This application claims the benefit of priority from Chinese Patent Application No. 202310277073.4, filed on Mar. 20, 2023. The content of the aforementioned application, including any intervening amendments thereto, is incorporated herein by reference in its entirety.
This application relates to wireless sensor networks, and more particularly to a routing protocol method for underwater acoustic sensor networks (UASNs) based on layering and source location privacy.
In recent years, extensive researches have been conducted on Source Location Privacy (SLP) in Wireless Sensor Networks (WSNs), while the research about SLP in Underwater Acoustic Sensor Networks (UASNs) is still at a primary stage. SLP is of great significance in the fields of underwater resource exploration and underwater battlefield monitoring.
The increasing global attention to the oceans has greatly promoted the development of UASNs. However, the accompanying security issues have become increasingly prominent, and the privacy security of UASNs needs to be addressed. Most of the current security researches about UASNs only focus on active attacks, while passive attacks are often ignored. However, the abnormal energy consumption or the alteration in packet content caused by active attacks makes it easy for nodes to detect and sense the attack; whereas passive attacks usually employ eavesdropping attacks and backtracking attacks, which will not result in a change in the packet content such that it is difficult to detect such attacks. Inspired by this, the concept of SLP in WSNs is introduced into UASNs. A SLP-based routing protocol specialized for UASNs is designed to mainly solve the security problems caused by passive attacks. SLP is crucial in the UASNs, and there is no routing protocol designed for source node location privacy protection in the UASNs.
In view of the deficiencies in the prior art, this application provides a routing protocol method for Underwater Acoustic Sensor Networks (UASNs) based on layering and source location privacy, which can assign different priorities to different nodes to alleviate the long detour problem, and has a longer security period, shorter latency, and less energy consumption.
In a first aspect, this application provides a routing protocol method for underwater acoustic sensor networks (UASNs) based on layering and source location privacy (LSLP), comprising:
In an embodiment, the forwarding probability-based multipath routing algorithm is performed through steps of:
In an embodiment, the step (2) further comprises:
In an embodiment, in step (2), the layer-based priority comprises:
This application has the following beneficial effects.
1. This application proposes a proxy node selection scheme that does not require the source node to know the location information of the proxy node in advance.
2. This application proposes a Multi-Path Routing algorithm based on Forwarding Probability (MPR-FP) which is more applicable to three-dimensional UASNs.
3. This application proposes a layered and SLP-based Routing (LSLPR) protocol for UASNs. The LSLPR protocol uses random proxy nodes and MPR-FP algorithm to create multi-path routes, and the multiple paths are distributed in various regions of the network. Therefore, the security period of LSLPR protocol is greatly extended.
4. The long detour problem is alleviated by giving different priorities to the candidate nodes during the first phase of packet delivery.
5. Each node has layered information, and the routing algorithm considers summing node density, which solves the problem of empty regions. Also, by achieving energy balance, empty regions are prevented due to premature death of nodes.
To further understand the present disclosure, the present disclosure is described in detail in connection with the accompanying drawings and embodiments. The embodiments are merely explanatory and does not limit the present disclosure.
As shown in
1.1 Network Model
The network model in this embodiment is a combination of a 3D Underwater Acoustic Sensor network model and a panda-hunter model, consisting of sink nodes on the water surface, and sensor nodes randomly deployed in the 3D network. The sensor nodes under the water surface sense the data and transmit the data to the sink nodes through a multi-hop approach. Ordinary sensor nodes are used to relay the packets. The hunter is near the sink node, and the area where the panda is located is near the source node. When the source nodes change, the area where panda is located also changes.
1.2 Adversary Model
Assuming that there is only one adversary in the network, the adversary covets the value of the source node and tries its best to find the position of the source node. In this process, the source node continuously sends packets to the sink node. The adversary starts searching for the position of the source node from sink. In order not to be detected by the network administrator, passive attacks like eavesdropping attack and backtracking attack are used. Based on the result of the eavesdropping results, the adversary moves directly to the next node. In other words, the adversary waits at a node until the packet is intercepted, and moves to the sending node of the packet, and the process is repeated until the adversary finds the source node.
1.3 Assumption
1) Except for the sink node, the other sensor nodes have the same functionality and parameters (e.g., initial energy, listening range, fixed transmit power, and gain).
2) All the sensor nodes are randomly and uniformly deployed in a three-dimensional area of defined range.
3) The initial energy of the adversary is infinite.
4) Except for the available energy, the adversary has the same attributes as the underwater sensor nodes, such as listening range and transmit power, both the adversary only can attack locally, not globally.
