoustic
channels.

 Several methods

are proposed to secure Underwater Wireless
Communication Networks. Three schemes namely, secure time
synchronization, localization, and routing in UWCNs

6

11/15/2013
Wormhole
attack
Sinkhole
Attack

Jamming

Attacks
Hello Flood
attack

Sybil attack

Acknowled
gement
spoofing

Selective
Forwarding
7

11/15/2013
Jamming
Method of Attack
• The transmission of data packets continuously
so that the wireless channel is completely
blocked.

Countermeasures
• Spread spectrum techniques
• Sensors can switch to sleep mode
8

11/15/2013
Wormhole Attack
Method of attack
• False neighborhood relationships are
created
• The adversary can delay or drop
packets sent through the wormhole.

Countermeasures
• Dis-VoW
• Estimating the direction of arrival
9

11/15/2013
Selective Forwarding
Method of Attack
• Malicious nodes drop certain messages instead
of forwarding them to hinder routing.

Countermeasures
• Multipath routing
• Authentication
10

11/15/2013
Sinkhole Attack
Method of Attack
• A malicious node attempts to attract traffic from
a particular area towards it by announcing that
it is a high quality route.

Countermeasures
• Geographical routing
• Authentication of nodes exchanging routing
11
information.

11/15/2013
Helloflood Attack
Method of Attack
• A node receiving a HELLO packet from a malicious
node may interpret that the adversary is a neighbor.

Countermeasures
• Bidirectional link verification
• Authentication is a possible defense
12

11/15/2013
Acknowledgement
Spoofing
Method of Attack
• A malicious node overhearing packets sent to
neighbor nodes use the information to spoof
acknowledgements.

Countermeasures
• Encryption of all packets sent through the
13
network

11/15/2013
Sybil Attack
Method of attack
• Sybil attack is defined as a malicious
node illegitimately taking on multiple
identities
• Attacker with multiple identities
pretend to be in many places at once.

Countermeasures
• Authentication
• Position verification
14

11/15/2013
Security Requirements
Authentication
Proof that data was sent by a legitimate user

Confidentiality
Information is not accessible to unauthorized parties

Integrity
Information is not altered

Availability
Data should be available when needed by an authorized user
15

11/15/2013
Proposed Security
Mechanism
Secure under
water
communication
Secure time
synchronization

Secure
localization

16

Secure routing

11/15/2013
Secure time
Synchronization
Why is Time Synchronization Important?

 Location and proximity of siblings
 Intranetwork coordination
 Maintain ordering of messages
 Use of TDMA
 Energy efficiency

17

11/15/2013
Secure time
Synchronization
Multilateration algorithm

Phase 1

Phase 2

• Assume that a set of anchor nodes on ocean surface already know
their location and time without error
• A group of nearby sensors receives synchronization packets from at
least 5 anchor nodes

• The sensors learn their time difference between themselves and
anchor nodes by comparing the synchronization packets
• These nodes subsequently becomes the next anchor nodes.

18

11/15/2013
Secure Localization
Why is Localization important?
 Vulnerability of WSN

What an attacker can potentially do?
GOAL: Make the node think it is
somewhere different from actual
location

Wormhole attack
Jamming

As a result…
Wrong results: wrong decisions
19

11/15/2013
Secure Localization
 Goal: To guarantee correctness despite of the presence of
intruders

 Localization is the process for each sensor node to locate its
positions in the network.

 Localization algorithms developed for terrestrial sensor networks

are either based on the signal strength or the time-of-arrival (TOA)

20

11/15/2013
Secure Localization
• Range-based
– Use exact measurements (point-to-point distance
estimate (range) or angle estimates)
– More expensive
– Scalable Localization with Mobility Prediction (SLMP)
• Range-free
– Cost-effective alternative to range-based solutions

21

11/15/2013
Secure Routing
 Routing is specially challenging in UWCNs due to
the large propagation delays, low
bandwidth, difficulty of battery refills of
underwater sensors, and dynamic topologies.

 A secure routing rejects routing paths containing
malicious nodes.

22

11/15/2013
Secure Routing
 Proactive protocols ( DSDV)
 Reactive protocols (AODV)
 Focused Beam Routing Protocol

23

11/15/2013
Advantages
 It avoids data spoofing.

 It avoids privacy leakage.
 Minimize communication and computational cost.
 Maximizes the battery power by preserving the power of
Underwater sensors

24

11/15/2013
Conclusion
 Wireless technology plays a vital role in many application areas that

were not possible in the past. Wireless Underwater communication is
one of them.

 The main attacks related to UWCN have been surveyed.

 A system with secure time synchronization, secure localization and
secure routing can overcome these attacks.

 Since the deployment of the proposed system is still in its development

stage, an account of actual implementation has not been provided here.

