SlideShare a Scribd company logo
1 of 27
INDIAN INSTITUTE OF SCIENCE AND TECHNOLOGY,
SHIBPUR
Electronics And Telecommunication Dept.
Dipaloke Howlader
Exam roll-110712033
SECURING UNDERWATER WIRELESS
COMMUNICATION NETWORKS
OUTLINE
 INTRODUCTION
HISTORY
NECCESITY OF UWCNs
ATTACKS AND COUNTER MEASURES
SECURITY REQUIREMENT
PROPOSED SECURITY MECHANISM
APPLICATIONS OF UWCNs
DISADVANTAGES OF UWCNs
CONCLUSION
REFERENCES
INTRODUCTION
.Underwater wireless communication networks (UWCNs) are constituted
by sensors and autonomous underwater vehicles (AUVs) that interact to
perform specific applications such as underwater monitoring .
 Sensors Nodes are simply nodes energy constrained devices that have
ability of sensing the surrounding environment.
 Sink also known as base station, is a more powerful node that behaves
as an interface between the sensor nodes and the clients.
 Autonomous Underwater Vehicles (AUVS) that interact to perform
specific applications such as underwater monitoring.
HISTORY
 The science of underwater communication began in 1490 when
Leonardo da Vinci stated.
 In 1687 , Issac Newton wrote his Mathematical Principles of Natural
Philosophy which included the first mathematical treatment of sound
of water.
NECESSITY OF UWCNs
Wired underwater is not feasible in all situations as shown below-
 Temporary experiments
 Breaking of wires
 Significant cost of deployment
 Experiment over long distances
 Radio waves do not propagate well underwater due to high energy
absorption of water. Therefore UWCNs are based on acoustic links
characterized by large propagation delay.
 It cannot rely on GPS.
ATTACKS AND COUNTERMEASURES
 Underwater wireless communication networks are particularly vulnerable
to malicious attacks due to the high bit error rates, large and variable
propagation delays and low bandwidth of acoustic channels.
 Several methods are proposed to secure UWCN . Three schemes are there
namely secure time synchronaization, localization and routing in UWCN.
Jamming
Wormh
ole
attacks
Sybil
attack
Selective
Forwardi
ng
Acknowl
edgment
Spoofing
ATTACKS Hello
Flood
attack
Sinkhole
Attacks
ATTACKS AND COUNTER MEASURES
JAMMING
Method of Attack
A jamming attack consists of interfering with the physical channel by putting
up carriers on the frequencies neighbor nodes use to communicate .
Countermeasures
 Spread spectrum techniques
 Sensors can switch to sleep mode
WORMHOLE ATTACK
Methods of Attack
• False neighbourhood relationship
are created.
• The adversary can delay or drop
packets sent through the wormhole.
Countermeasures
 Estimating the direction of arrival by a
wormhole indicator variable.
SINKHOLE ATTACK
Methods of Attack
• A malicious node attempts to attract
traffic from a particular area towards it by
announcing that it is a high quality route.
Countermeasures
 Geographical routing.
 Authentication of nodes exchanging
routing information.
HELLO FLOOD ATTACK
Methods of Attack
• A node receiving a hello packet from a malicious node may interpret that
the adversary is a neighbor node.
Countermeasures
 Bidirectional link verification.
 Authentication is a possible defense.
SELECTIVE FORWARDING
Methods of Attack
• Malicious nodes drop certain messages instead of forwarding
them to hinder routing.
Countermeasures
 Multipath routing.
 Authentication.
Sybil Attack
Methods of Attack
• Sybil attack is defined as a malicious
node illegitimately taking on multiple
identities.
• Attacker with multiple identities
pretend to be in many places at once.
Countermeasures
 Authentication.
 Position verification.
Acknowledgement Spoofing
Methods of Attack
• A malicious node overhearing packets sent to neighbor nodes use the
information to spoof acknowledgements.
Countermeasures
 Encryption of all packets sent through the networks.
SECURITY REQUIREMENT
 Authentication :-Proof that data was sent by a legitimate user.
 Confidentiality:- Information is not accessible to unauthorized
parties.
 Integrity:-Information is not altered.
 Availability:-Data should be available when needed by an authorized
user.
PROPOSED SECURITY MECHANISM
Securing underwater wireless communication :
Secure time synchronization.
Secure localization.
Secure routing.
SECURE TIME SYNCHRONIZATION:
Why is Time Synchronization important ?
 Location and proximity siblings
 Maintain ordering of messages
 Internetwork coordination
 Energy efficiency
SECURE LOCALIZATION:
Why is Localization important ?
 Sensor tasks .
 Making routing decisions .
 The attacker makes the node think it is somewhere different from actual location.As a
result wrong decisions happen.
Secure localization gives the guarantee of correctness despite of
presence of intruders.It is the process for each sensor node to locate its position in the
network.
SECURE ROUTING:
Why is routing important ?
 A sensor routing rejects the routing paths containing malicious
nodes.
 It is specially challenging in UWCNs due to the large propagation
delays,low bandwidth,difficulty of battery refills of underwater
sensors and dynamic topologies.
APPLICATIONS OF
UNDERWATER WIRELESS
COMMUNICATION.
Search and rescue missions under water.
Environmental monitoring to gather oceanographic data.
Marine archaeology
DISADVANTAGES of UWCNs
 Battery power is limited and can not be recharged easily.
 The available bandwidth is severely limited.
 Long and variable propagation delays.
 Multipath and fading problems.
 High bity error rate.
CONCLUSION
 Wireless technology will play a vital role in many application areas that
are not possible in past.
 The main challenges related to secure time synchronization,localization
and routing have been surveyed.
 Since the deployment of the proposed system is still in its development
stage , an account of actual implementation has not been provided in
this paper. The research issues of UWCNs remain wide open for
future investigation.
REFERENCES
 M.C Domingo ,”Securing underwater wireless communication networks”, Journal ,IEEE Wireless Communications archive.
Volume 18 Issue 1, February 2011
 I.F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc
Net., vol. 3, no. 3, Mar. 2005.
 W. Wang et al., “Visualization of Wormholes in Under-water Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3,
no. 1, 2008.
 F. Hu, S. Wilson, and Y. Xiao, “Correlation-Based Security in Time Synchronization of Sensor Networks,” Proc. IEEE WCNC,
2008.
 C. Tian et al., “Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks,”
Proc. IEEE ICC, 2009.
 C. Tian et al., “Localization and Synchronization for 3D Underwater Acoustic Sensor Networks,” in Ubiquitous Intelligence and
Computing, LNCS, Springer, 2007, pp. 622–31.
Securing Underwater Wireless Communication

