Abstract
Node localization is a fundamental requirement in underwater sensor networks (UWSNs) due to the ineptness of GPS and other terrestrial localization techniques in the underwater environment. In any UWSN monitoring application, the sensed information produces a better result when it is tagged with location information. However, the deployed nodes in UWSNs are vulnerable to many attacks, and hence, can be compromised by interested parties to generate incorrect location information. Consequently, using the existing localization schemes, the deployed nodes are unable to autonomously estimate the precise location information. In this regard, similar existing schemes for terrestrial wireless sensor networks are not applicable to UWSNs due to its inherent mobility, limited bandwidth availability, strict energy constraints, and high bit-error rates. In this article, we propose SecRET, a <underline>Sec</underline>ure <underline>R</underline>ange-based localization scheme empowered by <underline>E</underline>vidence <underline>T</underline>heory for UWSNs. With trust-based computations, the proposed scheme, SecRET, enables the unlocalized nodes to select the most reliable set of anchors with low resource consumption. Thus, the proposed scheme is adaptive to many attacks in UWSN environment. NS-3 based performance evaluation indicates that SecRET maintains energy-efficiency of the deployed nodes while ensuring efficient and secure localization, despite the presence of compromised nodes under various attacks.
- Bilal Ahmad, Wang Jian, Rabia Noor Enam, and Ali Abbas. 2019. Classification of DoS attacks in smart underwater wireless sensor network. Wirel. Pers. Commun. (2019), 1--15. DOI:https://doi.org/10.1007/s11277-019-06765-5Google Scholar
- an F. Akyildiz, Dario Pompili, and Tommaso Melodia. 2005. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 3, 3 (2005), 257--279.Google ScholarCross Ref
- L. Berkhovskikh and Y. Lysanov. 1982. Fundamentals of Ocean Acoustics. Springer, Germany.Google Scholar
- Christian Cardia, Petrika Gjanci, Chiara Petrioli, Gabriele Saturni, Daniele Spaccini, and Domenico Tomaselli. 2019. The internet of underwater things: From Nemo to underwater Whatsapp. In Proceedings of the ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MobiHoc’19). 409--410.Google ScholarDigital Library
- Antonio Caruso, Francesco Paparella, Luiz Filipe M. Vieira, Melike Erol, and Mario Gerla. 2008. The meandering current mobility model and its impact on underwater mobile sensor networks. In Proceedings of the IEEE International Conference on Computer Communications.Google ScholarCross Ref
- Haiguang Chen. 2009. Task-based trust management for wireless sensor networks. Int. J. Sec. Applic. 3, 2 (2009), 21--26.Google Scholar
- Haiguang Chen, Huafeng Wu, Xi Zhou, and Chuanshan Gao. 2007. Agent-based trust model in wireless sensor networks. In Proceedings of the International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Vol. 3. 119--124.Google ScholarCross Ref
- Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu. 2008b. Underwater localization in sparse 3D acoustic sensor networks. In Proceedings of the IEEE International Conference on Computer Communications. 798--806.Google ScholarCross Ref
- Xiuzhen Cheng, Haining Shu, Qilian Liang, and David Hung-Chang Du. 2008a. Silent positioning in underwater acoustic sensor networks. IEEE Trans. Vehic. Technol. 57, 3 (2008), 1756--1766.Google ScholarCross Ref
- Konstantinos Christidis, Petros Nicopolitidis, Georgios I. Papadimitriou, Panagiotis G. Sarigiannidis, and Andreas S. Pomportsis. 2011. Utilizing locality of demand for lower response times in underwater data broadcasting. In Proceedings of the IEEE Vehicular Technology Conference (VTC Spring’11). 1--5.Google Scholar
- Jun-Hong Cui, Jiejun Kong, Mario Gerla, and Shengli Zhou. 2006. The challenges of building mobile underwater wireless networks for aquatic applications. IEEE Netw. 20, 3 (2006), 12--18.Google ScholarDigital Library
- Anjana P. Das, Sabu M. Thampi, and Jaime Lloret. 2020. Anomaly detection in UASN localization based on time series analysis and fuzzy logic. Mob. Netw. Applic. 25 (2020), 55--67.Google ScholarCross Ref
- Arthur P. Dempster. 1967. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 38, 2 (1967), 325--339.Google ScholarCross Ref
