This document summarizes a research paper that analyzes malicious data attacks in underwater sensor networks. It first defines underwater sensor networks and discusses their key challenges, including limited bandwidth, impaired acoustic channels, high propagation delays, and limited energy. It then introduces the vector-based forwarding routing protocol that is energy-efficient and handles node mobility. Finally, it discusses security issues for underwater sensor networks including denial of service attacks, which can be launched at different network layers to eliminate the network's capacity. The document analyzes how a denial of service attack introduces malicious nodes that hack sensor node data.
This document discusses security challenges in underwater wireless communication networks (UWCNs). It outlines the unique characteristics of underwater acoustic channels that introduce vulnerabilities, such as high bit error rates and long propagation delays. Several common attacks on UWCNs are described, such as jamming, wormhole attacks, and selective forwarding. The document also discusses security requirements for UWCNs like authentication, confidentiality, integrity and availability. It provides a survey of existing research on securing UWCNs and outlines challenges that remain for achieving secure underwater communication.
This document discusses security challenges in underwater wireless communication networks (UWCNs). It provides an overview of the characteristics of underwater acoustic channels that make UWCNs vulnerable to attacks, such as high bit error rates and low bandwidth. Several common attacks on UWCNs are described, such as jamming, wormhole attacks, and selective forwarding. The document also outlines security requirements for UWCNs, including authentication, confidentiality, integrity, and availability. It provides a survey of existing literature on securing UWCNs and discusses open challenges in providing security for these networks.
The document summarizes underwater wireless communication technology. It discusses how acoustic waves are used instead of radio waves to transmit information underwater over long distances. It describes some of the challenges of underwater acoustic channels including high propagation loss, severe multipath interference, and low sound speed. The document also provides an overview of acoustic modem technology, discussing modulation schemes like FSK and PSK, and the use of equalizers to address multipath interference. The goal of underwater wireless communication is to enable applications like environmental monitoring without the need for heavy cables.
Cognitive Radio: When might it Become Economically and Technically Feasible? Jeffrey Funk
My Master's students use ideas from my (Jeff Funk) forthcoming book (Technology Change and the Rise of New Industries) to analyze the economic and technical feasibility of cognitive radio. See my other slides for details on concepts, methodology, and other new industries.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes research on underwater sensor networks (UWSNs). It describes two common architectures for UWSNs - two-dimensional networks where sensors are anchored to the ocean bottom, and three-dimensional networks where sensors float at different depths. It also outlines key factors that influence underwater acoustic communication in UWSNs, including high path loss, ambient noise, multipath effects, and long propagation delays. The goal of the research is to analyze the network layer and propose novel recommendations to improve the feasibility of UWSNs for applications like structural health monitoring.
The document discusses spectrum usage and dynamic spectrum access. It notes that current spectrum policies result in inefficient usage, with some blocks saturated and others underused. Improved flexibility and regulation are needed. Context-aware applications and cross-layer optimization, including flexible spectrum use, could enhance service. Most discussions focus on cognitive radio and how it can intelligently manage radio systems and networks to better utilize spectrum.
CR : smart radio that has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according
to the current state of the environment.
This document discusses security challenges in underwater wireless communication networks (UWCNs). It outlines the unique characteristics of underwater acoustic channels that introduce vulnerabilities, such as high bit error rates and long propagation delays. Several common attacks on UWCNs are described, such as jamming, wormhole attacks, and selective forwarding. The document also discusses security requirements for UWCNs like authentication, confidentiality, integrity and availability. It provides a survey of existing research on securing UWCNs and outlines challenges that remain for achieving secure underwater communication.
This document discusses security challenges in underwater wireless communication networks (UWCNs). It provides an overview of the characteristics of underwater acoustic channels that make UWCNs vulnerable to attacks, such as high bit error rates and low bandwidth. Several common attacks on UWCNs are described, such as jamming, wormhole attacks, and selective forwarding. The document also outlines security requirements for UWCNs, including authentication, confidentiality, integrity, and availability. It provides a survey of existing literature on securing UWCNs and discusses open challenges in providing security for these networks.
The document summarizes underwater wireless communication technology. It discusses how acoustic waves are used instead of radio waves to transmit information underwater over long distances. It describes some of the challenges of underwater acoustic channels including high propagation loss, severe multipath interference, and low sound speed. The document also provides an overview of acoustic modem technology, discussing modulation schemes like FSK and PSK, and the use of equalizers to address multipath interference. The goal of underwater wireless communication is to enable applications like environmental monitoring without the need for heavy cables.
Cognitive Radio: When might it Become Economically and Technically Feasible? Jeffrey Funk
My Master's students use ideas from my (Jeff Funk) forthcoming book (Technology Change and the Rise of New Industries) to analyze the economic and technical feasibility of cognitive radio. See my other slides for details on concepts, methodology, and other new industries.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes research on underwater sensor networks (UWSNs). It describes two common architectures for UWSNs - two-dimensional networks where sensors are anchored to the ocean bottom, and three-dimensional networks where sensors float at different depths. It also outlines key factors that influence underwater acoustic communication in UWSNs, including high path loss, ambient noise, multipath effects, and long propagation delays. The goal of the research is to analyze the network layer and propose novel recommendations to improve the feasibility of UWSNs for applications like structural health monitoring.
The document discusses spectrum usage and dynamic spectrum access. It notes that current spectrum policies result in inefficient usage, with some blocks saturated and others underused. Improved flexibility and regulation are needed. Context-aware applications and cross-layer optimization, including flexible spectrum use, could enhance service. Most discussions focus on cognitive radio and how it can intelligently manage radio systems and networks to better utilize spectrum.
CR : smart radio that has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according
to the current state of the environment.
The document provides an overview of cognitive radio networks and spectrum sharing. It discusses how cognitive radio allows for opportunistic and adaptive usage of spectrum. It defines primary and secondary users and describes the cognitive radio network architecture. It then covers spectrum sensing, management, mobility and sharing in cognitive radio systems. Game theory approaches to modeling spectrum sharing are also summarized.
Cognitive radios are smart radios that can sense their environment and adjust their transmission parameters accordingly. They were first proposed in 1999 to more efficiently utilize limited radio spectrum. Cognitive radios operate in a cycle of spectrum sensing, decision, sharing, and mobility. They can access licensed spectrum as secondary users as long as they do not interfere with primary users. This allows for increased spectrum utilization. Cognitive radios have characteristics of cognitive capability, reconfigurability, and self-organization. They enable applications such as cognitive mesh networks and public safety networks through techniques like dynamic spectrum management.
