SlideShare a Scribd company logo
1 of 5
Download to read offline
Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 2, Issue 4, July-August 2012, pp.967-971
        Analysis of Malicious Data in Underwater Sensor Network
                              Heena Ahuja*, Er. Jyoti Gupta**
                      *(Student, Department of ECE, MMU Mulllana, Ambala, India)
                 ** (Assistant Professor, Department of ECE,MMU Mullana, Ambala, India)


ABSTRACT
         In this paper, we tackle the malicious                 Battery power is limited and usually
 attacks in Underwater Sensor Networks                           batteries cannot be recharged, also
 (UWSNs). Underwater Sensor Networks                             because solar energy cannot be exploited.
 (UWSNs) consists of variable number of sensors                 Underwater sensors are prone to failures
 and vehicles that are deployed to perform                       because of fouling and corrosion.
 collaborative monitoring tasks over a given
 area. In this paper, we use a novel routing            Currently, many routing protocols are available for
 protocol, called vector-based forwarding (VBF)         terrestrial wireless sensor networks. However,
 protocol, to provide robust, scalable and energy       specific properties of underwater medium make
 efficient routing to deploy an Underwater              existing routing protocols inappropriate for under
 Sensor Network. VBF is essentially a position-         water. The main challenges in developing efficient
 based routing approach: nodes close to the             routing protocols for underwater environments are:
 “vector" from the source to the destination will
 forward the message. Then we introduce the                     High propagation delays: The radio
 malicious node in the network that hack the                     signals do not work efficiently under
 data of nodes when nodes undergoes Denial of                    water and this problem encourages use of
 Service attack (DoS). Thus in this paper we                     acoustic communication instead. The main
 have compared the various parameters like                       problems with the acoustic channel,
 Throughput, PDR, PLR and Checksum Errors                        however, are low bandwidths and long
 for before and after attack and results are                     propagation delays.
 shown in this paper.                                           Node mobility: Due to water currents,
                                                                 nodes can fluctuate or move if they are not
Keywords - checksum error, denial of service,                    anchored at the bottom of the sea. This
nodes, PDR, PLR.                                                 situation results in a dynamic network
                                                                 topology.        Moreover,     autonomous
1. INTRODUCTION                                                  underwater vehicles and robots used for
                                                                 exploration and controls can be utilised to
1.1 Definition of Underwater Sensor Network                      route and mulling data.
         Underwater Sensor Networks (UWSN)                      Error prone acoustic underwater channels:
consists of a variable number of sensors and                     Since the acoustic channels have very low
vehicles that are deployed to perform collaborative              bandwidth capacity, they suffer from high
monitoring tasks over a given area. To achieve this              bit error rates.
objective, sensors and vehicles self-organize in an             Limited energy: Like in terrestrial wireless
autonomous network which can adapt to the                        sensor networks, majority of sensor nodes
characteristics of the ocean environment.                        in UWSNs are battery powered.
Major challenges in the design of underwater
Sensor Networks are [1]:                                1.2 Vector Based Forwarding Protocol (VBF)
                                                                  In sensor networks, energy constraint is a
        The available bandwidth is severely            crucial factor since sensor nodes usually run on
         limited.                                       battery, and it is impossible or difficult to recharge
        The underwater channel is severely             them in most application scenarios. In underwater
         impaired, especially due to multi-path and     sensor networks, in addition to energy saving, the
         fading.                                        routing algorithms should be able to handle node
        Propagation delay in underwater is five        mobility in an efficient way [2].
         orders of magnitude higher than in radio
         frequency (RF) terrestrial channels, and                Vector-Based Forwarding (VBF) protocol
         extremely variable.                            meets these requirements successfully. We assume
        High bit error rates and temporary losses      that each node in VBF knows its position
         of connectivity (shadow zones) can be          information, which is provided by some location
         experienced, due to the extreme                algorithms. If there is no such localization service
         characteristics of the underwater channel.     available, a sensor node can still estimate its



                                                                                              967 | P a g e
Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 2, Issue 4, July-August 2012, pp.967-971
relative position to the forwarding node by               secrets, financial or healthcare records or any other
measuring its distance to the forwarder and the           kind of sensitive information. Attacks on the
angle of arrival (AOA) and strength of the signal         confidentiality of wireless transmissions are created
by being armed with some hardware device.                 by the simple act of analyzing a signal travelling
                                                          through the air.

