This document summarizes a seminar presentation on securing underwater wireless communication networks. It discusses the existing challenges with underwater wireless networks including high bit error rates, propagation delays, and low bandwidth. It proposes three schemes for securing such networks: secure time synchronization to enable power saving; secure localization for location information and data tagging; and secure routing to reject paths with malicious nodes. The techniques aim to provide secure data transmission and are based on mechanisms like time synchronization, localization using time/signal information, and routing protocols.
Underwater Wireless Communication is the wireless communication in which acoustic signals (waves) carry digital information through an underwater channel.
Underwater wireless communication networks (UWCNs) consist of sensors and autonomous underwater vehicles (AUVs) that interact, coordinate and share information with each other to carry out sensing and monitoring functions.
Topic on Underwater Communication which includes both underwater wireless and wired communication . A full detailed overview about the topic has been given. Pictures are given to visualize the topic in better way. Covers a major potion like Hydrophones and SONAR. Can be presented as a seminar topic as well .
Underwater acoustic communication is a technique of sending and receiving message below water.[1] There are several ways of employing such communication but the most common is using hydrophones. Under water communication is difficult due to factors like multi-path propagation, time variations of the channel, small available bandwidth and strong signal attenuation, especially over long ranges. In underwater communication there are low data rates compared to terrestrial communication, since underwater communication uses acoustic waves instead of electromagnetic waves.
Underwater Wireless Communication is the wireless communication in which acoustic signals (waves) carry digital information through an underwater channel.
Underwater wireless communication networks (UWCNs) consist of sensors and autonomous underwater vehicles (AUVs) that interact, coordinate and share information with each other to carry out sensing and monitoring functions.
Topic on Underwater Communication which includes both underwater wireless and wired communication . A full detailed overview about the topic has been given. Pictures are given to visualize the topic in better way. Covers a major potion like Hydrophones and SONAR. Can be presented as a seminar topic as well .
Underwater acoustic communication is a technique of sending and receiving message below water.[1] There are several ways of employing such communication but the most common is using hydrophones. Under water communication is difficult due to factors like multi-path propagation, time variations of the channel, small available bandwidth and strong signal attenuation, especially over long ranges. In underwater communication there are low data rates compared to terrestrial communication, since underwater communication uses acoustic waves instead of electromagnetic waves.
While wireless communication technology today has become part of our daily life, the
idea of wireless undersea communications may still seem far-fetched. However, research has
been active for over a decade on designing the methods for wireless information transmission
underwater. Human knowledge and understanding of the world’s oceans, which constitute
the major part of our planet, rests on our ability to collect information from remote undersea
locations.
The major discoveries of the past decades, such as the remains of Titanic, or the hydrothermal
vents at bottom of deep ocean, were made using cabled submersibles. Although such
systems remain indispensable if high-speed communication link is to exists between the
remote end and the surface, it is natural to wonder what one could accomplish without the
burden (and cost) of heavy cables.
Hence the motivation, and interest in wireless underwater communications. Together with
sensor technology and vehicular technology, wireless communications will enable new
applications ranging from environmental monitoring to gathering of oceanographic data,
marine archaeology, and search and rescue missions.
Implementation of Optical wireless communication through underwater channelSANKETLKENDUR
This project is based on transformation of data like text, voice, audio and image through underwater using visible light. This is major application in military like navy and submarines, scientific community for underwater research, flood detection, climatic changes , oceanography and more . The cost of this budget around 15k to 17k.
MicroStrip Antenna
Introduction .
Micro-Strip Antennas Types .
Micro-Strip Antennas Shapes .
Types of Substrates (Dielectric Media) .
Comparison of various types of flat profile printed antennas .
Advantages & DisAdvantages of MSAs .
Applications of MSAs .
Radiation patterns of MSAs .
How to Optimizing the Substrate Properties for Increased Bandwidth ?
Comparing the different feed techniques .
