[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

SecRET: Secure Range-based Localization with Evidence Theory for Underwater Sensor Networks

Published: 20 January 2021 Publication History

Abstract

Node localization is a fundamental requirement in underwater sensor networks (UWSNs) due to the ineptness of GPS and other terrestrial localization techniques in the underwater environment. In any UWSN monitoring application, the sensed information produces a better result when it is tagged with location information. However, the deployed nodes in UWSNs are vulnerable to many attacks, and hence, can be compromised by interested parties to generate incorrect location information. Consequently, using the existing localization schemes, the deployed nodes are unable to autonomously estimate the precise location information. In this regard, similar existing schemes for terrestrial wireless sensor networks are not applicable to UWSNs due to its inherent mobility, limited bandwidth availability, strict energy constraints, and high bit-error rates. In this article, we propose SecRET, a <underline>Sec</underline>ure <underline>R</underline>ange-based localization scheme empowered by <underline>E</underline>vidence <underline>T</underline>heory for UWSNs. With trust-based computations, the proposed scheme, SecRET, enables the unlocalized nodes to select the most reliable set of anchors with low resource consumption. Thus, the proposed scheme is adaptive to many attacks in UWSN environment. NS-3 based performance evaluation indicates that SecRET maintains energy-efficiency of the deployed nodes while ensuring efficient and secure localization, despite the presence of compromised nodes under various attacks.

