“Securing underwater wireless communication networks” 2


Published on

seminar ppt

Published in: Education
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

“Securing underwater wireless communication networks” 2

  1. 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014. A Seminar On“Securing Underwater Wireless Communication Networks” By Project Guide NAVEENA N (1BT08CS051) Mr. KESHAVA M (Lecturer of CSE department) B.T.L INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering 2010-11
  2. 2. AGENDAoAbstractoUnderwater Wireless Communication NetworksoExisting systemoProposed SystemoDrawbacksoApplicationsoConclusion
  3. 3. ABSTRACT Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring.
  4. 4. ABSTRACT Both intervehicle and sensor-AUV communications can be affected by denial-of- service (DoS) attacks. We propose several methods to secure Underwater Wireless Communication Networks. We design three schemes namely, secure time synchronization, localization, and routing in UWCNs
  5. 5. ABSTRACT Aim of proposed techniques is to enable the system to provide secure data transmission. Secure time synchronization aims for power saving. Secure localization aims to provide location information and data tagging. Secure routing rejects routing paths containing malicious nodes.
  6. 6. These techniques are based on following mechanisms Secure Time Synchronization It is essential in many underwater applications such as coordinated sensing tasks. & scheduling algorithms such as timedivision multiple access (TDMA). SECURE LOCALIZATION Localization is a very important issue for data tagging. Localization schemes can be classified into two types: (i) Range-based schemes (using range or bearing information): (ii) Range-free schemes (not using range or bearing information): SECURE ROUTING Routing is essential for packet delivery in UWCNs.
  7. 7. Underwater Wireless Communication NetworksUnderwater Wireless Communication Networks are constituted by sensor nodes, also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment. The sink, also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients. Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring
  8. 8. Underwater sensor network with AUV’s
  9. 9. Existing system Radio waves do not propagate well underwater due to the high energy absorption of water Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s) Acoustic channels have low bandwidth As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water.
  10. 10. Existing system The above mentioned characteristics of UWCNs have several security implications. High bit error rates cause packet errors. Consequently, critical security packets can be lost. Wireless underwater channels can be eavesdropped on. Attackers may intercept the information transmitted and attempt to modify or drop packets. Both intervehicle and sensor-AUV communications can be affected by denial-of-service (DoS) attacks. Several attacks are Jamming Wormhole attack  Acknowledgement spoofing Sinkhole attack  Selective forwardiing  Sybil attack Hello flood attack
  11. 11. Attacks on UWCN’s  Jamming attack
  12. 12. Attacks on UWCN’s Wormhole attack
  13. 13. Attacks on UWCN’s Sybil attack
  14. 14. Proposed system Secure time synchronization mechanismAchieving precise time synchronization is especially difficultin underwater environments due to the characteristics ofUWCNs. For this reason, the time synchronizationmechanisms proposed for ground-based sensor networkscannot be applied, and new mechanisms have been proposed. Secure LocalizationProposed terrestrial localization schemes based on receivedsignal strength (RSS) are not recommended in UWCNs, sincenon-uniform acoustic signal propagation causes signifiantvariations in the RSS. Time of arrival (ToA) and timedifference of arrival (TDoA)
  15. 15. Proposed system(contd) Secure routing Routing is essential for packet delivery in UWCNs. Proposed broadcast authentication methods would cause high communication overhead and latency in UWCNs. Multipath routing would cause high communication overhead as well.
  16. 16. Advantages It avoids data spoofing. It avoids privacy leakage. Minimize communication and computational cost. Maximizes the battery power by preserve the power of Underwater sensors.
  17. 17. Drawbacks Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies. Schemes is challenging because they do not work well in mobile environments.
  18. 18. APPLICATIONS Environmental monitoring to gathering of oceanographic data
  19. 19. APPLICATIONS Search and rescue missions
  20. 20. APPLICATIONSMarine archaeology
  21. 21. APPLICATIONS  Defense
  22. 22. CONCLUSION Wireless technology will play a vital role in many application areas that are not possible in the past. Wireless Underwater communication would be one of them. The main challenges related to secure time synchronization, localization, and routing have been surveyed. Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided in this paper.
  23. 23. Thank you…!!!