Seminar on underwater sensor network in which we are focusing on energy conservation or how to regain the energy in the sensor from tidal energy this is generating the new concept in this field
An autonomous underwater vehicle (AUV) is a robot which travels underwater without requiring input from an operator. AUVs constitute part of a larger group of undersea systems known as unmanned underwater vehicles, a classification that includes non-autonomous remotely operated underwater vehicles (ROVs) – controlled and powered from the surface by an operator/pilot via an umbilical or using remote control. In military applications AUVs are more often referred to simply as unmanned undersea vehicles (UUVs).
While wireless communication technology today has become part of our daily life, the
idea of wireless undersea communications may still seem far-fetched. However, research has
been active for over a decade on designing the methods for wireless information transmission
underwater. Human knowledge and understanding of the world’s oceans, which constitute
the major part of our planet, rests on our ability to collect information from remote undersea
locations.
The major discoveries of the past decades, such as the remains of Titanic, or the hydrothermal
vents at bottom of deep ocean, were made using cabled submersibles. Although such
systems remain indispensable if high-speed communication link is to exists between the
remote end and the surface, it is natural to wonder what one could accomplish without the
burden (and cost) of heavy cables.
Hence the motivation, and interest in wireless underwater communications. Together with
sensor technology and vehicular technology, wireless communications will enable new
applications ranging from environmental monitoring to gathering of oceanographic data,
marine archaeology, and search and rescue missions.
Implementation of Optical wireless communication through underwater channelSANKETLKENDUR
This project is based on transformation of data like text, voice, audio and image through underwater using visible light. This is major application in military like navy and submarines, scientific community for underwater research, flood detection, climatic changes , oceanography and more . The cost of this budget around 15k to 17k.
MicroStrip Antenna
Introduction .
Micro-Strip Antennas Types .
Micro-Strip Antennas Shapes .
Types of Substrates (Dielectric Media) .
Comparison of various types of flat profile printed antennas .
Advantages & DisAdvantages of MSAs .
Applications of MSAs .
Radiation patterns of MSAs .
How to Optimizing the Substrate Properties for Increased Bandwidth ?
Comparing the different feed techniques .
Seminar on underwater sensor network in which we are focusing on energy conservation or how to regain the energy in the sensor from tidal energy this is generating the new concept in this field
An autonomous underwater vehicle (AUV) is a robot which travels underwater without requiring input from an operator. AUVs constitute part of a larger group of undersea systems known as unmanned underwater vehicles, a classification that includes non-autonomous remotely operated underwater vehicles (ROVs) – controlled and powered from the surface by an operator/pilot via an umbilical or using remote control. In military applications AUVs are more often referred to simply as unmanned undersea vehicles (UUVs).
It is the welding process done under the water with the help of two methods : Dry Welding and Wet Welding. The presentation provides basic knowledge on the underwater welding and it's respective techniques.
Autonomous underwater vehicles (AUVs) often operate close to the seabed (5m-15m) enabling higher resolution surveys using high frequency sonars. Compact Autonomous surface vessels (ASVs) are often deployed in shallow water environments where deeper-draft manned survey vessels are unable to operate. On such vehicles there is limited space to deploy separate imaging, mapping and sub-bottom sonars. This presentation describes the technology deployed in the EdgeTech 2205 sonar system, which enables combined data acquisition in one system on AUVs and ASVs. Examples of the data acquired are given, which can include dual- or triple- frequency side scan, Multiphase Echosounder (MPES) swath bathymetry, and sub-bottom profiler data.
This document contains information about the SAAB Seaeye remotely operated vehicles in the context of current and future merging technologies within the ROV field. For more info contact underwater robotics specialist, Chris Roper of http://www.roperresources.com
This is the slideshow that I used while doing my thesis defense for "Analysis, Redesign and Verification of the Iver2 Autonomous Underwater Vehicle Motion Controller."
