Abstract
Node localization is a fundamental requirement in underwater sensor networks (UWSNs) due to the ineptness of GPS and other terrestrial localization techniques in the underwater environment. In any UWSN monitoring application, the sensed information produces a better result when it is tagged with location information. However, the deployed nodes in UWSNs are vulnerable to many attacks, and hence, can be compromised by interested parties to generate incorrect location information. Consequently, using the existing localization schemes, the deployed nodes are unable to autonomously estimate the precise location information. In this regard, similar existing schemes for terrestrial wireless sensor networks are not applicable to UWSNs due to its inherent mobility, limited bandwidth availability, strict energy constraints, and high bit-error rates. In this article, we propose SecRET, a <underline>Sec</underline>ure <underline>R</underline>ange-based localization scheme empowered by <underline>E</underline>vidence <underline>T</underline>heory for UWSNs. With trust-based computations, the proposed scheme, SecRET, enables the unlocalized nodes to select the most reliable set of anchors with low resource consumption. Thus, the proposed scheme is adaptive to many attacks in UWSN environment. NS-3 based performance evaluation indicates that SecRET maintains energy-efficiency of the deployed nodes while ensuring efficient and secure localization, despite the presence of compromised nodes under various attacks.
- Bilal Ahmad, Wang Jian, Rabia Noor Enam, and Ali Abbas. 2019. Classification of DoS attacks in smart underwater wireless sensor network. Wirel. Pers. Commun. (2019), 1--15. DOI:https://doi.org/10.1007/s11277-019-06765-5Google Scholar
- an F. Akyildiz, Dario Pompili, and Tommaso Melodia. 2005. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 3, 3 (2005), 257--279.Google Scholar
Cross Ref
- L. Berkhovskikh and Y. Lysanov. 1982. Fundamentals of Ocean Acoustics. Springer, Germany.Google Scholar
- Christian Cardia, Petrika Gjanci, Chiara Petrioli, Gabriele Saturni, Daniele Spaccini, and Domenico Tomaselli. 2019. The internet of underwater things: From Nemo to underwater Whatsapp. In Proceedings of the ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MobiHoc’19). 409--410.Google Scholar
Digital Library
- Antonio Caruso, Francesco Paparella, Luiz Filipe M. Vieira, Melike Erol, and Mario Gerla. 2008. The meandering current mobility model and its impact on underwater mobile sensor networks. In Proceedings of the IEEE International Conference on Computer Communications.Google Scholar
Cross Ref
- Haiguang Chen. 2009. Task-based trust management for wireless sensor networks. Int. J. Sec. Applic. 3, 2 (2009), 21--26.Google Scholar
- Haiguang Chen, Huafeng Wu, Xi Zhou, and Chuanshan Gao. 2007. Agent-based trust model in wireless sensor networks. In Proceedings of the International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Vol. 3. 119--124.Google Scholar
Cross Ref
- Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu. 2008b. Underwater localization in sparse 3D acoustic sensor networks. In Proceedings of the IEEE International Conference on Computer Communications. 798--806.Google Scholar
Cross Ref
- Xiuzhen Cheng, Haining Shu, Qilian Liang, and David Hung-Chang Du. 2008a. Silent positioning in underwater acoustic sensor networks. IEEE Trans. Vehic. Technol. 57, 3 (2008), 1756--1766.Google Scholar
Cross Ref
- Konstantinos Christidis, Petros Nicopolitidis, Georgios I. Papadimitriou, Panagiotis G. Sarigiannidis, and Andreas S. Pomportsis. 2011. Utilizing locality of demand for lower response times in underwater data broadcasting. In Proceedings of the IEEE Vehicular Technology Conference (VTC Spring’11). 1--5.Google Scholar
- Jun-Hong Cui, Jiejun Kong, Mario Gerla, and Shengli Zhou. 2006. The challenges of building mobile underwater wireless networks for aquatic applications. IEEE Netw. 20, 3 (2006), 12--18.Google Scholar
Digital Library
- Anjana P. Das, Sabu M. Thampi, and Jaime Lloret. 2020. Anomaly detection in UASN localization based on time series analysis and fuzzy logic. Mob. Netw. Applic. 25 (2020), 55--67.Google Scholar
Cross Ref
- Arthur P. Dempster. 1967. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 38, 2 (1967), 325--339.Google Scholar
Cross Ref
- Elizaveta Dubrovinskaya, Roee Diamant, and Paolo Casari. 2017. Anchorless underwater acoustic localization. In Proceedings of the Workshop on Positioning, Navigation and Communications. Bremen, Germany, 1--6.Google Scholar
