skip to main content
research-article

SecRET: Secure Range-based Localization with Evidence Theory for Underwater Sensor Networks

Authors Info & Claims
Published:20 January 2021Publication History
Skip Abstract Section

Abstract

Node localization is a fundamental requirement in underwater sensor networks (UWSNs) due to the ineptness of GPS and other terrestrial localization techniques in the underwater environment. In any UWSN monitoring application, the sensed information produces a better result when it is tagged with location information. However, the deployed nodes in UWSNs are vulnerable to many attacks, and hence, can be compromised by interested parties to generate incorrect location information. Consequently, using the existing localization schemes, the deployed nodes are unable to autonomously estimate the precise location information. In this regard, similar existing schemes for terrestrial wireless sensor networks are not applicable to UWSNs due to its inherent mobility, limited bandwidth availability, strict energy constraints, and high bit-error rates. In this article, we propose SecRET, a <underline>Sec</underline>ure <underline>R</underline>ange-based localization scheme empowered by <underline>E</underline>vidence <underline>T</underline>heory for UWSNs. With trust-based computations, the proposed scheme, SecRET, enables the unlocalized nodes to select the most reliable set of anchors with low resource consumption. Thus, the proposed scheme is adaptive to many attacks in UWSN environment. NS-3 based performance evaluation indicates that SecRET maintains energy-efficiency of the deployed nodes while ensuring efficient and secure localization, despite the presence of compromised nodes under various attacks.