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networksbijcicnjounal
UWSNs (underwater wireless sensor networks) are essential for doing any type of task underwater. Huge broadcast lag, great error degree, small bandwidth, and restricted energy in Underwater Sensor Networks interest concentration of utmost investigators. In UWSNs, the efficient use of energy is one of the main problems, as the substitution of energy sources in this kind of location is extremely costly. UWSNs are utilized in many fields, like measuring pollution, issuing tsunami cautions, conducting offshore surveys, and strategic tracing. For numerous functions, the efficacy and dependability of network regarding prominent operation, energy preservation, small bit error rate, and decreased interruption are fundamental. Nevertheless, UWSN’s exclusive features like small bandwidth accessibility, large interruptions in broadcast, very vivacious network topology, and extreme possibility of error present numerous problems in the growth of effective and dependable communication procedures. As opposed to current deepness-based routing techniques, we are focusing on CoDBR (Cooperative Depth-based Routing) and CEEDBR (Cooperative Energy Efficient Depth-based Routing) procedures to improve network lifespan, energy efficacy, and amount.
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksbijcicnjournal
Underwater wireless sensor networks (UWSNs) are essential for doing any type of task underwater. Huge broadcast lag, great error degree, small bandwidth, and restricted energy in Underwater Sensor Networks interest concentration of utmost investigators. In UWSNs, the efficient use of energy is one of the main problems, as the substitution of energy sources in this kind of location is extremely costly. UWSNs are utilized in many fields, like measuring pollution, issuing tsunami cautions, conducting offshore surveys, and strategic tracing. For numerous functions, the efficacy and dependability of network regarding prominent operation, energy preservation, small bit error rate, and decreased interruption are fundamental. Nevertheless, UWSN’s exclusive features like small bandwidth accessibility, large interruptions in broadcast, very vivacious network topology, and extreme possibility of error present numerous problems in the growth of effective and dependable communication procedures. As opposed to current deepness-based routing techniques, we are focusing on CoDBR (Cooperative Depthbased Routing) and CEEDBR (Cooperative Energy Efficient Depth-based Routing) procedures to improve network lifespan, energy efficacy, and amount.
Geographic routing protocols for underwater wireless sensor networks a surveyijwmn
Underwater wireless sensor networks (UWSN), similar to the terrestrial sensor networks, have different
challenges such as limited bandwidth, low battery power, defective underwater channels, and high variable
propagation delay. A crucial problem in UWSN is finding an efficient route between a source and a
destination. Consequently, great efforts have been made for designing efficient protocols while considering
the unique characteristics of underwater communication. Several routing protocols are proposed for this
issue and can be classified into geographic and non-geographic routing protocols. In this paper we focus
on the geographic routing protocols. We introduce a review and comparison of different algorithms
proposed recently in the literature. We also presented a novel taxonomy of these routing in which the
protocols are classified into three categories (greedy, restricted directional flooding and hierarchical)
according to their forwarding strategies.
Wireless underground Sensor Network based on IOT water saved agriculture Yohannes Bishaw
We introduced the concept of WUSNs in which sensor devices are deployed completely below ground. There e are existing applications of underground sensing, such as soil monitoring for agriculture.
Similar to “Securing underwater wireless communication networks” 2 (20)
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
“Securing underwater wireless communication networks” 2
1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY
Jnana Sangama, Belgaum, Karnataka-590 014.
A Seminar On
“Securing Underwater Wireless Communication Networks”
By Project Guide
NAVEENA N (1BT08CS051) Mr. KESHAVA M
(Lecturer of CSE department)
B.T.L INSTITUTE OF TECHNOLOGY
Department of Computer Science & Engineering
2010-11
3. ABSTRACT
Underwater wireless communication
networks are particularly vulnerable to
malicious attacks due to the high bit error
rates, large and variable propagation
delays, and low bandwidth of acoustic
channels.
(UWCNs) are constituted by sensors and
autonomous underwater vehicles (AUVs) that
interact to perform specific applications such
as underwater monitoring.
