securing underwater wireless communication networks ppt.pptx123.pptx

Upload: saideepthi31896

Post on 07-Jul-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    1/22

      SECURING UNDERWATER WIRELESS  COMMUNICATION NETWORKS

     

    SUBMITTED BY

      T.SAI DEEPTHI SREE  V.VATSALYA  DEPARTMENT OF ECE

     

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    2/22

    CONTENTS

     Introduction Underwater Wireless Communication sstem Attac!s and counter measures

     Securit re"uirements Pro#osed securit mec$anisms Conclusion 

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    3/22

      INTRODUCTION

    (UWCNs )are constituted b sensors! sin"and autono#ous under$ater %e&ic'es(AUs) t&at interact to er*or# seci+ca'ications suc& as under$ater#oniterin,-

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    4/22

    Sensor nodes also !nown as motes or sim#l %odes aresmall and ener& constrained de'ices t$at $a'e t$e a(ilit o)

    sensin& t$e surroundin& en'ironment.

    Sin"  also !nown as (ase station* is a more #ower)ul nodet$at (e$a'es as an inter)ace (etween t$e sensor nodes andt$e clients.

    Autono#ous Under$ater e&ic'es(AUs)t$at interact to #er)orm s#eci+c a##lications suc$ as

    underwater moniterin&.

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    5/22

      Under$ater Wire'ess Co##unication  Sste#

    Radio wa'es do not #ro#a&ate well underwater due to t$e $i&$ener&

    a(sor#tion o) water

     T$ere)ore* underwater communications are (ased on acousticlin!sc$aracteri,ed ( lar&e #ro#a&ation delas.

     T$e #ro#a&ation s#eed o) acoustic si&nals in water -t#icall

    /00 m1s2

    Acoustic c$annels $a'e low (andwidt$. As a result* t$e (it errorrates o)   acoustic lin!s are o)ten $i&$* and losses o) connecti'it arise

    It cannot rel on t$e 3lo(al Positionin& Sstem -3PS2 (ecause it

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    6/22

      Under$ater Wire'ess Co##unication  Sste#

    Underwater wireless communication networ!s are #articularl

      'ulnera(le to malicious attac!s due to t$e $i&$ (it error rates*lar&e and  'aria(le #ro#a&ation delas* and low (andwidt$ o) acousticc$annels.

    Se'eral met$ods are #ro#osed to secure Underwater wirelesscommunication %etwor!s. T$ree sc$emes namel* secure timesnc$roni,ation* locali,ation* and routin& in UWC%s

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    7/22

    Attac" s

    Wor#&o'e

    attac" 

    Sin"&o'e

    Attac" 

    .e''o/'oodattac" 

    Ac"no$'ed,e#e

    ntSoo+n

    ,

    Se'ecti%e/or$ardi

    n,

    Sbi'attac" 

     0a##in,

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    8/22

       0a##in,

    Met&od o* Attac"  T$e transmission o) data #ac!ets continuousl sot$at t$e

      wireless c$annel is com#letel (loc!ed.

    Counter#easuresS#read s#ectrum tec$ni"ues

     Sensors can switc$ to slee# mode

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    9/22

      Se'ecti%e /or$ardin,

    Met&od o* Attac" Malicious nodes dro# certain messa&es instead o))orwardin& t$em to

      $inder routin&.

    Counter#easuresMulti#at$ routin&

     Aut$entication

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    10/22

      Sin"&o'e Attac" 

    Met&od o* Attac" A malicious node attem#ts to attract tra4c )rom a#articular  area towards it ( announcin& t$at it is a $i&$ "ualit

    route

    Counter#easures3eo&ra#$ical routin&Aut$entication o) nodes e5c$an&in& routin&

    in)ormation.

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    11/22

      .e''o1ood attac" 

    Met&od o* attac" A node recei'in& a HE667 #ac!et )rom a malicious nodema  inter#ret t$at t$e ad'ersar is a nei&$(our.

    Counter#easuresBidirectional lin! 'eri+cation

    Aut$entication is a #ossi(le de)ense 

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    12/22

      Securit Re2uire#ents

    Aut&enticationProo) t$at data was sent ( a le&itimate usercon+dentialit

    In)ormation is not accessi(le to unaut$ori,ed #arties

    Inte,ritIn)ormation is not altered a'aila(ilit

    Data s$ould (e a'aila(le w$en needed ( anaut$ori,ed user

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    13/22

      3roosed Securit Mec&anis#

    Secure under$ater co##unicationSecure time snc$roni,ation

     Secure locali,ation

     Secure routin&

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    14/22

      Secure ti#e Snc&roni4ation

    W& is Ti#e Snc&roni4ationI#ortant56ocation and #ro5imit o) si(lin&s

    Intra networ! coordination

    Maintain orderin& o) messa&es

    Use o) TDMA

    Ener& e4cienc

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    15/22

      Secure ti#e Snc&roni4ation

     Mu'ti'ateration a',orit3&ase 67Assume t$at a set o) anc$or nodes on ocean sur)ace alread

    !now t$eir  location and time wit$out error A &rou# o) near( sensors recei'es snc$roni,ation Pac!ets)rom at least /  anc$or nodes

    3&ase 87 T$e sensors learn t$eir time di8erence (etween t$emsel'es andanc$or

    nodes ( com#arin& t$e snc$roni,ation #ac!ets T$ese nodes su(se"uentl (ecomes t$e ne5t anc$or nodes

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    16/22

      Secure Loca'i4ation

     Goa'9 To &uarantee correctness des#ite o) t$e #resence o)Intruders

     6ocali,ation is t$e #rocess )or eac$ sensor node to locateits #ositions  in t$e networ!.

     6ocali,ation al&orit$ms de'elo#ed )or terrestrial sensornetwor!s are  eit$er (ased on t$e si,na' stren,t& or t$e ti#e9o*9arri%a' (TOA)

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    17/22

      Secure Loca'i4ation

    Ran,e9based  : Use e5act measurements -#oint:to:#oint distanceestimate

      -ran&e2 or an&le estimates2  : More e5#ensi'e  : Scala(le 6ocali,ation wit$ Mo(ilit Prediction

    -S6MP2

    Ran,e9*ree  : Cost:e8ecti'e alternati'e to ran&e:(ased solutions

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    18/22

      Secure Routin,

    Routin& is es#iciall c$allen&in& in UWC%s due to t$e lar&e  #ro#a&ation delas* low (andwidt$* di4cult o) (atterre+lls o)   underwater sensors* and dnamic to#olo&ies.

    A secure routin& re;ects routin& #at$s containin& malicious

    nodes.

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    19/22

      Secure Routin,Proacti'e #rotocols -DSD

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    20/22

      Ad%anta,es

    It a'oids data s#oo+n&.

    It a'oids #ri'ac lea!a&e.

    Minimi,e communication and com#utational cost.

    Ma5imi,es t$e (atter #ower ( #reser'in& t$e #ower o)Underwater  sensors.

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    21/22

      Conc'usion

    Wireless tec$nolo& #las a 'ital role in man a##lication areast$at

    were not #ossi(le in t$e #ast. Wireless Underwater

    communication isone o) t$em.

     T$e main attac!s related to UWC% $a'e (een sur'eed.

     A sstem wit$ secure time snc$roni,ation* secure locali,ation

    andsecure routin& can o'ercome t$ese attac!s.

     Since t$e de'elo#ment o) t$e #ro#osed sstem is still in itsde'elo#ment

      sta&e* an account o) actual im#lementation $as not (een

  • 8/19/2019 securing underwater wireless communication networks ppt.pptx123.pptx

    22/22

     THA%> Y7U