SlideShare une entreprise Scribd logo
1  sur  23
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
          Jnana Sangama, Belgaum, Karnataka-590 014.




                         A Seminar On
“Securing Underwater Wireless Communication Networks”

 By                                     Project Guide
 NAVEENA N (1BT08CS051)                 Mr. KESHAVA M
                                        (Lecturer of CSE department)



           B.T.L INSTITUTE OF TECHNOLOGY
         Department of Computer Science & Engineering
                          2010-11
AGENDA

oAbstract

oUnderwater Wireless Communication Networks

oExisting system

oProposed System

oDrawbacks

oApplications

oConclusion
ABSTRACT
 Underwater      wireless    communication
  networks are particularly vulnerable to
  malicious attacks due to the high bit error
  rates, large and variable propagation
  delays, and low bandwidth of acoustic
  channels.



 (UWCNs) are constituted by sensors and
  autonomous underwater vehicles (AUVs) that
  interact to perform specific applications such
  as underwater monitoring.
ABSTRACT
 Both      intervehicle and     sensor-AUV
  communications can be affected by denial-of-
  service (DoS) attacks.

 We propose several methods to secure
  Underwater  Wireless   Communication
  Networks.

 We design three schemes namely, secure time
  synchronization, localization, and routing in
  UWCNs
ABSTRACT
 Aim of proposed techniques is to enable the
  system to provide secure data transmission.

 Secure time synchronization aims for
  power saving.

 Secure localization aims to provide location
  information and data tagging.

 Secure routing rejects routing paths
  containing malicious nodes.
These techniques are based on following
                     mechanisms
 Secure Time Synchronization
     It is essential in many underwater applications such as
     coordinated sensing tasks. & scheduling algorithms such as
     timedivision multiple access (TDMA).
 SECURE LOCALIZATION
      Localization is a very important issue for data tagging.
      Localization schemes can be classified into two types:
     (i) Range-based schemes (using range or bearing
     information):
     (ii) Range-free schemes (not using range or bearing
     information):
 SECURE ROUTING
     Routing is essential for packet delivery in UWCNs.
Underwater Wireless Communication Networks
Underwater Wireless Communication Networks are constituted by
 sensor nodes, also known as motes or simply nodes are
  small and energy constrained devices that have the
  ability of sensing the surrounding environment.

 The sink, also known as base station, is a more powerful
  node that behaves as an interface between the sensor
  nodes and the clients.

 Autonomous Underwater Vehicles (AUVs) that
  interact to perform specific applications such as
  underwater monitoring
Underwater sensor network with AUV’s
Existing system

 Radio waves do not propagate well underwater due to the high energy
  absorption of water

 Therefore, underwater communications are based on acoustic links
  characterized by large propagation delays. The propagation speed of
  acoustic signals in water (typically 1500 m/s)

 Acoustic channels have low bandwidth As a result, the bit error rates
  of acoustic links are often high, and losses of connectivity arise

 It cannot rely on the Global Positioning System (GPS) because it uses
  radar waves in the 1.5 GHz band that do not propagate in water.
Existing system
 The above mentioned characteristics of UWCNs have several security
  implications.
 High bit error rates cause packet errors. Consequently, critical security
  packets can be lost. Wireless underwater channels can be
  eavesdropped on. Attackers may intercept the information transmitted
  and attempt to modify or drop packets.
 Both intervehicle and sensor-AUV communications can be affected
  by denial-of-service (DoS) attacks. Several attacks are
 Jamming
 Wormhole attack              Acknowledgement spoofing
 Sinkhole attack              Selective forwardiing
                               Sybil attack
 Hello flood attack
Attacks on UWCN’s




  Jamming attack
Attacks on UWCN’s




  Wormhole attack
Attacks on UWCN’s




   Sybil attack
Proposed system
 Secure time synchronization mechanism
Achieving precise time synchronization is especially difficult
in underwater environments due to the characteristics of
UWCNs. For this reason, the time synchronization
mechanisms proposed for ground-based sensor networks
cannot be applied, and new mechanisms have been proposed.
 Secure Localization
Proposed terrestrial localization schemes based on received
signal strength (RSS) are not recommended in UWCNs, since
non-uniform acoustic signal propagation causes signifiant
variations in the RSS. Time of arrival (ToA) and time
difference of arrival (TDoA)
Proposed system(contd)

 Secure routing
 Routing is essential for packet delivery in UWCNs. Proposed
  broadcast authentication methods would cause high communication
  overhead and latency in UWCNs. Multipath routing would cause high
  communication overhead as well.
Advantages

 It avoids data spoofing.