5) The packets transmitted in the network are encrypted and cannot be cracked by the adversary.
2.1 Acquisition of Layer
In UASNs, the underwater nodes move with the water flow, in order to obtain the layer information and neighbor information of the underwater nodes in real time, sink periodically broadcasts hello packets to the network. The layer of the underwater node is the minimum number of hops that the underwater node is away from the sink node. When the underwater node listens to the hello packet, the information of the sending node of the hello packet is added to the two-hop neighbor table of the underwater node. The algorithm to get the layer information and neighbor information of the underwater node is in Algorithm 1.
2.2 Selection Scheme of Proxy Node
Unlike the wireless sensor networks, the data of Underwater Acoustic Sensor network is always transmitted from bottom to top, so the layer of the proxy node should be smaller than that of the source node. In addition to this, since the underwater node moves with the water flow, the source node cannot determine the position information of all nodes in the network in real time to specify a specific proxy node. Finally, to improve the source location privacy, the proxy nodes should be randomly distributed in various regions of the network.
To address the above problems, we propose the following scheme for selecting proxy nodes randomly. The specific steps are as follows.
(a) A three-dimensional (3D) coordinate system is established with the sink node as a center node. The position information of the sink node is made public across a network. The 3D underwater space is divided into four quadrants based on the 3D coordinate system, as shown in
(b) The position information of the underwater node is converted into a 3D coordinate centered on the sink node during a network initialization process.
(c) It is assumed that the layer of the source node is Ls, such that the layer of the proxy area is expressed as:
Lp=INT(Ls/2) (1);
(d) The proxy area is divided into the subarea I, the subarea II, the subarea III, and the subarea IV by the 3D coordinate system. If the source node is in one of the four quadrants, the proxy areas in the other three of the four quadrants become candidate proxy areas. One random number Q is set in a range of 0 to 3, and the target proxy area is selected according to a value of the random number Q, as shown in Table 1.
(e) After the packet is successfully delivered from the source node to the first node in the proxy area, according to the random number Q, the number of hops of the packet in the proxy area is randomly selected, and the node reached by the last hop is the proxy node.
2.3 Multipath Routing Algorithm Based on Forwarding Probability
In order to protect the SLP, the MPR-FP algorithm for UASNs is proposed. In this disclosure, SLP protection is realized in two phases. In the first phase, the source node routes the packets to the proxy node. In the second phase, the proxy node routes the packets to the sink node.
Both phases use the same routing algorithm to route the packets. In the routing algorithm, the sending node selects the neighbor nodes whose layers are not greater than the layer of the sending node as candidate neighbor nodes. The sending node selects the best next hop by calculating the forwarding probability of the candidate neighbor nodes. The forwarding probability depends on the node density and residual energy of the candidate neighbor node. The node density can alleviate the empty region problem. Meanwhile, the residual energy not only equalizes the energy in the network, but also enables multipath transmission of the packets from the source node to the sink node, thereby protecting the source location privacy. Therefore, the forwarding probability P(i,j) of one candidate neighbor node j of a sending node i is expressed as:
P(i,j)=αe(j)+βd(j) (2).
In the formula (2), α and β are weight coefficients, and α+β=1; d(j) represents the node density of the candidate neighbor node j; e(j) represents the ratio of the residual energy ER(j) of the candidate neighbor node j to the initial energy Einit of the candidate neighbor node j, and is expressed as:
The node density of the candidate neighbor node j is expressed as:
In the formula (4), Nc(j) represents a set of candidate nodes of the candidate node j; |Nc(j)| represents the number of the candidate nodes of the candidate node j; and
represents the number of the candidate neighbor nodes of all candidate neighbor nodes of the sending node i.
In LSLPR protocol, the selection of the proxy area as well as the proxy node is randomized. Secondly, since the residual energy is considered in selecting the next hop node during each packet transmission, even if the same proxy area is selected, different paths are taken from the source node to the proxy node. This makes the routing path more random, and it is difficult for an adversary to wait until the next packet arrives at a particular node, which in turn improves the privacy of the source location.
2.4 Long Detour Problem
Most phantom routes as well as multipath routes have the long detour problem. Long detours can lead to severe delay and energy wastage, which is unacceptable for data transmission in UASNs. In this disclosure, no packets will be delivered in the opposite direction of the sink node, which has alleviated the long detour problem to some extent. However, as the sending node selects the best next hop based on the forwarding probability, the packets may be sent to other proxy areas in the first phase of the LSLPR protocol, resulting in long detours of the packets from the source node to the proxy node.
