SlideShare ist ein Scribd-Unternehmen logo
1 von 27
SECURING UNDERWATER
WIRELESS
COMMUNICATION

NISHA MENON K
ROLL NO: 16
M-TECH
COMMUNICATION ENGINEERING
1

11/15/2013
OUTLINE
• Introduction
• Underwater Wireless Communication Network
• Attacks and counter measures
• Security requirements
• Proposed security mechanisms
• Conclusion
• Reference

2

11/15/2013
Introduction
(UWCNs) are constituted by sensors , sink and autonomous
underwater vehicles (AUVs) that interact to perform specific
applications such as underwater monitoring.

3

11/15/2013
Sensor nodes

also known as motes or simply
nodes are small and energy constrained devices that
have the ability of sensing the surrounding
environment.

Sink also known as base station, is a more powerful
node that behaves as an interface between the sensor
nodes and the clients.

Autonomous Underwater Vehicles
(AUVs) that interact to perform specific applications
such as underwater monitoring

4

11/15/2013
Underwater Wireless
Communication System
 Radio waves do not propagate well underwater due to the high
energy absorption of water

 Therefore, underwater communications are based on acoustic

links characterized by large propagation delays. The propagation
speed of acoustic signals in water (typically 1500 m/s)

 Acoustic channels have low bandwidth . As a result, the bit error

rates of acoustic links are often high, and losses of connectivity arise

 It cannot rely on the Global Positioning System (GPS) because it uses
radar waves in the 1.5 GHz band that do not propagate in water.
5

11/15/2013
Underwater Wireless
Communication System
 Underwater wireless communication networks are particularly

vulnerable to malicious attacks due to the high bit error rates, large
and variable propagation delays, and low bandwidth of acoustic
channels.

 Several methods

are proposed to secure Underwater Wireless
Communication Networks. Three schemes namely, secure time
synchronization, localization, and routing in UWCNs

6

11/15/2013
Wormhole
attack
Sinkhole
Attack

Jamming

Attacks
Hello Flood
attack

Sybil attack

Acknowled
gement
spoofing

Selective
Forwarding
7

11/15/2013
Jamming
Method of Attack
• The transmission of data packets continuously
so that the wireless channel is completely
blocked.

Countermeasures
• Spread spectrum techniques
• Sensors can switch to sleep mode
8

11/15/2013
Wormhole Attack
Method of attack
• False neighborhood relationships are
created
• The adversary can delay or drop
packets sent through the wormhole.

Countermeasures
• Dis-VoW
• Estimating the direction of arrival
9

11/15/2013
Selective Forwarding
Method of Attack
• Malicious nodes drop certain messages instead
of forwarding them to hinder routing.

Countermeasures
• Multipath routing
• Authentication
10

11/15/2013
Sinkhole Attack
Method of Attack
• A malicious node attempts to attract traffic from
a particular area towards it by announcing that
it is a high quality route.

Countermeasures
• Geographical routing
• Authentication of nodes exchanging routing
11
information.

11/15/2013
Helloflood Attack
Method of Attack
• A node receiving a HELLO packet from a malicious
node may interpret that the adversary is a neighbor.

Countermeasures
• Bidirectional link verification
• Authentication is a possible defense
12

11/15/2013
Acknowledgement
Spoofing
Method of Attack
• A malicious node overhearing packets sent to
neighbor nodes use the information to spoof
acknowledgements.

Countermeasures
• Encryption of all packets sent through the
13
network

11/15/2013
Sybil Attack
Method of attack
• Sybil attack is defined as a malicious
node illegitimately taking on multiple
identities
• Attacker with multiple identities
pretend to be in many places at once.

Countermeasures
• Authentication
• Position verification
14

11/15/2013
Security Requirements
Authentication
Proof that data was sent by a legitimate user

Confidentiality
Information is not accessible to unauthorized parties

Integrity
Information is not altered

Availability
Data should be available when needed by an authorized user
15

11/15/2013
Proposed Security
Mechanism
Secure under
water
communication
Secure time
synchronization

Secure
localization

16

Secure routing

11/15/2013
Secure time
Synchronization
Why is Time Synchronization Important?

