logging in or signing up “Securing Underwater Wireless Communication Networks” naveenbtlit Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 5752 Category: Science & Tech.. License: All Rights Reserved Like it (6) Dislike it (0) Added: May 04, 2012 This Presentation is Public Favorites: 9 Presentation Description Technical seminar Comments Posting comment... By: kesarv (4 days ago) pls send the ppts of ur seminor to firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close By: beenalokare (1 month(s) ago) pls send the ppts of ur seminar to email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: ramyasrii (3 month(s) ago) pls send this to firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close By: jayapavandeshpande (13 month(s) ago) pls send this to email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: psrinidhi9 (13 month(s) ago) it is good Saving..... Post Reply Close Saving..... Edit Comment Close loading.... See all Premium member Presentation Transcript VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014.: VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belgaum, Karnataka-590 014. A Seminar On “ Securing Underwater Wireless Communication Networks ” By Project Guide NAVEENA N (1BT08CS051) Mr. KESHAVA M (Lecturer of CSE department) B.T.L INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering 2011-12A G E N D A: A G E N D A Abstract Underwater Wireless Communication Networks Existing system Proposed System Drawbacks Applications ConclusionA B S T R A C T: A B S T R A C T Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring .A B S T R A C T: A B S T R A C T Both intervehicle and sensor-AUV communications can be affected by denial-of-service ( DoS) attacks. We propose several methods to secure Underwater Wireless Communication Networks. We design three schemes namely, secure time synchronization, localization, and routing in UWCNs: Aim of proposed techniques is to enable the system to provide secure data transmission. Secure time synchronization aims for power saving. Secure localization aims to provide location information and data tagging. Secure routing rejects routing paths containing malicious nodes.Underwater Wireless Communication Networks : Underwater Wireless Communication Networks Underwater Wireless Communication Networks are constituted by sensor nodes , also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment . The sink , also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients . A utonomous U nderwater V ehicles (AUVs) that interact to perform specific applications such as underwater monitoringPowerPoint Presentation: Underwater sensor network with AUV’sExisting system: Existing system Radio waves do not propagate well underwater due to the high energy absorption of water Therefore , underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s ) Acoustic channels have low bandwidth As a result , the bit error rates of acoustic links are often high, and losses of connectivity arise I t cannot rely on the Global Positioning System (GPS ) because it uses radar waves in the 1.5 GHz band that do not propagate in water.Existing system: Existing system The above mentioned characteristics of UWCNs have several security implications. High bit error rates cause packet errors. Consequently , critical security packets can be lost . Wireless underwater channels can be eavesdropped on . Attackers may intercept the information transmitted and attempt to modify or drop packets . Both intervehicle and sensor-AUV communications can be affected by denial-of-service ( DoS ) attacks. Several attacks are Jamming Wormhole attack Sinkhole attack Hello flood attack Acknowledgement spoofing Selective forwarding Sybil attackJamming attack: Jamming attack Attacks on UWCN’s Secure time synchronizationAttacks on UWCN’s : Attacks on UWCN’s Wormhole attack Attacks on UWCN’s Accurate localization Time synchronizationAttacks oAttacks on UWCN’s n UWCN’s: Attacks o Attacks on UWCN’s n UWCN’s Sybil attack Authentication Position verificationThese techniques are based on following mechanisms : These techniques are based on following mechanisms Secure Time S ynchronization It is essential in many underwater applications such as coordinated sensing tasks . & scheduling algorithms such as time division multiple access ( TDMA). SECURE LOCALIZATION Localization is a very important issue for data tagging . Localization schemes can be classified into two types: ( i ) Range-based schemes ( using range or bearing information ): (ii) Range-free schemes ( not using range or bearing information ): SECURE ROUTING Routing is essential for packet delivery in UWCNs .SECURITY REQUIREMENTS: SECURITY REQUIREMENTS AUTHENTICATION CONFIDENTIALITY INTEGRITY AVAILABILITYAdvantages: Advantages It avoids data spoofing. It avoids privacy leakage. Minimize communication and computational cost. Maximizes the battery power by preserve the power of Underwater sensors.Drawbacks: Drawbacks Routing is specially challenging in UWCNs due to the large propagation delays , low bandwidth, difficulty of battery refills of underwater sensors , and dynamic topologies . Schemes is challenging because they do not work well in mobile environments .A P P L I C A T I O N S: A P P L I C A T I O N S Environmental monitoring to gathering of oceanographic dataA P P L I C A T I O N S: A P P L I C A T I O N S Search and rescue missionsA P P L I C A T I O N S: A P P L I C A T I O N S Marine archaeologyA P P L I C A T I O N S: A P P L I C A T I O N S DefenceC O N C L U S I O N: C O N C L U S I O N Wireless technology will play a vital role in many application areas that are not possible in the past . Wireless Underwater communication would be one of them. The main challenges related to secure time synchronization, localization, and routing have been surveyed. Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided in this paper.Thank you: Thank you You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.