Based on the above-mentioned content, in the first phase of the routing process, the prioritization rule for nodes close to the proxy area is proposed to alleviate the long detour problem to some extent. The screening process of the candidate neighbor nodes of the sending node close to the proxy area is as follows.
(A) The coordinate of the sending node A is set as (xs, ys, zs). According to Table 2, the coordinate of the sphere center O is selecting as (a, b, c). The sphere center O is a coordinate point of the sending node A closest to the quadrant in which the proxy area is located.
(B) Calculation of the sphere radius R
The sphere radius R is the maximum of a distance Rmin and a communication radius Re. The distance Rmin represents a distance between the sending node A and the sphere center O, expressed as:
Rmin=sqrt((a−xs){circumflex over ( )}2+(b−ys){circumflex over ( )}2+(c−zs){circumflex over ( )}2) (5).
The sphere radius R is expressed as:
R=max(Rmin,Rc) (6).
(C) Screening the candidate neighbor node close to the proxy area
It is assumed that a set of the candidate neighbor nodes close to the proxy area is V. The sending node A has i candidate neighbor nodes. The coordinates of the i candidate neighbor nodes are expressed as (xi, yi, zi). Anode whose distance from the sphere center O is less than or equal to the sphere radius R is the candidate neighbor node of the sending node A close to the proxy area. The set V is expressed as:
V={(xi,yi,zi)|sqrt((a−xi){circumflex over ( )}2+(b−yi){circumflex over ( )}2+(c−zi){circumflex over ( )}2)<=R} (7).
The set V is represented more visually in
To summarize, the different priorities are given to the candidate nodes to avoid the long detour problem. The priorities are as follows.
Priority 1: The sending node gives preference to the candidate neighbor node which is close to the proxy area.
Priority 2: Compared to the layer level of the sending node, the candidate neighbor node with a smaller layer is preferentially selected.
In the first phase of routing, priority 1 and priority 2 are used. For the priority 2, if the layer level of the sending node is equal to the layer level of the proxy area during the first phase of routing, the candidate neighbor node that is in the same layer level as the proxy area is first selected. In the second phase of routing, only priority 2 is used. Specifically, the sending node first selects the candidate neighbor nodes that satisfy the priority 1, then finds the candidate neighbor nodes that satisfy the priority 2 from the candidate neighbor nodes that satisfy the priority 1. Finally, according to the MPR-FP algorithm, the candidate node with the highest forwarding probability from the candidate neighbor nodes that satisfy both the priority 1 and the priority 2 is selected as the best next hop. As a result, the packet will neither move away from the proxy area nor move in the opposite direction of the sink node. The above prioritization rule effectively avoids the long detour problem in LSLPR protocol.
2.5 Empty Region Problem
With many routing protocols in UASNs, empty regions are unavoidable when the packets are transmitted in a relatively sparse network. As shown in
First, the probability of a node with small remaining energy to become the next hop is small. Therefore, some nodes that die prematurely do not exist in this disclosure. By achieving energy balance, the creation of empty regions is avoided.
Secondly, each node has acquired its own layer level through sink node flooding hello packets, and at least one upper node should exist for each node. In addition, the MPR-FP algorithm considers the effect of node density, where candidate neighbor nodes with high node density are more likely to be selected as the next hop, avoiding packets being routed to regions with low node density. For example, the node 8 is more likely to be the next hop than the node 7. Therefore, there is no case where the sending node cannot find the next hop close to the sink.
In summary, the dual protection mechanism effectively solves the empty region routing problem. According to the MPR-FP algorithm, the path from the source node 1 to the sink node 13 is 1→3→5→8→11→13 if residual energy is not considered.
2.6 Source Location Privacy Analysis
In LSLPR protocol, randomized proxy nodes and MPR-FP algorithm are used to send packets from source node to sink node. In both shortest path routing and single path phantom routing, the shortest path routing is used to transmit the packets. The shortest path routing causes successive packets from the same source node to reach the sink node through closely connected intermediate nodes. Adversaries can easily receive consecutive packets, reducing the difficulty of tracing the source location. In addition, the shortest routing also reduces the time for the adversary to trace the source location. In LSLPR protocol, the source node sends packets to the proxy node using MPR-FP algorithm and the proxy node sends packets to the sink node using the same routing algorithm. The MPR-FP algorithm implements multipath routing, and the proxy node makes multiple paths randomly distributed in various regions of the network. In contrast to shortest path routing, the LSLPR protocol neither utilizes tightly connected intermediate nodes to deliver packets nor reduces the time for the adversary to trace the source location.
