Você está na página 1de 17

SECURING UNDERWATER

WIRELESS COMMUNICATION
NETWORK
FAHD AHMED
[1HK11EC027]
Under the guidance of

Prof. Zahira Tabassum


Assoc. Prof, Dept. of E&C Engg.
H.K.B.K.C.E, Bangalore

OUTLINE

Introduction
History
Underwater Wireless Communication Tech.
Attacks and counter measures
Necessity of Underwater Wireless
Communication
Conclusion
References

INTRODUCTION

Underwater wireless communication is


the wireless communication in which
acoustic signals (waves) carry digital
information through an underwater channel.

The signal that are used to carry digital


information through an underwater channel
are acoustic channel.

HISTORY

The science of underwater acoustics began in 1490,


whenLeonardo Da Vinci, stated.

In 1687 Isaac Newton wrote hisMathematical


Principles of Natural Philosophywhich included the
first mathematical treatment of sound in water.

Underwater Wireless Communication


Technology

Radio waves do not propagate well


underwater due to the high energy
absorption of water.
Therefore, underwater communication are
based on acoustic links characterized by
large propagation delays.
Acoustic channels have low bandwidth.

Underwater Wireless Communication


Technology

The signal that are used to carry digital information


through an underwater channel are acoustic channel.

The propagation speed of acoustic signals in water is


typically 1500 m/s.

It cannot rely on the Global Positioning System (GPS).

Underwater Wireless Communication


Technology

The signal that are used to carry digital information


through an underwater channel are acoustic channel.

The propagation speed of acoustic signals in water is


typically 1500 m/s.

It cannot rely on the Global Positioning System (GPS).

WAVE PROPAGATION
This is an multipath
propagation in water.

In shallow water, multipath


occurs due to signal reflection
from the surface and bottom.

In deep water, it occurs due


to ray bending.

ATTACKS AND COUNTER MEASURES.

Jamming

Method of Attack
The transmission of data packets
continuously so that the wireless channel
get completely blocked.
Countermeasures
Spread spectrum techniques.
Sensors can switch to sleep mode

Wormhole Attack
Method of attack
False neighborhood
relationship are
created..
Countermeasures
Estimating the
direction of arrival

Security requirement

Authentication
Proof that data was sent by a legitimate user
Integrity
Information is not altered.

Security requirement

Confidentiality
Information is not accessible to unauthorized
parties.
Availability
Data should be available when needed by an
authorized user.

Você também pode gostar