References

[1]
Bilal Ahmad, Wang Jian, Rabia Noor Enam, and Ali Abbas. 2019. Classification of DoS attacks in smart underwater wireless sensor network. Wirel. Pers. Commun. (2019), 1--15.
[2]
an F. Akyildiz, Dario Pompili, and Tommaso Melodia. 2005. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 3, 3 (2005), 257--279.
[3]
L. Berkhovskikh and Y. Lysanov. 1982. Fundamentals of Ocean Acoustics. Springer, Germany.
[4]
Christian Cardia, Petrika Gjanci, Chiara Petrioli, Gabriele Saturni, Daniele Spaccini, and Domenico Tomaselli. 2019. The internet of underwater things: From Nemo to underwater Whatsapp. In Proceedings of the ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MobiHoc’19). 409--410.
[5]
Antonio Caruso, Francesco Paparella, Luiz Filipe M. Vieira, Melike Erol, and Mario Gerla. 2008. The meandering current mobility model and its impact on underwater mobile sensor networks. In Proceedings of the IEEE International Conference on Computer Communications.
[6]
Haiguang Chen. 2009. Task-based trust management for wireless sensor networks. Int. J. Sec. Applic. 3, 2 (2009), 21--26.
[7]
Haiguang Chen, Huafeng Wu, Xi Zhou, and Chuanshan Gao. 2007. Agent-based trust model in wireless sensor networks. In Proceedings of the International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Vol. 3. 119--124.
[8]
Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu. 2008b. Underwater localization in sparse 3D acoustic sensor networks. In Proceedings of the IEEE International Conference on Computer Communications. 798--806.
[9]
Xiuzhen Cheng, Haining Shu, Qilian Liang, and David Hung-Chang Du. 2008a. Silent positioning in underwater acoustic sensor networks. IEEE Trans. Vehic. Technol. 57, 3 (2008), 1756--1766.
[10]
Konstantinos Christidis, Petros Nicopolitidis, Georgios I. Papadimitriou, Panagiotis G. Sarigiannidis, and Andreas S. Pomportsis. 2011. Utilizing locality of demand for lower response times in underwater data broadcasting. In Proceedings of the IEEE Vehicular Technology Conference (VTC Spring’11). 1--5.
[11]
Jun-Hong Cui, Jiejun Kong, Mario Gerla, and Shengli Zhou. 2006. The challenges of building mobile underwater wireless networks for aquatic applications. IEEE Netw. 20, 3 (2006), 12--18.
[12]
Anjana P. Das, Sabu M. Thampi, and Jaime Lloret. 2020. Anomaly detection in UASN localization based on time series analysis and fuzzy logic. Mob. Netw. Applic. 25 (2020), 55--67.
[13]
Arthur P. Dempster. 1967. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 38, 2 (1967), 325--339.
[14]
Elizaveta Dubrovinskaya, Roee Diamant, and Paolo Casari. 2017. Anchorless underwater acoustic localization. In Proceedings of the Workshop on Positioning, Navigation and Communications. Bremen, Germany, 1--6.
[15]
Melike Erol, Luiz F. M. Vieira, and Mario Gerla. 2007a. Localization with Dive’N’Rise (DNR) beacons for underwater acoustic sensor networks. In Proceedings of the ACM Workshop on Underwater Networks (WuWNet’07). 97--100.
[16]
Melike Erol, Luiz Filipe M. Vieira, and Mario Gerla. 2007b. AUV-aided localization for underwater sensor networks. In Proceedings of the Wireless Algorithms, Systems and Applications Conference. 44--54.
[17]
Melike Erol-Kantarci, Hussein T. Mouftah, and Sema Oktug. 2011. A survey of architectures and localization techniques for underwater acoustic sensor networks. IEEE Commun. Surv. Tutor. 13, 3 (2011), 487--502.
[18]
[19]
Melike Erol-Kantarci, Hussein T. Mouftah, and Sema Oktug. 2011b. A survey of architectures and localization techniques for underwater acoustic sensor networks. IEEE Communications Surveys and Tutorials 13, 3 (2011), 487--502. --&gt;
[20]
Saurabh Ganeriwal, Laura K. Balzano, and Mani B. Srivastava. 2008. Reputation-based framework for high integrity sensor networks. ACM Trans. Sensor Netw. 4, 3 (2008), 15.
[21]
Ying Guo, Qinghe Han, and Xiaoyue Kang. 2019. Underwater sensor networks localization based on mobility constrained beacon. Wirel. Netw. 26 (2019), 1--10.
[22]
Guangjie Han, Jinfang Jiang, Lei Shu, and Mohsen Guizani. 2015. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput 14, 12 (2015), 2447--2459.
[23]
Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, and Han-Chieh Chao. 2014. Management and applications of trust in wireless sensor networks: A survey. J. Comput. Syst. Sci. 80, 3 (2014), 602--617.
[24]
Guangjie Han, Li Liu, Jinfang Jiang, Lei Shu, and Joel J. P. C. Rodrigues. 2016. A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 16, 2 (2016), 229.
[25]
Albert F. Harris and Michele Zorzi. 2007. Modeling the underwater acoustic channel in NS2. In Proceedings of the International Conference on Performance Evaluation Methodologies and Tools. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 1--8.
[26]
