SlideShare a Scribd company logo
INDIAN INSTITUTE OF SCIENCE AND TECHNOLOGY,
SHIBPUR
Electronics And Telecommunication Dept.
Dipaloke Howlader
Exam roll-110712033
SECURING UNDERWATER WIRELESS
COMMUNICATION NETWORKS
OUTLINE
 INTRODUCTION
HISTORY
NECCESITY OF UWCNs
ATTACKS AND COUNTER MEASURES
SECURITY REQUIREMENT
PROPOSED SECURITY MECHANISM
APPLICATIONS OF UWCNs
DISADVANTAGES OF UWCNs
CONCLUSION
REFERENCES
INTRODUCTION
.Underwater wireless communication networks (UWCNs) are constituted
by sensors and autonomous underwater vehicles (AUVs) that interact to
perform specific applications such as underwater monitoring .
 Sensors Nodes are simply nodes energy constrained devices that have
ability of sensing the surrounding environment.
 Sink also known as base station, is a more powerful node that behaves
as an interface between the sensor nodes and the clients.
 Autonomous Underwater Vehicles (AUVS) that interact to perform
specific applications such as underwater monitoring.
HISTORY
 The science of underwater communication began in 1490 when
Leonardo da Vinci stated.
 In 1687 , Issac Newton wrote his Mathematical Principles of Natural
Philosophy which included the first mathematical treatment of sound
of water.
NECESSITY OF UWCNs
Wired underwater is not feasible in all situations as shown below-
 Temporary experiments
 Breaking of wires
 Significant cost of deployment
 Experiment over long distances
 Radio waves do not propagate well underwater due to high energy
absorption of water. Therefore UWCNs are based on acoustic links
characterized by large propagation delay.
 It cannot rely on GPS.
ATTACKS AND COUNTERMEASURES
 Underwater wireless communication networks are particularly vulnerable
to malicious attacks due to the high bit error rates, large and variable
propagation delays and low bandwidth of acoustic channels.
 Several methods are proposed to secure UWCN . Three schemes are there
namely secure time synchronaization, localization and routing in UWCN.
Jamming
Wormh
ole
attacks
Sybil
attack
Selective
Forwardi
ng
Acknowl
edgment
Spoofing
ATTACKS Hello
Flood
attack
Sinkhole
Attacks
ATTACKS AND COUNTER MEASURES
JAMMING
Method of Attack
A jamming attack consists of interfering with the physical channel by putting
up carriers on the frequencies neighbor nodes use to communicate .
Countermeasures
 Spread spectrum techniques
 Sensors can switch to sleep mode
WORMHOLE ATTACK
Methods of Attack
• False neighbourhood relationship
are created.
• The adversary can delay or drop
packets sent through the wormhole.
Countermeasures
 Estimating the direction of arrival by a
wormhole indicator variable.
SINKHOLE ATTACK
Methods of Attack
• A malicious node attempts to attract
traffic from a particular area towards it by
announcing that it is a high quality route.
Countermeasures
 Geographical routing.
 Authentication of nodes exchanging
routing information.
HELLO FLOOD ATTACK
Methods of Attack
• A node receiving a hello packet from a malicious node may interpret that
the adversary is a neighbor node.
Countermeasures
 Bidirectional link verification.
 Authentication is a possible defense.
SELECTIVE FORWARDING
Methods of Attack
• Malicious nodes drop certain messages instead of forwarding
them to hinder routing.
Countermeasures
 Multipath routing.
 Authentication.
Sybil Attack
Methods of Attack
• Sybil attack is defined as a malicious
node illegitimately taking on multiple
identities.
• Attacker with multiple identities
pretend to be in many places at once.
Countermeasures
 Authentication.
 Position verification.
Acknowledgement Spoofing
Methods of Attack
• A malicious node overhearing packets sent to neighbor nodes use the
information to spoof acknowledgements.
Countermeasures
 Encryption of all packets sent through the networks.
SECURITY REQUIREMENT
 Authentication :-Proof that data was sent by a legitimate user.
 Confidentiality:- Information is not accessible to unauthorized
parties.
 Integrity:-Information is not altered.
 Availability:-Data should be available when needed by an authorized
user.
PROPOSED SECURITY MECHANISM
Securing underwater wireless communication :
Secure time synchronization.
Secure localization.
Secure routing.
SECURE TIME SYNCHRONIZATION:
Why is Time Synchronization important ?
 Location and proximity siblings
 Maintain ordering of messages
 Internetwork coordination
 Energy efficiency
SECURE LOCALIZATION:
Why is Localization important ?
 Sensor tasks .
 Making routing decisions .
 The attacker makes the node think it is somewhere different from actual location.As a
result wrong decisions happen.
Secure localization gives the guarantee of correctness despite of
presence of intruders.It is the process for each sensor node to locate its position in the
network.
SECURE ROUTING:
Why is routing important ?
 A sensor routing rejects the routing paths containing malicious
nodes.
 It is specially challenging in UWCNs due to the large propagation
delays,low bandwidth,difficulty of battery refills of underwater
sensors and dynamic topologies.
APPLICATIONS OF
UNDERWATER WIRELESS
COMMUNICATION.
Search and rescue missions under water.
Environmental monitoring to gather oceanographic data.
Marine archaeology
DISADVANTAGES of UWCNs
 Battery power is limited and can not be recharged easily.
 The available bandwidth is severely limited.
 Long and variable propagation delays.
 Multipath and fading problems.
 High bity error rate.
CONCLUSION
 Wireless technology will play a vital role in many application areas that
are not possible in past.
 The main challenges related to secure time synchronization,localization
and routing have been surveyed.
 Since the deployment of the proposed system is still in its development
stage , an account of actual implementation has not been provided in
this paper. The research issues of UWCNs remain wide open for
future investigation.
REFERENCES
 M.C Domingo ,”Securing underwater wireless communication networks”, Journal ,IEEE Wireless Communications archive.
Volume 18 Issue 1, February 2011
 I.F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc
Net., vol. 3, no. 3, Mar. 2005.
 W. Wang et al., “Visualization of Wormholes in Under-water Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3,
no. 1, 2008.
 F. Hu, S. Wilson, and Y. Xiao, “Correlation-Based Security in Time Synchronization of Sensor Networks,” Proc. IEEE WCNC,
2008.
 C. Tian et al., “Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks,”
Proc. IEEE ICC, 2009.
 C. Tian et al., “Localization and Synchronization for 3D Underwater Acoustic Sensor Networks,” in Ubiquitous Intelligence and
Computing, LNCS, Springer, 2007, pp. 622–31.
Securing Underwater  Wireless  Communication Networks.pptxkkkk