- Elizaveta Dubrovinskaya, Roee Diamant, and Paolo Casari. 2017. Anchorless underwater acoustic localization. In Proceedings of the Workshop on Positioning, Navigation and Communications. Bremen, Germany, 1--6.Google ScholarCross Ref
- Melike Erol, Luiz F. M. Vieira, and Mario Gerla. 2007a. Localization with Dive’N’Rise (DNR) beacons for underwater acoustic sensor networks. In Proceedings of the ACM Workshop on Underwater Networks (WuWNet’07). 97--100.Google ScholarDigital Library
- Melike Erol, Luiz Filipe M. Vieira, and Mario Gerla. 2007b. AUV-aided localization for underwater sensor networks. In Proceedings of the Wireless Algorithms, Systems and Applications Conference. 44--54.Google ScholarDigital Library
- Melike Erol-Kantarci, Hussein T. Mouftah, and Sema Oktug. 2011. A survey of architectures and localization techniques for underwater acoustic sensor networks. IEEE Commun. Surv. Tutor. 13, 3 (2011), 487--502.Google ScholarCross Ref
- -->Google Scholar
- Melike Erol-Kantarci, Hussein T. Mouftah, and Sema Oktug. 2011b. A survey of architectures and localization techniques for underwater acoustic sensor networks. IEEE Communications Surveys and Tutorials 13, 3 (2011), 487--502. -->Google ScholarCross Ref
- Saurabh Ganeriwal, Laura K. Balzano, and Mani B. Srivastava. 2008. Reputation-based framework for high integrity sensor networks. ACM Trans. Sensor Netw. 4, 3 (2008), 15.Google ScholarDigital Library
- Ying Guo, Qinghe Han, and Xiaoyue Kang. 2019. Underwater sensor networks localization based on mobility constrained beacon. Wirel. Netw. 26 (2019), 1--10.Google Scholar
- Guangjie Han, Jinfang Jiang, Lei Shu, and Mohsen Guizani. 2015. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput 14, 12 (2015), 2447--2459.Google ScholarDigital Library
- Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, and Han-Chieh Chao. 2014. Management and applications of trust in wireless sensor networks: A survey. J. Comput. Syst. Sci. 80, 3 (2014), 602--617.Google ScholarDigital Library
- Guangjie Han, Li Liu, Jinfang Jiang, Lei Shu, and Joel J. P. C. Rodrigues. 2016. A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 16, 2 (2016), 229.Google ScholarCross Ref
- Albert F. Harris and Michele Zorzi. 2007. Modeling the underwater acoustic channel in NS2. In Proceedings of the International Conference on Performance Evaluation Methodologies and Tools. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 1--8.Google Scholar
- John Heidemann, Milica Stojanovic, and Michele Zorzi. 2012. Underwater sensor networks: Applications, advances and challenges. Philos. Trans. Roy. Soc. A 370 (2012), 158--175.Google ScholarCross Ref
- Gokhan Isbitiren and Ozgur B. Akan. 2011. Three-dimensional underwater target tracking with acoustic sensor networks. IEEE Trans. Vehic. Technol. 60, 8 (2011), 3897--3906.Google ScholarCross Ref
- M. Talha Isik and Ozgur B. Akan. 2009. A three dimensional localization algorithm for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 8, 9 (2009).Google Scholar
- Nabila Labraoui, Mourad Gueroui, and Larbi Sekhri. 2015. On-off attacks mitigation against trust systems in wireless sensor networks. In Proceedings of the IFIP International Conference on Computer Science and Its Applications. 406--415.Google ScholarCross Ref
- Chhagan Lal, Roberto Petroccia, Konstantinos Pelekanakis, Mauro Conti, and Joáo Alves. 2017. Toward the development of secure underwater acoustic networks. IEEE J. Ocean. Eng. 42, 4 (2017), 1--13.Google ScholarCross Ref
- Hong Li, Yunhua He, Xiuzhen Cheng, Hongsong Zhu, and Limin Sun. 2015. Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53, 11 (2015), 56--62.Google ScholarDigital Library
- Linfeng Liu, Jiagao Wu, and Zhiwen Zhu. 2015. Multihops fitting approach for node localization in underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 215, 682182 (2015), 1--11.Google Scholar
- Quan Liu, Yeqing Liao, Bing Tang, and Lei Yu. 2008. A trust model based on subjective logic for multi-domains in grids. In Proceedings of the Conference on Computational Intelligence and Industrial Application, Vol. 2. 882--886.Google ScholarDigital Library
- Goutam Mali and Sudip Misra. 2016. Topology management-based distributed camera actuation in wireless multimedia sensor networks. ACM Trans. Auton. Adapt. Syst. 12, 1 (2016).Google Scholar
- Sudip Misra, Tamoghna Ojha, and Ayan Mondal. 2015. Game-theoretic topology control for opportunistic localization in sparse underwater sensor networks. IEEE Trans. Mob. Comput. 14, 5 (2015), 990--1003.Google ScholarDigital Library