John Heidemann, Milica Stojanovic, and Michele Zorzi. 2012. Underwater sensor networks: Applications, advances and challenges. Philos. Trans. Roy. Soc. A 370 (2012), 158--175.
[27]
Gokhan Isbitiren and Ozgur B. Akan. 2011. Three-dimensional underwater target tracking with acoustic sensor networks. IEEE Trans. Vehic. Technol. 60, 8 (2011), 3897--3906.
[28]
M. Talha Isik and Ozgur B. Akan. 2009. A three dimensional localization algorithm for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 8, 9 (2009).
[29]
Nabila Labraoui, Mourad Gueroui, and Larbi Sekhri. 2015. On-off attacks mitigation against trust systems in wireless sensor networks. In Proceedings of the IFIP International Conference on Computer Science and Its Applications. 406--415.
[30]
Chhagan Lal, Roberto Petroccia, Konstantinos Pelekanakis, Mauro Conti, and Joáo Alves. 2017. Toward the development of secure underwater acoustic networks. IEEE J. Ocean. Eng. 42, 4 (2017), 1--13.
[31]
Hong Li, Yunhua He, Xiuzhen Cheng, Hongsong Zhu, and Limin Sun. 2015. Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53, 11 (2015), 56--62.
[32]
Linfeng Liu, Jiagao Wu, and Zhiwen Zhu. 2015. Multihops fitting approach for node localization in underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 215, 682182 (2015), 1--11.
[33]
Quan Liu, Yeqing Liao, Bing Tang, and Lei Yu. 2008. A trust model based on subjective logic for multi-domains in grids. In Proceedings of the Conference on Computational Intelligence and Industrial Application, Vol. 2. 882--886.
[34]
Goutam Mali and Sudip Misra. 2016. Topology management-based distributed camera actuation in wireless multimedia sensor networks. ACM Trans. Auton. Adapt. Syst. 12, 1 (2016).
[35]
Sudip Misra, Tamoghna Ojha, and Ayan Mondal. 2015. Game-theoretic topology control for opportunistic localization in sparse underwater sensor networks. IEEE Trans. Mob. Comput. 14, 5 (2015), 990--1003.
[36]
Sudip Misra and Sweta Singh. 2012. Localized policy-based target tracking using wireless sensor networks. ACM Trans. Sens. Netw. 8, 3 (2012), 27.
[37]
Tamoghna Ojha, Manas Khatua, and Sudip Misra. 2013. Tic-Tac-Toe-Arch: A self-organizing virtual architecture for underwater sensor networks. IET Wirel. Sens. Syst. 3, 4 (2013), 307--316.
[38]
Tamoghna Ojha and Sudip Misra. 2013. MobiL: A 3-dimensional localization scheme for mobile underwater sensor networks. In Proceedings of the National Conference on Communications (NCC’13). 1--5.
[39]
Arijit Roy, Sudip Misra, Pushpendu Kar, and Ayan Mondal. 2016. Topology control for self-adaptation in wireless sensor networks with temporary connection impairment. ACM Trans. Auton. Adapt. Syst. 11, 4 (2016).
[40]
Nasir Saeed, Abdulkadir Celik, Tareq Y. Al-Naffouri, and Mohamed-Slim Alouini. 2019. Localization of energy harvesting empowered underwater optical wireless sensor networks. IEEE Trans. Wirel. Commun. 18, 5 (2019), 2652--2663.
[41]
Antonio Sanchez, Sara Blanc, Pedro Yuste, and Juan Jose Serrano. 2011. A low cost and high efficient acoustic modem for underwater sensor networks. In Proceedings of the IEEE/MTS OCEANS Conference. 1--10.
[42]
Glenn Shafer. 1976. A Mathematical Theory of Evidence. Vol. 1. Princeton University Press, Princeton, NJ.
[43]
Alberto Signori, Chiara Pielli, Federico Chiariotti, Marco Giordani, Filippo Campagnaro, Nicola Laurenti, and Michele Zorzi. 2019. Jamming the underwater: A game-theoretic analysis of energy-depleting jamming attacks. In Proceedings of the ACM International Conference on Underwater Networks & Systems (WUWNet’19). 1--8.
[44]
Avinash Srinivasan and Jie Wu. 2007. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications. CRC Press, Taylor and Francis Group.
[45]
Ruoyu Su, Dengyin Zhang, Cheng Li, Zijun Gong, R. Venkatesan, and Fan Jiang. 2019. Localization and data collection in AUV-aided underwater sensor networks: Challenges and opportunities. IEEE Netw. 33, 6 (2019), 86--93.
[46]
Hwee-Pink Tan, Roee Diamant, Winston K. G. Seah, and Marc Waldmeyer. 2011. A survey of techniques and challenges in underwater localization. Ocean Eng. 38, 14 (2011), 1663--1676.
[47]
Amin Y. Teymorian, Wei Cheng, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu. 2009. 3D underwater sensor network localization. IEEE Trans. Mob. Comput. 8, 12 (2009), 1610--1621.
[48]
Zhiying Yao, Daeyoung Kim, and Yoonmee Doh. 2006. PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems. 437--446.
[49]
Huseyin Ugur Yildiz. 2019. Prolonging the lifetime of underwater sensor networks under sinkhole attacks. In Proceedings of the ACM International Conference on Underwater Networks & Systems (WUWNet’19). 1--5.
[50]
Ying Zhang, Jixing Liang, Shengming Jiang, and Wei Chen. 2016. A localization method for underwater wireless sensor networks based on mobility prediction and particle swarm optimization algorithms. Sensors 16, 212 (2016), 1--17.