4. ABSTRACT
Both intervehicle and sensor-AUV
communications can be affected by denial-of-
service (DoS) attacks.
We propose several methods to secure
Underwater Wireless Communication
Networks.
We design three schemes namely, secure time
synchronization, localization, and routing in
UWCNs
5. ABSTRACT
Aim of proposed techniques is to enable the
system to provide secure data transmission.
Secure time synchronization aims for
power saving.
Secure localization aims to provide location
information and data tagging.
Secure routing rejects routing paths
containing malicious nodes.
6. These techniques are based on following
mechanisms
Secure Time Synchronization
It is essential in many underwater applications such as
coordinated sensing tasks. & scheduling algorithms such as
timedivision multiple access (TDMA).
SECURE LOCALIZATION
Localization is a very important issue for data tagging.
Localization schemes can be classified into two types:
(i) Range-based schemes (using range or bearing
information):
(ii) Range-free schemes (not using range or bearing
information):
SECURE ROUTING
Routing is essential for packet delivery in UWCNs.
7. Underwater Wireless Communication Networks
Underwater Wireless Communication Networks are constituted by
sensor nodes, also known as motes or simply nodes are
small and energy constrained devices that have the
ability of sensing the surrounding environment.
The sink, also known as base station, is a more powerful
node that behaves as an interface between the sensor
nodes and the clients.
Autonomous Underwater Vehicles (AUVs) that
interact to perform specific applications such as
underwater monitoring
9. Existing system
Radio waves do not propagate well underwater due to the high energy
absorption of water
Therefore, underwater communications are based on acoustic links
characterized by large propagation delays. The propagation speed of
acoustic signals in water (typically 1500 m/s)
Acoustic channels have low bandwidth As a result, the bit error rates
of acoustic links are often high, and losses of connectivity arise
It cannot rely on the Global Positioning System (GPS) because it uses
radar waves in the 1.5 GHz band that do not propagate in water.
10. Existing system
The above mentioned characteristics of UWCNs have several security
implications.
High bit error rates cause packet errors. Consequently, critical security
packets can be lost. Wireless underwater channels can be
eavesdropped on. Attackers may intercept the information transmitted
and attempt to modify or drop packets.
Both intervehicle and sensor-AUV communications can be affected
by denial-of-service (DoS) attacks. Several attacks are
Jamming
Wormhole attack Acknowledgement spoofing
Sinkhole attack Selective forwardiing
Sybil attack
Hello flood attack
14. Proposed system
Secure time synchronization mechanism
Achieving precise time synchronization is especially difficult
in underwater environments due to the characteristics of
UWCNs. For this reason, the time synchronization
mechanisms proposed for ground-based sensor networks
cannot be applied, and new mechanisms have been proposed.
Secure Localization
Proposed terrestrial localization schemes based on received
signal strength (RSS) are not recommended in UWCNs, since
non-uniform acoustic signal propagation causes signifiant
variations in the RSS. Time of arrival (ToA) and time
difference of arrival (TDoA)
15. Proposed system(contd)
Secure routing
Routing is essential for packet delivery in UWCNs. Proposed
broadcast authentication methods would cause high communication
overhead and latency in UWCNs. Multipath routing would cause high
communication overhead as well.
16. Advantages
It avoids data spoofing.
It avoids privacy leakage.
Minimize communication and computational cost.
Maximizes the battery power by preserve the power of
Underwater sensors.
17. Drawbacks
Routing is specially challenging in UWCNs due to the large
propagation delays, low bandwidth, difficulty of battery refills of
underwater sensors, and dynamic topologies.
Schemes is challenging because they do not work well in mobile
environments.
22. CONCLUSION
Wireless technology will play a vital role in many
application areas that are not possible in the past. Wireless
Underwater communication would be one of them.
The main challenges related to secure time
synchronization, localization, and routing have been
surveyed.
Since the deployment of the proposed system is still in its
development stage, an account of actual implementation has
not been provided in this paper.