SlideShare a Scribd company logo
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
          Jnana Sangama, Belgaum, Karnataka-590 014.




                         A Seminar On
“Securing Underwater Wireless Communication Networks”

 By                                     Project Guide
 NAVEENA N (1BT08CS051)                 Mr. KESHAVA M
                                        (Lecturer of CSE department)



           B.T.L INSTITUTE OF TECHNOLOGY
         Department of Computer Science & Engineering
                          2010-11
AGENDA

oAbstract

oUnderwater Wireless Communication Networks

oExisting system

oProposed System

oDrawbacks

oApplications

oConclusion
ABSTRACT
 Underwater      wireless    communication
  networks are particularly vulnerable to
  malicious attacks due to the high bit error
  rates, large and variable propagation
  delays, and low bandwidth of acoustic
  channels.



 (UWCNs) are constituted by sensors and
  autonomous underwater vehicles (AUVs) that
  interact to perform specific applications such
  as underwater monitoring.
ABSTRACT
 Both      intervehicle and     sensor-AUV
  communications can be affected by denial-of-
  service (DoS) attacks.

 We propose several methods to secure
  Underwater  Wireless   Communication
  Networks.

 We design three schemes namely, secure time
  synchronization, localization, and routing in
  UWCNs
ABSTRACT
 Aim of proposed techniques is to enable the
  system to provide secure data transmission.

 Secure time synchronization aims for
  power saving.

 Secure localization aims to provide location
  information and data tagging.

 Secure routing rejects routing paths
  containing malicious nodes.
These techniques are based on following
                     mechanisms
 Secure Time Synchronization
     It is essential in many underwater applications such as
     coordinated sensing tasks. & scheduling algorithms such as
     timedivision multiple access (TDMA).
 SECURE LOCALIZATION
      Localization is a very important issue for data tagging.
      Localization schemes can be classified into two types:
     (i) Range-based schemes (using range or bearing
     information):
     (ii) Range-free schemes (not using range or bearing
     information):
 SECURE ROUTING
     Routing is essential for packet delivery in UWCNs.
Underwater Wireless Communication Networks
Underwater Wireless Communication Networks are constituted by
 sensor nodes, also known as motes or simply nodes are
  small and energy constrained devices that have the
  ability of sensing the surrounding environment.

 The sink, also known as base station, is a more powerful
  node that behaves as an interface between the sensor
  nodes and the clients.

 Autonomous Underwater Vehicles (AUVs) that
  interact to perform specific applications such as
  underwater monitoring
Underwater sensor network with AUV’s
Existing system

 Radio waves do not propagate well underwater due to the high energy
  absorption of water

 Therefore, underwater communications are based on acoustic links
  characterized by large propagation delays. The propagation speed of
  acoustic signals in water (typically 1500 m/s)

 Acoustic channels have low bandwidth As a result, the bit error rates
  of acoustic links are often high, and losses of connectivity arise

 It cannot rely on the Global Positioning System (GPS) because it uses
  radar waves in the 1.5 GHz band that do not propagate in water.
Existing system
 The above mentioned characteristics of UWCNs have several security
  implications.
 High bit error rates cause packet errors. Consequently, critical security
  packets can be lost. Wireless underwater channels can be
  eavesdropped on. Attackers may intercept the information transmitted
  and attempt to modify or drop packets.
 Both intervehicle and sensor-AUV communications can be affected
  by denial-of-service (DoS) attacks. Several attacks are
 Jamming
 Wormhole attack              Acknowledgement spoofing
 Sinkhole attack              Selective forwardiing
                               Sybil attack
 Hello flood attack
Attacks on UWCN’s




  Jamming attack
Attacks on UWCN’s




  Wormhole attack
Attacks on UWCN’s




   Sybil attack
Proposed system
 Secure time synchronization mechanism
Achieving precise time synchronization is especially difficult
in underwater environments due to the characteristics of
UWCNs. For this reason, the time synchronization
mechanisms proposed for ground-based sensor networks
cannot be applied, and new mechanisms have been proposed.
 Secure Localization
Proposed terrestrial localization schemes based on received
signal strength (RSS) are not recommended in UWCNs, since
non-uniform acoustic signal propagation causes signifiant
variations in the RSS. Time of arrival (ToA) and time
difference of arrival (TDoA)
Proposed system(contd)

 Secure routing
 Routing is essential for packet delivery in UWCNs. Proposed
  broadcast authentication methods would cause high communication
  overhead and latency in UWCNs. Multipath routing would cause high
  communication overhead as well.
Advantages

 It avoids data spoofing.