This document surveys various handoff prioritization and decision schemes used in wireless cellular networks. It begins by introducing handoffs and describing the basic handoff process, including the types of handoffs and key performance metrics. It then details the phases and common schemes for horizontal handoffs between homogeneous networks. Next, it examines the phases and solutions for vertical handoffs between heterogeneous networks. It concludes by discussing the advantages and disadvantages of different handoff schemes and most recent prioritization approaches.
Cognitive radio is an intelligent wireless communication system that is aware of its environment and can learn and adapt to better utilize available spectrum. It aims for highly reliable communication and efficient spectrum usage. Cognitive radios use radio scene analysis to detect spectrum holes by analyzing signals over time and space. They also estimate interference temperature using spectral estimation and adaptive beamforming. Transmit power control and dynamic spectrum management allow cognitive radios to opportunistically access spectrum holes while avoiding interference. Future work may focus on language understanding, MIMO techniques, and nanoscale processing to improve cognitive radio capabilities.
Diversity Techniques in mobile communicationsDiwaker Pant
The document discusses diversity techniques in wireless communication. It introduces different types of diversity including frequency diversity and time diversity. Frequency diversity involves transmitting the same information over multiple carrier frequencies separated by more than the coherence bandwidth. Time diversity involves repeated transmission of information with time spacing exceeding the channel coherence time. The document provides examples of how techniques like frequency division multiplexing and rake receivers implement frequency and time diversity respectively.
This document discusses using a fuzzy logic system to maximize spectrum access in cognitive radio. It proposes controlling spectrum access through a fuzzy logic system to minimize call blocking and interference. The fuzzy logic system will use three descriptors as inputs: the secondary user's spectrum utilization efficiency, degree of mobility, and distance to the primary user. The spectrum chosen for access will be based on the maximum possibility of better utilization while avoiding interference to primary users.
1) Cognitive radio is a smart radio that can identify idle spectrum to transmit its own signals. It is based on software-defined radio and allows for opportunistic usage of available frequencies not being used by primary users.
2) Spectrum sensing techniques like cyclostationary feature detection can be used to detect primary user transmissions by analyzing the cyclic spectral correlation function. This method is more reliable and provides noise immunity.
3) Cooperative spectrum sensing allows multiple cognitive radios to cooperate and share sensing results to overcome issues like shadowing and multipath fading. This improves detection accuracy and agility.
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...Keith Nolan
This document discusses cognitive radio and spectrum scarcity. It begins with an overview of the evolution of wireless technologies and the information age. It then discusses how cognitive radio aims to address the growing problem of spectrum scarcity by allowing for dynamic and flexible usage of spectrum through software-defined radios and adaptation to spectrum availability and use. The document outlines various techniques for characterizing spectrum usage and measuring availability through vehicular experiments and spectrum occupancy analysis to identify opportunities for cognitive radio to more efficiently utilize vacant spectrum.
The document discusses cognitive radio and its benefits. It defines cognitive radio as a radio that is aware of its surroundings and adapts intelligently. Cognitive radio provides a framework for devices to dynamically create links by sensing the environment, evaluating options, and implementing the best waveform. This allows for improved spectrum utilization and quality of service. Some applications of cognitive radio include extending mobile networks, emergency radio systems, and multi-technology phones.
This document discusses cognitive radio sensor networks (CRSN). It defines cognitive radio as a radio that is aware of its surroundings and adapts intelligently. A CRSN allows radios to dynamically tune to different frequencies and protocols based on environmental conditions to improve accessibility, adaptability, scalability, reliability and interconnectivity. The document outlines the CRSN mechanism of sense, analyze, decide and tune in using sensing and reconfigurable antennas. It compares cognitive radios to conventional radios, highlighting cognitive radios' ability to identify unused spectrum and adapt to interference. Benefits of CRSN include meeting FCC regulations and maximizing throughput. Applications of cognitive radio include compact wireless access points.
This document discusses underwater sensor networks. It begins by defining sensors and how machines use sensors like temperature, pressure, and light sensors to perceive the environment. It then discusses wireless sensor networks and key enabling technologies like MEMS, wireless communications, and digital electronics. The rest of the document discusses applications of underwater sensor networks, challenges in their design due to limitations of the underwater environment, how they differ from terrestrial networks, their components like sensors, autonomous underwater vehicles, and communication architectures. It also summarizes the protocol stack and discusses the physical, data link, network, transport and application layers in underwater sensor networks.
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
This document discusses providing quality of service (QoS) for scalable video streaming over ad-hoc networks using cross-layer design. It begins by introducing multi-hop wireless networks and ad-hoc networks, noting their advantages and challenges. It then discusses QoS and cross-layer design approaches. The document proposes using cross-layer design to provision QoS for scalable video streaming over ad-hoc networks in order to overcome challenges like variable topology, limited resources and interference.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
We would send hard copy of Journal by speed post to the address of correspondence author after online publication of paper.
We will dispatched hard copy to the author within 7 days of date of publication
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The document discusses spread spectrum communication schemes. It explains that spread spectrum technologies were initially developed for the military to overcome signal interception and jamming. It does this by transmitting digital signals across a broader bandwidth than the original signal, resulting in lower power and higher spectral density, making the signal harder to detect and intercept. The document outlines different spread spectrum schemes, including frequency hopping spread spectrum which modulates data across multiple frequencies in a pseudorandom sequence, and direct sequence spread spectrum which mixes data with a pseudorandom code before transmission.
This document is a PhD thesis that investigates medium access control (MAC) protocols for underwater swarm sensor networks (USSN) consisting of autonomous underwater vehicles (AUVs). It presents two new decentralized MAC protocols called Adaptive Token Polling MAC (ATP-MAC) and Adaptive Space Time - Time Division Multiple Access (AST-TDMA) for non-time critical and time critical USSN applications respectively. Analytical and simulation results show that the new protocols outperform conventional TDMA in their ability to disseminate time-sensitive information in a timely manner, allowing higher densities of AUVs to operate in swarm-like networks. The thesis also examines the short-range underwater acoustic communication channel characteristics that impact
El documento habla sobre los canales de distribución. Explica las funciones de los canales de distribución, los criterios para seleccionar el canal adecuado y los factores que afectan esta selección, incluyendo factores del producto, de los intermediarios y los principales canales de distribución.
La Unión Europea ha acordado un paquete de sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen restricciones a las transacciones con bancos rusos clave y la prohibición de la venta de aviones y equipos a Rusia. Los líderes de la UE esperan que las sanciones aumenten la presión económica sobre Rusia y la disuadan de continuar su agresión contra Ucrania.