Cross Ref
- Melike Erol, Luiz F. M. Vieira, and Mario Gerla. 2007a. Localization with Dive’N’Rise (DNR) beacons for underwater acoustic sensor networks. In Proceedings of the ACM Workshop on Underwater Networks (WuWNet’07). 97--100.Google Scholar
Digital Library
- Melike Erol, Luiz Filipe M. Vieira, and Mario Gerla. 2007b. AUV-aided localization for underwater sensor networks. In Proceedings of the Wireless Algorithms, Systems and Applications Conference. 44--54.Google Scholar
Digital Library
- Melike Erol-Kantarci, Hussein T. Mouftah, and Sema Oktug. 2011. A survey of architectures and localization techniques for underwater acoustic sensor networks. IEEE Commun. Surv. Tutor. 13, 3 (2011), 487--502.Google Scholar
Cross Ref
- -->Google Scholar
- Melike Erol-Kantarci, Hussein T. Mouftah, and Sema Oktug. 2011b. A survey of architectures and localization techniques for underwater acoustic sensor networks. IEEE Communications Surveys and Tutorials 13, 3 (2011), 487--502. -->Google Scholar
Cross Ref
- Saurabh Ganeriwal, Laura K. Balzano, and Mani B. Srivastava. 2008. Reputation-based framework for high integrity sensor networks. ACM Trans. Sensor Netw. 4, 3 (2008), 15.Google Scholar
Digital Library
- Ying Guo, Qinghe Han, and Xiaoyue Kang. 2019. Underwater sensor networks localization based on mobility constrained beacon. Wirel. Netw. 26 (2019), 1--10.Google Scholar
- Guangjie Han, Jinfang Jiang, Lei Shu, and Mohsen Guizani. 2015. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput 14, 12 (2015), 2447--2459.Google Scholar
Digital Library
- Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, and Han-Chieh Chao. 2014. Management and applications of trust in wireless sensor networks: A survey. J. Comput. Syst. Sci. 80, 3 (2014), 602--617.Google Scholar
Digital Library
- Guangjie Han, Li Liu, Jinfang Jiang, Lei Shu, and Joel J. P. C. Rodrigues. 2016. A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 16, 2 (2016), 229.Google Scholar
Cross Ref
- Albert F. Harris and Michele Zorzi. 2007. Modeling the underwater acoustic channel in NS2. In Proceedings of the International Conference on Performance Evaluation Methodologies and Tools. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 1--8.Google Scholar
- John Heidemann, Milica Stojanovic, and Michele Zorzi. 2012. Underwater sensor networks: Applications, advances and challenges. Philos. Trans. Roy. Soc. A 370 (2012), 158--175.Google Scholar
Cross Ref
- Gokhan Isbitiren and Ozgur B. Akan. 2011. Three-dimensional underwater target tracking with acoustic sensor networks. IEEE Trans. Vehic. Technol. 60, 8 (2011), 3897--3906.Google Scholar
Cross Ref
- M. Talha Isik and Ozgur B. Akan. 2009. A three dimensional localization algorithm for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 8, 9 (2009).Google Scholar
- Nabila Labraoui, Mourad Gueroui, and Larbi Sekhri. 2015. On-off attacks mitigation against trust systems in wireless sensor networks. In Proceedings of the IFIP International Conference on Computer Science and Its Applications. 406--415.Google Scholar
Cross Ref
- Chhagan Lal, Roberto Petroccia, Konstantinos Pelekanakis, Mauro Conti, and Joáo Alves. 2017. Toward the development of secure underwater acoustic networks. IEEE J. Ocean. Eng. 42, 4 (2017), 1--13.Google Scholar
Cross Ref
- Hong Li, Yunhua He, Xiuzhen Cheng, Hongsong Zhu, and Limin Sun. 2015. Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53, 11 (2015), 56--62.Google Scholar
Digital Library
- Linfeng Liu, Jiagao Wu, and Zhiwen Zhu. 2015. Multihops fitting approach for node localization in underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 215, 682182 (2015), 1--11.Google Scholar
- Quan Liu, Yeqing Liao, Bing Tang, and Lei Yu. 2008. A trust model based on subjective logic for multi-domains in grids. In Proceedings of the Conference on Computational Intelligence and Industrial Application, Vol. 2. 882--886.Google Scholar
Digital Library
- Goutam Mali and Sudip Misra. 2016. Topology management-based distributed camera actuation in wireless multimedia sensor networks. ACM Trans. Auton. Adapt. Syst. 12, 1 (2016).Google Scholar
- Sudip Misra, Tamoghna Ojha, and Ayan Mondal. 2015. Game-theoretic topology control for opportunistic localization in sparse underwater sensor networks. IEEE Trans. Mob. Comput. 14, 5 (2015), 990--1003.Google Scholar
Digital Library