More Related Content

What's hot

Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
asharanick
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
Rajeev N
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
Fatma Ala'a
 

What's hot (20)

wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Implementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelImplementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channel
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Stratellite
StratelliteStratellite
Stratellite
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review
 
Manet
ManetManet
Manet
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
satellite communication- UNIT-III.pptx
satellite communication- UNIT-III.pptxsatellite communication- UNIT-III.pptx
satellite communication- UNIT-III.pptx
 
Cdma 101
Cdma 101Cdma 101
Cdma 101
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
Unit iii mirowave passive components
Unit iii mirowave passive componentsUnit iii mirowave passive components
Unit iii mirowave passive components
 

Viewers also liked

UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
jaisica
 
Wireless power transmission via solar power satellite seminar report
Wireless power transmission via solar power satellite seminar reportWireless power transmission via solar power satellite seminar report
Wireless power transmission via solar power satellite seminar report
bharathi345
 
FSO networks under turbulence - Northumbria University 2013 Research Conference
FSO networks under turbulence - Northumbria University 2013 Research ConferenceFSO networks under turbulence - Northumbria University 2013 Research Conference
FSO networks under turbulence - Northumbria University 2013 Research Conference
Joaquin Perez
 

Viewers also liked (17)

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Solar Power Satellite
Solar Power SatelliteSolar Power Satellite
Solar Power Satellite
 