Autorização da Abratel para Prestação de Stfc - 5° Operadora do Brasiltelefoniaoficial
O documento contém vários atos da Agência Nacional de Telecomunicações (Anatel) autorizando empresas a realizar operações temporárias de equipamentos de radiocomunicação em São Paulo entre os dias 6 e 8 de julho de 2012. O documento também contém decisões do Conselho Diretor da Anatel sobre recursos administrativos e pedidos de reconsideração relacionados a processos de outorga e infrações.
The document provides an overview of cognitive radio networks and spectrum sharing. It discusses how cognitive radio allows for opportunistic and adaptive usage of spectrum. It defines primary and secondary users and describes the cognitive radio network architecture. It then covers spectrum sensing, management, mobility and sharing in cognitive radio systems. Game theory approaches to modeling spectrum sharing are also summarized.
Cognitive radios are smart radios that can sense their environment and adjust their transmission parameters accordingly. They were first proposed in 1999 to more efficiently utilize limited radio spectrum. Cognitive radios operate in a cycle of spectrum sensing, decision, sharing, and mobility. They can access licensed spectrum as secondary users as long as they do not interfere with primary users. This allows for increased spectrum utilization. Cognitive radios have characteristics of cognitive capability, reconfigurability, and self-organization. They enable applications such as cognitive mesh networks and public safety networks through techniques like dynamic spectrum management.
This document surveys various handoff prioritization and decision schemes used in wireless cellular networks. It begins by introducing handoffs and describing the basic handoff process, including the types of handoffs and key performance metrics. It then details the phases and common schemes for horizontal handoffs between homogeneous networks. Next, it examines the phases and solutions for vertical handoffs between heterogeneous networks. It concludes by discussing the advantages and disadvantages of different handoff schemes and most recent prioritization approaches.
Cognitive radio is an intelligent wireless communication system that is aware of its environment and can learn and adapt to better utilize available spectrum. It aims for highly reliable communication and efficient spectrum usage. Cognitive radios use radio scene analysis to detect spectrum holes by analyzing signals over time and space. They also estimate interference temperature using spectral estimation and adaptive beamforming. Transmit power control and dynamic spectrum management allow cognitive radios to opportunistically access spectrum holes while avoiding interference. Future work may focus on language understanding, MIMO techniques, and nanoscale processing to improve cognitive radio capabilities.
Diversity Techniques in mobile communicationsDiwaker Pant
The document discusses diversity techniques in wireless communication. It introduces different types of diversity including frequency diversity and time diversity. Frequency diversity involves transmitting the same information over multiple carrier frequencies separated by more than the coherence bandwidth. Time diversity involves repeated transmission of information with time spacing exceeding the channel coherence time. The document provides examples of how techniques like frequency division multiplexing and rake receivers implement frequency and time diversity respectively.
This document discusses using a fuzzy logic system to maximize spectrum access in cognitive radio. It proposes controlling spectrum access through a fuzzy logic system to minimize call blocking and interference. The fuzzy logic system will use three descriptors as inputs: the secondary user's spectrum utilization efficiency, degree of mobility, and distance to the primary user. The spectrum chosen for access will be based on the maximum possibility of better utilization while avoiding interference to primary users.
1) Cognitive radio is a smart radio that can identify idle spectrum to transmit its own signals. It is based on software-defined radio and allows for opportunistic usage of available frequencies not being used by primary users.
2) Spectrum sensing techniques like cyclostationary feature detection can be used to detect primary user transmissions by analyzing the cyclic spectral correlation function. This method is more reliable and provides noise immunity.
3) Cooperative spectrum sensing allows multiple cognitive radios to cooperate and share sensing results to overcome issues like shadowing and multipath fading. This improves detection accuracy and agility.
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...Keith Nolan
This document discusses cognitive radio and spectrum scarcity. It begins with an overview of the evolution of wireless technologies and the information age. It then discusses how cognitive radio aims to address the growing problem of spectrum scarcity by allowing for dynamic and flexible usage of spectrum through software-defined radios and adaptation to spectrum availability and use. The document outlines various techniques for characterizing spectrum usage and measuring availability through vehicular experiments and spectrum occupancy analysis to identify opportunities for cognitive radio to more efficiently utilize vacant spectrum.
The document discusses cognitive radio and its benefits. It defines cognitive radio as a radio that is aware of its surroundings and adapts intelligently. Cognitive radio provides a framework for devices to dynamically create links by sensing the environment, evaluating options, and implementing the best waveform. This allows for improved spectrum utilization and quality of service. Some applications of cognitive radio include extending mobile networks, emergency radio systems, and multi-technology phones.
This document discusses cognitive radio sensor networks (CRSN). It defines cognitive radio as a radio that is aware of its surroundings and adapts intelligently. A CRSN allows radios to dynamically tune to different frequencies and protocols based on environmental conditions to improve accessibility, adaptability, scalability, reliability and interconnectivity. The document outlines the CRSN mechanism of sense, analyze, decide and tune in using sensing and reconfigurable antennas. It compares cognitive radios to conventional radios, highlighting cognitive radios' ability to identify unused spectrum and adapt to interference. Benefits of CRSN include meeting FCC regulations and maximizing throughput. Applications of cognitive radio include compact wireless access points.
This document discusses underwater sensor networks. It begins by defining sensors and how machines use sensors like temperature, pressure, and light sensors to perceive the environment. It then discusses wireless sensor networks and key enabling technologies like MEMS, wireless communications, and digital electronics. The rest of the document discusses applications of underwater sensor networks, challenges in their design due to limitations of the underwater environment, how they differ from terrestrial networks, their components like sensors, autonomous underwater vehicles, and communication architectures. It also summarizes the protocol stack and discusses the physical, data link, network, transport and application layers in underwater sensor networks.
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
This document discusses providing quality of service (QoS) for scalable video streaming over ad-hoc networks using cross-layer design. It begins by introducing multi-hop wireless networks and ad-hoc networks, noting their advantages and challenges. It then discusses QoS and cross-layer design approaches. The document proposes using cross-layer design to provision QoS for scalable video streaming over ad-hoc networks in order to overcome challenges like variable topology, limited resources and interference.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
We would send hard copy of Journal by speed post to the address of correspondence author after online publication of paper.
We will dispatched hard copy to the author within 7 days of date of publication
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The document discusses spread spectrum communication schemes. It explains that spread spectrum technologies were initially developed for the military to overcome signal interception and jamming. It does this by transmitting digital signals across a broader bandwidth than the original signal, resulting in lower power and higher spectral density, making the signal harder to detect and intercept. The document outlines different spread spectrum schemes, including frequency hopping spread spectrum which modulates data across multiple frequencies in a pseudorandom sequence, and direct sequence spread spectrum which mixes data with a pseudorandom code before transmission.