In the existing multipath routing protocols, different packets reach the sink node from the source node through multiple paths. The above protocol expands the search range of the adversary to some extent. However, in some cases, multiple paths are in parallel, which facilitates the adversary. Moreover, since the existence probability of multiple paths in the same region is very high, it is easy for the adversary to receive consecutive packets. As a result, the SLP level is reduced. In LSLPR protocol, proxy nodes make multiple paths distributed in different regions of the network. Proxy nodes with randomness and MPR-FP algorithm do not allow multiple parallel paths.
Overall, in LSLPR protocol, it is highly unlikely for an adversary to eavesdrop on consecutive packets. In order to successfully trace the source location, the adversary needs to intercept enough packets to trace the source location. However, it is possible that the source may change before the adversary obtains the source location. It is very difficult for the adversary to trace multiple paths scattered in the network. To summarize, the MRP-SLP protocol is effective against adversaries and protects SLPs.
3.1 Security Analysis
In this disclosure, the adversary cannot obtain the source location information by eavesdropping the contents of the packets. The adversary can only move towards the location of the source node by eavesdropping the packet. Location privacy is closely related to the location of the nodes in the network that the adversary has already obtained. For the adversary, the more uncertain nodes in the network, the better the SLP is protected. AT is the set of nodes for which the adversary has already obtained information about the nodes. UT represents all the nodes that the adversary cannot determine in the network, i.e., the set of protected nodes. Assuming that the UT contains n nodes, which can be expressed as UT={u1, . . . un}. The UT contains source nodes, and the set of nodes of the source nodes is US. The number of nodes in UT is proportional to the difficulty of tracking the source location. We use information entropy (hereafter referred to as “entropy”) to measure the degree of privacy protection of the protocol. The entropy of location privacy is defined as:
S(p1,p2,p3 . . . pn)=−Σi=0|U
In the formula (8), pi represents the probability that the node i is a source node. |UT| is the number of nodes that the adversary cannot determine. The probability that any node in UT is the source node is
The number of uncertain nodes in the network for the adversary is n, i.e., |UT|=n. The size of the node set of the source node is m, i.e., |US|=m. Therefore, the source location privacy is expressed as:
Entropy S(p1, p2, p3 . . . pn) describes the uncertainty of the adversary about the nodes in the network. When the adversary believes that all the nodes in the network have the same probability to become source nodes, the adversary's uncertainty about the nodes in the network is highest and the entropy reaches its maximum value. Therefore, we define the size of the total set UT* of nodes in the network as N, i.e., |UT*|=N. Then, the optimal entropy is expressed as:
It is worth noting that the source location privacy is related to the size of UT and US The larger |UT|, the more nodes that may be the source node, the more uncertainty of the adversary about the source node, and the larger the entropy value. In this disclosure, it is almost impossible for the adversary to receive consecutive packets, and it is difficult for the adversary to obtain the location information of the nodes in the network by tracing the packets. It is difficult to further expand the content of the node set AT, so the adversary has a great deal of uncertainty about the nodes in the network, which makes the privacy level of the source location of the routing protocol relatively high.
3.2 Network Lifetime
After we have protected the SLP, we are interested in balancing the energy consumption in the network to extend the network lifetime. The more nodes involved in transmission in the network, the more energy balance can be achieved, and the longer the network lifetime. We use the existing energy model. For an underwater acoustic signal with a frequency off, the signal attenuation in the underwater acoustic channel with the distance of dis expressed as:
A(d,f)=dkα(f)d (11).
In the formula (11), d represents the distance between the sending node and the receiving node; f represents the frequency of the carrier wave in kHz; k is the energy diffusion coefficient (k=1 in cylinder, k=1.5 in real, k=2 in sphere). When f is kHz, α(f) represents the absorption coefficient in dB/km. The absorption coefficient is calculated using Throp formula, which is expressed as:
The sending node transmits one packet of the length l bits to the receiving node, and the distance between the sending node and the receiving node is d. The energy consumption of the sending node to transmit the data is expressed as:
Et(l,d)=lPrTdA(d,f) (13).
In the formula (13), Pr represents the power consumption; Td represents the time of the data transmission. Meanwhile, the energy consumption of the receiving node to receive one packet is expressed as:
Er(l)=lPrTd (14).