                                                                    Availability: Availability is allowing
                                                          legitimate users access to confidential information
                                                          after they have been properly authenticated. When
                                                          availability is compromised, the access is denied
                                                          for legitimate users because of malicious activity
                                                          such as denial of service (DOS) attacks. Receiving
                                                          RF Signal is not always possible, especially if
                                                          someone does not want you to. Using a signal
                                                          jammer to jam an RF signal is a huge problem that
Fig.1: A high level view of VBF for UWSNs.                has been faced by national governments for years.
          The position information can be calculated               Integrity:    Integrity    involves      the
by measuring the AOA and strength of the signal.          unauthorized modification of information. This
In VBF, each packet carries the positions of the          could mean modifying information while in transit
sender, the target, and the forwarder (i.e., the node     or while being stored electronically or via some
which transmits this packet). The forwarding path         type of media. To protect the integrity of
is specified by the routing vector from the sender to     information, one must employ a validation
the target. Upon receiving a packet, a node               technique. This technique can be in the form of
computes its relative position to the forwarder.          checksum, an integrity check, or a digital signature.
Recursively, all the nodes receiving the packet           Wireless networks are intended to function in an
compute their positions. If a node determines that it     unimpaired manner, free from deliberate or
is sufficiently close to the routing vector (e.g., less   inadvertent manipulation of the system.
than a predefined distance threshold), it puts its
own computed position in the packet and continues         1.4 Various attacks in UWSNs
forwarding the packet; otherwise, it simply discards
the packet. In this way, all the packet forwarders in              Denial of Service (DoS): A Denial of
the sensor network form a “routing pipe”: the             Service attack in sensor networks and networks in
sensor nodes in this pipe are eligible for packet         general is defined as any event that eliminates the
forwarding, and those which are not close to the          network’s capacity to perform its desired function.
routing vector (i.e., the axis of the pipe) do not        DoS attacks in wireless sensor networks may be
forward. Fig. 1 illustrates the basic idea of VBF. In     carried out at different layers like the physical, link,
the above figure, node S1 is the source, and node S0      routing and transport layers. [4], [5].This occurs by
is the sink. The routing vector is specified by S1S0.     the unintentional failure of sensor nodes. The
Data packets are forwarded from S 1 to S0.                simplest DoS attack tries to exhaust the resources
Forwarders along the routing vector form a routing        available to the victim node, by transmitting
pipe with a pre controlled radius (i.e., the distance     additional unwanted packets and thus prevents
threshold, denoted by W).As we can see, like all          legitimate sensor network users from tapping work
other source routing protocols, VBF requires no           or resources to which these nodes are deployed [6].
state information at each node. Therefore, it is          Denial of Service (DoS) attack is means that not
scalable to the size of the network. Moreover, in         only for the adversary’s attempt to subvert, disrupt,
VBF, only the nodes along the forwarding path             or destroy a sensor network, but also for any event
(specified by the routing vector) are involved in         that diminishes a sensor network’s capability to
packet routing, thus saving Security Issues and           provide a service [7].In WSNs, several types of
Solutions in UWSNs.                                       Denial of Service attacks in different layers might
                                                          be performed. i.e. at physical layer, the Denial of
1.3 Various security parameters in UWSNs                  Service attacks could be jamming and tampering, at
Various security parameters are [3]:                      link layer, collision, exhaustion, unfairness, at
         Confidentiality: An attack on the                network layer, neglect and greed, homing,
confidentiality of information means theft or             misdirection, black holes and at transport layer this
unauthorized access of data. This can be performed        attack could be performed by malicious flooding
in lots of ways, such as the interception of data         and resynchronizations.
while in transit or it can be simply the theft of
equipment on which the data might reside. The                     Wormhole attacks: A devastating attack
goal of compromising confidentiality is to obtain         is known as the wormhole attack, where more than
proprietary information, user credentials, trade          two malicious colluding sensor nodes does a


