SlideShare une entreprise Scribd logo
1  sur  27
SECURING UNDERWATER
WIRELESS
COMMUNICATION

NISHA MENON K
ROLL NO: 16
M-TECH
COMMUNICATION ENGINEERING
1

11/15/2013
OUTLINE
• Introduction
• Underwater Wireless Communication Network
• Attacks and counter measures
• Security requirements
• Proposed security mechanisms
• Conclusion
• Reference

2

11/15/2013
Introduction
(UWCNs) are constituted by sensors , sink and autonomous
underwater vehicles (AUVs) that interact to perform specific
applications such as underwater monitoring.

3

11/15/2013
Sensor nodes

also known as motes or simply
nodes are small and energy constrained devices that
have the ability of sensing the surrounding
environment.

Sink also known as base station, is a more powerful
node that behaves as an interface between the sensor
nodes and the clients.

Autonomous Underwater Vehicles
(AUVs) that interact to perform specific applications
such as underwater monitoring

4

11/15/2013
Underwater Wireless
Communication System
 Radio waves do not propagate well underwater due to the high
energy absorption of water

 Therefore, underwater communications are based on acoustic

links characterized by large propagation delays. The propagation
speed of acoustic signals in water (typically 1500 m/s)

 Acoustic channels have low bandwidth . As a result, the bit error

rates of acoustic links are often high, and losses of connectivity arise

 It cannot rely on the Global Positioning System (GPS) because it uses
radar waves in the 1.5 GHz band that do not propagate in water.
5

11/15/2013
Underwater Wireless
Communication System
 Underwater wireless communication networks are particularly

vulnerable to malicious attacks due to the high bit error rates, large
and variable propagation delays, and low bandwidth of acoustic
channels.

 Several methods

are proposed to secure Underwater Wireless
Communication Networks. Three schemes namely, secure time
synchronization, localization, and routing in UWCNs

6

11/15/2013
Wormhole
attack
Sinkhole
Attack

Jamming

Attacks
Hello Flood
attack

Sybil attack

Acknowled
gement
spoofing

Selective
Forwarding
7

11/15/2013
Jamming
Method of Attack
• The transmission of data packets continuously
so that the wireless channel is completely
blocked.

Countermeasures
• Spread spectrum techniques
• Sensors can switch to sleep mode
8

11/15/2013
Wormhole Attack
Method of attack
• False neighborhood relationships are
created
• The adversary can delay or drop
packets sent through the wormhole.

Countermeasures
• Dis-VoW
• Estimating the direction of arrival
9

11/15/2013
Selective Forwarding
Method of Attack
• Malicious nodes drop certain messages instead
of forwarding them to hinder routing.

Countermeasures
• Multipath routing
• Authentication
10

11/15/2013
Sinkhole Attack
Method of Attack
• A malicious node attempts to attract traffic from
a particular area towards it by announcing that
it is a high quality route.

Countermeasures
• Geographical routing
• Authentication of nodes exchanging routing
11
information.

11/15/2013
Helloflood Attack
Method of Attack
• A node receiving a HELLO packet from a malicious
node may interpret that the adversary is a neighbor.

Countermeasures
• Bidirectional link verification
• Authentication is a possible defense
12

11/15/2013
Acknowledgement
Spoofing
Method of Attack
• A malicious node overhearing packets sent to
neighbor nodes use the information to spoof
acknowledgements.

Countermeasures
• Encryption of all packets sent through the
13
network

11/15/2013
Sybil Attack
Method of attack
• Sybil attack is defined as a malicious
node illegitimately taking on multiple
identities
• Attacker with multiple identities
pretend to be in many places at once.

Countermeasures
• Authentication
• Position verification
14

11/15/2013
Security Requirements
Authentication
Proof that data was sent by a legitimate user

Confidentiality
Information is not accessible to unauthorized parties

Integrity
Information is not altered

Availability
Data should be available when needed by an authorized user
15

11/15/2013
Proposed Security
Mechanism
Secure under
water
communication
Secure time
synchronization

Secure
localization

16

Secure routing

11/15/2013
Secure time
Synchronization
Why is Time Synchronization Important?