This document is a PhD thesis that investigates medium access control (MAC) protocols for underwater swarm sensor networks (USSN) consisting of autonomous underwater vehicles (AUVs). It presents two new decentralized MAC protocols called Adaptive Token Polling MAC (ATP-MAC) and Adaptive Space Time - Time Division Multiple Access (AST-TDMA) for non-time critical and time critical USSN applications respectively. Analytical and simulation results show that the new protocols outperform conventional TDMA in their ability to disseminate time-sensitive information in a timely manner, allowing higher densities of AUVs to operate in swarm-like networks. The thesis also examines the short-range underwater acoustic communication channel characteristics that impact
El documento habla sobre los canales de distribución. Explica las funciones de los canales de distribución, los criterios para seleccionar el canal adecuado y los factores que afectan esta selección, incluyendo factores del producto, de los intermediarios y los principales canales de distribución.
La Unión Europea ha acordado un paquete de sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen restricciones a las transacciones con bancos rusos clave y la prohibición de la venta de aviones y equipos a Rusia. Los líderes de la UE esperan que las sanciones aumenten la presión económica sobre Rusia y la disuadan de continuar su agresión contra Ucrania.
Autorização da Abratel para Prestação de Stfc - 5° Operadora do Brasiltelefoniaoficial
O documento contém vários atos da Agência Nacional de Telecomunicações (Anatel) autorizando empresas a realizar operações temporárias de equipamentos de radiocomunicação em São Paulo entre os dias 6 e 8 de julho de 2012. O documento também contém decisões do Conselho Diretor da Anatel sobre recursos administrativos e pedidos de reconsideração relacionados a processos de outorga e infrações.
Este documento proporciona instrucciones para completar un trabajo práctico sobre el planeta Tierra. Se pide al estudiante que cree una carpeta con su nombre, abra un enlace web sobre datos fascinantes de la Tierra, pegue la información en un documento de Word guardado en su carpeta, y aplique un formato específico que incluye bordes de página, marca de agua, títulos, estilos de fuente, y división del texto en dos columnas.
O Núcleo de Cultura do CEU Tiquatira está promovendo um concurso de fotografia chamado "A São Paulo que eu quero ver". Os interessados podem enviar uma foto digital até 15 de setembro e serão julgados por originalidade, pertinência ao tema e qualidade artística. Os três primeiros colocados receberão bolsas de estudos em cursos de fotografia e os 20 melhores escolhidos pelo público terão suas fotos expostas.
El documento proporciona instrucciones para geolocalizar un Instituto de Formación Docente (IFD) en Google Maps y agregar el mapa a una página web. Primero se busca la dirección del IFD en Google Maps y se verifica que coincida con su ubicación real. Luego se copia el código HTML de enlace del mapa y se pega en la página web del nodo para insertar el mapa.
Este documento apresenta os resultados financeiros da Triunfo Participações e Investimentos no terceiro trimestre de 2011. Os principais pontos são: (1) Crescimento de 7,2% no tráfego rodoviário e de 14,4% na receita do segmento; (2) Queda de 10,2% no volume portuário devido a chuvas, porém aumento de 30,8% na receita; (3) Crescimento de 11,1% na geração de energia e de 32,6% na energia gerada. Apesar de prejuízo líqu
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksbijcicnjournal
Underwater wireless sensor networks (UWSNs) are essential for doing any type of task underwater. Huge broadcast lag, great error degree, small bandwidth, and restricted energy in Underwater Sensor Networks interest concentration of utmost investigators. In UWSNs, the efficient use of energy is one of the main problems, as the substitution of energy sources in this kind of location is extremely costly. UWSNs are utilized in many fields, like measuring pollution, issuing tsunami cautions, conducting offshore surveys, and strategic tracing. For numerous functions, the efficacy and dependability of network regarding prominent operation, energy preservation, small bit error rate, and decreased interruption are fundamental. Nevertheless, UWSN’s exclusive features like small bandwidth accessibility, large interruptions in broadcast, very vivacious network topology, and extreme possibility of error present numerous problems in the growth of effective and dependable communication procedures. As opposed to current deepness-based routing techniques, we are focusing on CoDBR (Cooperative Depthbased Routing) and CEEDBR (Cooperative Energy Efficient Depth-based Routing) procedures to improve network lifespan, energy efficacy, and amount.
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networksbijcicnjounal
UWSNs (underwater wireless sensor networks) are essential for doing any type of task underwater. Huge broadcast lag, great error degree, small bandwidth, and restricted energy in Underwater Sensor Networks interest concentration of utmost investigators. In UWSNs, the efficient use of energy is one of the main problems, as the substitution of energy sources in this kind of location is extremely costly. UWSNs are utilized in many fields, like measuring pollution, issuing tsunami cautions, conducting offshore surveys, and strategic tracing. For numerous functions, the efficacy and dependability of network regarding prominent operation, energy preservation, small bit error rate, and decreased interruption are fundamental. Nevertheless, UWSN’s exclusive features like small bandwidth accessibility, large interruptions in broadcast, very vivacious network topology, and extreme possibility of error present numerous problems in the growth of effective and dependable communication procedures. As opposed to current deepness-based routing techniques, we are focusing on CoDBR (Cooperative Depth-based Routing) and CEEDBR (Cooperative Energy Efficient Depth-based Routing) procedures to improve network lifespan, energy efficacy, and amount.
This document summarizes a research paper that proposes a new routing protocol called Vector-Based Forwarding (VBF) for underwater sensor networks. VBF is a location-based routing approach that uses the position of nodes to efficiently route data through a network of moving underwater sensors. It forms redundant forwarding paths between source and destination nodes to improve reliability. VBF also uses a self-adaptation algorithm to allow nodes to discard redundant packets to reduce energy consumption. The paper argues that VBF provides robust, scalable and energy efficient routing for underwater sensor networks.
This document provides an overview of underwater communication protocols and challenges in underwater wireless sensor networks (UWSNs). It discusses that UWSNs face different challenges than terrestrial networks due to limited bandwidth, high propagation delays, and dynamic underwater channels. Several MAC protocols have been proposed to provide energy efficient and reliable data transmission from sensor nodes to a sink node in UWSNs. The document reviews research on localization techniques, existing MAC protocols, and advances and future trends in the physical, MAC and routing layers of UWSN communication stacks. It aims to give a comprehensive overview of the current state of research in key areas of UWSNs.
“Securing underwater wireless communication networks” 2Naveena N
This document summarizes a seminar presentation on securing underwater wireless communication networks. It discusses the existing challenges with underwater wireless networks including high bit error rates, propagation delays, and low bandwidth. It proposes three schemes for securing such networks: secure time synchronization to enable power saving; secure localization for location information and data tagging; and secure routing to reject paths with malicious nodes. The techniques aim to provide secure data transmission and are based on mechanisms like time synchronization, localization using time/signal information, and routing protocols.