Cited By

View all
  • (2025)Exploration of contemporary modernization in UWSNs in the context of localization including opportunities for future research in machine learning and deep learningScientific Reports10.1038/s41598-025-89916-y15:1Online publication date: 15-Feb-2025
  • (2025)Joint trust-based detection and signature-based authentication technique for secure localization in underwater wireless sensor networkMultimedia Tools and Applications10.1007/s11042-025-20683-8Online publication date: 17-Feb-2025
  • (2024)Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation TechniquesIEEE Access10.1109/ACCESS.2024.349049812(161096-161133)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. SecRET: Secure Range-based Localization with Evidence Theory for Underwater Sensor Networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Autonomous and Adaptive Systems
      ACM Transactions on Autonomous and Adaptive Systems  Volume 15, Issue 1
      March 2020
      79 pages
      ISSN:1556-4665
      EISSN:1556-4703
      DOI:10.1145/3446624
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 January 2021
      Accepted: 01 October 2020
      Revised: 01 April 2020
      Received: 01 July 2019
      Published in TAAS Volume 15, Issue 1

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Localization
      2. evidence theory
      3. trust evaluation
      4. underwater sensor networks

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)37
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Exploration of contemporary modernization in UWSNs in the context of localization including opportunities for future research in machine learning and deep learningScientific Reports10.1038/s41598-025-89916-y15:1Online publication date: 15-Feb-2025
      • (2025)Joint trust-based detection and signature-based authentication technique for secure localization in underwater wireless sensor networkMultimedia Tools and Applications10.1007/s11042-025-20683-8Online publication date: 17-Feb-2025
      • (2024)Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation TechniquesIEEE Access10.1109/ACCESS.2024.349049812(161096-161133)Online publication date: 2024
      • (2024)Robust multi-model mobile target localization scheme based on underwater acoustic sensor networksOcean Engineering10.1016/j.oceaneng.2023.116441291(116441)Online publication date: Jan-2024
      • (2024)Localization of Underwater Wireless Sensor Networks for Ranging Interference based on the AdaDelta Gradient Descent AlgorithmWireless Personal Communications: An International Journal10.1007/s11277-024-11458-9137:2(1189-1216)Online publication date: 1-Jul-2024
      • (2024)A comprehensive survey of localization schemes and routing protocols with fault tolerant mechanism in UWSN- Recent progress and future prospectsMultimedia Tools and Applications10.1007/s11042-024-18525-083:31(76449-76503)Online publication date: 17-Feb-2024
      • (2024)A survey on node localization technologies in UWSNs: Potential solutions, recent advancements, and future directionsInternational Journal of Communication Systems10.1002/dac.591537:16Online publication date: 22-Jul-2024
      • (2023)A Secure Localization Scheme for UASNs Based on Anchor Node Self-Adaptive AdjustmentJournal of Marine Science and Engineering10.3390/jmse1107135411:7(1354)Online publication date: 3-Jul-2023
      • (2023)Exploring Trust Modeling and Management Techniques in the Context of Distributed Wireless Networks: A Literature ReviewIEEE Access10.1109/ACCESS.2023.332094511(106803-106832)Online publication date: 2023
      • (2023)Target localization using information fusion in WSNs-based Marine search and rescueAlexandria Engineering Journal10.1016/j.aej.2023.01.02868(227-238)Online publication date: Apr-2023
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media