SlideShare ist ein Scribd-Unternehmen logo
1 von 27
SECURING UNDERWATER
WIRELESS
COMMUNICATION

NISHA MENON K
ROLL NO: 16
M-TECH
COMMUNICATION ENGINEERING
1

11/15/2013
OUTLINE
• Introduction
• Underwater Wireless Communication Network
• Attacks and counter measures
• Security requirements
• Proposed security mechanisms
• Conclusion
• Reference

2

11/15/2013
Introduction
(UWCNs) are constituted by sensors , sink and autonomous
underwater vehicles (AUVs) that interact to perform specific
applications such as underwater monitoring.

3

11/15/2013
Sensor nodes

also known as motes or simply
nodes are small and energy constrained devices that
have the ability of sensing the surrounding
environment.

Sink also known as base station, is a more powerful
node that behaves as an interface between the sensor
nodes and the clients.

Autonomous Underwater Vehicles
(AUVs) that interact to perform specific applications
such as underwater monitoring

4

11/15/2013
Underwater Wireless
Communication System
 Radio waves do not propagate well underwater due to the high
energy absorption of water

 Therefore, underwater communications are based on acoustic

links characterized by large propagation delays. The propagation
speed of acoustic signals in water (typically 1500 m/s)

 Acoustic channels have low bandwidth . As a result, the bit error

rates of acoustic links are often high, and losses of connectivity arise

 It cannot rely on the Global Positioning System (GPS) because it uses
radar waves in the 1.5 GHz band that do not propagate in water.
5

11/15/2013
Underwater Wireless
Communication System
 Underwater wireless communication networks are particularly

vulnerable to malicious attacks due to the high bit error rates, large
and variable propagation delays, and low bandwidth of acoustic
channels.

 Several methods

are proposed to secure Underwater Wireless
Communication Networks. Three schemes namely, secure time
synchronization, localization, and routing in UWCNs

6

11/15/2013
Wormhole
attack
Sinkhole
Attack

Jamming

Attacks
Hello Flood
attack

Sybil attack

Acknowled
gement
spoofing

Selective
Forwarding
7

11/15/2013
Jamming
Method of Attack
• The transmission of data packets continuously
so that the wireless channel is completely
blocked.

Countermeasures
• Spread spectrum techniques
• Sensors can switch to sleep mode
8

11/15/2013
Wormhole Attack
Method of attack
• False neighborhood relationships are
created
• The adversary can delay or drop
packets sent through the wormhole.

Countermeasures
• Dis-VoW
• Estimating the direction of arrival
9

11/15/2013
Selective Forwarding
Method of Attack
• Malicious nodes drop certain messages instead
of forwarding them to hinder routing.

Countermeasures
• Multipath routing
• Authentication
10

11/15/2013
Sinkhole Attack
Method of Attack
• A malicious node attempts to attract traffic from
a particular area towards it by announcing that
it is a high quality route.

Countermeasures
• Geographical routing
• Authentication of nodes exchanging routing
11
information.

11/15/2013
Helloflood Attack
Method of Attack
• A node receiving a HELLO packet from a malicious
node may interpret that the adversary is a neighbor.

Countermeasures
• Bidirectional link verification
• Authentication is a possible defense
12

11/15/2013
Acknowledgement
Spoofing
Method of Attack
• A malicious node overhearing packets sent to
neighbor nodes use the information to spoof
acknowledgements.

Countermeasures
• Encryption of all packets sent through the
13
network

11/15/2013
Sybil Attack
Method of attack
• Sybil attack is defined as a malicious
node illegitimately taking on multiple
identities
• Attacker with multiple identities
pretend to be in many places at once.

Countermeasures
• Authentication
• Position verification
14

11/15/2013
Security Requirements
Authentication
Proof that data was sent by a legitimate user

Confidentiality
Information is not accessible to unauthorized parties

Integrity
Information is not altered

Availability
Data should be available when needed by an authorized user
15

11/15/2013
Proposed Security
Mechanism
Secure under
water
communication
Secure time
synchronization

Secure
localization

16

Secure routing

11/15/2013
Secure time
Synchronization
Why is Time Synchronization Important?