                                                                                                  968 | P a g e
Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
                 Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.967-971
virtual tunnel in the wireless sensor network, which     The accuracy of IDS is measured in terms of false
is used to forward message packets between the           positives i.e. the normal activities which have been
tunnel edge points. This tunnel establishes shorter      reported as malicious and false negatives i.e. an
links in the network. In which adversary documents       attack which has not been detected by the IDS.
forwards packets at one location in the sensor
network, tunnels them to different location, and re-     2. PROBLEM DEFINITION
forwards them into the sensor network. In sensor                  The following two problems we have
network when sender node sends a message to              proposed here deal that can be linked together with
another receiver node in the network [1].Then the        them to give out the desired results:
receiving node tries to send the message to its          1) Underwater sensor networks should be secure
neighboring nodes. The neighbor sensor nodes             and reliable in such a manner that they do not
assume that the message was sent by the sender           defeat the purpose of data acquisition.
node (this is normally out of range), so they tries to
forward the message to the originating node, but         2) Underwater sensor networks are prone to
this message never comes because it is too far           malicious data attacks as they are based on sensing
away. Wormhole attack is a great threat to sensor        data which is RF based since they can be contacted/
networks since, this type of attack will not require     communicated from any other signal in device
compromising a wireless sensor in the network            which may be malicious in intent.
instead; it could be performed even at the starting
phase during the sensors initializes to identify its     3. RESEARCH METHODOLOGY
neighboring information [7]. This Wormhole                        This paper is based on the following
attacks are very difficult to stop since routing         research methodology. There are four main steps in
information given by a sensor node is very difficult     UWSN’s Threat Analysis:
to check. The wormhole attack is possible even           1) Study of UWSN
when the attacker has not compromised with any
hosts nodes and even if all communication provides       2) Deploy a UWSN using VBF Protocol
confidentiality and are authenticated also.
                                                         3) Data transmission and correction
         Sinkhole attack: In this case a
                                                         4) Compare the results before and after attack
compromised sensor node tries to influence the
information to it from each and every neighboring                  Step One: In the first step study of
node. Thereby, sensor node eavesdrops on each and        Underwater Sensor Network is done. Various
every information is being communicated with its         properties of Underwater Network are studied over
neighboring sensor nodes.                                the Terrestrial Network. These properties are
                                                         Underwater Network is highly dynamic, prone to
1.5 Intrusion Detection System
                                                         errors, low bandwidth and high latency. Above all
         Information Systems and networks are            there are various properties of Underwater Network
vulnerable to electronic attacks. Underwater Sensor      like     Environmental      monitoring,      undersea
Networks are vulnerable to a large variety of            explorations, Distributed tactical surveillance,
attacks. To prevent a network, first and foremost        assisted navigation, Disaster prevention, Mine
important thing that is helpful is an Intrusion          reconnaissance. Under the study of UWSN it has
Detection System (IDS) which can be used for both        been studied that energy constraint is a crucial
wired as well as wireless networks. The challenges       factor since sensor nodes usually run on battery,
in designing an IDS for Underwater Sensor                and it is impossible or difficult to recharge them in
Network are much more than any other network             most application scenarios. In underwater sensor
due to the fact that it is dynamic in nature,            networks, in addition to energy saving, the routing
decentralized nature, and access to radio medium.        algorithms should be able to handle node mobility
Thus the intrusion detection system of Underwater        in an efficient way. Various threats of UWSNs
Sensor Network needs to be different from that of        have also been studied like Denial of Service,
the wired networks.                                      Wormhole attacks, Sinkhole attack, Sybil Attack,
                                                         Hello flood attack and the countermeasures against
          The main purpose of Intrusion detection        these attacks have also been studied. Various
system is not to prevent attacks but to alert network    protocols of UWSNs has also been studied.
administrator about the possible attacks so that they
can be detected in time and hence their effect can       Step Two: After the study of UWSN, a network is
be reduced. An IDS differentiates the aberrant           deployed using VBF protocols. There are many
activities from normal one and identifies the            other protocols of UWSNs and it has been studied
malicious activities from abnormal but non-
malicious activities.



                                                                                               969 | P a g e
Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
                 Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.967-971
in       the         previous        step         that   sending and receiving nodes exchange keys and
                                                         start sending data and receiving acknowledgement.
                                                         There is a malicious node in the network which
                                                         hacks the data and does not send any
                                                         acknowledgement to the sending node when Denial
                                                         of Service (DoS) occurs in certain nodes.

                                                                  Step Four: When the attack occurs in the
                                                         network, the various parameters like Packet
                                                         Delivery Ratio (PDR), Packet Lost Ratio (PLR),
                                                         Throughput and checksum errors have been
                                                         studied, compared and plotted for before and after
                                                         attack.

                                                         4. RESULTS AND DISCUSSION
                                                                   Fig. 3 shows the Throughput vs. Message
                                                         Arrival Rate for normal run or before attack and
                                                         after attack. Throughput is the no. of bits per slot. It
                                                         is shown in the following figure that no. of bits per
                                                         slot for normal run is more than no. of bits per slot
                                                         after the attack has been occurred.




                                                            Fig. 3: Throughput vs. Message Arrival Rate

                                                         Fig. 4 shows the Packet Delivery Ratio (PDR)
                                                         between two sensors. It is clear that packet delivery
                                                         ratio is more in normal run condition and when the
Fig. 2: Algorithm for the UWSN’s Threat Analysis         attack occurs the packet delivery ratio start
                                                         decreasing.
          VBF is the most robust, scalable and
energy efficient. In VBF, each packet carries the
positions of the sender, the target, and the
forwarder (i.e., the node which transmits this
packet). The forwarding path is specified by the
routing vector from the sender to the target. Upon
receiving a packet, a node computes its relative
position to the forwarder. Recursively, all the nodes
receiving the packet compute their positions. If a
node determines that it is sufficiently close to the                 Fig. 4: Packet Delivery Ratio
routing vector (e.g., less than a predefined distance
threshold), it puts its own computed position in the     Fig. 5 shows the Packet Loss Ratio between two
packet and continues forwarding the packet;              sensors. It is exactly opposite of Packet Delivery
otherwise, it simply discards the packet. In this        Ratio. It is show in the figure that there is loss in
way, all the packet forwarders in the sensor             packets when the attack occurs.
network form a “routing pipe”: the sensor nodes in
this pipe are eligible for packet forwarding, and
those which are not close to the routing vector (i.e.,
the axis of the pipe) do not forward.