References

  1. Bilal Ahmad, Wang Jian, Rabia Noor Enam, and Ali Abbas. 2019. Classification of DoS attacks in smart underwater wireless sensor network. Wirel. Pers. Commun. (2019), 1--15. DOI:https://doi.org/10.1007/s11277-019-06765-5Google ScholarGoogle Scholar
  2. an F. Akyildiz, Dario Pompili, and Tommaso Melodia. 2005. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 3, 3 (2005), 257--279.Google ScholarGoogle ScholarCross RefCross Ref
  3. L. Berkhovskikh and Y. Lysanov. 1982. Fundamentals of Ocean Acoustics. Springer, Germany.Google ScholarGoogle Scholar
  4. Christian Cardia, Petrika Gjanci, Chiara Petrioli, Gabriele Saturni, Daniele Spaccini, and Domenico Tomaselli. 2019. The internet of underwater things: From Nemo to underwater Whatsapp. In Proceedings of the ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MobiHoc’19). 409--410.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Antonio Caruso, Francesco Paparella, Luiz Filipe M. Vieira, Melike Erol, and Mario Gerla. 2008. The meandering current mobility model and its impact on underwater mobile sensor networks. In Proceedings of the IEEE International Conference on Computer Communications.Google ScholarGoogle ScholarCross RefCross Ref
  6. Haiguang Chen. 2009. Task-based trust management for wireless sensor networks. Int. J. Sec. Applic. 3, 2 (2009), 21--26.Google ScholarGoogle Scholar
  7. Haiguang Chen, Huafeng Wu, Xi Zhou, and Chuanshan Gao. 2007. Agent-based trust model in wireless sensor networks. In Proceedings of the International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Vol. 3. 119--124.Google ScholarGoogle ScholarCross RefCross Ref
  8. Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu. 2008b. Underwater localization in sparse 3D acoustic sensor networks. In Proceedings of the IEEE International Conference on Computer Communications. 798--806.Google ScholarGoogle ScholarCross RefCross Ref
  9. Xiuzhen Cheng, Haining Shu, Qilian Liang, and David Hung-Chang Du. 2008a. Silent positioning in underwater acoustic sensor networks. IEEE Trans. Vehic. Technol. 57, 3 (2008), 1756--1766.Google ScholarGoogle ScholarCross RefCross Ref
  10. Konstantinos Christidis, Petros Nicopolitidis, Georgios I. Papadimitriou, Panagiotis G. Sarigiannidis, and Andreas S. Pomportsis. 2011. Utilizing locality of demand for lower response times in underwater data broadcasting. In Proceedings of the IEEE Vehicular Technology Conference (VTC Spring’11). 1--5.Google ScholarGoogle Scholar
  11. Jun-Hong Cui, Jiejun Kong, Mario Gerla, and Shengli Zhou. 2006. The challenges of building mobile underwater wireless networks for aquatic applications. IEEE Netw. 20, 3 (2006), 12--18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Anjana P. Das, Sabu M. Thampi, and Jaime Lloret. 2020. Anomaly detection in UASN localization based on time series analysis and fuzzy logic. Mob. Netw. Applic. 25 (2020), 55--67.Google ScholarGoogle ScholarCross RefCross Ref
  13. Arthur P. Dempster. 1967. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 38, 2 (1967), 325--339.Google ScholarGoogle ScholarCross RefCross Ref
  14. Elizaveta Dubrovinskaya, Roee Diamant, and Paolo Casari. 2017. Anchorless underwater acoustic localization. In Proceedings of the Workshop on Positioning, Navigation and Communications. Bremen, Germany, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  15. Melike Erol, Luiz F. M. Vieira, and Mario Gerla. 2007a. Localization with Dive’N’Rise (DNR) beacons for underwater acoustic sensor networks. In Proceedings of the ACM Workshop on Underwater Networks (WuWNet’07). 97--100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Melike Erol, Luiz Filipe M. Vieira, and Mario Gerla. 2007b. AUV-aided localization for underwater sensor networks. In Proceedings of the Wireless Algorithms, Systems and Applications Conference. 44--54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Melike Erol-Kantarci, Hussein T. Mouftah, and Sema Oktug. 2011. A survey of architectures and localization techniques for underwater acoustic sensor networks. IEEE Commun. Surv. Tutor. 13, 3 (2011), 487--502.Google ScholarGoogle ScholarCross RefCross Ref
  18. --&gt;Google ScholarGoogle Scholar
  19. Melike Erol-Kantarci, Hussein T. Mouftah, and Sema Oktug. 2011b. A survey of architectures and localization techniques for underwater acoustic sensor networks. IEEE Communications Surveys and Tutorials 13, 3 (2011), 487--502. --&gt;Google ScholarGoogle ScholarCross RefCross Ref
  20. Saurabh Ganeriwal, Laura K. Balzano, and Mani B. Srivastava. 2008. Reputation-based framework for high integrity sensor networks. ACM Trans. Sensor Netw. 4, 3 (2008), 15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ying Guo, Qinghe Han, and Xiaoyue Kang. 2019. Underwater sensor networks localization based on mobility constrained beacon. Wirel. Netw. 26 (2019), 1--10.Google ScholarGoogle Scholar
  22. Guangjie Han, Jinfang Jiang, Lei Shu, and Mohsen Guizani. 2015. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput 14, 12 (2015), 2447--2459.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, and Han-Chieh Chao. 2014. Management and applications of trust in wireless sensor networks: A survey. J. Comput. Syst. Sci. 80, 3 (2014), 602--617.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Guangjie Han, Li Liu, Jinfang Jiang, Lei Shu, and Joel J. P. C. Rodrigues. 2016. A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 16, 2 (2016), 229.Google ScholarGoogle ScholarCross RefCross Ref
  25. Albert F. Harris and Michele Zorzi. 2007. Modeling the underwater acoustic channel in NS2. In Proceedings of the International Conference on Performance Evaluation Methodologies and Tools. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 1--8.Google ScholarGoogle Scholar
  26. John Heidemann, Milica Stojanovic, and Michele Zorzi. 2012. Underwater sensor networks: Applications, advances and challenges. Philos. Trans. Roy. Soc. A 370 (2012), 158--175.Google ScholarGoogle ScholarCross RefCross Ref
  27. Gokhan Isbitiren and Ozgur B. Akan. 2011. Three-dimensional underwater target tracking with acoustic sensor networks. IEEE Trans. Vehic. Technol. 60, 8 (2011), 3897--3906.Google ScholarGoogle ScholarCross RefCross Ref