 It avoids privacy leakage.

 Minimize communication and computational cost.

 Maximizes the battery power by preserve the power of
  Underwater sensors.
Drawbacks


 Routing is specially challenging in UWCNs due to the large
  propagation delays, low bandwidth, difficulty of battery refills of
  underwater sensors, and dynamic topologies.



 Schemes is challenging because they do not work well in mobile
  environments.
APPLICATIONS




 Environmental monitoring to gathering of oceanographic
  data
APPLICATIONS




 Search and rescue missions
APPLICATIONS




Marine archaeology
APPLICATIONS




    Defense
CONCLUSION

    Wireless technology will play a vital role in many
    application areas that are not possible in the past. Wireless
    Underwater communication would be one of them.

 The main challenges related to secure time
  synchronization, localization, and routing have been
  surveyed.

 Since the deployment of the proposed system is still in its
  development stage, an account of actual implementation has
  not been provided in this paper.
Thank you…!!!

More Related Content

What's hot

Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
Şüheda Acar
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
Shubham Srivastava
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,
Er. Saba karim
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
tanveer alam
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
frestoadi
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt asharanick
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkSrija Kumar
 
Light tree
Light treeLight tree
Light tree
Jitendra31291
 
Implementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelImplementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channel
SANKETLKENDUR
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
Shudhanshu Singh
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
gaurav kumar
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
Yogesh Fulara
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
patna
 
Military radar and satellite switching
Military radar and satellite switchingMilitary radar and satellite switching
Military radar and satellite switching
MDKAWSARAHMEDSAGAR
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)
Mustafa Khaleel
 
MicroStrip Antenna
MicroStrip AntennaMicroStrip Antenna
MicroStrip Antenna
Tarek Nader
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdm
RAVITEJA828
 
UNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASEDUNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASED
Maharishi markandeshwar University
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 

What's hot (20)

Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Light tree
Light treeLight tree
Light tree
 
Implementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelImplementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channel
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
Military radar and satellite switching
Military radar and satellite switchingMilitary radar and satellite switching
Military radar and satellite switching
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)
 
MicroStrip Antenna
MicroStrip AntennaMicroStrip Antenna
MicroStrip Antenna
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdm
 
UNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASEDUNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASED
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 

Viewers also liked

Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)
MM.H.Saboo Siddik Polytechnic
 
Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)
Ahmed ElSheikh
 
The Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesThe Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface Vehicles
Steve Shaker
 
Underwater Welding
Underwater WeldingUnderwater Welding
Underwater Welding
Karan Prajapati
 
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVsKevin Ma
 
Advantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsAdvantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVs
Hydrographic Society Benelux
 
"Click here" to build your UAV
"Click here" to build your UAV"Click here" to build your UAV
"Click here" to build your UAV
Dirk Gorissen
 
Merging Technology Ui2009
Merging Technology Ui2009Merging Technology Ui2009
Merging Technology Ui2009
Kenneth Fersht
 
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceaniMichele Cocco
 
Stormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone TrialStormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone TrialPramod Janardhanan
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defense
elev0083
 

Viewers also liked (11)

Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)
 
Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)
 
The Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesThe Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface Vehicles
 
Underwater Welding
Underwater WeldingUnderwater Welding
Underwater Welding
 
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
 
Advantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsAdvantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVs
 
"Click here" to build your UAV
"Click here" to build your UAV"Click here" to build your UAV
"Click here" to build your UAV
 
Merging Technology Ui2009
Merging Technology Ui2009Merging Technology Ui2009
Merging Technology Ui2009
 
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
 
Stormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone TrialStormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone Trial
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defense
 

Similar to “Securing underwater wireless communication networks” 2

Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
SunilPoddar7
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
bijcicnjounal
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...
IAEME Publication
 
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksAnalysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
bijcicnjournal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)IJRAT
 
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
IRJET Journal
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148IJRAT
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
Mphasis
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
Dipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
Dipaloke Arunodoy
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
Devyani Vaidya
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a survey
ijwmn
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
Iaetsd Iaetsd
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...
IAEME Publication
 
Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture
Yohannes Bishaw
 

Similar to “Securing underwater wireless communication networks” 2 (20)

Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...
 
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksAnalysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a survey
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Fs2410401044
Fs2410401044Fs2410401044
Fs2410401044
 
50120140502016
5012014050201650120140502016
50120140502016
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...
 
Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture
 

More from Naveena N

Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
Naveena N
 
A review of cloud computing for transportation system
A review of cloud computing for transportation systemA review of cloud computing for transportation system
A review of cloud computing for transportation system
Naveena N
 
Multithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processorMultithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processor
Naveena N
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networks
Naveena N
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Naveena N
 

More from Naveena N (7)

Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
 
A review of cloud computing for transportation system
A review of cloud computing for transportation systemA review of cloud computing for transportation system
A review of cloud computing for transportation system
 
Multithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processorMultithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processor
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networks
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

“Securing underwater wireless communication networks” 2

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014. A Seminar On “Securing Underwater Wireless Communication Networks” By Project Guide NAVEENA N (1BT08CS051) Mr. KESHAVA M (Lecturer of CSE department) B.T.L INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering 2010-11
  • 2. AGENDA oAbstract oUnderwater Wireless Communication Networks oExisting system oProposed System oDrawbacks oApplications oConclusion
  • 3. ABSTRACT  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels.  (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring.
  • 4. ABSTRACT  Both intervehicle and sensor-AUV communications can be affected by denial-of- service (DoS) attacks.  We propose several methods to secure Underwater Wireless Communication Networks.  We design three schemes namely, secure time synchronization, localization, and routing in UWCNs
  • 5. ABSTRACT  Aim of proposed techniques is to enable the system to provide secure data transmission.  Secure time synchronization aims for power saving.  Secure localization aims to provide location information and data tagging.  Secure routing rejects routing paths containing malicious nodes.
  • 6. These techniques are based on following mechanisms  Secure Time Synchronization It is essential in many underwater applications such as coordinated sensing tasks. & scheduling algorithms such as timedivision multiple access (TDMA).  SECURE LOCALIZATION Localization is a very important issue for data tagging. Localization schemes can be classified into two types: (i) Range-based schemes (using range or bearing information): (ii) Range-free schemes (not using range or bearing information):  SECURE ROUTING Routing is essential for packet delivery in UWCNs.
  • 7. Underwater Wireless Communication Networks Underwater Wireless Communication Networks are constituted by  sensor nodes, also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment.  The sink, also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients.  Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring
  • 9. Existing system  Radio waves do not propagate well underwater due to the high energy absorption of water  Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s)  Acoustic channels have low bandwidth As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise  It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water.
  • 10. Existing system  The above mentioned characteristics of UWCNs have several security implications.  High bit error rates cause packet errors. Consequently, critical security packets can be lost. Wireless underwater channels can be eavesdropped on. Attackers may intercept the information transmitted and attempt to modify or drop packets.  Both intervehicle and sensor-AUV communications can be affected by denial-of-service (DoS) attacks. Several attacks are  Jamming  Wormhole attack  Acknowledgement spoofing  Sinkhole attack  Selective forwardiing  Sybil attack  Hello flood attack
  • 11. Attacks on UWCN’s  Jamming attack
  • 12. Attacks on UWCN’s Wormhole attack
  • 13. Attacks on UWCN’s Sybil attack
  • 14. Proposed system  Secure time synchronization mechanism Achieving precise time synchronization is especially difficult in underwater environments due to the characteristics of UWCNs. For this reason, the time synchronization mechanisms proposed for ground-based sensor networks cannot be applied, and new mechanisms have been proposed.  Secure Localization Proposed terrestrial localization schemes based on received signal strength (RSS) are not recommended in UWCNs, since non-uniform acoustic signal propagation causes signifiant variations in the RSS. Time of arrival (ToA) and time difference of arrival (TDoA)
  • 15. Proposed system(contd)  Secure routing  Routing is essential for packet delivery in UWCNs. Proposed broadcast authentication methods would cause high communication overhead and latency in UWCNs. Multipath routing would cause high communication overhead as well.
  • 16. Advantages  It avoids data spoofing.  It avoids privacy leakage.  Minimize communication and computational cost.  Maximizes the battery power by preserve the power of Underwater sensors.
  • 17. Drawbacks  Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies.  Schemes is challenging because they do not work well in mobile environments.
  • 18. APPLICATIONS  Environmental monitoring to gathering of oceanographic data
  • 19. APPLICATIONS  Search and rescue missions
  • 21. APPLICATIONS  Defense
  • 22. CONCLUSION  Wireless technology will play a vital role in many application areas that are not possible in the past. Wireless Underwater communication would be one of them.  The main challenges related to secure time synchronization, localization, and routing have been surveyed.  Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided in this paper.