        Step Three: After the deployment of
network, the network starts transmitting the data by
checking the minimum Angle of Arrival and
Desirable Factor. Then the network checks whether                      Fig. 5: Packet Loss Ratio
the channel is free or not. If the channel is free the



                                                                                                 970 | P a g e
Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 2, Issue 4, July-August 2012, pp.967-971
Fig. 6 shows the Check Sum Errors for normal run               Networks”, EURASIP Journal on Wireless
and after attack. It is clear from the following fig.          Communications and Networking Volume
that checksum errors are more in after attack                  2010, Article ID 195910, 13 pages.
condition.                                              [3]    J.-P. Hubaux,S. Cˇapkun, and J. Luo. The
                                                               Security and Privacy of Smart Vehicles.
                                                               IEEE Security & Privacy, pages 49–55,
                                                               2004.
                                                        [4]    A. D. Wood and J. A. Stankovic, “Denial
                                                               of service in sensor networks,” IEEE
                                                               Computer, vol. 35, no. 10, pp. 54–62,
                                                               October 2002.
             Fig. 6: Checksum Errors                    [5]    M. Lee, E. J. Kim, and C. W. Lee,
                                                               “Source identification scheme against DoS
6. CONCLUSION                                                  attacks in cluster interconnects,” in Proc.
          In this paper it has tried to explore the            International     Workshop on Network
possibility of threats of Underwater Sensor                    Design and Architecture, Montreal,
Network, as we progress we found the most                      Quebec, August 2004, pp. 354–362.
prominent attack which might occur in Underwater        [6]    A.D. Wood and J.A. Stankovic, (2002)
Sensor Network which might occur in Underwater                 “Denial of Service in Sensor Networks,”
Sensor Network might be related to resource                    Computer, vol. 35, no. 10, 2002, pp. 54–
constraints. These resource constraints are natural            62.
due to nature of Underwater Sensors which cannot        [7]    David R. Raymond and Scott F. Midkiff,
be supplied with recharging of power/energy.                   (2008) "Denial-of-Service in Wireless
Therefore when nodes communicate with each                     Sensor Networks: Attacks and Defenses,"
other even in an efficient routing protocol like               IEEE Pervasive Computing, vol. 7, no. 1,
VBF, there is a possibility that a node might                  2008, pp. 74-81.
behave maliciously or may indefinitely continue to      [8]    Adrian Perrig, John Stankovic,,” Security
communicate with each other and at the same time               in wireless sensor networks”. ACM
deny services to other nodes. In this simulation it            Communication, 47(6): 2004, pp. 53-57.
has been demonstrated the same scenario and             [9]    Zaw Tun and Aung Htein Maw,(2008),”
observed before and after attacks on the network.              Worm hole Attack Detection in Wireless
These before and after attack observation were                 Sensor networks”, proceedings of world
made by recording the trace of each event occur in             Academy of Science, Engineering and
simulation. By using this trace we identified few              Technology Volume 36, December 2008,
parameters based on which we could identify                    ISSN 2070-3740.
abnormal behavior in the network. These include         [10]   Denning D.(1987) “An              Intrusion-
Check Sum error, Packet Delivery Ratio, Packet                 Detection Model,” IEEE Transactions on
Lost Ratio and Throughput. It is apparent from the             Software Engineering, Vol.SE-13, No 2,
bar graph shown above that these values drastically            pp. 222-232.
change if an attack is accused which shows
abnormal behavior in the network.

7. FUTURE SCOPE
         The research for detection of such
scenarios which are related to the attack on services
are limited due to resource constraints or external
manipulations of the node which turns maliciously
in nature. For future scope it has been suggested
that more scenarios must be considered and some
Intrusion Detection System must be designed so
that we can have secure Underwater Sensor
Networks.

REFERENCES
  [1]    J. G. Proakis, E. M. Sozer, J. A. Rice, and
         M. Stojanovic, “Shallow water acoustic
         networks,”      IEEE     Communications
         Magazine, pp. 114–119, Nov. 2001.
  [2]    Peng Xie et.al,” Efficient Vector-Based
         Forwarding for         Underwater Sensor


                                                                                           971 | P a g e

More Related Content

What's hot

Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio RiyaSaini16
 
Handoff survey
Handoff surveyHandoff survey
Handoff surveyBasil John
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiwaker Pant
 
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
Alex Wyglinski  - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...Alex Wyglinski  - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...Keith Nolan
 
Cognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkCognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkSatyaki Mitra
 
Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless NetworkSunilPoddar7
 
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Ameer Sameer
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemesHira Shaukat
 
IEEE 802.22 WRAN Standard
IEEE 802.22 WRAN StandardIEEE 802.22 WRAN Standard
IEEE 802.22 WRAN Standardsonix022
 
Thesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksThesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksGunilla Burrowes
 

What's hot (18)

Cognitive radio (1)
Cognitive radio (1)Cognitive radio (1)
Cognitive radio (1)
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio
 
Handoff survey
Handoff surveyHandoff survey
Handoff survey
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
 
Hz2414081415
Hz2414081415Hz2414081415
Hz2414081415
 
Cognitiveradio
CognitiveradioCognitiveradio
Cognitiveradio
 
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
Alex Wyglinski  - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...Alex Wyglinski  - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Cognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkCognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-Network
 
Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
 
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemes
 
IEEE 802.22 WRAN Standard
IEEE 802.22 WRAN StandardIEEE 802.22 WRAN Standard
IEEE 802.22 WRAN Standard
 
Thesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksThesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor Networks
 