 Location and proximity of siblings
 Intranetwork coordination
 Maintain ordering of messages
 Use of TDMA
 Energy efficiency

17

11/15/2013
Secure time
Synchronization
Multilateration algorithm

Phase 1

Phase 2

• Assume that a set of anchor nodes on ocean surface already know
their location and time without error
• A group of nearby sensors receives synchronization packets from at
least 5 anchor nodes

• The sensors learn their time difference between themselves and
anchor nodes by comparing the synchronization packets
• These nodes subsequently becomes the next anchor nodes.

18

11/15/2013
Secure Localization
Why is Localization important?
 Vulnerability of WSN

What an attacker can potentially do?
GOAL: Make the node think it is
somewhere different from actual
location

Wormhole attack
Jamming

As a result…
Wrong results: wrong decisions
19

11/15/2013
Secure Localization
 Goal: To guarantee correctness despite of the presence of
intruders

 Localization is the process for each sensor node to locate its
positions in the network.

 Localization algorithms developed for terrestrial sensor networks

are either based on the signal strength or the time-of-arrival (TOA)

20

11/15/2013
Secure Localization
• Range-based
– Use exact measurements (point-to-point distance
estimate (range) or angle estimates)
– More expensive
– Scalable Localization with Mobility Prediction (SLMP)
• Range-free
– Cost-effective alternative to range-based solutions

21

11/15/2013
Secure Routing
 Routing is specially challenging in UWCNs due to
the large propagation delays, low
bandwidth, difficulty of battery refills of
underwater sensors, and dynamic topologies.

 A secure routing rejects routing paths containing
malicious nodes.

22

11/15/2013
Secure Routing
 Proactive protocols ( DSDV)
 Reactive protocols (AODV)
 Focused Beam Routing Protocol

23

11/15/2013
Advantages
 It avoids data spoofing.

 It avoids privacy leakage.
 Minimize communication and computational cost.
 Maximizes the battery power by preserving the power of
Underwater sensors

24

11/15/2013
Conclusion
 Wireless technology plays a vital role in many application areas that

were not possible in the past. Wireless Underwater communication is
one of them.

 The main attacks related to UWCN have been surveyed.

 A system with secure time synchronization, secure localization and
secure routing can overcome these attacks.

 Since the deployment of the proposed system is still in its development

stage, an account of actual implementation has not been provided here.

25

11/15/2013
REFERNCES
[1] “Underwater Acoustic Sensor Networks: Research Challenges,” Ad HocNet., vol. 3, no.
3, I. F. Akyildiz, D. Pompili, and T. Melodia, Mar. 2005.
[2] “Visualization of Wormholes in Underwater Sensor Networks: A Distributed
Approach,” Int’l. J. Security Net., vol. 3, no. 1, W. Wang et al., 2008, pp. 10–23.
[3] “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.” chapter in
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, A. D. Wood
and J. A. Stankovic, M. Ilyas and I. Mahgoub, Eds., CRC Press, 2004.
[4] Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish
Behavior in the Age of Ubiquitous Computing, Cambridge Univ. Press, L. Buttyán and J.-P.
Hubaux, 2008.

[5] “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic
Networks,” R. Zhang and Y. Zhang, Proc. IEEE INFOCOM, 2010.
26

11/15/2013
THANK YOU

27

11/15/2013

Weitere ähnliche Inhalte

Was ist angesagt?

Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde9527604481
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communicationEr. Saba karim
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor networkShiwangi Thakur
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Fundamentals of Cellular Communications
Fundamentals of Cellular CommunicationsFundamentals of Cellular Communications
Fundamentals of Cellular CommunicationsDon Norwood
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
The cellular concept
The cellular conceptThe cellular concept
The cellular conceptZunAib Ali
 

Was ist angesagt? (20)

Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
UNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASEDUNDER WATER SENSOR NETWORK ENERGY BASED
UNDER WATER SENSOR NETWORK ENERGY BASED
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communication
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Fundamentals of Cellular Communications
Fundamentals of Cellular CommunicationsFundamentals of Cellular Communications
Fundamentals of Cellular Communications
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 

Andere mochten auch

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communicationDheeresh Kumar
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt asharanick
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communicationAbhirami P S
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wirelesspatna
 