Assuming that the average number of hops of one packet from the source node to the sink node is H hops, the duration time of one hop for each packet transmission is Td. After successfully transmitting w packets, the adversary finds the source location. The total energy consumption for transmitting packets in the network is expressed as:
At this point, the more nodes in the network involved in packet forwarding, the less energy consumption of any node in the network in this stage of data transmission, and the longer the network life. Assuming that the probability of the node in the network to participate in data transmission is ρ, the average energy consumption of any one node in this phase of data transmission can be expressed as:
According to the formula (16), the larger ρ, the smaller Esingle. Specifically, the higher the probability that any node participates in data transmission, the smaller the average energy consumption of a single node. Because |UT|=n and
so n=2S(p
According to the formula (17), Esingle is inversely proportional to S(p1, . . . pn). The higher the privacy level, the lower the value of Esingle, and the longer the network lifetime. In other words, in the LSLPR protocol, the protection of SLP and the extension of network lifetime can be realized simultaneously.
This section describes and analyzes the performance of LSLPR protocol. MATLAB simulation software is used to perform simulation experiments. In the simulation experiments, it is compared with SSLP, PP-SLPP, and 2hop-AHH-VBF. The SSLP and PP-SLPP are source location protection schemes UASNs that utilize AUVs to implement. 2hop-AHH-VBF is an energy efficient underwater routing protocol.
A. Performance Metrics
This section evaluates the following three performance metrics: security period, energy consumption, and delay. Security period is the distance traveled by the adversary to find the source node. Energy consumption is the total energy consumed for each simulation experiment run. The specific energy consumption calculation process is shown in formula (15). Delay is the end-to-end delay, i.e., the delay from the source node to the sink node. The simulation experiment parameters are shown in Table 3.
B. Security Period
According to the above definition of security period, the farther the adversary travels to find the source node, the more time the adversary spends to find the source node. The degree to which SLP is protected is determined by the length of the security period.
In
C. Delay
In LSLPR, the shorter the path from source node to sink node, the smaller the delay. Priority 1 is added in LSLPR protocol to avoid packets from moving away from the proxy area. Thus, priority 1 alleviates the long detour problem and reduces the delay.
As shown in
In
Location privacy protection is crucial for UASNs. The LSLPR protocol incorporates the SLP algorithm into the routing protocol for UASNs. The protocol improves the methods of protecting SLP such as multipath techniques and proxy node selection in WSNs and makes these methods applicable to UASNs. At the same time, a new MPR-FP algorithm is proposed which calculates the forwarding probability using the node residual energy and the node density to select the best next hop. MPR-FP algorithm implements multipath routing. Proxy nodes enable multiple paths to be distributed throughout the network rather than in the single region. The MPR-FP algorithm and proxy nodes enhance SLP by increasing the search range of the adversary. Simulation results show that compared to the existing routing protocols for UASNs and SLP schemes, the LSLPR protocol has less energy consumption and delay and longer security period.
Described above are merely preferred embodiments of the disclosure, which are not intended to limit the disclosure. It should be understood that any modifications and replacements made by those skilled in the art without departing from the spirit of the disclosure should fall within the scope of the disclosure defined by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
202310277073.4 | Mar 2023 | CN | national |
Number | Name | Date | Kind |
---|---|---|---|
8600830 | Hoffberg | Dec 2013 | B2 |
9054978 | Shinohara | Jun 2015 | B2 |
9818136 | Hoffberg | Nov 2017 | B1 |
10163137 | Hoffberg | Dec 2018 | B2 |
10943273 | Hoffberg | Mar 2021 | B2 |
11790413 | Hoffberg | Oct 2023 | B2 |
20100317420 | Hoffberg | Dec 2010 | A1 |
20110004513 | Hoffberg | Jan 2011 | A1 |
20140081793 | Hoffberg | Mar 2014 | A1 |
20180068358 | Hoffberg | Mar 2018 | A1 |
20210192582 | Hoffberg | Jun 2021 | A1 |
Number | Date | Country |
---|---|---|
107548029 | Jan 2018 | CN |
109660945 | Apr 2019 | CN |
110493841 | Nov 2019 | CN |
111542059 | Aug 2020 | CN |
112689282 | Apr 2021 | CN |
2019169874 | Sep 2019 | WO |
Entry |
---|
Tian, Xiaojing, et al. “LSLPR: A Layering and Source-Location-Privacy based Routing Protocol for Underwater Acoustic Sensor Networks.” IEEE Sensors Journal (2023). (Year: 2023). |
Number | Date | Country | |
---|---|---|---|
20240106716 A1 | Mar 2024 | US |