Viewers also liked

Plan de capacitación.35
Plan de capacitación.35Plan de capacitación.35
Plan de capacitación.35Robert Gallegos
 
Autorização da Abratel para Prestação de Stfc - 5° Operadora do Brasil
Autorização da Abratel para Prestação de Stfc - 5° Operadora do BrasilAutorização da Abratel para Prestação de Stfc - 5° Operadora do Brasil
Autorização da Abratel para Prestação de Stfc - 5° Operadora do Brasiltelefoniaoficial
 
Unha cualificación é o mesmo que un título
Unha cualificación é o mesmo que un títuloUnha cualificación é o mesmo que un título
Unha cualificación é o mesmo que un títulodeporti
 
Ejercicio práctico 02
Ejercicio práctico 02Ejercicio práctico 02
Ejercicio práctico 02Lauri28
 
Edital concurso
Edital concursoEdital concurso
Edital concursoculturaceu
 
Minitutorial Mapas En La Web
Minitutorial Mapas En La WebMinitutorial Mapas En La Web
Minitutorial Mapas En La WebINFOD
 
Speech apresentação 3 t11
Speech   apresentação 3 t11Speech   apresentação 3 t11
Speech apresentação 3 t11TriunfoRi
 

Viewers also liked (8)

Plaza
PlazaPlaza
Plaza
 
Plan de capacitación.35
Plan de capacitación.35Plan de capacitación.35
Plan de capacitación.35
 
Autorização da Abratel para Prestação de Stfc - 5° Operadora do Brasil
Autorização da Abratel para Prestação de Stfc - 5° Operadora do BrasilAutorização da Abratel para Prestação de Stfc - 5° Operadora do Brasil
Autorização da Abratel para Prestação de Stfc - 5° Operadora do Brasil
 
Unha cualificación é o mesmo que un título
Unha cualificación é o mesmo que un títuloUnha cualificación é o mesmo que un título
Unha cualificación é o mesmo que un título
 
Ejercicio práctico 02
Ejercicio práctico 02Ejercicio práctico 02
Ejercicio práctico 02
 
Edital concurso
Edital concursoEdital concurso
Edital concurso
 
Minitutorial Mapas En La Web
Minitutorial Mapas En La WebMinitutorial Mapas En La Web
Minitutorial Mapas En La Web
 
Speech apresentação 3 t11
Speech   apresentação 3 t11Speech   apresentação 3 t11
Speech apresentação 3 t11
 

Similar to Fd24967971

Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networksbijcicnjounal
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2Naveena N
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless CommunicationDipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksDipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkkDipaloke Arunodoy
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunicationDevyani Vaidya
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...IAEME Publication
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsijctet
 
A Review on Architecture, Issues, Challenges and Applications in Underwater W...
A Review on Architecture, Issues, Challenges and Applications in Underwater W...A Review on Architecture, Issues, Challenges and Applications in Underwater W...
A Review on Architecture, Issues, Challenges and Applications in Underwater W...ijtsrd
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor networkfrestoadi
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyijwmn
 
A Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksA Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksIJERA Editor
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkMphasis
 

Similar to Fd24967971 (20)

Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Fs2410401044
Fs2410401044Fs2410401044
Fs2410401044
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
QoS in WSN thesis
QoS in WSN thesisQoS in WSN thesis
QoS in WSN thesis
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errors
 
A Review on Architecture, Issues, Challenges and Applications in Underwater W...
A Review on Architecture, Issues, Challenges and Applications in Underwater W...A Review on Architecture, Issues, Challenges and Applications in Underwater W...
A Review on Architecture, Issues, Challenges and Applications in Underwater W...
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a survey
 
A Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksA Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor Networks
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 