Laser Communications
Laser CommunicationsLaser Communications
Laser CommunicationsSeminar Links
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communicationchiranjitgiri
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channelsShudhanshu Singh
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technologySushil Sudake
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17Darshil Shah
 
Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010le luan
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theaterPeter Gordon
 

Andere mochten auch (20)

Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communication
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
LASER Communication
LASER CommunicationLASER Communication
LASER Communication
 
Laser Communication
Laser CommunicationLaser Communication
Laser Communication
 
Laser Communications
Laser CommunicationsLaser Communications
Laser Communications
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technology
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Red tacton
Red tactonRed tacton
Red tacton
 
final report_51_33_17
final report_51_33_17final report_51_33_17
final report_51_33_17
 
Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010Principles of sonar performance modeling 2010
Principles of sonar performance modeling 2010
 
Captchas are becoming security theater
Captchas are becoming security theaterCaptchas are becoming security theater
Captchas are becoming security theater
 

Ähnlich wie Securing underwater wireless communication by Nisha Menon K

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksDipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkkDipaloke Arunodoy
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunicationDevyani Vaidya
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)IJRAT
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148IJRAT
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...IAEME Publication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 

Ähnlich wie Securing underwater wireless communication by Nisha Menon K (20)

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
D0961927
D0961927D0961927
D0961927
 
A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...A survey on various time synchronization techniques in underwater sensor netw...
A survey on various time synchronization techniques in underwater sensor netw...
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 

Mehr von Nisha Menon K

High capacity optical
High capacity opticalHigh capacity optical
High capacity opticalNisha Menon K
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon kNisha Menon K
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kNisha Menon K
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless TechnologyNisha Menon K
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNisha Menon K
 

Mehr von Nisha Menon K (11)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
Digital signature
Digital signatureDigital signature
Digital signature
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

Kürzlich hochgeladen

Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 

Kürzlich hochgeladen (20)

Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 

Securing underwater wireless communication by Nisha Menon K

  • 1. SECURING UNDERWATER WIRELESS COMMUNICATION NISHA MENON K ROLL NO: 16 M-TECH COMMUNICATION ENGINEERING 1 11/15/2013
  • 2. OUTLINE • Introduction • Underwater Wireless Communication Network • Attacks and counter measures • Security requirements • Proposed security mechanisms • Conclusion • Reference 2 11/15/2013
  • 3. Introduction (UWCNs) are constituted by sensors , sink and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring. 3 11/15/2013
  • 4. Sensor nodes also known as motes or simply nodes are small and energy constrained devices that have the ability of sensing the surrounding environment. Sink also known as base station, is a more powerful node that behaves as an interface between the sensor nodes and the clients. Autonomous Underwater Vehicles (AUVs) that interact to perform specific applications such as underwater monitoring 4 11/15/2013
  • 5. Underwater Wireless Communication System  Radio waves do not propagate well underwater due to the high energy absorption of water  Therefore, underwater communications are based on acoustic links characterized by large propagation delays. The propagation speed of acoustic signals in water (typically 1500 m/s)  Acoustic channels have low bandwidth . As a result, the bit error rates of acoustic links are often high, and losses of connectivity arise  It cannot rely on the Global Positioning System (GPS) because it uses radar waves in the 1.5 GHz band that do not propagate in water. 5 11/15/2013
  • 6. Underwater Wireless Communication System  Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels.  Several methods are proposed to secure Underwater Wireless Communication Networks. Three schemes namely, secure time synchronization, localization, and routing in UWCNs 6 11/15/2013
  • 8. Jamming Method of Attack • The transmission of data packets continuously so that the wireless channel is completely blocked. Countermeasures • Spread spectrum techniques • Sensors can switch to sleep mode 8 11/15/2013
  • 9. Wormhole Attack Method of attack • False neighborhood relationships are created • The adversary can delay or drop packets sent through the wormhole. Countermeasures • Dis-VoW • Estimating the direction of arrival 9 11/15/2013
  • 10. Selective Forwarding Method of Attack • Malicious nodes drop certain messages instead of forwarding them to hinder routing. Countermeasures • Multipath routing • Authentication 10 11/15/2013
  • 11. Sinkhole Attack Method of Attack • A malicious node attempts to attract traffic from a particular area towards it by announcing that it is a high quality route. Countermeasures • Geographical routing • Authentication of nodes exchanging routing 11 information. 11/15/2013
  • 12. Helloflood Attack Method of Attack • A node receiving a HELLO packet from a malicious node may interpret that the adversary is a neighbor. Countermeasures • Bidirectional link verification • Authentication is a possible defense 12 11/15/2013
  • 13. Acknowledgement Spoofing Method of Attack • A malicious node overhearing packets sent to neighbor nodes use the information to spoof acknowledgements. Countermeasures • Encryption of all packets sent through the 13 network 11/15/2013
  • 14. Sybil Attack Method of attack • Sybil attack is defined as a malicious node illegitimately taking on multiple identities • Attacker with multiple identities pretend to be in many places at once. Countermeasures • Authentication • Position verification 14 11/15/2013
  • 15. Security Requirements Authentication Proof that data was sent by a legitimate user Confidentiality Information is not accessible to unauthorized parties Integrity Information is not altered Availability Data should be available when needed by an authorized user 15 11/15/2013
  • 16. Proposed Security Mechanism Secure under water communication Secure time synchronization Secure localization 16 Secure routing 11/15/2013
  • 17. Secure time Synchronization Why is Time Synchronization Important?  Location and proximity of siblings  Intranetwork coordination  Maintain ordering of messages  Use of TDMA  Energy efficiency 17 11/15/2013
  • 18. Secure time Synchronization Multilateration algorithm Phase 1 Phase 2 • Assume that a set of anchor nodes on ocean surface already know their location and time without error • A group of nearby sensors receives synchronization packets from at least 5 anchor nodes • The sensors learn their time difference between themselves and anchor nodes by comparing the synchronization packets • These nodes subsequently becomes the next anchor nodes. 18 11/15/2013
  • 19. Secure Localization Why is Localization important?  Vulnerability of WSN What an attacker can potentially do? GOAL: Make the node think it is somewhere different from actual location Wormhole attack Jamming As a result… Wrong results: wrong decisions 19 11/15/2013
  • 20. Secure Localization  Goal: To guarantee correctness despite of the presence of intruders  Localization is the process for each sensor node to locate its positions in the network.  Localization algorithms developed for terrestrial sensor networks are either based on the signal strength or the time-of-arrival (TOA) 20 11/15/2013
  • 21. Secure Localization • Range-based – Use exact measurements (point-to-point distance estimate (range) or angle estimates) – More expensive – Scalable Localization with Mobility Prediction (SLMP) • Range-free – Cost-effective alternative to range-based solutions 21 11/15/2013
  • 22. Secure Routing  Routing is specially challenging in UWCNs due to the large propagation delays, low bandwidth, difficulty of battery refills of underwater sensors, and dynamic topologies.  A secure routing rejects routing paths containing malicious nodes. 22 11/15/2013
  • 23. Secure Routing  Proactive protocols ( DSDV)  Reactive protocols (AODV)  Focused Beam Routing Protocol 23 11/15/2013
  • 24. Advantages  It avoids data spoofing.  It avoids privacy leakage.  Minimize communication and computational cost.  Maximizes the battery power by preserving the power of Underwater sensors 24 11/15/2013
  • 25. Conclusion  Wireless technology plays a vital role in many application areas that were not possible in the past. Wireless Underwater communication is one of them.  The main attacks related to UWCN have been surveyed.  A system with secure time synchronization, secure localization and secure routing can overcome these attacks.  Since the deployment of the proposed system is still in its development stage, an account of actual implementation has not been provided here. 25 11/15/2013
  • 26. REFERNCES [1] “Underwater Acoustic Sensor Networks: Research Challenges,” Ad HocNet., vol. 3, no. 3, I. F. Akyildiz, D. Pompili, and T. Melodia, Mar. 2005. [2] “Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach,” Int’l. J. Security Net., vol. 3, no. 1, W. Wang et al., 2008, pp. 10–23. [3] “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.” chapter in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, A. D. Wood and J. A. Stankovic, M. Ilyas and I. Mahgoub, Eds., CRC Press, 2004. [4] Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge Univ. Press, L. Buttyán and J.-P. Hubaux, 2008. [5] “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks,” R. Zhang and Y. Zhang, Proc. IEEE INFOCOM, 2010. 26 11/15/2013