 Location and proximity of siblings
 Intranetwork coordination
 Maintain ordering of messages
 Use of TDMA
 Energy efficiency

17

11/15/2013
Secure time
Synchronization
Multilateration algorithm

Phase 1

Phase 2

• Assume that a set of anchor nodes on ocean surface already know
their location and time without error
• A group of nearby sensors receives synchronization packets from at
least 5 anchor nodes

• The sensors learn their time difference between themselves and
anchor nodes by comparing the synchronization packets
• These nodes subsequently becomes the next anchor nodes.

18

11/15/2013
Secure Localization
Why is Localization important?
 Vulnerability of WSN

What an attacker can potentially do?
GOAL: Make the node think it is
somewhere different from actual
location

Wormhole attack
Jamming

As a result…
Wrong results: wrong decisions
19

11/15/2013
Secure Localization
 Goal: To guarantee correctness despite of the presence of
intruders

 Localization is the process for each sensor node to locate its
positions in the network.

 Localization algorithms developed for terrestrial sensor networks

are either based on the signal strength or the time-of-arrival (TOA)

20

11/15/2013
Secure Localization
• Range-based
– Use exact measurements (point-to-point distance
estimate (range) or angle estimates)
– More expensive
– Scalable Localization with Mobility Prediction (SLMP)
• Range-free
– Cost-effective alternative to range-based solutions

21

11/15/2013
Secure Routing
 Routing is specially challenging in UWCNs due to
the large propagation delays, low
bandwidth, difficulty of battery refills of
underwater sensors, and dynamic topologies.

 A secure routing rejects routing paths containing
malicious nodes.

22

11/15/2013
Secure Routing
 Proactive protocols ( DSDV)
 Reactive protocols (AODV)
 Focused Beam Routing Protocol

23

11/15/2013
Advantages
 It avoids data spoofing.

 It avoids privacy leakage.
 Minimize communication and computational cost.
 Maximizes the battery power by preserving the power of
Underwater sensors

24

11/15/2013
Conclusion
 Wireless technology plays a vital role in many application areas that

were not possible in the past. Wireless Underwater communication is
one of them.

 The main attacks related to UWCN have been surveyed.

 A system with secure time synchronization, secure localization and
secure routing can overcome these attacks.

 Since the deployment of the proposed system is still in its development

stage, an account of actual implementation has not been provided here.

25

11/15/2013
REFERNCES
[1] “Underwater Acoustic Sensor Networks: Research Challenges,” Ad HocNet., vol. 3, no.
3, I. F. Akyildiz, D. Pompili, and T. Melodia, Mar. 2005.
[2] “Visualization of Wormholes in Underwater Sensor Networks: A Distributed
Approach,” Int’l. J. Security Net., vol. 3, no. 1, W. Wang et al., 2008, pp. 10–23.
[3] “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.” chapter in
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, A. D. Wood
and J. A. Stankovic, M. Ilyas and I. Mahgoub, Eds., CRC Press, 2004.
[4] Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish
Behavior in the Age of Ubiquitous Computing, Cambridge Univ. Press, L. Buttyán and J.-P.
Hubaux, 2008.