More Related Content

What's hot

11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
argh61
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Editor IJCTER
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
Devyani Vaidya
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Bala Lavanya
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
Md Waresul Islam
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
gaurav kumar
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
sofiakhatoon
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
ghaidaa WN
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
farrukh Farrukh
 
Guard-dog Intrusion Detector: Class project on Wireless sensor networks
Guard-dog Intrusion Detector: Class project on Wireless sensor networksGuard-dog Intrusion Detector: Class project on Wireless sensor networks
Guard-dog Intrusion Detector: Class project on Wireless sensor networks
prajon
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
Harsh Kishore Mishra
 

What's hot (19)

11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Security issues
Security issuesSecurity issues
Security issues
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Slideshare
SlideshareSlideshare
Slideshare
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
Guard-dog Intrusion Detector: Class project on Wireless sensor networks
Guard-dog Intrusion Detector: Class project on Wireless sensor networksGuard-dog Intrusion Detector: Class project on Wireless sensor networks
Guard-dog Intrusion Detector: Class project on Wireless sensor networks
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 

Similar to Securing Underwater Wireless Communication Networks.pptxkkkk

“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
Naveena N
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
bijcicnjounal
 
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksAnalysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
bijcicnjournal
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
Richa Kumari
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
IJARIIE JOURNAL
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Bala Lavanya
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstract
vishnuRajan20
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errors
ijctet
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
RABIA ASHRAFI
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
raosg
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
ijwmn
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
Ramesh Patriotic
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
IISRT
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
IISRTJournals
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
tanveer alam
 

Similar to Securing Underwater Wireless Communication Networks.pptxkkkk (20)

“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksAnalysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstract
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errors
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 

Recently uploaded

J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 

Recently uploaded (20)

