SlideShare a Scribd company logo
1 of 27
INDIAN INSTITUTE OF SCIENCE AND TECHNOLOGY,
SHIBPUR
Electronics And Telecommunication Dept.
Dipaloke Howlader
Exam roll-110712033
SECURING UNDERWATER WIRELESS
COMMUNICATION NETWORKS
OUTLINE
 INTRODUCTION
HISTORY
NECCESITY OF UWCNs
ATTACKS AND COUNTER MEASURES
SECURITY REQUIREMENT
PROPOSED SECURITY MECHANISM
APPLICATIONS OF UWCNs
DISADVANTAGES OF UWCNs
CONCLUSION
REFERENCES
INTRODUCTION
.Underwater wireless communication networks (UWCNs) are constituted
by sensors and autonomous underwater vehicles (AUVs) that interact to
perform specific applications such as underwater monitoring .
 Sensors Nodes are simply nodes energy constrained devices that have
ability of sensing the surrounding environment.
 Sink also known as base station, is a more powerful node that behaves
as an interface between the sensor nodes and the clients.
 Autonomous Underwater Vehicles (AUVS) that interact to perform
specific applications such as underwater monitoring.
HISTORY
 The science of underwater communication began in 1490 when
Leonardo da Vinci stated.
 In 1687 , Issac Newton wrote his Mathematical Principles of Natural
Philosophy which included the first mathematical treatment of sound
of water.
NECESSITY OF UWCNs
Wired underwater is not feasible in all situations as shown below-
 Temporary experiments
 Breaking of wires
 Significant cost of deployment
 Experiment over long distances
 Radio waves do not propagate well underwater due to high energy
absorption of water. Therefore UWCNs are based on acoustic links
characterized by large propagation delay.
 It cannot rely on GPS.
ATTACKS AND COUNTERMEASURES
 Underwater wireless communication networks are particularly vulnerable
to malicious attacks due to the high bit error rates, large and variable
propagation delays and low bandwidth of acoustic channels.
 Several methods are proposed to secure UWCN . Three schemes are there
namely secure time synchronaization, localization and routing in UWCN.
Jamming
Wormh
ole
attacks
Sybil
attack
Selective
Forwardi
ng
Acknowl
edgment
Spoofing
ATTACKS Hello
Flood
attack
Sinkhole
Attacks
ATTACKS AND COUNTER MEASURES
JAMMING
Method of Attack
A jamming attack consists of interfering with the physical channel by putting
up carriers on the frequencies neighbor nodes use to communicate .
Countermeasures
 Spread spectrum techniques
 Sensors can switch to sleep mode
WORMHOLE ATTACK
Methods of Attack
• False neighbourhood relationship
are created.
• The adversary can delay or drop
packets sent through the wormhole.
Countermeasures
 Estimating the direction of arrival by a
wormhole indicator variable.
SINKHOLE ATTACK
Methods of Attack
• A malicious node attempts to attract
traffic from a particular area towards it by
announcing that it is a high quality route.
Countermeasures
 Geographical routing.
 Authentication of nodes exchanging
routing information.
HELLO FLOOD ATTACK
Methods of Attack
• A node receiving a hello packet from a malicious node may interpret that
the adversary is a neighbor node.
Countermeasures
 Bidirectional link verification.
 Authentication is a possible defense.
SELECTIVE FORWARDING
Methods of Attack
• Malicious nodes drop certain messages instead of forwarding
them to hinder routing.
Countermeasures
 Multipath routing.
 Authentication.
Sybil Attack
Methods of Attack
• Sybil attack is defined as a malicious
node illegitimately taking on multiple
identities.
• Attacker with multiple identities
pretend to be in many places at once.
Countermeasures
 Authentication.
 Position verification.
Acknowledgement Spoofing
Methods of Attack
• A malicious node overhearing packets sent to neighbor nodes use the
information to spoof acknowledgements.
Countermeasures
 Encryption of all packets sent through the networks.
SECURITY REQUIREMENT
 Authentication :-Proof that data was sent by a legitimate user.
 Confidentiality:- Information is not accessible to unauthorized
parties.
 Integrity:-Information is not altered.
 Availability:-Data should be available when needed by an authorized
user.
PROPOSED SECURITY MECHANISM
Securing underwater wireless communication :
Secure time synchronization.
Secure localization.
Secure routing.
SECURE TIME SYNCHRONIZATION:
Why is Time Synchronization important ?
 Location and proximity siblings
 Maintain ordering of messages
 Internetwork coordination
 Energy efficiency
SECURE LOCALIZATION:
Why is Localization important ?
 Sensor tasks .
 Making routing decisions .
 The attacker makes the node think it is somewhere different from actual location.As a
result wrong decisions happen.
Secure localization gives the guarantee of correctness despite of
presence of intruders.It is the process for each sensor node to locate its position in the
network.
SECURE ROUTING:
Why is routing important ?
 A sensor routing rejects the routing paths containing malicious
nodes.
 It is specially challenging in UWCNs due to the large propagation
delays,low bandwidth,difficulty of battery refills of underwater
sensors and dynamic topologies.
APPLICATIONS OF
UNDERWATER WIRELESS
COMMUNICATION.
Search and rescue missions under water.
Environmental monitoring to gather oceanographic data.
Marine archaeology
DISADVANTAGES of UWCNs
 Battery power is limited and can not be recharged easily.
 The available bandwidth is severely limited.
 Long and variable propagation delays.
 Multipath and fading problems.
 High bity error rate.
CONCLUSION
 Wireless technology will play a vital role in many application areas that
are not possible in past.
 The main challenges related to secure time synchronization,localization
and routing have been surveyed.
 Since the deployment of the proposed system is still in its development
stage , an account of actual implementation has not been provided in
this paper. The research issues of UWCNs remain wide open for
future investigation.
REFERENCES
 M.C Domingo ,”Securing underwater wireless communication networks”, Journal ,IEEE Wireless Communications archive.
Volume 18 Issue 1, February 2011
 I.F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc
Net., vol. 3, no. 3, Mar. 2005.
 W. Wang et al., “Visualization of Wormholes in Under-water Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3,
no. 1, 2008.
 F. Hu, S. Wilson, and Y. Xiao, “Correlation-Based Security in Time Synchronization of Sensor Networks,” Proc. IEEE WCNC,
2008.
 C. Tian et al., “Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks,”
Proc. IEEE ICC, 2009.
 C. Tian et al., “Localization and Synchronization for 3D Underwater Acoustic Sensor Networks,” in Ubiquitous Intelligence and
Computing, LNCS, Springer, 2007, pp. 622–31.
Securing Underwater Wireless Communication Networks