Securing Underwater Wireless Communication Networks.pptxkkkkDipaloke Arunodoy
This document outlines securing underwater wireless communication networks. It discusses the necessity of underwater communication networks (UWCNs) due to limitations of wired networks underwater. It describes various attacks on UWCNs like jamming, wormhole attacks, and selective forwarding. It proposes countermeasures like spread spectrum techniques and multipath routing. The document also discusses requirements for secure UWCNs like authentication, confidentiality, and integrity. It proposes mechanisms for secure time synchronization, localization, and routing in UWCNs. Applications of UWCNs include search and rescue missions, environmental monitoring, and marine archaeology.
This document outlines securing underwater wireless communication networks. It discusses the necessity of underwater communication networks for applications like monitoring and introduces common attacks like jamming, wormholes, and Sybil attacks. It proposes countermeasures like spread spectrum techniques and localization. The document also covers important security requirements like authentication, confidentiality, and integrity. It proposes mechanisms for secure time synchronization, localization, and routing to address challenges in underwater wireless networks.
This document is a project report submitted by four students for their Bachelor of Engineering degree. It examines quality of service improvement in wireless sensor networks. Specifically, it studies cluster-based routing protocols like LEACH and proposes modifications to LEACH called MODLEACH that introduces efficient cluster head replacement and dual transmitting power levels. Thresholding techniques are also incorporated into MODLEACH to further boost performance based on metrics like throughput, network lifetime and cluster head formations. The report analyzes and compares the performance of LEACH, MODLEACH, MODLEACH with hard thresholds and MODLEACH with soft thresholds through simulation and implementation in Qualnet and Matlab.
Wireless sensor networks (WSNs) consist of distributed sensor nodes that communicate wirelessly. Routing protocols for WSNs include flooding, gossiping, SPIN, and GEAR. Flooding broadcasts data to all neighbors while gossiping randomly selects neighbors, avoiding duplicated data. SPIN and GEAR use data negotiation and geographical information to route packets efficiently. Common networking technologies in WSNs are Bluetooth, ZigBee, UWB, and Wi-Fi, with each having advantages for different applications depending on data rates and power requirements. TinyOS and Contiki are lightweight operating systems used in WSNs. WSNs have a variety of applications including environmental monitoring, pollution monitoring, and detection of fires, landslides
This document outlines security challenges and mechanisms for underwater wireless communication networks (UWCNs). UWCNs use acoustic links for sensors and autonomous underwater vehicles due to radio frequency absorption by water. The document discusses common attacks on UWCNs like jamming, wormholes, and selective forwarding. It proposes secure time synchronization, localization, and routing to authenticate nodes and secure the network. Potential applications of UWCNs include environmental monitoring, search and rescue missions, and marine archaeology. Key challenges are limited battery power, bandwidth, and high error rates in underwater acoustic channels.
Architectural study of littoral zone sensing using underwater acoustic wirele...IAEME Publication
This document summarizes and discusses different architectural approaches for deploying underwater wireless sensor networks to monitor coastal environments. It describes Pompili and Melodia's 2D and 3D static architectures where sensor nodes are anchored to the seabed or attached to buoys at various depths. It also discusses challenges like energy efficiency, node mobility, and propagation delays. Modified 3D architectures are proposed where nodes can dynamically adjust their depths using engines. Finally, it introduces a multipath virtual sink architecture using clustering and local aggregation points to improve reliability and robustness of data transmission.
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
This document summarizes and reviews various routing protocols for wireless sensor networks. It begins by describing the characteristics and design objectives of wireless sensor networks. It then discusses the design constraints for routing in these networks, including autonomy, energy efficiency, scalability, resilience, and heterogeneity. The document classifies routing protocols into three categories: data-centric/negotiation-based, hierarchical/cluster-based, and location-based. Examples like SPIN, directed diffusion, LEACH, and PEGASIS are described for each category. Location-based protocols such as GAF that use node positions are also mentioned.
Improving reliability & performance of wsn via routing errorsijctet
The document proposes a scheme called Link Scanner (LS) for detecting faulty links in wireless sensor networks. LS operates passively by collecting hop count data from probe flooding processes. It analyzes mismatches between expected and received hop counts to infer which links may be faulty. Having a blacklist of potential faulty links allows further analysis and recovery, including adjusting routing strategies, identifying root causes of observed network issues, and providing spare link options. The scheme aims to not only detect currently faulty links but also evaluate unused links, to help guide rerouting for better performance. It was tested on a 60-node sensor network and in simulation and found to accurately detect faulty links with low overhead.
A Review on Architecture, Issues, Challenges and Applications in Underwater W...ijtsrd
Underwater Wireless Sensor Network UWSN is an emerging technique for various underwater applications such as marine climate observation, pollution tracking, disaster prevention, underwater surveillance etc. And, each of these applications require Sensor Nodes SNs to effectively provide accurate sensed data. A node must know its own location before sending data to its neighbour. The need for location arises because the number of nodes is very large and it is not possible for the base station to nd the nodes' positions, so the individual node is required to send location information along with the observed data to provide exact location to the user, which means the node must localize itself. However, due to the complex environment, it is very challenging to transmit the collected data to the base station on the surface quickly and effectively. An energy ef cient routing protocol plays a vital role in data transmission. However, due to the speci c characteristics of UWSNs, such as dynamic structure, narrow bandwidth, rapid energy consumption, and high latency, it is dif cult to build routing protocols for UWSNs. In this article, we focus on surveying architecture, challenges, opportunities as well as various applications in UWSN. Gaurav Rai | Ravi Kumar Malik "A Review on Architecture, Issues, Challenges and Applications in Underwater Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18634.pdf
Underwater sensor networks have the potential to enable new applications and enhance ocean observation. They consist of sensors, autonomous underwater vehicles, and communication architecture. Challenges include limited bandwidth, multipath effects, and power constraints. The network topology and protocol stack must be designed to address issues like delays and bandwidth restrictions. Underwater sensor networks differ from terrestrial networks in deployment, power, memory and other factors due to the underwater environment. They can be used for applications like environmental monitoring, exploration, and disaster prevention.
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
This document discusses key design issues affecting the deployment of wireless sensor networks for pipeline monitoring. It identifies critical requirements such as the need for low-cost solutions to monitor long pipelines traversing remote areas. The document covers sensing modalities, power efficiency, energy harvesting, network reliability, and localization as major design categories. It emphasizes the need to consider these issues to facilitate effective pipeline monitoring using wireless sensor networks.