Grid Based Fuzzy Optimized Routing Protocol for Under Water Sensor Network
Grid Based Fuzzy Optimized  Routing Protocol for  Under Water Sensor Network Grid Based Fuzzy Optimized  Routing Protocol for  Under Water Sensor Network
Grid Based Fuzzy Optimized Routing Protocol for Under Water Sensor Network
 
Red tacton
Red tactonRed tacton
Red tacton
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17
 
Wireless power transmission via solar power satellite seminar report
Wireless power transmission via solar power satellite seminar reportWireless power transmission via solar power satellite seminar report
Wireless power transmission via solar power satellite seminar report
 
Active controls for Flight and Simulation
Active controls for Flight and SimulationActive controls for Flight and Simulation
Active controls for Flight and Simulation
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filter
 
Free space optics
Free space opticsFree space optics
Free space optics
 
(Slides) A Method for Sharing Traffic Jam Information Using Inter-Vehicle C...
(Slides) A Method for Sharing Traffic Jam Information Using Inter-Vehicle C...(Slides) A Method for Sharing Traffic Jam Information Using Inter-Vehicle C...
(Slides) A Method for Sharing Traffic Jam Information Using Inter-Vehicle C...
 
FSO networks under turbulence - Northumbria University 2013 Research Conference
FSO networks under turbulence - Northumbria University 2013 Research ConferenceFSO networks under turbulence - Northumbria University 2013 Research Conference
FSO networks under turbulence - Northumbria University 2013 Research Conference
 
Power line communication
Power line communicationPower line communication
Power line communication
 
Hydrogen Gas Turbine
Hydrogen Gas TurbineHydrogen Gas Turbine
Hydrogen Gas Turbine
 
Verilog
VerilogVerilog
Verilog
 

Similar to Securing Underwater Wireless Communication

Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
IJRAT
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
IJRAT
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
IJRAT
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
raosg
 

Similar to Securing Underwater Wireless Communication (20)

Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
underwater communication skills for the new way of devine(2)
 underwater communication skills for the new way of devine(2) underwater communication skills for the new way of devine(2)
underwater communication skills for the new way of devine(2)
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstract
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errors
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Securing Underwater Wireless Communication