[5] “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic
Networks,” R. Zhang and Y. Zhang, Proc. IEEE INFOCOM, 2010.
26

11/15/2013
THANK YOU

27

11/15/2013

Contenu connexe

Tendances

under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communicationDheeresh Kumar
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networksŞüheda Acar
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)tanveer alam
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communicationchiranjitgiri
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor networkfrestoadi
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc networkAshish Prajapat
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 

Tendances (20)

under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
MANET
MANETMANET
MANET
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
MANET VS VANET
MANET VS VANETMANET VS VANET
MANET VS VANET
 
Ad Hoc Wireless Network
Ad Hoc Wireless NetworkAd Hoc Wireless Network
Ad Hoc Wireless Network
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 

En vedette

UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt asharanick
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wirelesspatna
 
Laser Communications
Laser CommunicationsLaser Communications
Laser CommunicationsSeminar Links
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channelsShudhanshu Singh
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technologySushil Sudake
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17Darshil Shah
 
Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010le luan
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theaterPeter Gordon
 
Active controls for Flight and Simulation
Active controls for Flight and SimulationActive controls for Flight and Simulation
Active controls for Flight and SimulationStirling Dynamics
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filtereSAT Journals
 

En vedette (18)

UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
LASER Communication
LASER CommunicationLASER Communication
LASER Communication
 
Laser Communication
Laser CommunicationLaser Communication
Laser Communication
 
Laser Communications
Laser CommunicationsLaser Communications
Laser Communications
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technology
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Red tacton
Red tactonRed tacton
Red tacton
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17
 
Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theater
 
Active controls for Flight and Simulation
Active controls for Flight and SimulationActive controls for Flight and Simulation
Active controls for Flight and Simulation
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filter
 

Similaire à Securing Underwater Wireless Communication Networks

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksDipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkkDipaloke Arunodoy
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunicationDevyani Vaidya
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)IJRAT
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148IJRAT
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...IAEME Publication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 

Similaire à Securing Underwater Wireless Communication Networks (20)

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
D0961927
D0961927D0961927
D0961927
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 

Plus de Nisha Menon K

High capacity optical
High capacity opticalHigh capacity optical
High capacity opticalNisha Menon K
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon kNisha Menon K
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kNisha Menon K
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless TechnologyNisha Menon K
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNisha Menon K
 

Plus de Nisha Menon K (11)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
Digital signature
Digital signatureDigital signature
Digital signature
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Securing Underwater Wireless Communication Networks