Fd24967971

  • 1. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.967-971 Analysis of Malicious Data in Underwater Sensor Network Heena Ahuja*, Er. Jyoti Gupta** *(Student, Department of ECE, MMU Mulllana, Ambala, India) ** (Assistant Professor, Department of ECE,MMU Mullana, Ambala, India) ABSTRACT In this paper, we tackle the malicious  Battery power is limited and usually attacks in Underwater Sensor Networks batteries cannot be recharged, also (UWSNs). Underwater Sensor Networks because solar energy cannot be exploited. (UWSNs) consists of variable number of sensors  Underwater sensors are prone to failures and vehicles that are deployed to perform because of fouling and corrosion. collaborative monitoring tasks over a given area. In this paper, we use a novel routing Currently, many routing protocols are available for protocol, called vector-based forwarding (VBF) terrestrial wireless sensor networks. However, protocol, to provide robust, scalable and energy specific properties of underwater medium make efficient routing to deploy an Underwater existing routing protocols inappropriate for under Sensor Network. VBF is essentially a position- water. The main challenges in developing efficient based routing approach: nodes close to the routing protocols for underwater environments are: “vector" from the source to the destination will forward the message. Then we introduce the  High propagation delays: The radio malicious node in the network that hack the signals do not work efficiently under data of nodes when nodes undergoes Denial of water and this problem encourages use of Service attack (DoS). Thus in this paper we acoustic communication instead. The main have compared the various parameters like problems with the acoustic channel, Throughput, PDR, PLR and Checksum Errors however, are low bandwidths and long for before and after attack and results are propagation delays. shown in this paper.  Node mobility: Due to water currents, nodes can fluctuate or move if they are not Keywords - checksum error, denial of service, anchored at the bottom of the sea. This nodes, PDR, PLR. situation results in a dynamic network topology. Moreover, autonomous 1. INTRODUCTION underwater vehicles and robots used for exploration and controls can be utilised to 1.1 Definition of Underwater Sensor Network route and mulling data. Underwater Sensor Networks (UWSN)  Error prone acoustic underwater channels: consists of a variable number of sensors and Since the acoustic channels have very low vehicles that are deployed to perform collaborative bandwidth capacity, they suffer from high monitoring tasks over a given area. To achieve this bit error rates. objective, sensors and vehicles self-organize in an  Limited energy: Like in terrestrial wireless autonomous network which can adapt to the sensor networks, majority of sensor nodes characteristics of the ocean environment. in UWSNs are battery powered. Major challenges in the design of underwater Sensor Networks are [1]: 1.2 Vector Based Forwarding Protocol (VBF) In sensor networks, energy constraint is a  The available bandwidth is severely crucial factor since sensor nodes usually run on limited. battery, and it is impossible or difficult to recharge  The underwater channel is severely them in most application scenarios. In underwater impaired, especially due to multi-path and sensor networks, in addition to energy saving, the fading. routing algorithms should be able to handle node  Propagation delay in underwater is five mobility in an efficient way [2]. orders of magnitude higher than in radio frequency (RF) terrestrial channels, and Vector-Based Forwarding (VBF) protocol extremely variable. meets these requirements successfully. We assume  High bit error rates and temporary losses that each node in VBF knows its position of connectivity (shadow zones) can be information, which is provided by some location experienced, due to the extreme algorithms. If there is no such localization service characteristics of the underwater channel. available, a sensor node can still estimate its 967 | P a g e
  • 2. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.967-971 relative position to the forwarding node by secrets, financial or healthcare records or any other measuring its distance to the forwarder and the kind of sensitive information. Attacks on the angle of arrival (AOA) and strength of the signal confidentiality of wireless transmissions are created by being armed with some hardware device. by the simple act of analyzing a signal travelling through the air. Availability: Availability is allowing legitimate users access to confidential information after they have been properly authenticated. When availability is compromised, the access is denied for legitimate users because of malicious activity such as denial of service (DOS) attacks. Receiving RF Signal is not always possible, especially if someone does not want you to. Using a signal jammer to jam an RF signal is a huge problem that Fig.1: A high level view of VBF for UWSNs. has been faced by national governments for years. The position information can be calculated Integrity: Integrity involves the by measuring the AOA and strength of the signal. unauthorized modification of information. This In VBF, each packet carries the positions of the could mean modifying information while in transit sender, the target, and the forwarder (i.e., the node or while being stored electronically or via some which transmits this packet). The forwarding path type of media. To protect the integrity of is specified by the routing vector from the sender to information, one must employ a validation the target. Upon receiving a packet, a node technique. This technique can be in the form of computes its relative position to the forwarder. checksum, an integrity check, or a digital signature. Recursively, all the nodes receiving the packet Wireless networks are intended to function in an compute their positions. If a node determines that it unimpaired manner, free from deliberate or is sufficiently close to the routing vector (e.g., less inadvertent manipulation of the system. than a predefined distance threshold), it puts its own computed position in the packet and continues 1.4 Various attacks in UWSNs forwarding the packet; otherwise, it simply discards the packet. In this way, all the packet forwarders in Denial of Service (DoS): A Denial of the sensor network form a “routing pipe”: the Service attack in sensor networks and networks in sensor nodes in this pipe are eligible for packet general is defined as any event that eliminates the forwarding, and those which are not close to the network’s capacity to perform its desired