AUV-Assisted Stratified Source Location Privacy Protection Scheme Based on Network Coding in UASNs

被引:7
|
作者
Wang, Hao [1 ]
Han, Guangjie [1 ]
Liu, Yulin [1 ]
Li, Aohan [2 ]
Jiang, Jinfang [1 ]
机构
[1] Hohai Univ, Changzhou Key Lab Internet Things Technol Intellig, Changzhou 213022, Peoples R China
[2] Univ Electrocommun, Grad Sch Informat & Engn, Tokyo 1828585, Japan
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 12期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Privacy; Monitoring; Routing; Position measurement; Wireless sensor networks; Underwater acoustics; Network coding; Autonomous underwater vehicle (AUV); location privacy; network coding; relay node selection; underwater acoustic sensor networks (UASNs); WIRELESS; PROTOCOLS; WSNS;
D O I
10.1109/JIOT.2023.3240179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The position of the source is sensitive and critical information in underwater acoustic sensor networks (UASNs). In this study, a network coding-based scheme called the stratified source location privacy protection scheme (SSLP-NC) with autonomous underwater vehicle (AUV) is suggested for a strong adversary that can decode data. First, for the adversary with passive attacks, several fake source selection algorithms are suggested for two circumstances where the source is in the shallow and deep sea, respectively. Each node then utilizes a pseudo-random number generator to create sequences on a regular basis so that the key data can be delivered to the sink without interference. Then, for the adversary with the active attack, the node encrypts the source and fake data using the pre-existing pseudo-random number sequence as an encoding vector to thwart the adversary's decryption. Further, this work develops a relay node selection approach for transmitting the encoded data, which increases the variety of the data transmission pathways. Finally, this study includes a hole avoidance strategy that uses nodes or an AUV to address the potential hole issue. The simulation demonstrates that the SSLP-NC successfully fends off an adversary that can decode data packets, and performs better than the EECOR and DBR-MAC algorithms in terms of network safe time and packet delivery rate.
引用
收藏
页码:10636 / 10648
页数:13
相关论文
共 50 条
  • [31] Semantic-Based Customizable Location Privacy Protection Scheme
    Lv, Xin
    Shi, Haitao
    Wang, Aili
    Zeng, Tao
    Wu, Zhongzhong
    Proceedings - 2018 17th International Symposium on Distributed Computing and Applications for Business Engineering and Science, DCABES 2018, 2018, : 148 - 154
  • [32] Semantic-Based Customizable Location Privacy Protection Scheme
    Lv, Xin
    Shi, Haitao
    Wang, Aili
    Zeng, Tao
    Wu, Zhongzhong
    2018 17TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS ENGINEERING AND SCIENCE (DCABES), 2018, : 148 - 154
  • [33] A Gradual Sensitive Indistinguishable Based Location Privacy Protection Scheme
    Wang B.
    Zhang L.
    Zhang G.
    Zhang, Lei (8213662@163.com), 1600, Science Press (57): : 616 - 630
  • [34] A dynamic location privacy protection scheme based on Cloud storage
    Li, Li
    Lv, Zhengjuan
    Tong, Xiaohong
    Shi, Runhua
    International Journal of Network Security, 2019, 21 (05) : 828 - 834
  • [35] Network Location Privacy Protection Based on Game Theory
    Fan, Ya-feng
    Liu, Hong-yue
    Yang, Wei-dong
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 246 - 250
  • [36] GLPS: A Geohash-Based Location Privacy Protection Scheme
    Liu, Bin
    Zhang, Chunyong
    Yao, Liangwei
    Xin, Yang
    ENTROPY, 2023, 25 (12)
  • [37] Road Network-based Location Privacy Protection
    Wen, Chen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 231 - 236
  • [38] Privacy Preserving Scheme for Location and Content Protection in Location-Based Services
    Peng, Tao
    Liu, Qin
    Wang, Guojun
    Xiang, Yang
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 26 - 38
  • [39] Location-semantic-based location privacy protection for road network
    Chen H.
    Qin X.-L.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (08): : 67 - 76
  • [40] A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission
    Anurag Shukla
    Deepak Singh
    Mohit Sajwan
    Abhishek Verma
    Ajit Kumar
    Wireless Networks, 2022, 28 : 827 - 852