Professional Documents
Culture Documents
UWCNs are
constituted by sensors,
sink, autonomous under
vehicles.
That interact to
perform specific
applications such as
under water monitoring.
Contd...
CONTENTS
UNDERWATER
WIRELESS
COMMUNICATION
NETWORKS
CHARACTERISTICS
AND
VULNERABILITIES
UWCNS
ATTACKS
SECURITY REQUIREMENTS
RESEARCH
CHALLENGES
SUMMARY
APPLICATIONS
CONCLUSION
OF
Radio Waves do not propagate well Under Water due to the high
energy absorption of water.
Contd
synchronization,
Jamming
Wormhole Attack
Sinkhole Attack
Acknowledgement Spoofing
Selective Forwarding
Sybil Attack
JAMMING
METHOD OF ATTACK:
COUNTERMEASURES:
WORMHOLE ATTACK
METHOD OF
ATTACK:
False neighborhood
relationships are created.
COUNTERMEASURES:
SELECTIVE
FORWARDING:
METHOD OF ATTACK:
Drop certain
messages instead of
forwarding to hinder
routing.
SINKHOLE ATTACK:
METHOD OF ATTACK:
COUNTERMEASURES:
COUNTERMEASURES:
Multipath routing
Geographical routing
authentication
Authentication of nodes
exchanging routing information
HELLOFLOOD ATTACK:
METHOD OF ATTACK:
ACKNOWLEDGMENT SPOOFING
COUNTERMEASURES:
Bidirectional link
verification
METHOD OF ATTACK:
COUNTERMEASURES:
Encryption
SYBIL ATTACK
METHOD
OF ATTACK:
An
attacker with
multiple identities can
pretend to be in many
places at once.
COUNTERMEASURES:
Position
verification.
RESEARCH CHALLENGES
2.Secure localization
3.Secure Routing
SECURE LOCALISATION
Localization is a very important issue for data
tagging. It can also help in making routing
decisions.
Localization schemes can be classified into:
1. Range-based schemes
(i) Anchor-based schemes
(ii) Distributed positioning schemes
2. Range-free schemes
SECURE ROUTING
ADVANTAGES
DRAWBACKS
APPLICATIONS
Contd.
Oceanographic studies
Marine Archaeology
CONCLUSION
REFERENCES