underwater communication skills for the new way of devine(2)

20
PRESENTEBY MANJUSHREE MASHAL

Upload: manjushree-mashal

Post on 16-Jul-2015

78 views

Category:

Technology


4 download

TRANSCRIPT

PRESENTEBY

MANJUSHREE MASHAL

INTRODUCTION

HISTORICAL PERSPECTIVE

UNDERWATER SENSOR NETWORK

ARCHITECTURE

APPLICATION OF WIRELESS SENSOR

NETWORK

PROBLEM IN UNDERWATER SENSOR

NETWORK

ATTACKS ON UWCN

SECURITY REQUIREMENT

CONCLUSION

2

Underwater wireless communication is the

wireless communication in which acoustic signals

(waves) carry digital information through an

underwater channel.

The signal that are used to carry digital

information through an underwater channel areacoustic channel.

3

Underwater wireless communication networks

(UWCNs) are constituted by sensors and autonomous

underwater vehicles (AUVs) that interact to performspecific applications such as underwater monitoring

using the underwater acoustic channel.

Electromagnetic waves propagate poorly in sea water,

acoustics provides the most obvious medium to

enable underwater communications

4

The science of underwater acoustics began in 1490,

when Leonardo Da Vinci, stated.

In 1687 Isaac Newton wrote his Mathematical

Principles of Natural Philosophy which included the first

mathematical treatment of sound in water.

HISTORY

5

6

Figure : Underwater sensor network with AUV

Initial Efforts in Underwater Communications

Incoherent and Coherent Modulation

Production Systems

7

8

UNDERWATER SENSOR NETWORK

ARCHITECTURE

2D architecture of underwater sensor network

9

Fastest way for finding underwater information

Disaster Prevention

Ocean Sampling Network

Environmental Monitoring

APPLICATION S OF UNDERWATER

SENSOR NETWORK

APPLICATION

Search and rescue mission

10

More costly devices

Hardware Protection requirement

Needed high power for communication:

Localization

Limited battery power

Bandwidth size

Reliability

Temporary losses

11

12

Jamming

Wormhole attacks

Sybil attack

SelectiveForwardin

g

AcknowledgmentSpoofing

ATTACKS Hello Flood attack

SinkholeAttacks

ATTACKS AND COUNTERMEASURES

Countermeasures

13

•The transmission of data packets continuously so that the

wireless channel get completely blocked.

•Spread spectrum techniques.

• Sensors can switch to sleep mode

Jamming

Wormhole Attack

Method of attack

•False neighborhood

relationship are created..

Countermeasures

• Estimating the direction of

arrival…

14

SINKHOLE ATTACK : In a sinkhole attack, a

malicious node attempts to attract traffic from a

particular area toward it.

HELLO FLOOD ATTACK : A node receiving a

HELLO packet from a malicious node may interpret

that the adversary is a neighbour.

ACKNOWLEDGMENT SPOOFING:

SYBIL ATTACK

15

Authentication

•Proof that data was sent by a valid user

Integrity

•It insures that Information is not altered by any

adversary node

16

Confidentiality

•Information is not accessible to unauthorized parties.

Availability

•Data should be available when needed by an authorized

user.

17

The main objective is to overcome the present limitations and

implement advanced technology for oceanographic research.

the future challenges like effective transmission of audio and

video signals etc.

Security in wireless sensor networks has attracted a lot of

attention in the recent years.

www.ieee.org/organizations/pubs/newsletters/oes/ht

ml/spring06/underwater.html

www.link-quest.com/html/oceans2000.pdf/

www.gleonrcn.org/pgm-

download_media.php?name=Aquanode.pps

www.cs.virginia.edu/sigbed/archives/akyildiz.pdf

20