AUV-Assisted Stratified Source Location Privacy Protection Scheme Based on Network Coding in UASNs

被引:7
|
作者
Wang, Hao [1 ]
Han, Guangjie [1 ]
Liu, Yulin [1 ]
Li, Aohan [2 ]
Jiang, Jinfang [1 ]
机构
[1] Hohai Univ, Changzhou Key Lab Internet Things Technol Intellig, Changzhou 213022, Peoples R China
[2] Univ Electrocommun, Grad Sch Informat & Engn, Tokyo 1828585, Japan
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 12期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Privacy; Monitoring; Routing; Position measurement; Wireless sensor networks; Underwater acoustics; Network coding; Autonomous underwater vehicle (AUV); location privacy; network coding; relay node selection; underwater acoustic sensor networks (UASNs); WIRELESS; PROTOCOLS; WSNS;
D O I
10.1109/JIOT.2023.3240179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The position of the source is sensitive and critical information in underwater acoustic sensor networks (UASNs). In this study, a network coding-based scheme called the stratified source location privacy protection scheme (SSLP-NC) with autonomous underwater vehicle (AUV) is suggested for a strong adversary that can decode data. First, for the adversary with passive attacks, several fake source selection algorithms are suggested for two circumstances where the source is in the shallow and deep sea, respectively. Each node then utilizes a pseudo-random number generator to create sequences on a regular basis so that the key data can be delivered to the sink without interference. Then, for the adversary with the active attack, the node encrypts the source and fake data using the pre-existing pseudo-random number sequence as an encoding vector to thwart the adversary's decryption. Further, this work develops a relay node selection approach for transmitting the encoded data, which increases the variety of the data transmission pathways. Finally, this study includes a hole avoidance strategy that uses nodes or an AUV to address the potential hole issue. The simulation demonstrates that the SSLP-NC successfully fends off an adversary that can decode data packets, and performs better than the EECOR and DBR-MAC algorithms in terms of network safe time and packet delivery rate.
引用
收藏
页码:10636 / 10648
页数:13
相关论文
共 50 条
  • [1] Value of Information-Based Packet Scheduling Scheme for AUV-Assisted UASNs
    Zhuo, Xiaoxiao
    Wu, Wen
    Tang, Liang
    Qu, Fengzhong
    Shen, Xuemin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (07) : 7172 - 7185
  • [2] A Backbone-Network-Construction-Based Multi-AUV Collaboration Source Location Privacy Protection Algorithm in UASNs
    Wang, Hao
    Han, Guangjie
    Gong, Aini
    Li, Aohan
    Hou, Yun
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 18198 - 18210
  • [3] Value of Information-Based Packet Scheduling for AUV-Assisted UASNs
    Zhuo, Xiaoxiao
    Wu, Wen
    Tang, Liang
    Qu, Fengzhong
    Shen, Xuemin
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3926 - 3931
  • [4] An AUV-Assisted Data Collection Approach for UASNs Based on Hybrid Clustering and Matrix Completion
    Jiang, Qihang
    Zhu, Rongxin
    Boukerche, Azzedine
    Yang, Qiuling
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [5] A Collision-Free-Transmission-Based Source Location Privacy Protection Scheme in UASNs Under Time Slot Allocation
    Han, Guangjie
    Liu, Yulin
    Wang, Hao
    Zhang, Yu
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02) : 1546 - 1557
  • [6] An AUV-Assisted Data Gathering Scheme Based on Deep Reinforcement Learning for IoUT
    Shi, Wentao
    Tang, Yongqi
    Jin, Mingqi
    Jing, Lianyou
    JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2023, 11 (12)
  • [7] Multi-AUV Collaboration-Assisted Location Privacy Protection Scheme in Unknown Marine Environments
    Wang, Hao
    Han, Guangjie
    Tang, Dong
    Xiong, Weipeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 27398 - 27408
  • [8] Geohash coding location privacy protection scheme based on entropy weight TOPSIS
    Jing, Li
    Ke, Liu
    Lei, Zhang
    Yin, Xiaoya
    Jia, Yuanyuan
    Jia, Huinan
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01):
  • [9] Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
    Mutalemwa, Lilian C.
    Shin, Seokjoo
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 1188 - 1191
  • [10] An AUV-Assisted Data Gathering Scheme Based on Clustering and Matrix Completion for Smart Ocean
    Huang, Mingfeng
    Zhang, Kuan
    Zeng, Zhiwen
    Wang, Tian
    Liu, Yuxin
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 9904 - 9918