More Related Content

What's hot

Signal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsSignal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsPraveen Kumar Reddy
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkSrija Kumar
 
Underwater acoustic sensor networks (uw asn ) bibhudas
Underwater acoustic sensor networks (uw asn ) bibhudasUnderwater acoustic sensor networks (uw asn ) bibhudas
Underwater acoustic sensor networks (uw asn ) bibhudasBibhu Prasad Das
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communicationDheeresh Kumar
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdmRAVITEJA828
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,Er. Saba karim
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)tanveer alam
 
Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless NetworkSunilPoddar7
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communicationAbhirami P S
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communicationEr. Saba karim
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wirelesspatna
 
Project report_new_pdf
Project report_new_pdfProject report_new_pdf
Project report_new_pdftiwarivinit
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2Naveena N
 
Underwater acoustic 1
Underwater acoustic 1Underwater acoustic 1
Underwater acoustic 1kanusinghal3
 
RF Based Wireless Under Water Communication
RF Based Wireless Under Water CommunicationRF Based Wireless Under Water Communication
RF Based Wireless Under Water CommunicationKrishnabhashkar Jha
 
underwater wireless communication.
underwater wireless communication.underwater wireless communication.
underwater wireless communication.Poonam Jamakhandi
 
Thesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksThesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksGunilla Burrowes
 

What's hot (20)

Signal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsSignal processing for underwater acoustic communications
Signal processing for underwater acoustic communications
 
Slideshare
SlideshareSlideshare
Slideshare
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Underwater acoustic sensor networks (uw asn ) bibhudas
Underwater acoustic sensor networks (uw asn ) bibhudasUnderwater acoustic sensor networks (uw asn ) bibhudas
Underwater acoustic sensor networks (uw asn ) bibhudas
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
 
UNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASEDUNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASED
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdm
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communication
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communication
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
Project report_new_pdf
Project report_new_pdfProject report_new_pdf
Project report_new_pdf
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
 
Underwater acoustic 1
Underwater acoustic 1Underwater acoustic 1
Underwater acoustic 1
 
RF Based Wireless Under Water Communication
RF Based Wireless Under Water CommunicationRF Based Wireless Under Water Communication
RF Based Wireless Under Water Communication
 
underwater wireless communication.
underwater wireless communication.underwater wireless communication.
underwater wireless communication.
 
Current developments in underwater autonomy
Current developments in underwater autonomyCurrent developments in underwater autonomy
Current developments in underwater autonomy
 
Thesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksThesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor Networks
 

Similar to Securing Underwater Wireless Communication Networks

Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)IJRAT
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148IJRAT
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networksbijcicnjounal
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractvishnuRajan20
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsijctet
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkIISRT
 

Similar to Securing Underwater Wireless Communication Networks (20)

Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstract
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errors
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 