 Location and proximity of siblings
 Intranetwork coordination
 Maintain ordering of messages
 Use of TDMA
 Energy efficiency

17

11/15/2013
Secure time
Synchronization
Multilateration algorithm

Phase 1

Phase 2

• Assume that a set of anchor nodes on ocean surface already know
their location and time without error
• A group of nearby sensors receives synchronization packets from at
least 5 anchor nodes

• The sensors learn their time difference between themselves and
anchor nodes by comparing the synchronization packets
• These nodes subsequently becomes the next anchor nodes.

18

11/15/2013
Secure Localization
Why is Localization important?
 Vulnerability of WSN

What an attacker can potentially do?
GOAL: Make the node think it is
somewhere different from actual
location

Wormhole attack
Jamming

As a result…
Wrong results: wrong decisions
19

11/15/2013
Secure Localization
 Goal: To guarantee correctness despite of the presence of
intruders

 Localization is the process for each sensor node to locate its
positions in the network.

 Localization algorithms developed for terrestrial sensor networks

are either based on the signal strength or the time-of-arrival (TOA)

20

11/15/2013
Secure Localization
• Range-based
– Use exact measurements (point-to-point distance
estimate (range) or angle estimates)
– More expensive
– Scalable Localization with Mobility Prediction (SLMP)
• Range-free
– Cost-effective alternative to range-based solutions

21

11/15/2013
Secure Routing
 Routing is specially challenging in UWCNs due to
the large propagation delays, low
bandwidth, difficulty of battery refills of
underwater sensors, and dynamic topologies.

 A secure routing rejects routing paths containing
malicious nodes.

22

11/15/2013
Secure Routing
 Proactive protocols ( DSDV)
 Reactive protocols (AODV)
 Focused Beam Routing Protocol

23

11/15/2013
Advantages
 It avoids data spoofing.

 It avoids privacy leakage.
 Minimize communication and computational cost.
 Maximizes the battery power by preserving the power of
Underwater sensors

24

11/15/2013
Conclusion
 Wireless technology plays a vital role in many application areas that

were not possible in the past. Wireless Underwater communication is
one of them.

 The main attacks related to UWCN have been surveyed.

 A system with secure time synchronization, secure localization and
secure routing can overcome these attacks.

 Since the deployment of the proposed system is still in its development

stage, an account of actual implementation has not been provided here.

25

11/15/2013
REFERNCES
[1] “Underwater Acoustic Sensor Networks: Research Challenges,” Ad HocNet., vol. 3, no.
3, I. F. Akyildiz, D. Pompili, and T. Melodia, Mar. 2005.
[2] “Visualization of Wormholes in Underwater Sensor Networks: A Distributed
Approach,” Int’l. J. Security Net., vol. 3, no. 1, W. Wang et al., 2008, pp. 10–23.
[3] “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.” chapter in
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, A. D. Wood
and J. A. Stankovic, M. Ilyas and I. Mahgoub, Eds., CRC Press, 2004.
[4] Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish
Behavior in the Age of Ubiquitous Computing, Cambridge Univ. Press, L. ButtyĂĄn and J.-P.
Hubaux, 2008.

[5] “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic
Networks,” R. Zhang and Y. Zhang, Proc. IEEE INFOCOM, 2010.
26

11/15/2013
THANK YOU

27

11/15/2013

Weitere ähnliche Inhalte

Was ist angesagt?

under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communicationDheeresh Kumar
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communicationchiranjitgiri
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulatorsSyedAhamed44
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Networkgaurav kumar
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,Er. Saba karim
 
Wlan security
Wlan securityWlan security
Wlan securitySajan Sahu
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkKrishna Ghanva
 
Implementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelImplementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelSANKETLKENDUR
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)tanveer alam
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkMphasis
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSNRanjith Nair
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
ACCIDENT DETECTION USING MOBILE PHONE.pptx
ACCIDENT DETECTION USING MOBILE  PHONE.pptxACCIDENT DETECTION USING MOBILE  PHONE.pptx
ACCIDENT DETECTION USING MOBILE PHONE.pptxAjay575757
 
Node localization
Node localizationNode localization
Node localizationad-hocnet
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending NetworkSwarna Gautam
 

Was ist angesagt? (20)

under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,
 
Wlan security
Wlan securityWlan security
Wlan security
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication network
 
Implementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelImplementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channel
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
ACCIDENT DETECTION USING MOBILE PHONE.pptx
ACCIDENT DETECTION USING MOBILE  PHONE.pptxACCIDENT DETECTION USING MOBILE  PHONE.pptx
ACCIDENT DETECTION USING MOBILE PHONE.pptx
 
Node localization
Node localizationNode localization
Node localization
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending Network
 

Andere mochten auch

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt asharanick
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSAlessandro Gonella
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wirelesspatna
 
LASER Communication
LASER CommunicationLASER Communication
LASER CommunicationArijit Baishnab
 
Laser Communications
Laser CommunicationsLaser Communications
Laser CommunicationsSeminar Links
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channelsShudhanshu Singh
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technologySushil Sudake
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17Darshil Shah
 
Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010le luan
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theaterPeter Gordon
 
Active controls for Flight and Simulation
Active controls for Flight and SimulationActive controls for Flight and Simulation
Active controls for Flight and SimulationStirling Dynamics
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filtereSAT Journals
 

Andere mochten auch (18)

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
LASER Communication
LASER CommunicationLASER Communication
LASER Communication
 
Laser Communication
Laser CommunicationLaser Communication
Laser Communication
 
Laser Communications
Laser CommunicationsLaser Communications
Laser Communications
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technology
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Red tacton
Red tactonRed tacton
Red tacton
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17
 
Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theater
 
Active controls for Flight and Simulation
Active controls for Flight and SimulationActive controls for Flight and Simulation
Active controls for Flight and Simulation
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filter
 

Ähnlich wie Securing underwater wireless communication by Nisha Menon K

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksDipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkkDipaloke Arunodoy
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunicationDevyani Vaidya
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)IJRAT
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148IJRAT
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...IAEME Publication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 

Ähnlich wie Securing underwater wireless communication by Nisha Menon K (20)

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
D0961927
D0961927D0961927
D0961927
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 

Mehr von Nisha Menon K

High capacity optical
High capacity opticalHigh capacity optical
High capacity opticalNisha Menon K
 
Digital signature
Digital signatureDigital signature
Digital signatureNisha Menon K
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon kNisha Menon K
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kNisha Menon K
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless TechnologyNisha Menon K
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Nisha Menon K
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalizationNisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNisha Menon K
 

Mehr von Nisha Menon K (11)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
Digital signature
Digital signatureDigital signature
Digital signature
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

KĂźrzlich hochgeladen

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

KĂźrzlich hochgeladen (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Securing underwater wireless communication by Nisha Menon K