25

11/15/2013
REFERNCES
[1] “Underwater Acoustic Sensor Networks: Research Challenges,” Ad HocNet., vol. 3, no.
3, I. F. Akyildiz, D. Pompili, and T. Melodia, Mar. 2005.
[2] “Visualization of Wormholes in Underwater Sensor Networks: A Distributed
Approach,” Int’l. J. Security Net., vol. 3, no. 1, W. Wang et al., 2008, pp. 10–23.
[3] “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.” chapter in
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, A. D. Wood
and J. A. Stankovic, M. Ilyas and I. Mahgoub, Eds., CRC Press, 2004.
[4] Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish
Behavior in the Age of Ubiquitous Computing, Cambridge Univ. Press, L. Buttyán and J.-P.
Hubaux, 2008.

[5] “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic
Networks,” R. Zhang and Y. Zhang, Proc. IEEE INFOCOM, 2010.
26

11/15/2013
THANK YOU

27

11/15/2013

Más contenido relacionado

La actualidad más candente

Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communicationAbhirami P S
 
Underwater wireless communication
Underwater wireless communication Underwater wireless communication
Underwater wireless communication AndeAkash
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)tanveer alam
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkSrija Kumar
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Mustafa Khaleel
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
8. introduction to small scale fading
8. introduction to small scale fading8. introduction to small scale fading
8. introduction to small scale fadingJAIGANESH SEKAR
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Body based sensor network and its applications
Body based sensor network and its applicationsBody based sensor network and its applications
Body based sensor network and its applicationsShashank Gupta
 
Optical wireless communication
Optical wireless communicationOptical wireless communication
Optical wireless communicationVishak V Thampy
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 

La actualidad más candente (20)

Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communication
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Underwater wireless communication
Underwater wireless communication Underwater wireless communication
Underwater wireless communication
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
8. introduction to small scale fading
8. introduction to small scale fading8. introduction to small scale fading
8. introduction to small scale fading
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Lecture 3 4. prnet
Lecture 3 4. prnetLecture 3 4. prnet
Lecture 3 4. prnet
 
Body based sensor network and its applications
Body based sensor network and its applicationsBody based sensor network and its applications
Body based sensor network and its applications
 
Optical wireless communication
Optical wireless communicationOptical wireless communication
Optical wireless communication
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Manet
ManetManet
Manet
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
UNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASEDUNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASED
 

Destacado

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt asharanick
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wirelesspatna
 
Laser Communications
Laser CommunicationsLaser Communications
Laser CommunicationsSeminar Links
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communicationchiranjitgiri
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channelsShudhanshu Singh
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technologySushil Sudake
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17Darshil Shah
 
Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010le luan
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theaterPeter Gordon
 
Active controls for Flight and Simulation
Active controls for Flight and SimulationActive controls for Flight and Simulation
Active controls for Flight and SimulationStirling Dynamics
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filtereSAT Journals
 

Destacado (20)

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
LASER Communication
LASER CommunicationLASER Communication
LASER Communication
 
Laser Communication
Laser CommunicationLaser Communication
Laser Communication
 
Laser Communications
Laser CommunicationsLaser Communications
Laser Communications
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technology
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Red tacton
Red tactonRed tacton
Red tacton
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17
 
Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theater
 
Active controls for Flight and Simulation
Active controls for Flight and SimulationActive controls for Flight and Simulation
Active controls for Flight and Simulation
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filter
 

Similar a Securing Underwater Wireless Communication Networks

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksDipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkkDipaloke Arunodoy
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunicationDevyani Vaidya
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)IJRAT
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148IJRAT
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...IAEME Publication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 

Similar a Securing Underwater Wireless Communication Networks (20)

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
D0961927
D0961927D0961927
D0961927
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 

Más de Nisha Menon K

High capacity optical
High capacity opticalHigh capacity optical
High capacity opticalNisha Menon K
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon kNisha Menon K
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kNisha Menon K
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless TechnologyNisha Menon K
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNisha Menon K
 

Más de Nisha Menon K (11)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
Digital signature
Digital signatureDigital signature
Digital signature
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

Último

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Último (20)

