Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks
Opportunistic Underwater Sensor Networks (OUSNs) are deployed for various underwater applications, such as underwater creature tracking and tactical surveillance. In an OUSN invaded by some eavesdroppers, the data messages disseminated by sensor nodes are probably stolen (captured and cracked) by th...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2022, Vol.17, p.1610-1623 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1623 |
---|---|
container_issue | |
container_start_page | 1610 |
container_title | IEEE transactions on information forensics and security |
container_volume | 17 |
creator | Liu, Linfeng Xi, Zhiyuan Wu, Jiagao Xu, Jia |
description | Opportunistic Underwater Sensor Networks (OUSNs) are deployed for various underwater applications, such as underwater creature tracking and tactical surveillance. In an OUSN invaded by some eavesdroppers, the data messages disseminated by sensor nodes are probably stolen (captured and cracked) by the eavesdroppers. The data messages are disseminated through acoustic waves which could be altered by the environmental noises, i.e., the acoustic waves containing data messages could be superimposed by the environmental noises. To protect the data messages from being stolen by eavesdroppers and guarantee the required delivery ratio of data messages, we propose a Noise-based-protection Message Dissemination Method (NMDM). In NMDM, the acoustic waves containing data messages are superposed by the environmental noises and converted into some pseudo data messages. The environmental noises around source nodes are identified, encoded, and encrypted into some noise messages. Then, the pseudo data messages and noise messages are individually disseminated to the sink node. Such mechanism makes the eavesdroppers difficult to steal the data messages. Besides, the required delivery ratio of data messages is achieved by measuring the similarities between the nodes and the sink node, i.e., the pseudo data messages and noise messages are preferentially disseminated to the nodes with larger similarities to the sink node. Finally, simulation results demonstrate the superior performance of NMDM. NMDM can reduce the theft ratio of data messages and guarantee the required delivery ratio of data messages effectively. |
doi_str_mv | 10.1109/TIFS.2022.3167911 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2656879582</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9758770</ieee_id><sourcerecordid>2656879582</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-a5b7250baa3e7ff7d12d2667cfc47bbe192b38f919a71f3596c5032437a00ea3</originalsourceid><addsrcrecordid>eNo9kE1LAzEQhoMoWKs_QLwseN6aj02ye_SrWqit0HoO2exEU-2mJlmK_94tLT3Ny_C8M_AgdE3wiBBc3S0n48WIYkpHjAhZEXKCBoRzkQtMyekxE3aOLmJcYVwURJQD5GbeRcgfdIQmfw8-gUnOt9kbxKg_IXtyMcLatfqwTV--yawP2aSNYLoA2Xyz8SF1rYvJmeyjbSBsdYKQLaCNPTiDtPXhO16iM6t_Ilwd5hAtx8_Lx9d8On-ZPN5Pc0MpS7nmtaQc11ozkNbKhtCGCiGNNYWsayAVrVlpK1JpSSzjlTAcM1owqTEGzYbodn92E_xvBzGple9C239UVHBRyoqXtKfInjLBxxjAqk1wax3-FMFqJ1TthKqdUHUQ2ndu9h0HAEe-kryUErN_YCRzdA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2656879582</pqid></control><display><type>article</type><title>Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Liu, Linfeng ; Xi, Zhiyuan ; Wu, Jiagao ; Xu, Jia</creator><creatorcontrib>Liu, Linfeng ; Xi, Zhiyuan ; Wu, Jiagao ; Xu, Jia</creatorcontrib><description>Opportunistic Underwater Sensor Networks (OUSNs) are deployed for various underwater applications, such as underwater creature tracking and tactical surveillance. In an OUSN invaded by some eavesdroppers, the data messages disseminated by sensor nodes are probably stolen (captured and cracked) by the eavesdroppers. The data messages are disseminated through acoustic waves which could be altered by the environmental noises, i.e., the acoustic waves containing data messages could be superimposed by the environmental noises. To protect the data messages from being stolen by eavesdroppers and guarantee the required delivery ratio of data messages, we propose a Noise-based-protection Message Dissemination Method (NMDM). In NMDM, the acoustic waves containing data messages are superposed by the environmental noises and converted into some pseudo data messages. The environmental noises around source nodes are identified, encoded, and encrypted into some noise messages. Then, the pseudo data messages and noise messages are individually disseminated to the sink node. Such mechanism makes the eavesdroppers difficult to steal the data messages. Besides, the required delivery ratio of data messages is achieved by measuring the similarities between the nodes and the sink node, i.e., the pseudo data messages and noise messages are preferentially disseminated to the nodes with larger similarities to the sink node. Finally, simulation results demonstrate the superior performance of NMDM. NMDM can reduce the theft ratio of data messages and guarantee the required delivery ratio of data messages effectively.