Geographic routing protocols for underwater wireless sensor networks a surveyijwmn
Underwater wireless sensor networks (UWSN), similar to the terrestrial sensor networks, have different
challenges such as limited bandwidth, low battery power, defective underwater channels, and high variable
propagation delay. A crucial problem in UWSN is finding an efficient route between a source and a
destination. Consequently, great efforts have been made for designing efficient protocols while considering
the unique characteristics of underwater communication. Several routing protocols are proposed for this
issue and can be classified into geographic and non-geographic routing protocols. In this paper we focus
on the geographic routing protocols. We introduce a review and comparison of different algorithms
proposed recently in the literature. We also presented a novel taxonomy of these routing in which the
protocols are classified into three categories (greedy, restricted directional flooding and hierarchical)
according to their forwarding strategies.
A Review on Congestion control Mechanisms in Wireless Sensor NetworksIJERA Editor
Recently, Wireless Sensor Networks (WSNs) have been in many applications and systems with vastly
varying requirements and characteristics. Due to this, it would be difficult to decide the requirements
regarding hardware issues and software support. Heterogeneous applications can be integrated within
the same wireless sensor network with the aid of modern motes that have multiple sensors on a single
radio board. Considering such multi-purpose nodes, different types of data could be generated from
such types of motes with many transmission characteristics in terms of priority, transmission rate,
required bandwidth, tolerable packet loss, delay demands etc. WSNs have many different constraints,
such as computational power, storage capacity, energy supply and the most important issue is their
energy constraint. Energy aware routing protocol is very important in WSN, but only considering
energy has no efficiency in performance.
Congestion in WSNs is one of the critical problems still from its evolution. Congestion causes
malfunctions such as packet loss, lower throughput, energy efficiency, increase in collisions, increase
in queuing delay and decreased network lifetime. As a result, the performance of the whole network is
subject to undesirable and unpredictable changes. In this paper, WSN performance control by robust
Congestion control approaches that aim to keep the network operational under varying network
conditions is presented.
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
A reliable routing protocol for wireless sensor
networks (WSN) should be capable of adjusting to
constantly varying network conditions while conserving
maximum power. Existing Routing protocols provide
reliability at the cost of high energy consumption. In this
paper, we propose to develop an Adaptive Energy Efficient
Reliable Routing Protocol (AEERRP) with the aim of
keeping the energy consumption low while achieving high
reliability. In our proposed protocol, the data forwarding
probability is adaptively adjusted based on the measured
loss conditions at the sink. So only for high loss rates, a node
makes use of high transmission power to arrive at the sink.
Whenever the loss rate is low, it adaptively lessens the
transmission power. Since the source rebroadcasts the data,
until the packet loss is minimized, high data reliability is
achieved. By simulation results we show that the proposed
protocol achieves high reliability while ensuring low energy
consumption and overhead.
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
Fd24967971
1. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.967-971
Analysis of Malicious Data in Underwater Sensor Network
Heena Ahuja*, Er. Jyoti Gupta**
*(Student, Department of ECE, MMU Mulllana, Ambala, India)
** (Assistant Professor, Department of ECE,MMU Mullana, Ambala, India)
ABSTRACT
In this paper, we tackle the malicious Battery power is limited and usually
attacks in Underwater Sensor Networks batteries cannot be recharged, also
(UWSNs). Underwater Sensor Networks because solar energy cannot be exploited.
(UWSNs) consists of variable number of sensors Underwater sensors are prone to failures
and vehicles that are deployed to perform because of fouling and corrosion.
collaborative monitoring tasks over a given
area. In this paper, we use a novel routing Currently, many routing protocols are available for
protocol, called vector-based forwarding (VBF) terrestrial wireless sensor networks. However,
protocol, to provide robust, scalable and energy specific properties of underwater medium make
efficient routing to deploy an Underwater existing routing protocols inappropriate for under
Sensor Network. VBF is essentially a position- water. The main challenges in developing efficient
based routing approach: nodes close to the routing protocols for underwater environments are:
“vector" from the source to the destination will
forward the message. Then we introduce the High propagation delays: The radio
malicious node in the network that hack the signals do not work efficiently under
data of nodes when nodes undergoes Denial of water and this problem encourages use of
Service attack (DoS). Thus in this paper we acoustic communication instead. The main
have compared the various parameters like problems with the acoustic channel,
Throughput, PDR, PLR and Checksum Errors however, are low bandwidths and long
for before and after attack and results are propagation delays.
shown in this paper. Node mobility: Due to water currents,
nodes can fluctuate or move if they are not
Keywords - checksum error, denial of service, anchored at the bottom of the sea. This
nodes, PDR, PLR. situation results in a dynamic network
topology. Moreover, autonomous
1. INTRODUCTION underwater vehicles and robots used for
exploration and controls can be utilised to
1.1 Definition of Underwater Sensor Network route and mulling data.
Underwater Sensor Networks (UWSN) Error prone acoustic underwater channels:
consists of a variable number of sensors and Since the acoustic channels have very low
vehicles that are deployed to perform collaborative bandwidth capacity, they suffer from high
monitoring tasks over a given area. To achieve this bit error rates.
objective, sensors and vehicles self-organize in an Limited energy: Like in terrestrial wireless
autonomous network which can adapt to the sensor networks, majority of sensor nodes
characteristics of the ocean environment. in UWSNs are battery powered.
Major challenges in the design of underwater
Sensor Networks are [1]: 1.2 Vector Based Forwarding Protocol (VBF)
In sensor networks, energy constraint is a
The available bandwidth is severely crucial factor since sensor nodes usually run on
limited. battery, and it is impossible or difficult to recharge
The underwater channel is severely them in most application scenarios. In underwater
impaired, especially due to multi-path and sensor networks, in addition to energy saving, the
fading. routing algorithms should be able to handle node
Propagation delay in underwater is five mobility in an efficient way [2].
orders of magnitude higher than in radio
frequency (RF) terrestrial channels, and Vector-Based Forwarding (VBF) protocol
extremely variable. meets these requirements successfully. We assume
High bit error rates and temporary losses that each node in VBF knows its position
of connectivity (shadow zones) can be information, which is provided by some location
experienced, due to the extreme algorithms. If there is no such localization service
characteristics of the underwater channel. available, a sensor node can still estimate its
967 | P a g e
2. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.967-971
relative position to the forwarding node by secrets, financial or healthcare records or any other
measuring its distance to the forwarder and the kind of sensitive information. Attacks on the
angle of arrival (AOA) and strength of the signal confidentiality of wireless transmissions are created
by being armed with some hardware device. by the simple act of analyzing a signal travelling
through the air.
