IoT-16231-2021_Proof_hi.pdf (2.9 MB)
Download fileA push-based probabilistic method for source location privacy protection in underwater acoustic sensor networks
journal contribution
posted on 2021-08-03, 13:06 authored by Hao Wang, Guangjie Han, Eve ZhangEve Zhang, Ling XieAs the research topics in ocean emerge, Underwater Acoustic Sensor Networks (UASNs) have become ever more relevant. Consequently, challenges arise with the security and privacy of the UASNs. Compared to the active attacks, the characteristics of passive attacks are more difficult to discriminate. Thus, the focus of this study is on the passive attacks in UASNs, where a Push-based Probabilistic method for Source Location Privacy Protection (PP-SLPP) is proposed. The fake packet technology and the multi-path technology are utilized in the PP-SLPP scheme to counter the passive attacks, so as to protect the source location privacy in UASNs. Moreover, the Ekman drift current model is employed to simulate the underwater environment. And the mean shift algorithm and the k-means algorithm are adopted in the dynamic layer and static layer of the Ekman drift current model, respectively, to increase the stability of the clusters. Finally, an Autonomous Underwater Vehicle (AUV) swarm is implemented to collect data in clusters. Through the comparison with existing data collection schemes in UASNs, the simulation results have demonstrated that the PP-SLPP scheme can achieve a longer safety period, with a minor compromise of energy consumption and delay.
Funding
National Natural Science Foundation of China under Grant No. 62072072, No. 62072155 and No. 62002099
Open fund of State Key Laboratory of Acoustics under Grant SKLA202102
History
School
- Aeronautical, Automotive, Chemical and Materials Engineering
Department
- Aeronautical and Automotive Engineering
Published in
IEEE Internet of Things JournalVolume
9Issue
1Pages
770 - 782Publisher
IEEEVersion
- AM (Accepted Manuscript)
Rights holder
© IEEEPublisher statement
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Publication date
2021-06-03Copyright date
2022eISSN
2327-4662Publisher version
Language
- en