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

Securing Underwater Wireless Communication Networks

  • 1. SECURING UNDERWATER WIRELESS COMMUNICATION NISHA MENON K ROLL NO: 16 M-TECH COMMUNICATION ENGINEERING 1 11/15/2013
  • 2. OUTLINE • Introduction • Underwater Wireless Communication Network • Attacks and counter measures • Security requirements • Proposed security mechanisms • Conclusion • Reference 2 11/15/2013
  • 3. Introduction (UWCNs) are constituted by sensors , sink and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring. 3 11/15/2013
  • 4. Sensor nodes also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment. Sink also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients. Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring 4 11/15/2013
  • 5. Underwater Wireless Communication System  Radio waves do not propagate well underwater due to the high energy absorption of water  Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s)  Acoustic channels have low bandwidth . As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise  It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water. 5 11/15/2013
  • 6. Underwater Wireless Communication System  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels.  Several methods are proposed to secure Underwater Wireless Communication Networks. Three schemes namely, secure time synchronization, localization, and routing in UWCNs 6 11/15/2013
  • 8. Jamming Method of Attack • The transmission of data packets continuously so that the wireless channel is completely blocked. Countermeasures • Spread spectrum techniques • Sensors can switch to sleep mode 8 11/15/2013
  • 9. Wormhole Attack Method of attack • False neighborhood relationships are created • The adversary can delay or drop packets sent through the wormhole. Countermeasures • Dis-VoW • Estimating the direction of arrival 9 11/15/2013
  • 10. Selective Forwarding Method of Attack • Malicious nodes drop certain messages instead of forwarding them to hinder routing. Countermeasures • Multipath routing • Authentication 10 11/15/2013
  • 11. Sinkhole Attack Method of Attack • A malicious node attempts to attract traffic from a particular area towards it by announcing that it is a high quality route. Countermeasures • Geographical routing • Authentication of nodes exchanging routing 11 information. 11/15/2013
  • 12. Helloflood Attack Method of Attack • A node receiving a HELLO packet from a malicious node may interpret that the adversary is a neighbor. Countermeasures • Bidirectional link verification • Authentication is a possible defense 12 11/15/2013
  • 13. Acknowledgement Spoofing Method of Attack • A malicious node overhearing packets sent to neighbor nodes use the information to spoof acknowledgements. Countermeasures • Encryption of all packets sent through the 13 network 11/15/2013
  • 14. Sybil Attack Method of attack • Sybil attack is defined as a malicious node illegitimately taking on multiple identities • Attacker with multiple identities pretend to be in many places at once. Countermeasures • Authentication • Position verification 14 11/15/2013
  • 15. Security Requirements Authentication Proof that data was sent by a legitimate user Confidentiality Information is not accessible to unauthorized parties Integrity Information is not altered Availability Data should be available when needed by an authorized user 15 11/15/2013
  • 16. Proposed Security Mechanism Secure under water communication Secure time synchronization Secure localization 16 Secure routing 11/15/2013
  • 17. Secure time Synchronization Why is Time Synchronization Important?  Location and proximity of siblings  Intranetwork coordination  Maintain ordering of messages  Use of TDMA  Energy efficiency 17 11/15/2013
  • 18. Secure time Synchronization Multilateration algorithm Phase 1 Phase 2 • Assume that a set of anchor nodes on ocean surface already know their location and time without error • A group of nearby sensors receives synchronization packets from at least 5 anchor nodes • The sensors learn their time difference between themselves and anchor nodes by comparing the synchronization packets • These nodes subsequently becomes the next anchor nodes. 18 11/15/2013
  • 19. Secure Localization Why is Localization important?  Vulnerability of WSN What an attacker can potentially do? GOAL: Make the node think it is somewhere different from actual location Wormhole attack Jamming As a result… Wrong results: wrong decisions 19 11/15/2013
  • 20. Secure Localization  Goal: To guarantee correctness despite of the presence of intruders  Localization is the process for each sensor node to locate its positions in the network.  Localization algorithms developed for terrestrial sensor networks are either based on the signal strength or the time-of-arrival (TOA) 20 11/15/2013
  • 21. Secure Localization • Range-based – Use exact measurements (point-to-point distance estimate (range) or angle estimates) – More expensive – Scalable Localization with Mobility Prediction (SLMP) • Range-free – Cost-effective alternative to range-based solutions 21 11/15/2013
  • 22. Secure Routing  Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies.  A secure routing rejects routing paths containing malicious nodes. 22 11/15/2013
  • 23. Secure Routing  Proactive protocols ( DSDV)  Reactive protocols (AODV)  Focused Beam Routing Protocol 23 11/15/2013
  • 24. Advantages  It avoids data spoofing.  It avoids privacy leakage.  Minimize communication and computational cost.  Maximizes the battery power by preserving the power of Underwater sensors 24 11/15/2013
  • 25. Conclusion  Wireless technology plays a vital role in many application areas that were not possible in the past. Wireless Underwater communication is one of them.  The main attacks related to UWCN have been surveyed.  A system with secure time synchronization, secure localization and secure routing can overcome these attacks.  Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided here. 25 11/15/2013
  • 26. REFERNCES [1] “Underwater Acoustic Sensor Networks: Research Challenges,” Ad HocNet., vol. 3, no. 3, I. F. Akyildiz, D. Pompili, and T. Melodia, Mar. 2005. [2] “Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3, no. 1, W. Wang et al., 2008, pp. 10–23. [3] “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.” chapter in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, A. D. Wood and J. A. Stankovic, M. Ilyas and I. Mahgoub, Eds., CRC Press, 2004. [4] Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge Univ. Press, L. Buttyán and J.-P. Hubaux, 2008. [5] “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks,” R. Zhang and Y. Zhang, Proc. IEEE INFOCOM, 2010. 26 11/15/2013