  28. M. Talha Isik and Ozgur B. Akan. 2009. A three dimensional localization algorithm for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 8, 9 (2009).Google ScholarGoogle Scholar
  29. Nabila Labraoui, Mourad Gueroui, and Larbi Sekhri. 2015. On-off attacks mitigation against trust systems in wireless sensor networks. In Proceedings of the IFIP International Conference on Computer Science and Its Applications. 406--415.Google ScholarGoogle ScholarCross RefCross Ref
  30. Chhagan Lal, Roberto Petroccia, Konstantinos Pelekanakis, Mauro Conti, and Joáo Alves. 2017. Toward the development of secure underwater acoustic networks. IEEE J. Ocean. Eng. 42, 4 (2017), 1--13.Google ScholarGoogle ScholarCross RefCross Ref
  31. Hong Li, Yunhua He, Xiuzhen Cheng, Hongsong Zhu, and Limin Sun. 2015. Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53, 11 (2015), 56--62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Linfeng Liu, Jiagao Wu, and Zhiwen Zhu. 2015. Multihops fitting approach for node localization in underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 215, 682182 (2015), 1--11.Google ScholarGoogle Scholar
  33. Quan Liu, Yeqing Liao, Bing Tang, and Lei Yu. 2008. A trust model based on subjective logic for multi-domains in grids. In Proceedings of the Conference on Computational Intelligence and Industrial Application, Vol. 2. 882--886.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Goutam Mali and Sudip Misra. 2016. Topology management-based distributed camera actuation in wireless multimedia sensor networks. ACM Trans. Auton. Adapt. Syst. 12, 1 (2016).Google ScholarGoogle Scholar
  35. Sudip Misra, Tamoghna Ojha, and Ayan Mondal. 2015. Game-theoretic topology control for opportunistic localization in sparse underwater sensor networks. IEEE Trans. Mob. Comput. 14, 5 (2015), 990--1003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sudip Misra and Sweta Singh. 2012. Localized policy-based target tracking using wireless sensor networks. ACM Trans. Sens. Netw. 8, 3 (2012), 27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Tamoghna Ojha, Manas Khatua, and Sudip Misra. 2013. Tic-Tac-Toe-Arch: A self-organizing virtual architecture for underwater sensor networks. IET Wirel. Sens. Syst. 3, 4 (2013), 307--316.Google ScholarGoogle ScholarCross RefCross Ref
  38. Tamoghna Ojha and Sudip Misra. 2013. MobiL: A 3-dimensional localization scheme for mobile underwater sensor networks. In Proceedings of the National Conference on Communications (NCC’13). 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  39. Arijit Roy, Sudip Misra, Pushpendu Kar, and Ayan Mondal. 2016. Topology control for self-adaptation in wireless sensor networks with temporary connection impairment. ACM Trans. Auton. Adapt. Syst. 11, 4 (2016).Google ScholarGoogle Scholar
  40. Nasir Saeed, Abdulkadir Celik, Tareq Y. Al-Naffouri, and Mohamed-Slim Alouini. 2019. Localization of energy harvesting empowered underwater optical wireless sensor networks. IEEE Trans. Wirel. Commun. 18, 5 (2019), 2652--2663.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Antonio Sanchez, Sara Blanc, Pedro Yuste, and Juan Jose Serrano. 2011. A low cost and high efficient acoustic modem for underwater sensor networks. In Proceedings of the IEEE/MTS OCEANS Conference. 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  42. Glenn Shafer. 1976. A Mathematical Theory of Evidence. Vol. 1. Princeton University Press, Princeton, NJ.Google ScholarGoogle Scholar
  43. Alberto Signori, Chiara Pielli, Federico Chiariotti, Marco Giordani, Filippo Campagnaro, Nicola Laurenti, and Michele Zorzi. 2019. Jamming the underwater: A game-theoretic analysis of energy-depleting jamming attacks. In Proceedings of the ACM International Conference on Underwater Networks & Systems (WUWNet’19). 1--8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Avinash Srinivasan and Jie Wu. 2007. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications. CRC Press, Taylor and Francis Group.Google ScholarGoogle Scholar
  45. Ruoyu Su, Dengyin Zhang, Cheng Li, Zijun Gong, R. Venkatesan, and Fan Jiang. 2019. Localization and data collection in AUV-aided underwater sensor networks: Challenges and opportunities. IEEE Netw. 33, 6 (2019), 86--93.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Hwee-Pink Tan, Roee Diamant, Winston K. G. Seah, and Marc Waldmeyer. 2011. A survey of techniques and challenges in underwater localization. Ocean Eng. 38, 14 (2011), 1663--1676.Google ScholarGoogle ScholarCross RefCross Ref
  47. Amin Y. Teymorian, Wei Cheng, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu. 2009. 3D underwater sensor network localization. IEEE Trans. Mob. Comput. 8, 12 (2009), 1610--1621.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Zhiying Yao, Daeyoung Kim, and Yoonmee Doh. 2006. PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems. 437--446.Google ScholarGoogle ScholarCross RefCross Ref
  49. Huseyin Ugur Yildiz. 2019. Prolonging the lifetime of underwater sensor networks under sinkhole attacks. In Proceedings of the ACM International Conference on Underwater Networks & Systems (WUWNet’19). 1--5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Ying Zhang, Jixing Liang, Shengming Jiang, and Wei Chen. 2016. A localization method for underwater wireless sensor networks based on mobility prediction and particle swarm optimization algorithms. Sensors 16, 212 (2016), 1--17.Google ScholarGoogle Scholar

Index Terms

  1. SecRET: Secure Range-based Localization with Evidence Theory for Underwater Sensor Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Autonomous and Adaptive Systems
        ACM Transactions on Autonomous and Adaptive Systems  Volume 15, Issue 1
        March 2020
        79 pages
        ISSN:1556-4665
        EISSN:1556-4703
        DOI:10.1145/3446624
        Issue’s Table of Contents

        Copyright © 2021 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 January 2021
        • Accepted: 1 October 2020
        • Revised: 1 April 2020
        • Received: 1 July 2019
        Published in taas Volume 15, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format