J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 

Securing Underwater Wireless Communication Networks.pptxkkkk

  • 1. INDIAN INSTITUTE OF SCIENCE AND TECHNOLOGY, SHIBPUR Electronics And Telecommunication Dept. Dipaloke Howlader Exam roll-110712033 SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS
  • 2. OUTLINE  INTRODUCTION HISTORY NECCESITY OF UWCNs ATTACKS AND COUNTER MEASURES SECURITY REQUIREMENT PROPOSED SECURITY MECHANISM APPLICATIONS OF UWCNs DISADVANTAGES OF UWCNs CONCLUSION REFERENCES
  • 3. INTRODUCTION .Underwater wireless communication networks (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring .  Sensors Nodes are simply nodes energy constrained devices that have ability of sensing the surrounding environment.  Sink also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients.  Autonomous Underwater Vehicles (AUVS) that interact to perform specific applications such as underwater monitoring.
  • 4. HISTORY  The science of underwater communication began in 1490 when Leonardo da Vinci stated.  In 1687 , Issac Newton wrote his Mathematical Principles of Natural Philosophy which included the first mathematical treatment of sound of water.
  • 5. NECESSITY OF UWCNs Wired underwater is not feasible in all situations as shown below-  Temporary experiments  Breaking of wires  Significant cost of deployment  Experiment over long distances  Radio waves do not propagate well underwater due to high energy absorption of water. Therefore UWCNs are based on acoustic links characterized by large propagation delay.  It cannot rely on GPS.
  • 6. ATTACKS AND COUNTERMEASURES  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays and low bandwidth of acoustic channels.  Several methods are proposed to secure UWCN . Three schemes are there namely secure time synchronaization, localization and routing in UWCN.
  • 8. JAMMING Method of Attack A jamming attack consists of interfering with the physical channel by putting up carriers on the frequencies neighbor nodes use to communicate . Countermeasures  Spread spectrum techniques  Sensors can switch to sleep mode
  • 9. WORMHOLE ATTACK Methods of Attack • False neighbourhood relationship are created. • The adversary can delay or drop packets sent through the wormhole. Countermeasures  Estimating the direction of arrival by a wormhole indicator variable.
  • 10. SINKHOLE ATTACK Methods of Attack • A malicious node attempts to attract traffic from a particular area towards it by announcing that it is a high quality route. Countermeasures  Geographical routing.  Authentication of nodes exchanging routing information.
  • 11. HELLO FLOOD ATTACK Methods of Attack • A node receiving a hello packet from a malicious node may interpret that the adversary is a neighbor node. Countermeasures  Bidirectional link verification.  Authentication is a possible defense.
  • 12. SELECTIVE FORWARDING Methods of Attack • Malicious nodes drop certain messages instead of forwarding them to hinder routing. Countermeasures  Multipath routing.  Authentication.
  • 13. Sybil Attack Methods of Attack • Sybil attack is defined as a malicious node illegitimately taking on multiple identities. • Attacker with multiple identities pretend to be in many places at once. Countermeasures  Authentication.  Position verification.
  • 14. Acknowledgement Spoofing Methods of Attack • A malicious node overhearing packets sent to neighbor nodes use the information to spoof acknowledgements. Countermeasures  Encryption of all packets sent through the networks.
  • 15. SECURITY REQUIREMENT  Authentication :-Proof that data was sent by a legitimate user.  Confidentiality:- Information is not accessible to unauthorized parties.  Integrity:-Information is not altered.  Availability:-Data should be available when needed by an authorized user.
  • 16. PROPOSED SECURITY MECHANISM Securing underwater wireless communication : Secure time synchronization. Secure localization. Secure routing.
  • 17. SECURE TIME SYNCHRONIZATION: Why is Time Synchronization important ?  Location and proximity siblings  Maintain ordering of messages  Internetwork coordination  Energy efficiency
  • 18. SECURE LOCALIZATION: Why is Localization important ?  Sensor tasks .  Making routing decisions .  The attacker makes the node think it is somewhere different from actual location.As a result wrong decisions happen. Secure localization gives the guarantee of correctness despite of presence of intruders.It is the process for each sensor node to locate its position in the network.
  • 19. SECURE ROUTING: Why is routing important ?  A sensor routing rejects the routing paths containing malicious nodes.  It is specially challenging in UWCNs due to the large propagation delays,low bandwidth,difficulty of battery refills of underwater sensors and dynamic topologies.
  • 21. Search and rescue missions under water.
  • 22. Environmental monitoring to gather oceanographic data.
  • 24. DISADVANTAGES of UWCNs  Battery power is limited and can not be recharged easily.  The available bandwidth is severely limited.  Long and variable propagation delays.  Multipath and fading problems.  High bity error rate.
  • 25. CONCLUSION  Wireless technology will play a vital role in many application areas that are not possible in past.  The main challenges related to secure time synchronization,localization and routing have been surveyed.  Since the deployment of the proposed system is still in its development stage , an account of actual implementation has not been provided in this paper. The research issues of UWCNs remain wide open for future investigation.
  • 26. REFERENCES  M.C Domingo ,”Securing underwater wireless communication networks”, Journal ,IEEE Wireless Communications archive. Volume 18 Issue 1, February 2011  I.F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc Net., vol. 3, no. 3, Mar. 2005.  W. Wang et al., “Visualization of Wormholes in Under-water Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3, no. 1, 2008.  F. Hu, S. Wilson, and Y. Xiao, “Correlation-Based Security in Time Synchronization of Sensor Networks,” Proc. IEEE WCNC, 2008.  C. Tian et al., “Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks,” Proc. IEEE ICC, 2009.  C. Tian et al., “Localization and Synchronization for 3D Underwater Acoustic Sensor Networks,” in Ubiquitous Intelligence and Computing, LNCS, Springer, 2007, pp. 622–31.