Availability: Availability is allowing
legitimate users access to confidential information
after they have been properly authenticated. When
availability is compromised, the access is denied
for legitimate users because of malicious activity
such as denial of service (DOS) attacks. Receiving
RF Signal is not always possible, especially if
someone does not want you to. Using a signal
jammer to jam an RF signal is a huge problem that
Fig.1: A high level view of VBF for UWSNs. has been faced by national governments for years.
The position information can be calculated Integrity: Integrity involves the
by measuring the AOA and strength of the signal. unauthorized modification of information. This
In VBF, each packet carries the positions of the could mean modifying information while in transit
sender, the target, and the forwarder (i.e., the node or while being stored electronically or via some
which transmits this packet). The forwarding path type of media. To protect the integrity of
is specified by the routing vector from the sender to information, one must employ a validation
the target. Upon receiving a packet, a node technique. This technique can be in the form of
computes its relative position to the forwarder. checksum, an integrity check, or a digital signature.
Recursively, all the nodes receiving the packet Wireless networks are intended to function in an
compute their positions. If a node determines that it unimpaired manner, free from deliberate or
is sufficiently close to the routing vector (e.g., less inadvertent manipulation of the system.
than a predefined distance threshold), it puts its
own computed position in the packet and continues 1.4 Various attacks in UWSNs
forwarding the packet; otherwise, it simply discards
the packet. In this way, all the packet forwarders in Denial of Service (DoS): A Denial of
the sensor network form a “routing pipe”: the Service attack in sensor networks and networks in
sensor nodes in this pipe are eligible for packet general is defined as any event that eliminates the
forwarding, and those which are not close to the network’s capacity to perform its desired function.
routing vector (i.e., the axis of the pipe) do not DoS attacks in wireless sensor networks may be
forward. Fig. 1 illustrates the basic idea of VBF. In carried out at different layers like the physical, link,
the above figure, node S1 is the source, and node S0 routing and transport layers. [4], [5].This occurs by
is the sink. The routing vector is specified by S1S0. the unintentional failure of sensor nodes. The
Data packets are forwarded from S 1 to S0. simplest DoS attack tries to exhaust the resources
Forwarders along the routing vector form a routing available to the victim node, by transmitting
pipe with a pre controlled radius (i.e., the distance additional unwanted packets and thus prevents
threshold, denoted by W).As we can see, like all legitimate sensor network users from tapping work
other source routing protocols, VBF requires no or resources to which these nodes are deployed [6].
state information at each node. Therefore, it is Denial of Service (DoS) attack is means that not
scalable to the size of the network. Moreover, in only for the adversary’s attempt to subvert, disrupt,
VBF, only the nodes along the forwarding path or destroy a sensor network, but also for any event
(specified by the routing vector) are involved in that diminishes a sensor network’s capability to
packet routing, thus saving Security Issues and provide a service [7].In WSNs, several types of
Solutions in UWSNs. Denial of Service attacks in different layers might
be performed. i.e. at physical layer, the Denial of
1.3 Various security parameters in UWSNs Service attacks could be jamming and tampering, at
Various security parameters are [3]: link layer, collision, exhaustion, unfairness, at
Confidentiality: An attack on the network layer, neglect and greed, homing,
confidentiality of information means theft or misdirection, black holes and at transport layer this
unauthorized access of data. This can be performed attack could be performed by malicious flooding
in lots of ways, such as the interception of data and resynchronizations.
while in transit or it can be simply the theft of
equipment on which the data might reside. The Wormhole attacks: A devastating attack
goal of compromising confidentiality is to obtain is known as the wormhole attack, where more than
proprietary information, user credentials, trade two malicious colluding sensor nodes does a
968 | P a g e
3. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.967-971
virtual tunnel in the wireless sensor network, which The accuracy of IDS is measured in terms of false
is used to forward message packets between the positives i.e. the normal activities which have been
tunnel edge points. This tunnel establishes shorter reported as malicious and false negatives i.e. an
links in the network. In which adversary documents attack which has not been detected by the IDS.
forwards packets at one location in the sensor
network, tunnels them to different location, and re- 2. PROBLEM DEFINITION
forwards them into the sensor network. In sensor The following two problems we have
network when sender node sends a message to proposed here deal that can be linked together with
another receiver node in the network [1].Then the them to give out the desired results:
receiving node tries to send the message to its 1) Underwater sensor networks should be secure
neighboring nodes. The neighbor sensor nodes and reliable in such a manner that they do not
assume that the message was sent by the sender defeat the purpose of data acquisition.
node (this is normally out of range), so they tries to
forward the message to the originating node, but 2) Underwater sensor networks are prone to
this message never comes because it is too far malicious data attacks as they are based on sensing
away. Wormhole attack is a great threat to sensor data which is RF based since they can be contacted/
networks since, this type of attack will not require communicated from any other signal in device
compromising a wireless sensor in the network which may be malicious in intent.
instead; it could be performed even at the starting
phase during the sensors initializes to identify its 3. RESEARCH METHODOLOGY
neighboring information [7]. This Wormhole This paper is based on the following
attacks are very difficult to stop since routing research methodology. There are four main steps in
information given by a sensor node is very difficult UWSN’s Threat Analysis:
to check. The wormhole attack is possible even 1) Study of UWSN
when the attacker has not compromised with any
hosts nodes and even if all communication provides 2) Deploy a UWSN using VBF Protocol
confidentiality and are authenticated also.
3) Data transmission and correction
Sinkhole attack: In this case a
4) Compare the results before and after attack
compromised sensor node tries to influence the
information to it from each and every neighboring Step One: In the first step study of
node. Thereby, sensor node eavesdrops on each and Underwater Sensor Network is done. Various
every information is being communicated with its properties of Underwater Network are studied over
neighboring sensor nodes. the Terrestrial Network. These properties are
Underwater Network is highly dynamic, prone to
1.5 Intrusion Detection System
errors, low bandwidth and high latency. Above all
Information Systems and networks are there are various properties of Underwater Network
vulnerable to electronic attacks. Underwater Sensor like Environmental monitoring, undersea
Networks are vulnerable to a large variety of explorations, Distributed tactical surveillance,
attacks. To prevent a network, first and foremost assisted navigation, Disaster prevention, Mine
important thing that is helpful is an Intrusion reconnaissance. Under the study of UWSN it has
Detection System (IDS) which can be used for both been studied that energy constraint is a crucial
wired as well as wireless networks. The challenges factor since sensor nodes usually run on battery,
in designing an IDS for Underwater Sensor and it is impossible or difficult to recharge them in
Network are much more than any other network most application scenarios. In underwater sensor
due to the fact that it is dynamic in nature, networks, in addition to energy saving, the routing
decentralized nature, and access to radio medium. algorithms should be able to handle node mobility
Thus the intrusion detection system of Underwater in an efficient way. Various threats of UWSNs
Sensor Network needs to be different from that of have also been studied like Denial of Service,
the wired networks. Wormhole attacks, Sinkhole attack, Sybil Attack,
Hello flood attack and the countermeasures against
The main purpose of Intrusion detection these attacks have also been studied. Various
system is not to prevent attacks but to alert network protocols of UWSNs has also been studied.
administrator about the possible attacks so that they
can be detected in time and hence their effect can Step Two: After the study of UWSN, a network is
be reduced. An IDS differentiates the aberrant deployed using VBF protocols. There are many
activities from normal one and identifies the other protocols of UWSNs and it has been studied
malicious activities from abnormal but non-
malicious activities.