 It avoids privacy leakage.

 Minimize communication and computational cost.

 Maximizes the battery power by preserve the power of
  Underwater sensors.
Drawbacks


 Routing is specially challenging in UWCNs due to the large
  propagation delays, low bandwidth, difficulty of battery refills of
  underwater sensors, and dynamic topologies.



 Schemes is challenging because they do not work well in mobile
  environments.
APPLICATIONS




 Environmental monitoring to gathering of oceanographic
  data
APPLICATIONS




 Search and rescue missions
APPLICATIONS




Marine archaeology
APPLICATIONS




    Defense
CONCLUSION

    Wireless technology will play a vital role in many
    application areas that are not possible in the past. Wireless
    Underwater communication would be one of them.

 The main challenges related to secure time
  synchronization, localization, and routing have been
  surveyed.

 Since the deployment of the proposed system is still in its
  development stage, an account of actual implementation has
  not been provided in this paper.
Thank you…!!!

Contenu connexe

Tendances

wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)tanveer alam
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt asharanick
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wirelesspatna
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkSrija Kumar
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networksŞüheda Acar
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communicationchiranjitgiri
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdmRAVITEJA828
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communicationEr. Saba karim
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor networkfrestoadi
 
Signal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsSignal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsPraveen Kumar Reddy
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkShubhamTakkar
 
Rf and microwave components and devices
Rf and microwave components and devicesRf and microwave components and devices
Rf and microwave components and devicesShankar Gangaju
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communicationjadhavmanoj01
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 

Tendances (20)

wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdm
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communication
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 
Signal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsSignal processing for underwater acoustic communications
Signal processing for underwater acoustic communications
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv ece
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
Seminar report
Seminar reportSeminar report
Seminar report
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
Rf and microwave components and devices
Rf and microwave components and devicesRf and microwave components and devices
Rf and microwave components and devices
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 

En vedette

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Ahmed ElSheikh
 
The Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesThe Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesSteve Shaker
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channelsShudhanshu Singh
 
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVsKevin Ma
 
Advantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsAdvantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsHydrographic Society Benelux
 
"Click here" to build your UAV
"Click here" to build your UAV"Click here" to build your UAV
"Click here" to build your UAVDirk Gorissen
 
Merging Technology Ui2009
Merging Technology Ui2009Merging Technology Ui2009
Merging Technology Ui2009Kenneth Fersht
 
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceaniMichele Cocco
 
Stormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone TrialStormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone TrialPramod Janardhanan
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defenseelev0083
 

En vedette (13)

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)
 
Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)
 
The Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesThe Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface Vehicles
 
Underwater Welding
Underwater WeldingUnderwater Welding
Underwater Welding
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
 
Advantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsAdvantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVs
 
"Click here" to build your UAV
"Click here" to build your UAV"Click here" to build your UAV
"Click here" to build your UAV
 
Merging Technology Ui2009
Merging Technology Ui2009Merging Technology Ui2009
Merging Technology Ui2009
 
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
 
Stormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone TrialStormwater 2016 Conference_Drone Trial
Stormwater 2016 Conference_Drone Trial
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defense
 

Similaire à “Securing underwater wireless communication networks” 2

Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless NetworkSunilPoddar7
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networksbijcicnjounal
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...IAEME Publication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)IJRAT
 
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...IRJET Journal
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148IJRAT
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkMphasis
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksDipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkkDipaloke Arunodoy
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunicationDevyani Vaidya
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyijwmn
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...IAEME Publication
 
Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture Yohannes Bishaw
 
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...theijes
 

Similaire à “Securing underwater wireless communication networks” 2 (20)

Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Geographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a surveyGeographic routing protocols for underwater wireless sensor networks a survey
Geographic routing protocols for underwater wireless sensor networks a survey
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Fs2410401044
Fs2410401044Fs2410401044
Fs2410401044
 
50120140502016
5012014050201650120140502016
50120140502016
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...
 
Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture Wireless underground Sensor Network based on IOT water saved agriculture
Wireless underground Sensor Network based on IOT water saved agriculture
 
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
 

Plus de Naveena N

Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Naveena N
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Naveena N
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingNaveena N
 
A review of cloud computing for transportation system
A review of cloud computing for transportation systemA review of cloud computing for transportation system
A review of cloud computing for transportation systemNaveena N
 
Multithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processorMultithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processorNaveena N
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksNaveena N
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Naveena N
 

Plus de Naveena N (7)

Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
 
A review of cloud computing for transportation system
A review of cloud computing for transportation systemA review of cloud computing for transportation system
A review of cloud computing for transportation system
 
Multithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processorMultithreaded reactive programming—the kiel esterel processor
Multithreaded reactive programming—the kiel esterel processor
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networks
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 

Dernier

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 

Dernier (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

“Securing underwater wireless communication networks” 2

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014. A Seminar On “Securing Underwater Wireless Communication Networks” By Project Guide NAVEENA N (1BT08CS051) Mr. KESHAVA M (Lecturer of CSE department) B.T.L INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering 2010-11
  • 2. AGENDA oAbstract oUnderwater Wireless Communication Networks oExisting system oProposed System oDrawbacks oApplications oConclusion
  • 3. ABSTRACT  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels.  (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring.
  • 4. ABSTRACT  Both intervehicle and sensor-AUV communications can be affected by denial-of- service (DoS) attacks.  We propose several methods to secure Underwater Wireless Communication Networks.  We design three schemes namely, secure time synchronization, localization, and routing in UWCNs
  • 5. ABSTRACT  Aim of proposed techniques is to enable the system to provide secure data transmission.  Secure time synchronization aims for power saving.  Secure localization aims to provide location information and data tagging.  Secure routing rejects routing paths containing malicious nodes.
  • 6. These techniques are based on following mechanisms  Secure Time Synchronization It is essential in many underwater applications such as coordinated sensing tasks. & scheduling algorithms such as timedivision multiple access (TDMA).  SECURE LOCALIZATION Localization is a very important issue for data tagging. Localization schemes can be classified into two types: (i) Range-based schemes (using range or bearing information): (ii) Range-free schemes (not using range or bearing information):  SECURE ROUTING Routing is essential for packet delivery in UWCNs.
  • 7. Underwater Wireless Communication Networks Underwater Wireless Communication Networks are constituted by  sensor nodes, also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment.  The sink, also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients.  Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring
  • 9. Existing system  Radio waves do not propagate well underwater due to the high energy absorption of water  Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s)  Acoustic channels have low bandwidth As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise  It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water.
  • 10. Existing system  The above mentioned characteristics of UWCNs have several security implications.  High bit error rates cause packet errors. Consequently, critical security packets can be lost. Wireless underwater channels can be eavesdropped on. Attackers may intercept the information transmitted and attempt to modify or drop packets.  Both intervehicle and sensor-AUV communications can be affected by denial-of-service (DoS) attacks. Several attacks are  Jamming  Wormhole attack  Acknowledgement spoofing  Sinkhole attack  Selective forwardiing  Sybil attack  Hello flood attack
  • 11. Attacks on UWCN’s  Jamming attack
  • 12. Attacks on UWCN’s Wormhole attack
  • 13. Attacks on UWCN’s Sybil attack
  • 14. Proposed system  Secure time synchronization mechanism Achieving precise time synchronization is especially difficult in underwater environments due to the characteristics of UWCNs. For this reason, the time synchronization mechanisms proposed for ground-based sensor networks cannot be applied, and new mechanisms have been proposed.  Secure Localization Proposed terrestrial localization schemes based on received signal strength (RSS) are not recommended in UWCNs, since non-uniform acoustic signal propagation causes signifiant variations in the RSS. Time of arrival (ToA) and time difference of arrival (TDoA)
  • 15. Proposed system(contd)  Secure routing  Routing is essential for packet delivery in UWCNs. Proposed broadcast authentication methods would cause high communication overhead and latency in UWCNs. Multipath routing would cause high communication overhead as well.
  • 16. Advantages  It avoids data spoofing.  It avoids privacy leakage.  Minimize communication and computational cost.  Maximizes the battery power by preserve the power of Underwater sensors.
  • 17. Drawbacks  Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies.  Schemes is challenging because they do not work well in mobile environments.
  • 18. APPLICATIONS  Environmental monitoring to gathering of oceanographic data
  • 19. APPLICATIONS  Search and rescue missions
  • 21. APPLICATIONS  Defense
  • 22. CONCLUSION  Wireless technology will play a vital role in many application areas that are not possible in the past. Wireless Underwater communication would be one of them.  The main challenges related to secure time synchronization, localization, and routing have been surveyed.  Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided in this paper.