function. routing vector (i.e., the axis of the pipe) do not DoS attacks in wireless sensor networks may be forward. Fig. 1 illustrates the basic idea of VBF. In carried out at different layers like the physical, link, the above figure, node S1 is the source, and node S0 routing and transport layers. [4], [5].This occurs by is the sink. The routing vector is specified by S1S0. the unintentional failure of sensor nodes. The Data packets are forwarded from S 1 to S0. simplest DoS attack tries to exhaust the resources Forwarders along the routing vector form a routing available to the victim node, by transmitting pipe with a pre controlled radius (i.e., the distance additional unwanted packets and thus prevents threshold, denoted by W).As we can see, like all legitimate sensor network users from tapping work other source routing protocols, VBF requires no or resources to which these nodes are deployed [6]. state information at each node. Therefore, it is Denial of Service (DoS) attack is means that not scalable to the size of the network. Moreover, in only for the adversary’s attempt to subvert, disrupt, VBF, only the nodes along the forwarding path or destroy a sensor network, but also for any event (specified by the routing vector) are involved in that diminishes a sensor network’s capability to packet routing, thus saving Security Issues and provide a service [7].In WSNs, several types of Solutions in UWSNs. Denial of Service attacks in different layers might be performed. i.e. at physical layer, the Denial of 1.3 Various security parameters in UWSNs Service attacks could be jamming and tampering, at Various security parameters are [3]: link layer, collision, exhaustion, unfairness, at Confidentiality: An attack on the network layer, neglect and greed, homing, confidentiality of information means theft or misdirection, black holes and at transport layer this unauthorized access of data. This can be performed attack could be performed by malicious flooding in lots of ways, such as the interception of data and resynchronizations. while in transit or it can be simply the theft of equipment on which the data might reside. The Wormhole attacks: A devastating attack goal of compromising confidentiality is to obtain is known as the wormhole attack, where more than proprietary information, user credentials, trade two malicious colluding sensor nodes does a 968 | P a g e
  • 3. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.967-971 virtual tunnel in the wireless sensor network, which The accuracy of IDS is measured in terms of false is used to forward message packets between the positives i.e. the normal activities which have been tunnel edge points. This tunnel establishes shorter reported as malicious and false negatives i.e. an links in the network. In which adversary documents attack which has not been detected by the IDS. forwards packets at one location in the sensor network, tunnels them to different location, and re- 2. PROBLEM DEFINITION forwards them into the sensor network. In sensor The following two problems we have network when sender node sends a message to proposed here deal that can be linked together with another receiver node in the network [1].Then the them to give out the desired results: receiving node tries to send the message to its 1) Underwater sensor networks should be secure neighboring nodes. The neighbor sensor nodes and reliable in such a manner that they do not assume that the message was sent by the sender defeat the purpose of data acquisition. node (this is normally out of range), so they tries to forward the message to the originating node, but 2) Underwater sensor networks are prone to this message never comes because it is too far malicious data attacks as they are based on sensing away. Wormhole attack is a great threat to sensor data which is RF based since they can be contacted/ networks since, this type of attack will not require communicated from any other signal in device compromising a wireless sensor in the network which may be malicious in intent. instead; it could be performed even at the starting phase during the sensors initializes to identify its 3. RESEARCH METHODOLOGY neighboring information [7]. This Wormhole This paper is based on the following attacks are very difficult to stop since routing research methodology. There are four main steps in information given by a sensor node is very difficult UWSN’s Threat Analysis: to check. The wormhole attack is possible even 1) Study of UWSN when the attacker has not compromised with any hosts nodes and even if all communication provides 2) Deploy a UWSN using VBF Protocol confidentiality and are authenticated also. 3) Data transmission and correction Sinkhole attack: In this case a 4) Compare the results before and after attack compromised sensor node tries to influence the information to it from each and every neighboring Step One: In the first step study of node. Thereby, sensor node eavesdrops on each and Underwater Sensor Network is done. Various every information is being communicated with its properties of Underwater Network are studied over neighboring sensor nodes. the Terrestrial Network. These properties are Underwater Network is highly dynamic, prone to 1.5 Intrusion Detection System errors, low bandwidth and high latency. Above all Information Systems and networks are there are various properties of Underwater Network vulnerable to electronic attacks. Underwater Sensor like Environmental monitoring, undersea Networks are vulnerable to a large variety of explorations, Distributed tactical surveillance, attacks. To prevent a network, first and foremost assisted navigation, Disaster prevention, Mine important thing that is helpful is an Intrusion reconnaissance. Under the study of UWSN it has Detection System (IDS) which can be used for both been studied that energy constraint is a crucial wired as well as wireless networks. The challenges factor since sensor nodes usually run on battery, in designing an IDS for Underwater Sensor and it is impossible or difficult to recharge them in Network are much more than any other network most application scenarios. In underwater sensor due to the fact that it is dynamic in nature, networks, in addition to energy saving, the routing decentralized nature, and access to radio medium. algorithms should be able to handle node mobility Thus the intrusion detection system of Underwater in an efficient way. Various threats of UWSNs Sensor Network needs to be different from that of have also been studied like Denial of Service, the wired networks. Wormhole attacks, Sinkhole attack, Sybil Attack, Hello flood attack and the countermeasures against The main purpose of Intrusion detection these attacks have also been studied. Various system is not to prevent attacks but to alert network protocols of UWSNs has also been studied. administrator about the possible attacks so that they can be detected in time and hence their effect can Step Two: After the study of UWSN, a network is be reduced. An IDS differentiates the aberrant deployed using VBF protocols. There are many activities from normal one and identifies the other protocols of UWSNs and it has been studied malicious activities from abnormal but non- malicious activities. 969 | P a g e