- Sudip Misra and Sweta Singh. 2012. Localized policy-based target tracking using wireless sensor networks. ACM Trans. Sens. Netw. 8, 3 (2012), 27.Google Scholar
Digital Library
- Tamoghna Ojha, Manas Khatua, and Sudip Misra. 2013. Tic-Tac-Toe-Arch: A self-organizing virtual architecture for underwater sensor networks. IET Wirel. Sens. Syst. 3, 4 (2013), 307--316.Google Scholar
Cross Ref
- Tamoghna Ojha and Sudip Misra. 2013. MobiL: A 3-dimensional localization scheme for mobile underwater sensor networks. In Proceedings of the National Conference on Communications (NCC’13). 1--5.Google Scholar
Cross Ref
- Arijit Roy, Sudip Misra, Pushpendu Kar, and Ayan Mondal. 2016. Topology control for self-adaptation in wireless sensor networks with temporary connection impairment. ACM Trans. Auton. Adapt. Syst. 11, 4 (2016).Google Scholar
- Nasir Saeed, Abdulkadir Celik, Tareq Y. Al-Naffouri, and Mohamed-Slim Alouini. 2019. Localization of energy harvesting empowered underwater optical wireless sensor networks. IEEE Trans. Wirel. Commun. 18, 5 (2019), 2652--2663.Google Scholar
Digital Library
- Antonio Sanchez, Sara Blanc, Pedro Yuste, and Juan Jose Serrano. 2011. A low cost and high efficient acoustic modem for underwater sensor networks. In Proceedings of the IEEE/MTS OCEANS Conference. 1--10.Google Scholar
Cross Ref
- Glenn Shafer. 1976. A Mathematical Theory of Evidence. Vol. 1. Princeton University Press, Princeton, NJ.Google Scholar
- Alberto Signori, Chiara Pielli, Federico Chiariotti, Marco Giordani, Filippo Campagnaro, Nicola Laurenti, and Michele Zorzi. 2019. Jamming the underwater: A game-theoretic analysis of energy-depleting jamming attacks. In Proceedings of the ACM International Conference on Underwater Networks & Systems (WUWNet’19). 1--8.Google Scholar
Digital Library
- Avinash Srinivasan and Jie Wu. 2007. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications. CRC Press, Taylor and Francis Group.Google Scholar
- Ruoyu Su, Dengyin Zhang, Cheng Li, Zijun Gong, R. Venkatesan, and Fan Jiang. 2019. Localization and data collection in AUV-aided underwater sensor networks: Challenges and opportunities. IEEE Netw. 33, 6 (2019), 86--93.Google Scholar
Digital Library
- Hwee-Pink Tan, Roee Diamant, Winston K. G. Seah, and Marc Waldmeyer. 2011. A survey of techniques and challenges in underwater localization. Ocean Eng. 38, 14 (2011), 1663--1676.Google Scholar
Cross Ref
- Amin Y. Teymorian, Wei Cheng, Liran Ma, Xiuzhen Cheng, Xicheng Lu, and Zexin Lu. 2009. 3D underwater sensor network localization. IEEE Trans. Mob. Comput. 8, 12 (2009), 1610--1621.Google Scholar
Digital Library
- Zhiying Yao, Daeyoung Kim, and Yoonmee Doh. 2006. PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems. 437--446.Google Scholar
Cross Ref
- Huseyin Ugur Yildiz. 2019. Prolonging the lifetime of underwater sensor networks under sinkhole attacks. In Proceedings of the ACM International Conference on Underwater Networks & Systems (WUWNet’19). 1--5.Google Scholar
Digital Library
- Ying Zhang, Jixing Liang, Shengming Jiang, and Wei Chen. 2016. A localization method for underwater wireless sensor networks based on mobility prediction and particle swarm optimization algorithms. Sensors 16, 212 (2016), 1--17.Google Scholar
Index Terms
SecRET: Secure Range-based Localization with Evidence Theory for Underwater Sensor Networks
Recommendations
Single Anchor Node Based Localization in Mobile Underwater Wireless Sensor Networks
Proceedings of the ICA3PP International Workshops and Symposiums on Algorithms and Architectures for Parallel Processing - Volume 9532Underwater Sensor Networks UWSN provide a promising solution for aquatic applications. Localization in Mobile Underwater Sensor Networks is very challenging because of the harsh environmental characteristics and limitations of radio communication. ...
A Localization Scheme for Underwater Sensor Networks Without Time Synchronization
The underwater sensor networks (UWSNs) exhibit different characteristics from terrestrial WSNs. To make the sensed data meaningful, one of basic task is the localization of sensor nodes. In UWSNs, this is not feasible to use global positioning system ...
Path Planning of a Mobile Beacon for Localization in Underwater Sensor Networks
EUC '11: Proceedings of the 2011 IFIP 9th International Conference on Embedded and Ubiquitous ComputingIn underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined locations. Localization schemes using a mobile beacon have fine-grained localization accuracy ...






Comments