Securing Underwater Wireless Communication Networks

  • 1. INDIAN INSTITUTE OF SCIENCE AND TECHNOLOGY, SHIBPUR Electronics And Telecommunication Dept. Dipaloke Howlader Exam roll-110712033 SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS
  • 2. OUTLINE  INTRODUCTION HISTORY NECCESITY OF UWCNs ATTACKS AND COUNTER MEASURES SECURITY REQUIREMENT PROPOSED SECURITY MECHANISM APPLICATIONS OF UWCNs DISADVANTAGES OF UWCNs CONCLUSION REFERENCES
  • 3. INTRODUCTION .Underwater wireless communication networks (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring .  Sensors Nodes are simply nodes energy constrained devices that have ability of sensing the surrounding environment.  Sink also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients.  Autonomous Underwater Vehicles (AUVS) that interact to perform specific applications such as underwater monitoring.
  • 4. HISTORY  The science of underwater communication began in 1490 when Leonardo da Vinci stated.  In 1687 , Issac Newton wrote his Mathematical Principles of Natural Philosophy which included the first mathematical treatment of sound of water.
  • 5. NECESSITY OF UWCNs Wired underwater is not feasible in all situations as shown below-  Temporary experiments  Breaking of wires  Significant cost of deployment  Experiment over long distances  Radio waves do not propagate well underwater due to high energy absorption of water. Therefore UWCNs are based on acoustic links characterized by large propagation delay.  It cannot rely on GPS.
  • 6. ATTACKS AND COUNTERMEASURES  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays and low bandwidth of acoustic channels.  Several methods are proposed to secure UWCN . Three schemes are there namely secure time synchronaization, localization and routing in UWCN.
  • 8. JAMMING Method of Attack A jamming attack consists of interfering with the physical channel by putting up carriers on the frequencies neighbor nodes use to communicate . Countermeasures  Spread spectrum techniques  Sensors can switch to sleep mode
  • 9. WORMHOLE ATTACK Methods of Attack • False neighbourhood relationship are created. • The adversary can delay or drop packets sent through the wormhole. Countermeasures  Estimating the direction of arrival by a wormhole indicator variable.
  • 10. SINKHOLE ATTACK Methods of Attack • A malicious node attempts to attract traffic from a particular area towards it by announcing that it is a high quality route. Countermeasures  Geographical routing.  Authentication of nodes exchanging routing information.
  • 11. HELLO FLOOD ATTACK Methods of Attack • A node receiving a hello packet from a malicious node may interpret that the adversary is a neighbor node. Countermeasures  Bidirectional link verification.  Authentication is a possible defense.
  • 12. SELECTIVE FORWARDING Methods of Attack • Malicious nodes drop certain messages instead of forwarding them to hinder routing. Countermeasures  Multipath routing.  Authentication.
  • 13. Sybil Attack Methods of Attack • Sybil attack is defined as a malicious node illegitimately taking on multiple identities. • Attacker with multiple identities pretend to be in many places at once. Countermeasures  Authentication.  Position verification.
  • 14. Acknowledgement Spoofing Methods of Attack • A malicious node overhearing packets sent to neighbor nodes use the information to spoof acknowledgements. Countermeasures  Encryption of all packets sent through the networks.
  • 15. SECURITY REQUIREMENT  Authentication :-Proof that data was sent by a legitimate user.  Confidentiality:- Information is not accessible to unauthorized parties.  Integrity:-Information is not altered.  Availability:-Data should be available when needed by an authorized user.
  • 16. PROPOSED SECURITY MECHANISM Securing underwater wireless communication : Secure time synchronization. Secure localization. Secure routing.
  • 17. SECURE TIME SYNCHRONIZATION: Why is Time Synchronization important ?  Location and proximity siblings  Maintain ordering of messages  Internetwork coordination  Energy efficiency
  • 18. SECURE LOCALIZATION: Why is Localization important ?  Sensor tasks .  Making routing decisions .  The attacker makes the node think it is somewhere different from actual location.As a result wrong decisions happen. Secure localization gives the guarantee of correctness despite of presence of intruders.It is the process for each sensor node to locate its position in the network.
  • 19. SECURE ROUTING: Why is routing important ?  A sensor routing rejects the routing paths containing malicious nodes.  It is specially challenging in UWCNs due to the large propagation delays,low bandwidth,difficulty of battery refills of underwater sensors and dynamic topologies.
  • 21. Search and rescue missions under water.
  • 22. Environmental monitoring to gather oceanographic data.
  • 24. DISADVANTAGES of UWCNs  Battery power is limited and can not be recharged easily.  The available bandwidth is severely limited.  Long and variable propagation delays.  Multipath and fading problems.  High bity error rate.
  • 25. CONCLUSION  Wireless technology will play a vital role in many application areas that are not possible in past.  The main challenges related to secure time synchronization,localization and routing have been surveyed.  Since the deployment of the proposed system is still in its development stage , an account of actual implementation has not been provided in this paper. The research issues of UWCNs remain wide open for future investigation.
  • 26. REFERENCES  M.C Domingo ,”Securing underwater wireless communication networks”, Journal ,IEEE Wireless Communications archive. Volume 18 Issue 1, February 2011  I.F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc Net., vol. 3, no. 3, Mar. 2005.  W. Wang et al., “Visualization of Wormholes in Under-water Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3, no. 1, 2008.  F. Hu, S. Wilson, and Y. Xiao, “Correlation-Based Security in Time Synchronization of Sensor Networks,” Proc. IEEE WCNC, 2008.  C. Tian et al., “Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks,” Proc. IEEE ICC, 2009.  C. Tian et al., “Localization and Synchronization for 3D Underwater Acoustic Sensor Networks,” in Ubiquitous Intelligence and Computing, LNCS, Springer, 2007, pp. 622–31.