A Cooperative Jamming Scheme Based on Node Authentication for Underwater Acoustic Sensor Networks

Yishan Su , Yao Liu , Rong Fan , Luyu Li , Huili Fan , Shu Zhang

Journal of Marine Science and Application ›› 2022, Vol. 21 ›› Issue (2) : 197 -209.

PDF
Journal of Marine Science and Application ›› 2022, Vol. 21 ›› Issue (2) : 197 -209. DOI: 10.1007/s11804-022-00277-8
Research Article

A Cooperative Jamming Scheme Based on Node Authentication for Underwater Acoustic Sensor Networks

Author information +
History +
PDF

Abstract

Cooperative jamming (CJ) is one of the important methods to solve security problems of underwater acoustic sensor networks (UASNs). In this paper, we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes. In the node authentication, all nodes will be identified by their trust value (TV). TV is calculated according to three types of evidence: channel-based trust evidence, behavior-based trust evidence and energy-based trust evidence. Besides, to deal with cases where legal nodes may be suspected, the historical TV and trust redemption will be considered when calculating TV. In cooperative jamming, according to the link quality, several nodes are selected to jam illegal nodes. Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.

Keywords

underwater acoustic sensor networks (UASNs) / physical layer security / cooperative jamming / physical layer authentication / trust management mechanism

Cite this article

Download citation ▾
Yishan Su, Yao Liu, Rong Fan, Luyu Li, Huili Fan, Shu Zhang. A Cooperative Jamming Scheme Based on Node Authentication for Underwater Acoustic Sensor Networks. Journal of Marine Science and Application, 2022, 21(2): 197-209 DOI:10.1007/s11804-022-00277-8

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Arifeen MM, Islam AA, Rahman MM, Taher KA, Islam MM, Kaiser MS (2019) ANFIS based trust management model to enhance location privacy in underwater wireless sensor networks. 2019 international conference on electrical, computer and communication engineering (ECCE), Cox’s bazar, bangladesh. Doi: https://doi.org/10.1109/ECACE.2019.8679165

[2]

Chen Y. Time-Reversal Wireless Paradigm for Green Internet of Things: An Overview. IEEE Internet of Things Journal, 2014, 1(1): 81-98

[3]

Diamant R, Casari P, Tomasin S. Cooperative authentication in underwater acoustic sensor networks. IEEE transactions on wireless communications, 2019, 18(2): 954-968

[4]

Han G, Jiang J, Shu L, Guizani M. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing, 2015, 14(12): 2447-2459

[5]

Huang Y, Xiao P, Zhou S, Shi Z. A half-duplex self-protection jamming approach for improving secrecy of block transmissions in underwater acoustic channels. IEEE sensors journal, 2016, 16(11): 4100-4109

[6]

Liao RF. Multiuser physical layer authentication in internet of things with data augmentation. IEEE internet of things journal, 2020, 73: 2077-2088

[7]

Liu J, Refaey A, Wang X, Tang H. Reliability enhancement for CIR-based physical layer authentication. Secur. Commun. Netw, 2015, 8(4): 661-671

[8]

Liu J, Wang X. Physical layer authentication enhancement using two-dimensional channel quantization. IEEE transactions on wireless communications, 2016, 15(6): 4171-4182

[9]

Paris JF. Statistical Characterization of κ-μShadowed Fading. IEEE Transactions on Vehicular Technology, 2014, 63(2): 518-526

[10]

Su Y, Ma S, Zhang H, Jin Z, Fu X. A redeemable SVM-DS fusion-based trust management mechanism for underwater acoustic sensor networks. IEEE sensors journal, 2021, 21(22): 26161-26174

[11]

Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications, 2008, 7(7): 2571-2579

[12]

Xie N, Chen J, Huang L. Physical-layer authentication using multiple channel-based features. IEEE transactions on information forensics and security, 2021, 16: 2356-2366

[13]

Zeng K, Govindan K, Mohapatra P. Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Communications, 2010, 17(5): 56-62

[14]

Zhao R, Khalid M, Dobre OA, Wang X. Physical Layer Node Authentication in Underwater Acoustic Sensor Networks Using Time-Reversal. IEEE Sensors Journal, 2022, 22(4): 3796-3809

[15]

Zhou H, He D, Wang H. Joint relay and jammer selection for secure cooperative networks with a full-duplex active eavesdropper. IET Communications, 2020, 14(6): 1043-1055

AI Summary AI Mindmap
PDF

124

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/