“Securing Underwater Wireless Communication Networks”

Views:
 
     
 

Presentation Description

Technical seminar

Comments

By: kesarv (6 month(s) ago)

pls send the ppts of ur seminor to pruthvi.v.reddy@gmail.com

By: beenalokare (7 month(s) ago)

pls send the ppts of ur seminar to beena.v21@gmai.com

By: ramyasrii (9 month(s) ago)

pls send this to ramyaneerugatti@gmail.com

By: jayapavandeshpande (19 month(s) ago)

pls send this to jayapavansri@gmail.com

By: psrinidhi9 (20 month(s) ago)

it is good

See all

Presentation Transcript

VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014.:

VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014. A Seminar On “ Securing Underwater Wireless Communication Networks ” By Project Guide NAVEENA N (1BT08CS051) Mr. KESHAVA M (Lecturer of CSE department) B.T.L INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering 2011-12

A G E N D A:

A G E N D A Abstract Underwater Wireless Communication Networks Existing system Proposed System Drawbacks Applications Conclusion

A B S T R A C T:

A B S T R A C T Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring .

A B S T R A C T:

A B S T R A C T Both intervehicle and sensor-AUV communications can be affected by denial-of-service ( DoS) attacks. We propose several methods to secure Underwater Wireless Communication Networks. We design three schemes namely, secure time synchronization, localization, and routing in UWCNs

:

Aim of proposed techniques is to enable the system to provide secure data transmission. Secure time synchronization aims for power saving. Secure localization aims to provide location information and data tagging. Secure routing rejects routing paths containing malicious nodes.

Underwater Wireless Communication Networks :

Underwater Wireless Communication Networks Underwater Wireless Communication Networks are constituted by sensor nodes , also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment . The sink , also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients . A utonomous U nderwater V ehicles (AUVs) that interact to perform specific applications such as underwater monitoring

PowerPoint Presentation:

Underwater sensor network with AUV’s

Existing system:

Existing system Radio waves do not propagate well underwater due to the high energy absorption of water Therefore , underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s ) Acoustic channels have low bandwidth As a result , the bit error rates of acoustic links are often high, and losses of connectivity arise I t cannot rely on the Global Positioning System (GPS ) because it uses radar waves in the 1.5 GHz band that do not propagate in water.

Existing system:

Existing system The above mentioned characteristics of UWCNs have several security implications. High bit error rates cause packet errors. Consequently , critical security packets can be lost . Wireless underwater channels can be eavesdropped on . Attackers may intercept the information transmitted and attempt to modify or drop packets . Both intervehicle and sensor-AUV communications can be affected by denial-of-service ( DoS ) attacks. Several attacks are Jamming Wormhole attack Sinkhole attack Hello flood attack Acknowledgement spoofing Selective forwarding Sybil attack

Jamming attack:

Jamming attack Attacks on UWCN’s Secure time synchronization

Attacks on UWCN’s :

Attacks on UWCN’s Wormhole attack Attacks on UWCN’s Accurate localization Time synchronization

Attacks oAttacks on UWCN’s n UWCN’s:

Attacks o Attacks on UWCN’s n UWCN’s Sybil attack Authentication Position verification

These techniques are based on following mechanisms :

These techniques are based on following mechanisms Secure Time S ynchronization It is essential in many underwater applications such as coordinated sensing tasks . & scheduling algorithms such as time division multiple access ( TDMA). SECURE LOCALIZATION Localization is a very important issue for data tagging . Localization schemes can be classified into two types: ( i ) Range-based schemes ( using range or bearing information ): (ii) Range-free schemes ( not using range or bearing information ): SECURE ROUTING Routing is essential for packet delivery in UWCNs .

SECURITY REQUIREMENTS:

SECURITY REQUIREMENTS AUTHENTICATION CONFIDENTIALITY INTEGRITY AVAILABILITY

Advantages:

Advantages It avoids data spoofing. It avoids privacy leakage. Minimize communication and computational cost. Maximizes the battery power by preserve the power of Underwater sensors.

Drawbacks:

Drawbacks Routing is specially challenging in UWCNs due to the large propagation delays , low bandwidth, difficulty of battery refills of underwater sensors , and dynamic topologies . Schemes is challenging because they do not work well in mobile environments .

A P P L I C A T I O N S:

A P P L I C A T I O N S Environmental monitoring to gathering of oceanographic data

A P P L I C A T I O N S:

A P P L I C A T I O N S Search and rescue missions

A P P L I C A T I O N S:

A P P L I C A T I O N S Marine archaeology

A P P L I C A T I O N S:

A P P L I C A T I O N S Defence

C O N C L U S I O N:

C O N C L U S I O N Wireless technology will play a vital role in many application areas that are not possible in the past . Wireless Underwater communication would be one of them. The main challenges related to secure time synchronization, localization, and routing have been surveyed. Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided in this paper.

Thank you:

Thank you