  • 1. SECURING UNDERWATER WIRELESS COMMUNICATION NISHA MENON K ROLL NO: 16 M-TECH COMMUNICATION ENGINEERING 1 11/15/2013
  • 2. OUTLINE • Introduction • Underwater Wireless Communication Network • Attacks and counter measures • Security requirements • Proposed security mechanisms • Conclusion • Reference 2 11/15/2013
  • 3. Introduction (UWCNs) are constituted by sensors , sink and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring. 3 11/15/2013
  • 4. Sensor nodes also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment. Sink also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients. Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring 4 11/15/2013
  • 5. Underwater Wireless Communication System  Radio waves do not propagate well underwater due to the high energy absorption of water  Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s)  Acoustic channels have low bandwidth . As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise  It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water. 5 11/15/2013
  • 6. Underwater Wireless Communication System  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels.  Several methods are proposed to secure Underwater Wireless Communication Networks. Three schemes namely, secure time synchronization, localization, and routing in UWCNs 6 11/15/2013
  • 8. Jamming Method of Attack • The transmission of data packets continuously so that the wireless channel is completely blocked. Countermeasures • Spread spectrum techniques • Sensors can switch to sleep mode 8 11/15/2013
  • 9. Wormhole Attack Method of attack • False neighborhood relationships are created • The adversary can delay or drop packets sent through the wormhole. Countermeasures • Dis-VoW • Estimating the direction of arrival 9 11/15/2013
  • 10. Selective Forwarding Method of Attack • Malicious nodes drop certain messages instead of forwarding them to hinder routing. Countermeasures • Multipath routing • Authentication 10 11/15/2013
  • 11. Sinkhole Attack Method of Attack • A malicious node attempts to attract traffic from a particular area towards it by announcing that it is a high quality route. Countermeasures • Geographical routing • Authentication of nodes exchanging routing 11 information. 11/15/2013
  • 12. Helloflood Attack Method of Attack • A node receiving a HELLO packet from a malicious node may interpret that the adversary is a neighbor. Countermeasures • Bidirectional link verification • Authentication is a possible defense 12 11/15/2013
  • 13. Acknowledgement Spoofing Method of Attack • A malicious node overhearing packets sent to neighbor nodes use the information to spoof acknowledgements. Countermeasures • Encryption of all packets sent through the 13 network 11/15/2013
  • 14. Sybil Attack Method of attack • Sybil attack is defined as a malicious node illegitimately taking on multiple identities • Attacker with multiple identities pretend to be in many places at once. Countermeasures • Authentication • Position verification 14 11/15/2013
  • 15. Security Requirements Authentication Proof that data was sent by a legitimate user Confidentiality Information is not accessible to unauthorized parties Integrity Information is not altered Availability Data should be available when needed by an authorized user 15 11/15/2013
  • 16. Proposed Security Mechanism Secure under water communication Secure time synchronization Secure localization 16 Secure routing 11/15/2013
  • 17. Secure time Synchronization Why is Time Synchronization Important?  Location and proximity of siblings  Intranetwork coordination  Maintain ordering of messages  Use of TDMA  Energy efficiency 17 11/15/2013
  • 18. Secure time Synchronization Multilateration algorithm Phase 1 Phase 2 • Assume that a set of anchor nodes on ocean surface already know their location and time without error • A group of nearby sensors receives synchronization packets from at least 5 anchor nodes • The sensors learn their time difference between themselves and anchor nodes by comparing the synchronization packets • These nodes subsequently becomes the next anchor nodes. 18 11/15/2013
  • 19. Secure Localization Why is Localization important?  Vulnerability of WSN What an attacker can potentially do? GOAL: Make the node think it is somewhere different from actual location Wormhole attack Jamming As a result… Wrong results: wrong decisions 19 11/15/2013
  • 20. Secure Localization  Goal: To guarantee correctness despite of the presence of intruders  Localization is the process for each sensor node to locate its positions in the network.  Localization algorithms developed for terrestrial sensor networks are either based on the signal strength or the time-of-arrival (TOA) 20 11/15/2013
  • 21. Secure Localization • Range-based – Use exact measurements (point-to-point distance estimate (range) or angle estimates) – More expensive – Scalable Localization with Mobility Prediction (SLMP) • Range-free – Cost-effective alternative to range-based solutions 21 11/15/2013
  • 22. Secure Routing  Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies.  A secure routing rejects routing paths containing malicious nodes. 22 11/15/2013
  • 23. Secure Routing  Proactive protocols ( DSDV)  Reactive protocols (AODV)  Focused Beam Routing Protocol 23 11/15/2013
  • 24. Advantages  It avoids data spoofing.  It avoids privacy leakage.  Minimize communication and computational cost.  Maximizes the battery power by preserving the power of Underwater sensors 24 11/15/2013
  • 25. Conclusion  Wireless technology plays a vital role in many application areas that were not possible in the past. Wireless Underwater communication is one of them.  The main attacks related to UWCN have been surveyed.  A system with secure time synchronization, secure localization and secure routing can overcome these attacks.  Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided here. 25 11/15/2013
  • 26. REFERNCES [1] “Underwater Acoustic Sensor Networks: Research Challenges,” Ad HocNet., vol. 3, no. 3, I. F. Akyildiz, D. Pompili, and T. Melodia, Mar. 2005. [2] “Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3, no. 1, W. Wang et al., 2008, pp. 10–23. [3] “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.” chapter in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, A. D. Wood and J. A. Stankovic, M. Ilyas and I. Mahgoub, Eds., CRC Press, 2004. [4] Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge Univ. Press, L. ButtyĂĄn and J.-P. Hubaux, 2008. [5] “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks,” R. Zhang and Y. Zhang, Proc. IEEE INFOCOM, 2010. 26 11/15/2013