969 | P a g e
4. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.967-971
in the previous step that sending and receiving nodes exchange keys and
start sending data and receiving acknowledgement.
There is a malicious node in the network which
hacks the data and does not send any
acknowledgement to the sending node when Denial
of Service (DoS) occurs in certain nodes.
Step Four: When the attack occurs in the
network, the various parameters like Packet
Delivery Ratio (PDR), Packet Lost Ratio (PLR),
Throughput and checksum errors have been
studied, compared and plotted for before and after
attack.
4. RESULTS AND DISCUSSION
Fig. 3 shows the Throughput vs. Message
Arrival Rate for normal run or before attack and
after attack. Throughput is the no. of bits per slot. It
is shown in the following figure that no. of bits per
slot for normal run is more than no. of bits per slot
after the attack has been occurred.
Fig. 3: Throughput vs. Message Arrival Rate
Fig. 4 shows the Packet Delivery Ratio (PDR)
between two sensors. It is clear that packet delivery
ratio is more in normal run condition and when the
Fig. 2: Algorithm for the UWSN’s Threat Analysis attack occurs the packet delivery ratio start
decreasing.
VBF is the most robust, scalable and
energy efficient. In VBF, each packet carries the
positions of the sender, the target, and the
forwarder (i.e., the node which transmits this
packet). The forwarding path is specified by the
routing vector from the sender to the target. Upon
receiving a packet, a node computes its relative
position to the forwarder. Recursively, all the nodes
receiving the packet compute their positions. If a
node determines that it is sufficiently close to the Fig. 4: Packet Delivery Ratio
routing vector (e.g., less than a predefined distance
threshold), it puts its own computed position in the Fig. 5 shows the Packet Loss Ratio between two
packet and continues forwarding the packet; sensors. It is exactly opposite of Packet Delivery
otherwise, it simply discards the packet. In this Ratio. It is show in the figure that there is loss in
way, all the packet forwarders in the sensor packets when the attack occurs.
network form a “routing pipe”: the sensor nodes in
this pipe are eligible for packet forwarding, and
those which are not close to the routing vector (i.e.,
the axis of the pipe) do not forward.
Step Three: After the deployment of
network, the network starts transmitting the data by
checking the minimum Angle of Arrival and
Desirable Factor. Then the network checks whether Fig. 5: Packet Loss Ratio
the channel is free or not. If the channel is free the
970 | P a g e
5. Heena Ahuja, Er. Jyoti Gupta / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.967-971
Fig. 6 shows the Check Sum Errors for normal run Networks”, EURASIP Journal on Wireless
and after attack. It is clear from the following fig. Communications and Networking Volume
that checksum errors are more in after attack 2010, Article ID 195910, 13 pages.
condition. [3] J.-P. Hubaux,S. Cˇapkun, and J. Luo. The
Security and Privacy of Smart Vehicles.
IEEE Security & Privacy, pages 49–55,
2004.
[4] A. D. Wood and J. A. Stankovic, “Denial
of service in sensor networks,” IEEE
Computer, vol. 35, no. 10, pp. 54–62,
October 2002.
Fig. 6: Checksum Errors [5] M. Lee, E. J. Kim, and C. W. Lee,
“Source identification scheme against DoS
6. CONCLUSION attacks in cluster interconnects,” in Proc.
In this paper it has tried to explore the International Workshop on Network
possibility of threats of Underwater Sensor Design and Architecture, Montreal,
Network, as we progress we found the most Quebec, August 2004, pp. 354–362.
prominent attack which might occur in Underwater [6] A.D. Wood and J.A. Stankovic, (2002)
Sensor Network which might occur in Underwater “Denial of Service in Sensor Networks,”
Sensor Network might be related to resource Computer, vol. 35, no. 10, 2002, pp. 54–
constraints. These resource constraints are natural 62.
due to nature of Underwater Sensors which cannot [7] David R. Raymond and Scott F. Midkiff,
be supplied with recharging of power/energy. (2008) "Denial-of-Service in Wireless
Therefore when nodes communicate with each Sensor Networks: Attacks and Defenses,"
other even in an efficient routing protocol like IEEE Pervasive Computing, vol. 7, no. 1,
VBF, there is a possibility that a node might 2008, pp. 74-81.
behave maliciously or may indefinitely continue to [8] Adrian Perrig, John Stankovic,,” Security
communicate with each other and at the same time in wireless sensor networks”. ACM
deny services to other nodes. In this simulation it Communication, 47(6): 2004, pp. 53-57.
has been demonstrated the same scenario and [9] Zaw Tun and Aung Htein Maw,(2008),”
observed before and after attacks on the network. Worm hole Attack Detection in Wireless
These before and after attack observation were Sensor networks”, proceedings of world
made by recording the trace of each event occur in Academy of Science, Engineering and
simulation. By using this trace we identified few Technology Volume 36, December 2008,
parameters based on which we could identify ISSN 2070-3740.
abnormal behavior in the network. These include [10] Denning D.(1987) “An Intrusion-
Check Sum error, Packet Delivery Ratio, Packet Detection Model,” IEEE Transactions on
Lost Ratio and Throughput. It is apparent from the Software Engineering, Vol.SE-13, No 2,
bar graph shown above that these values drastically pp. 222-232.
change if an attack is accused which shows
abnormal behavior in the network.
7. FUTURE SCOPE
The research for detection of such
scenarios which are related to the attack on services
are limited due to resource constraints or external
manipulations of the node which turns maliciously
in nature. For future scope it has been suggested
that more scenarios must be considered and some
Intrusion Detection System must be designed so
that we can have secure Underwater Sensor
Networks.
REFERENCES
[1] J. G. Proakis, E. M. Sozer, J. A. Rice, and
M. Stojanovic, “Shallow water acoustic
networks,” IEEE Communications
Magazine, pp. 114–119, Nov. 2001.
[2] Peng Xie et.al,” Efficient Vector-Based
Forwarding for Underwater Sensor
971 | P a g e