AUV-Assisted Stratified Source Location Privacy Protection Scheme Based on Network Coding in UASNs

被引:7
|
作者
Wang, Hao [1 ]
Han, Guangjie [1 ]
Liu, Yulin [1 ]
Li, Aohan [2 ]
Jiang, Jinfang [1 ]
机构
[1] Hohai Univ, Changzhou Key Lab Internet Things Technol Intellig, Changzhou 213022, Peoples R China
[2] Univ Electrocommun, Grad Sch Informat & Engn, Tokyo 1828585, Japan
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 12期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Privacy; Monitoring; Routing; Position measurement; Wireless sensor networks; Underwater acoustics; Network coding; Autonomous underwater vehicle (AUV); location privacy; network coding; relay node selection; underwater acoustic sensor networks (UASNs); WIRELESS; PROTOCOLS; WSNS;
D O I
10.1109/JIOT.2023.3240179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The position of the source is sensitive and critical information in underwater acoustic sensor networks (UASNs). In this study, a network coding-based scheme called the stratified source location privacy protection scheme (SSLP-NC) with autonomous underwater vehicle (AUV) is suggested for a strong adversary that can decode data. First, for the adversary with passive attacks, several fake source selection algorithms are suggested for two circumstances where the source is in the shallow and deep sea, respectively. Each node then utilizes a pseudo-random number generator to create sequences on a regular basis so that the key data can be delivered to the sink without interference. Then, for the adversary with the active attack, the node encrypts the source and fake data using the pre-existing pseudo-random number sequence as an encoding vector to thwart the adversary's decryption. Further, this work develops a relay node selection approach for transmitting the encoded data, which increases the variety of the data transmission pathways. Finally, this study includes a hole avoidance strategy that uses nodes or an AUV to address the potential hole issue. The simulation demonstrates that the SSLP-NC successfully fends off an adversary that can decode data packets, and performs better than the EECOR and DBR-MAC algorithms in terms of network safe time and packet delivery rate.
引用
收藏
页码:10636 / 10648
页数:13
相关论文
共 50 条
  • [41] A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission
    Shukla, Anurag
    Singh, Deepak
    Sajwan, Mohit
    Verma, Abhishek
    Kumar, Ajit
    WIRELESS NETWORKS, 2022, 28 (02) : 827 - 852
  • [43] Location-aware privacy protection scheme in continuous location-based service
    Zheng L.
    Zhang J.-X.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2020, 54 (12): : 2437 - 2444
  • [44] A Privacy Protection Scheme for Vehicle's Location Based on Virtual Location and Route Confusion
    Cui, Jie
    Wen, Jingyu
    Zhong, Hong
    Zhang, Jing
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 190 - 194
  • [45] A Location-Based Path Privacy Protection Scheme in Internet of Vehicles
    Yu, Haili
    Li, Guangshun
    Wu, JunHua
    Ren, Xinrong
    Cao, Jiabin
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 665 - 670
  • [46] LBS user location privacy protection scheme based on trajectory similarity
    Kun Qian
    Xiaohui Li
    Scientific Reports, 12
  • [47] A Trajectory Substitution Privacy Protection Scheme in location-based services
    Song, Cheng
    Zhang, Yadong
    Gu, Xinan
    Wang, Lei
    Liu, Zhizhong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (09) : 4771 - 4787
  • [48] A location privacy protection scheme based on random encryption period for VSNs
    Deng, Xinyang
    Xin, Xin
    Gao, Tianhan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1351 - 1359
  • [49] An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
    Jingjing Wang
    Yiliang Han
    Xiaoyuan Yang
    TsinghuaScienceandTechnology, 2016, 21 (03) : 260 - 269
  • [50] A location privacy protection scheme based on random encryption period for VSNs
    Xinyang Deng
    Xin Xin
    Tianhan Gao
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1351 - 1359