  • 1. INDIAN INSTITUTE OF SCIENCE AND TECHNOLOGY, SHIBPUR Electronics And Telecommunication Dept. Dipaloke Howlader Exam roll-110712033 SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS
  • 2. OUTLINE  INTRODUCTION HISTORY NECCESITY OF UWCNs ATTACKS AND COUNTER MEASURES SECURITY REQUIREMENT PROPOSED SECURITY MECHANISM APPLICATIONS OF UWCNs DISADVANTAGES OF UWCNs CONCLUSION REFERENCES
  • 3. INTRODUCTION .Underwater wireless communication networks (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring .  Sensors Nodes are simply nodes energy constrained devices that have ability of sensing the surrounding environment.  Sink also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients.  Autonomous Underwater Vehicles (AUVS) that interact to perform specific applications such as underwater monitoring.
  • 4. HISTORY  The science of underwater communication began in 1490 when Leonardo da Vinci stated.  In 1687 , Issac Newton wrote his Mathematical Principles of Natural Philosophy which included the first mathematical treatment of sound of water.
  • 5. NECESSITY OF UWCNs Wired underwater is not feasible in all situations as shown below-  Temporary experiments  Breaking of wires  Significant cost of deployment  Experiment over long distances  Radio waves do not propagate well underwater due to high energy absorption of water. Therefore UWCNs are based on acoustic links characterized by large propagation delay.  It cannot rely on GPS.
  • 6. ATTACKS AND COUNTERMEASURES  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays and low bandwidth of acoustic channels.  Several methods are proposed to secure UWCN . Three schemes are there namely secure time synchronaization, localization and routing in UWCN.
  • 8. JAMMING Method of Attack A jamming attack consists of interfering with the physical channel by putting up carriers on the frequencies neighbor nodes use to communicate . Countermeasures  Spread spectrum techniques  Sensors can switch to sleep mode
  • 9. WORMHOLE ATTACK Methods of Attack • False neighbourhood relationship are created. • The adversary can delay or drop packets sent through the wormhole. Countermeasures  Estimating the direction of arrival by a wormhole indicator variable.
  • 10. SINKHOLE ATTACK Methods of Attack • A malicious node attempts to attract traffic from a particular area towards it by announcing that it is a high quality route. Countermeasures  Geographical routing.  Authentication of nodes exchanging routing information.
  • 11. HELLO FLOOD ATTACK Methods of Attack • A node receiving a hello packet from a malicious node may interpret that the adversary is a neighbor node. Countermeasures  Bidirectional link verification.  Authentication is a possible defense.
  • 12. SELECTIVE FORWARDING Methods of Attack • Malicious nodes drop certain messages instead of forwarding them to hinder routing. Countermeasures  Multipath routing.  Authentication.
  • 13. Sybil Attack Methods of Attack • Sybil attack is defined as a malicious node illegitimately taking on multiple identities. • Attacker with multiple identities pretend to be in many places at once. Countermeasures  Authentication.  Position verification.
  • 14. Acknowledgement Spoofing Methods of Attack • A malicious node overhearing packets sent to neighbor nodes use the information to spoof acknowledgements. Countermeasures  Encryption of all packets sent through the networks.
  • 15. SECURITY REQUIREMENT  Authentication :-Proof that data was sent by a legitimate user.  Confidentiality:- Information is not accessible to unauthorized parties.  Integrity:-Information is not altered.  Availability:-Data should be available when needed by an authorized user.
  • 16. PROPOSED SECURITY MECHANISM Securing underwater wireless communication : Secure time synchronization. Secure localization. Secure routing.
  • 17. SECURE TIME SYNCHRONIZATION: Why is Time Synchronization important ?  Location and proximity siblings  Maintain ordering of messages  Internetwork coordination  Energy efficiency
  • 18. SECURE LOCALIZATION: Why is Localization important ?  Sensor tasks .  Making routing decisions .  The attacker makes the node think it is somewhere different from actual location.As a result wrong decisions happen. Secure localization gives the guarantee of correctness despite of presence of intruders.It is the process for each sensor node to locate its position in the network.
  • 19. SECURE ROUTING: Why is routing important ?  A sensor routing rejects the routing paths containing malicious nodes.  It is specially challenging in UWCNs due to the large propagation delays,low bandwidth,difficulty of battery refills of underwater sensors and dynamic topologies.
  • 21. Search and rescue missions under water.
  • 22. Environmental monitoring to gather oceanographic data.
  • 24. DISADVANTAGES of UWCNs  Battery power is limited and can not be recharged easily.  The available bandwidth is severely limited.  Long and variable propagation delays.  Multipath and fading problems.  High bity error rate.
  • 25. CONCLUSION  Wireless technology will play a vital role in many application areas that are not possible in past.  The main challenges related to secure time synchronization,localization and routing have been surveyed.  Since the deployment of the proposed system is still in its development stage , an account of actual implementation has not been provided in this paper. The research issues of UWCNs remain wide open for future investigation.
  • 26. REFERENCES  M.C Domingo ,”Securing underwater wireless communication networks”, Journal ,IEEE Wireless Communications archive. Volume 18 Issue 1, February 2011  I.F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc Net., vol. 3, no. 3, Mar. 2005.  W. Wang et al., “Visualization of Wormholes in Under-water Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3, no. 1, 2008.  F. Hu, S. Wilson, and Y. Xiao, “Correlation-Based Security in Time Synchronization of Sensor Networks,” Proc. IEEE WCNC, 2008.  C. Tian et al., “Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks,” Proc. IEEE ICC, 2009.  C. Tian et al., “Localization and Synchronization for 3D Underwater Acoustic Sensor Networks,” in Ubiquitous Intelligence and Computing, LNCS, Springer, 2007, pp. 622–31.