  • 4. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.967-971 in the previous step that sending and receiving nodes exchange keys and start sending data and receiving acknowledgement. There is a malicious node in the network which hacks the data and does not send any acknowledgement to the sending node when Denial of Service (DoS) occurs in certain nodes. Step Four: When the attack occurs in the network, the various parameters like Packet Delivery Ratio (PDR), Packet Lost Ratio (PLR), Throughput and checksum errors have been studied, compared and plotted for before and after attack. 4. RESULTS AND DISCUSSION Fig. 3 shows the Throughput vs. Message Arrival Rate for normal run or before attack and after attack. Throughput is the no. of bits per slot. It is shown in the following figure that no. of bits per slot for normal run is more than no. of bits per slot after the attack has been occurred. Fig. 3: Throughput vs. Message Arrival Rate Fig. 4 shows the Packet Delivery Ratio (PDR) between two sensors. It is clear that packet delivery ratio is more in normal run condition and when the Fig. 2: Algorithm for the UWSN’s Threat Analysis attack occurs the packet delivery ratio start decreasing. VBF is the most robust, scalable and energy efficient. In VBF, each packet carries the positions of the sender, the target, and the forwarder (i.e., the node which transmits this packet). The forwarding path is specified by the routing vector from the sender to the target. Upon receiving a packet, a node computes its relative position to the forwarder. Recursively, all the nodes receiving the packet compute their positions. If a node determines that it is sufficiently close to the Fig. 4: Packet Delivery Ratio routing vector (e.g., less than a predefined distance threshold), it puts its own computed position in the Fig. 5 shows the Packet Loss Ratio between two packet and continues forwarding the packet; sensors. It is exactly opposite of Packet Delivery otherwise, it simply discards the packet. In this Ratio. It is show in the figure that there is loss in way, all the packet forwarders in the sensor packets when the attack occurs. network form a “routing pipe”: the sensor nodes in this pipe are eligible for packet forwarding, and those which are not close to the routing vector (i.e., the axis of the pipe) do not forward. Step Three: After the deployment of network, the network starts transmitting the data by checking the minimum Angle of Arrival and Desirable Factor. Then the network checks whether Fig. 5: Packet Loss Ratio the channel is free or not. If the channel is free the 970 | P a g e
  • 5. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.967-971 Fig. 6 shows the Check Sum Errors for normal run Networks”, EURASIP Journal on Wireless and after attack. It is clear from the following fig. Communications and Networking Volume that checksum errors are more in after attack 2010, Article ID 195910, 13 pages. condition. [3] J.-P. Hubaux,S. Cˇapkun, and J. Luo. The Security and Privacy of Smart Vehicles. IEEE Security & Privacy, pages 49–55, 2004. [4] A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” IEEE Computer, vol. 35, no. 10, pp. 54–62, October 2002. Fig. 6: Checksum Errors [5] M. Lee, E. J. Kim, and C. W. Lee, “Source identification scheme against DoS 6. CONCLUSION attacks in cluster interconnects,” in Proc. In this paper it has tried to explore the International Workshop on Network possibility of threats of Underwater Sensor Design and Architecture, Montreal, Network, as we progress we found the most Quebec, August 2004, pp. 354–362. prominent attack which might occur in Underwater [6] A.D. Wood and J.A. Stankovic, (2002) Sensor Network which might occur in Underwater “Denial of Service in Sensor Networks,” Sensor Network might be related to resource Computer, vol. 35, no. 10, 2002, pp. 54– constraints. These resource constraints are natural 62. due to nature of Underwater Sensors which cannot [7] David R. Raymond and Scott F. Midkiff, be supplied with recharging of power/energy. (2008) "Denial-of-Service in Wireless Therefore when nodes communicate with each Sensor Networks: Attacks and Defenses," other even in an efficient routing protocol like IEEE Pervasive Computing, vol. 7, no. 1, VBF, there is a possibility that a node might 2008, pp. 74-81. behave maliciously or may indefinitely continue to [8] Adrian Perrig, John Stankovic,,” Security communicate with each other and at the same time in wireless sensor networks”. ACM deny services to other nodes. In this simulation it Communication, 47(6): 2004, pp. 53-57. has been demonstrated the same scenario and [9] Zaw Tun and Aung Htein Maw,(2008),” observed before and after attacks on the network. Worm hole Attack Detection in Wireless These before and after attack observation were Sensor networks”, proceedings of world made by recording the trace of each event occur in Academy of Science, Engineering and simulation. By using this trace we identified few Technology Volume 36, December 2008, parameters based on which we could identify ISSN 2070-3740. abnormal behavior in the network. These include [10] Denning D.(1987) “An Intrusion- Check Sum error, Packet Delivery Ratio, Packet Detection Model,” IEEE Transactions on Lost Ratio and Throughput. It is apparent from the Software Engineering, Vol.SE-13, No 2, bar graph shown above that these values drastically pp. 222-232. change if an attack is accused which shows abnormal behavior in the network. 7. FUTURE SCOPE The research for detection of such scenarios which are related to the attack on services are limited due to resource constraints or external manipulations of the node which turns maliciously in nature. For future scope it has been suggested that more scenarios must be considered and some Intrusion Detection System must be designed so that we can have secure Underwater Sensor Networks. REFERENCES [1] J. G. Proakis, E. M. Sozer, J. A. Rice, and M. Stojanovic, “Shallow water acoustic networks,” IEEE Communications Magazine, pp. 114–119, Nov. 2001. [2] Peng Xie et.al,” Efficient Vector-Based Forwarding for Underwater Sensor 971 | P a g e