2. INTRODUCTION
HISTORICAL PERSPECTIVE
UNDERWATER SENSOR NETWORK
ARCHITECTURE
APPLICATION OF WIRELESS SENSOR
NETWORK
PROBLEM IN UNDERWATER SENSOR
NETWORK
ATTACKS ON UWCN
SECURITY REQUIREMENT
CONCLUSION
2
3. Underwater wireless communication is the
wireless communication in which acoustic signals
(waves) carry digital information through an
underwater channel.
The signal that are used to carry digital
information through an underwater channel are
acoustic channel.
3
4. Underwater wireless communication networks
(UWCNs) are constituted by sensors and autonomous
underwater vehicles (AUVs) that interact to perform
specific applications such as underwater monitoring
using the underwater acoustic channel.
Electromagnetic waves propagate poorly in sea water,
acoustics provides the most obvious medium to
enable underwater communications
4
5. The science of underwater acoustics began in 1490,
when Leonardo Da Vinci, stated.
In 1687 Isaac Newton wrote his Mathematical
Principles of Natural Philosophy which included the first
mathematical treatment of sound in water.
HISTORY
5
9. 9
Fastest way for finding underwater information
Disaster Prevention
Ocean Sampling Network
Environmental Monitoring
APPLICATION S OF UNDERWATER
SENSOR NETWORK
13. Countermeasures
13
•The transmission of data packets continuously so that the
wireless channel get completely blocked.
•Spread spectrum techniques.
• Sensors can switch to sleep mode
Jamming
14. Wormhole Attack
Method of attack
•False neighborhood
relationship are created..
Countermeasures
• Estimating the direction of
arrival…
14
15. SINKHOLE ATTACK : In a sinkhole attack, a
malicious node attempts to attract traffic from a
particular area toward it.
HELLO FLOOD ATTACK : A node receiving a
HELLO packet from a malicious node may interpret
that the adversary is a neighbour.
ACKNOWLEDGMENT SPOOFING:
SYBIL ATTACK
15
16. Authentication
•Proof that data was sent by a valid user
Integrity
•It insures that Information is not altered by any
adversary node
16
17. Confidentiality
•Information is not accessible to unauthorized parties.
Availability
•Data should be available when needed by an authorized
user.
17
18. The main objective is to overcome the present limitations and
implement advanced technology for oceanographic research.
the future challenges like effective transmission of audio and
video signals etc.
Security in wireless sensor networks has attracted a lot of
attention in the recent years.