  • 1. SECURING UNDERWATER WIRELESS COMMUNICATION NISHA MENON K ROLL NO: 16 M-TECH COMMUNICATION ENGINEERING 1 11/15/2013
  • 2. OUTLINE • Introduction • Underwater Wireless Communication Network • Attacks and counter measures • Security requirements • Proposed security mechanisms • Conclusion • Reference 2 11/15/2013
  • 3. Introduction (UWCNs) are constituted by sensors , sink and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring. 3 11/15/2013
  • 4. Sensor nodes also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment. Sink also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients. Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring 4 11/15/2013
  • 5. Underwater Wireless Communication System  Radio waves do not propagate well underwater due to the high energy absorption of water  Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s)  Acoustic channels have low bandwidth . As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise  It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water. 5 11/15/2013
  • 6. Underwater Wireless Communication System  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels.  Several methods are proposed to secure Underwater Wireless Communication Networks. Three schemes namely, secure time synchronization, localization, and routing in UWCNs 6 11/15/2013
  • 8. Jamming Method of Attack • The transmission of data packets continuously so that the wireless channel is completely blocked. Countermeasures • Spread spectrum techniques • Sensors can switch to sleep mode 8 11/15/2013
  • 9. Wormhole Attack Method of attack • False neighborhood relationships are created • The adversary can delay or drop packets sent through the wormhole. Countermeasures • Dis-VoW • Estimating the direction of arrival 9 11/15/2013
  • 10. Selective Forwarding Method of Attack • Malicious nodes drop certain messages instead of forwarding them to hinder routing. Countermeasures • Multipath routing • Authentication 10 11/15/2013
  • 11. Sinkhole Attack Method of Attack • A malicious node attempts to attract traffic from a particular area towards it by announcing that it is a high quality route. Countermeasures • Geographical routing • Authentication of nodes exchanging routing 11 information. 11/15/2013
  • 12. Helloflood Attack Method of Attack • A node receiving a HELLO packet from a malicious node may interpret that the adversary is a neighbor. Countermeasures • Bidirectional link verification • Authentication is a possible defense 12 11/15/2013
  • 13. Acknowledgement Spoofing Method of Attack • A malicious node overhearing packets sent to neighbor nodes use the information to spoof acknowledgements. Countermeasures • Encryption of all packets sent through the 13 network 11/15/2013
  • 14. Sybil Attack Method of attack • Sybil attack is defined as a malicious node illegitimately taking on multiple identities • Attacker with multiple identities pretend to be in many places at once. Countermeasures • Authentication • Position verification 14 11/15/2013
  • 15. Security Requirements Authentication Proof that data was sent by a legitimate user Confidentiality Information is not accessible to unauthorized parties Integrity Information is not altered Availability Data should be available when needed by an authorized user 15 11/15/2013
  • 16. Proposed Security Mechanism Secure under water communication Secure time synchronization Secure localization 16 Secure routing 11/15/2013
  • 17. Secure time Synchronization Why is Time Synchronization Important?  Location and proximity of siblings  Intranetwork coordination  Maintain ordering of messages  Use of TDMA  Energy efficiency 17 11/15/2013
  • 18. Secure time Synchronization Multilateration algorithm Phase 1 Phase 2 • Assume that a set of anchor nodes on ocean surface already know their location and time without error • A group of nearby sensors receives synchronization packets from at least 5 anchor nodes • The sensors learn their time difference between themselves and anchor nodes by comparing the synchronization packets • These nodes subsequently becomes the next anchor nodes. 18 11/15/2013
  • 19. Secure Localization Why is Localization important?  Vulnerability of WSN What an attacker can potentially do? GOAL: Make the node think it is somewhere different from actual location Wormhole attack Jamming As a result… Wrong results: wrong decisions 19 11/15/2013
  • 20. Secure Localization  Goal: To guarantee correctness despite of the presence of intruders  Localization is the process for each sensor node to locate its positions in the network.  Localization algorithms developed for terrestrial sensor networks are either based on the signal strength or the time-of-arrival (TOA) 20 11/15/2013
  • 21. Secure Localization • Range-based – Use exact measurements (point-to-point distance estimate (range) or angle estimates) – More expensive – Scalable Localization with Mobility Prediction (SLMP) • Range-free – Cost-effective alternative to range-based solutions 21 11/15/2013
  • 22. Secure Routing  Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies.  A secure routing rejects routing paths containing malicious nodes. 22 11/15/2013
  • 23. Secure Routing  Proactive protocols ( DSDV)  Reactive protocols (AODV)  Focused Beam Routing Protocol 23 11/15/2013
  • 24. Advantages  It avoids data spoofing.  It avoids privacy leakage.  Minimize communication and computational cost.  Maximizes the battery power by preserving the power of Underwater sensors 24 11/15/2013
  • 25. Conclusion  Wireless technology plays a vital role in many application areas that were not possible in the past. Wireless Underwater communication is one of them.  The main attacks related to UWCN have been surveyed.  A system with secure time synchronization, secure localization and secure routing can overcome these attacks.  Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided here. 25 11/15/2013
  • 26. REFERNCES [1] “Underwater Acoustic Sensor Networks: Research Challenges,” Ad HocNet., vol. 3, no. 3, I. F. Akyildiz, D. Pompili, and T. Melodia, Mar. 2005. [2] “Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3, no. 1, W. Wang et al., 2008, pp. 10–23. [3] “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.” chapter in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, A. D. Wood and J. A. Stankovic, M. Ilyas and I. Mahgoub, Eds., CRC Press, 2004. [4] Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge Univ. Press, L. Buttyán and J.-P. Hubaux, 2008. [5] “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks,” R. Zhang and Y. Zhang, Proc. IEEE INFOCOM, 2010. 26 11/15/2013