• Save
“Securing underwater wireless communication networks” 2
Upcoming SlideShare
Loading in...5
×
 

“Securing underwater wireless communication networks” 2

on

  • 8,146 views

seminar ppt

seminar ppt

Statistics

Views

Total Views
8,146
Views on SlideShare
8,146
Embed Views
0

Actions

Likes
20
Downloads
0
Comments
15

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

15 of 15 Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • Please, send me ppt and pdf format to ynsdiary@gmail.com
    Are you sure you want to
    Your message goes here
    Processing…
  • Sir...
    Please send me ppt and pdf to ynsdiary@gmail.com
    Are you sure you want to
    Your message goes here
    Processing…
  • Naveena Sir Very Nice Presentation.

    Request send me the copy at jasjeet.engg@gmail.com

    Thanks!
    Are you sure you want to
    Your message goes here
    Processing…
  • send me pdf format to abhilashchintu8@gmail.com
    its very urgent plssssssssssssssssss.......................
    Are you sure you want to
    Your message goes here
    Processing…
  • sir can u mail me this ppt to apoorv8192@gmail.com
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

“Securing underwater wireless communication networks” 2 “Securing underwater wireless communication networks” 2 Presentation Transcript

  • VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014. A Seminar On“Securing Underwater Wireless Communication Networks” By Project Guide NAVEENA N (1BT08CS051) Mr. KESHAVA M (Lecturer of CSE department) B.T.L INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering 2010-11
  • AGENDAoAbstractoUnderwater Wireless Communication NetworksoExisting systemoProposed SystemoDrawbacksoApplicationsoConclusion
  • ABSTRACT Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring. View slide
  • ABSTRACT Both intervehicle and sensor-AUV communications can be affected by denial-of- service (DoS) attacks. We propose several methods to secure Underwater Wireless Communication Networks. We design three schemes namely, secure time synchronization, localization, and routing in UWCNs View slide
  • ABSTRACT Aim of proposed techniques is to enable the system to provide secure data transmission. Secure time synchronization aims for power saving. Secure localization aims to provide location information and data tagging. Secure routing rejects routing paths containing malicious nodes.
  • These techniques are based on following mechanisms Secure Time Synchronization It is essential in many underwater applications such as coordinated sensing tasks. & scheduling algorithms such as timedivision multiple access (TDMA). SECURE LOCALIZATION Localization is a very important issue for data tagging. Localization schemes can be classified into two types: (i) Range-based schemes (using range or bearing information): (ii) Range-free schemes (not using range or bearing information): SECURE ROUTING Routing is essential for packet delivery in UWCNs.
  • Underwater Wireless Communication NetworksUnderwater Wireless Communication Networks are constituted by sensor nodes, also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment. The sink, also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients. Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring
  • Underwater sensor network with AUV’s
  • Existing system Radio waves do not propagate well underwater due to the high energy absorption of water Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s) Acoustic channels have low bandwidth As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water.
  • Existing system The above mentioned characteristics of UWCNs have several security implications. High bit error rates cause packet errors. Consequently, critical security packets can be lost. Wireless underwater channels can be eavesdropped on. Attackers may intercept the information transmitted and attempt to modify or drop packets. Both intervehicle and sensor-AUV communications can be affected by denial-of-service (DoS) attacks. Several attacks are Jamming Wormhole attack  Acknowledgement spoofing Sinkhole attack  Selective forwardiing  Sybil attack Hello flood attack
  • Attacks on UWCN’s  Jamming attack
  • Attacks on UWCN’s Wormhole attack
  • Attacks on UWCN’s Sybil attack
  • Proposed system Secure time synchronization mechanismAchieving precise time synchronization is especially difficultin underwater environments due to the characteristics ofUWCNs. For this reason, the time synchronizationmechanisms proposed for ground-based sensor networkscannot be applied, and new mechanisms have been proposed. Secure LocalizationProposed terrestrial localization schemes based on receivedsignal strength (RSS) are not recommended in UWCNs, sincenon-uniform acoustic signal propagation causes signifiantvariations in the RSS. Time of arrival (ToA) and timedifference of arrival (TDoA)
  • Proposed system(contd) Secure routing Routing is essential for packet delivery in UWCNs. Proposed broadcast authentication methods would cause high communication overhead and latency in UWCNs. Multipath routing would cause high communication overhead as well.
  • Advantages It avoids data spoofing. It avoids privacy leakage. Minimize communication and computational cost. Maximizes the battery power by preserve the power of Underwater sensors.
  • Drawbacks Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies. Schemes is challenging because they do not work well in mobile environments.
  • APPLICATIONS Environmental monitoring to gathering of oceanographic data
  • APPLICATIONS Search and rescue missions
  • APPLICATIONSMarine archaeology
  • APPLICATIONS  Defense
  • CONCLUSION Wireless technology will play a vital role in many application areas that are not possible in the past. Wireless Underwater communication would be one of them. The main challenges related to secure time synchronization, localization, and routing have been surveyed. Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided in this paper.
  • Thank you…!!!