underwater communication skills for the new way of devine(2)
TRANSCRIPT
INTRODUCTION
HISTORICAL PERSPECTIVE
UNDERWATER SENSOR NETWORK
ARCHITECTURE
APPLICATION OF WIRELESS SENSOR
NETWORK
PROBLEM IN UNDERWATER SENSOR
NETWORK
ATTACKS ON UWCN
SECURITY REQUIREMENT
CONCLUSION
2
Underwater wireless communication is the
wireless communication in which acoustic signals
(waves) carry digital information through an
underwater channel.
The signal that are used to carry digital
information through an underwater channel areacoustic channel.
3
Underwater wireless communication networks
(UWCNs) are constituted by sensors and autonomous
underwater vehicles (AUVs) that interact to performspecific applications such as underwater monitoring
using the underwater acoustic channel.
Electromagnetic waves propagate poorly in sea water,
acoustics provides the most obvious medium to
enable underwater communications
4
The science of underwater acoustics began in 1490,
when Leonardo Da Vinci, stated.
In 1687 Isaac Newton wrote his Mathematical
Principles of Natural Philosophy which included the first
mathematical treatment of sound in water.
HISTORY
5
Initial Efforts in Underwater Communications
Incoherent and Coherent Modulation
Production Systems
7
9
Fastest way for finding underwater information
Disaster Prevention
Ocean Sampling Network
Environmental Monitoring
APPLICATION S OF UNDERWATER
SENSOR NETWORK
More costly devices
Hardware Protection requirement
Needed high power for communication:
Localization
Limited battery power
Bandwidth size
Reliability
Temporary losses
11
12
Jamming
Wormhole attacks
Sybil attack
SelectiveForwardin
g
AcknowledgmentSpoofing
ATTACKS Hello Flood attack
SinkholeAttacks
ATTACKS AND COUNTERMEASURES
Countermeasures
13
•The transmission of data packets continuously so that the
wireless channel get completely blocked.
•Spread spectrum techniques.
• Sensors can switch to sleep mode
Jamming
Wormhole Attack
Method of attack
•False neighborhood
relationship are created..
Countermeasures
• Estimating the direction of
arrival…
14
SINKHOLE ATTACK : In a sinkhole attack, a
malicious node attempts to attract traffic from a
particular area toward it.
HELLO FLOOD ATTACK : A node receiving a
HELLO packet from a malicious node may interpret
that the adversary is a neighbour.
ACKNOWLEDGMENT SPOOFING:
SYBIL ATTACK
15
Authentication
•Proof that data was sent by a valid user
Integrity
•It insures that Information is not altered by any
adversary node
16
Confidentiality
•Information is not accessible to unauthorized parties.
Availability
•Data should be available when needed by an authorized
user.
17
The main objective is to overcome the present limitations and
implement advanced technology for oceanographic research.
the future challenges like effective transmission of audio and
video signals etc.
Security in wireless sensor networks has attracted a lot of
attention in the recent years.
www.ieee.org/organizations/pubs/newsletters/oes/ht
ml/spring06/underwater.html
www.link-quest.com/html/oceans2000.pdf/
www.gleonrcn.org/pgm-
download_media.php?name=Aquanode.pps
www.cs.virginia.edu/sigbed/archives/akyildiz.pdf