- Sudip Misra and Sweta Singh. 2012. Localized policy-based target tracking using wireless sensor networks. ACM Trans. Sens. Netw. 8, 3 (2012), 27.Google ScholarDigital Library
- Tamoghna Ojha, Manas Khatua, and Sudip Misra. 2013. Tic-Tac-Toe-Arch: A self-organizing virtual architecture for underwater sensor networks. IET Wirel. Sens. Syst. 3, 4 (2013), 307--316.Google ScholarCross Ref
- Tamoghna Ojha and Sudip Misra. 2013. MobiL: A 3-dimensional localization scheme for mobile underwater sensor networks. In Proceedings of the National Conference on Communications (NCC’13). 1--5.Google ScholarCross Ref
- Arijit Roy, Sudip Misra, Pushpendu Kar, and Ayan Mondal. 2016. Topology control for self-adaptation in wireless sensor networks with temporary connection impairment. ACM Trans. Auton. Adapt. Syst. 11, 4 (2016).Google Scholar
- Nasir Saeed, Abdulkadir Celik, Tareq Y. Al-Naffouri, and Mohamed-Slim Alouini. 2019. Localization of energy harvesting empowered underwater optical wireless sensor networks. IEEE Trans. Wirel. Commun. 18, 5 (2019), 2652--2663.Google ScholarDigital Library
- Antonio Sanchez, Sara Blanc, Pedro Yuste, and Juan Jose Serrano. 2011. A low cost and high efficient acoustic modem for underwater sensor networks. In Proceedings of the IEEE/MTS OCEANS Conference. 1--10.Google ScholarCross Ref
- Glenn Shafer. 1976. A Mathematical Theory of Evidence. Vol. 1. Princeton University Press, Princeton, NJ.Google Scholar
- Alberto Signori, Chiara Pielli, Federico Chiariotti, Marco Giordani, Filippo Campagnaro, Nicola Laurenti, and Michele Zorzi. 2019. Jamming the underwater: A game-theoretic analysis of energy-depleting jamming attacks. In Proceedings of the ACM International Conference on Underwater Networks & Systems (WUWNet’19). 1--8.Google ScholarDigital Library
- Avinash Srinivasan and Jie Wu. 2007. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications. CRC Press, Taylor and Francis Group.Google Scholar
- Ruoyu Su, Dengyin Zhang, Cheng Li, Zijun Gong, R. Venkatesan, and Fan Jiang. 2019. Localization and data collection in AUV-aided underwater sensor networks: Challenges and opportunities. IEEE Netw. 33, 6 (2019), 86--93.Google ScholarDigital Library
- Hwee-Pink Tan, Roee Diamant, Winston K. G. Seah, and Marc Waldmeyer. 2011. A survey of techniques and challenges in underwater localization. Ocean Eng. 38, 14 (2011), 1663--1676.Google ScholarCross Ref
- Amin Y. Teymorian, Wei Cheng, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu. 2009. 3D underwater sensor network localization. IEEE Trans. Mob. Comput. 8, 12 (2009), 1610--1621.Google ScholarDigital Library
- Zhiying Yao, Daeyoung Kim, and Yoonmee Doh. 2006. PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems. 437--446.Google ScholarCross Ref
- Huseyin Ugur Yildiz. 2019. Prolonging the lifetime of underwater sensor networks under sinkhole attacks. In Proceedings of the ACM International Conference on Underwater Networks & Systems (WUWNet’19). 1--5.Google ScholarDigital Library
- Ying Zhang, Jixing Liang, Shengming Jiang, and Wei Chen. 2016. A localization method for underwater wireless sensor networks based on mobility prediction and particle swarm optimization algorithms. Sensors 16, 212 (2016), 1--17.Google Scholar
Index Terms
- SecRET: Secure Range-based Localization with Evidence Theory for Underwater Sensor Networks
Recommendations
Path Planning of a Mobile Beacon for Localization in Underwater Sensor Networks
EUC '11: Proceedings of the 2011 IFIP 9th International Conference on Embedded and Ubiquitous ComputingIn underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined locations. Localization schemes using a mobile beacon have fine-grained localization accuracy ...
Localization with Dive'N'Rise (DNR) beacons for underwater acoustic sensor networks
WUWNet '07: Proceedings of the 2nd Workshop on Underwater NetworksIn this paper, we address the localization issue in Underwater Sensor Networks (UWSNs). We propose Dive'N'Rise(DNR) Positioning, the novel idea of using DNR beacons for localization. These beacons get their coordinates from GPS while floating above the ...
Localization with a Mobile Beacon in Underwater Sensor Networks
EUC '10: Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous ComputingIn underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined locations. Since range-based schemes require additional device and precise time synchronization ...
Comments