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2022.3167911</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Acoustic waves ; Acoustics ; Authentication ; Cryptography ; eavesdropper ; Eavesdropping ; environmental noise ; Messages ; Nodes ; Noise ; Opportunistic underwater sensor networks ; Relays ; Routing ; Sensors ; Similarity ; Theft ; theft ratio ; Underwater detectors ; Wireless sensor networks ; Working environment noise</subject><ispartof>IEEE transactions on information forensics and security, 2022, Vol.17, p.1610-1623</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-a5b7250baa3e7ff7d12d2667cfc47bbe192b38f919a71f3596c5032437a00ea3</citedby><cites>FETCH-LOGICAL-c223t-a5b7250baa3e7ff7d12d2667cfc47bbe192b38f919a71f3596c5032437a00ea3</cites><orcidid>0000-0002-0523-9673 ; 0000-0002-0824-6203 ; 0000-0003-3109-2553</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9758770$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,4010,27900,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9758770$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, Linfeng</creatorcontrib><creatorcontrib>Xi, Zhiyuan</creatorcontrib><creatorcontrib>Wu, Jiagao</creatorcontrib><creatorcontrib>Xu, Jia</creatorcontrib><title>Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Opportunistic Underwater Sensor Networks (OUSNs) are deployed for various underwater applications, such as underwater creature tracking and tactical surveillance. In an OUSN invaded by some eavesdroppers, the data messages disseminated by sensor nodes are probably stolen (captured and cracked) by the eavesdroppers. The data messages are disseminated through acoustic waves which could be altered by the environmental noises, i.e., the acoustic waves containing data messages could be superimposed by the environmental noises. To protect the data messages from being stolen by eavesdroppers and guarantee the required delivery ratio of data messages, we propose a Noise-based-protection Message Dissemination Method (NMDM). In NMDM, the acoustic waves containing data messages are superposed by the environmental noises and converted into some pseudo data messages. The environmental noises around source nodes are identified, encoded, and encrypted into some noise messages. Then, the pseudo data messages and noise messages are individually disseminated to the sink node. Such mechanism makes the eavesdroppers difficult to steal the data messages. Besides, the required delivery ratio of data messages is achieved by measuring the similarities between the nodes and the sink node, i.e., the pseudo data messages and noise messages are preferentially disseminated to the nodes with larger similarities to the sink node. Finally, simulation results demonstrate the superior performance of NMDM. NMDM can reduce the theft ratio of data messages and guarantee the required delivery ratio of data messages effectively.</description><subject>Acoustic waves</subject><subject>Acoustics</subject><subject>Authentication</subject><subject>Cryptography</subject><subject>eavesdropper</subject><subject>Eavesdropping</subject><subject>environmental noise</subject><subject>Messages</subject><subject>Nodes</subject><subject>Noise</subject><subject>Opportunistic underwater sensor networks</subject><subject>Relays</subject><subject>Routing</subject><subject>Sensors</subject><subject>Similarity</subject><subject>Theft</subject><subject>theft ratio</subject><subject>Underwater detectors</subject><subject>Wireless sensor networks</subject><subject>Working environment noise</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1LAzEQhoMoWKs_QLwseN6aj02ye_SrWqit0HoO2exEU-2mJlmK_94tLT3Ny_C8M_AgdE3wiBBc3S0n48WIYkpHjAhZEXKCBoRzkQtMyekxE3aOLmJcYVwURJQD5GbeRcgfdIQmfw8-gUnOt9kbxKg_IXtyMcLatfqwTV--yawP2aSNYLoA2Xyz8SF1rYvJmeyjbSBsdYKQLaCNPTiDtPXhO16iM6t_Ilwd5hAtx8_Lx9d8On-ZPN5Pc0MpS7nmtaQc11ozkNbKhtCGCiGNNYWsayAVrVlpK1JpSSzjlTAcM1owqTEGzYbodn92E_xvBzGple9C239UVHBRyoqXtKfInjLBxxjAqk1wax3-FMFqJ1TthKqdUHUQ2ndu9h0HAEe-kryUErN_YCRzdA</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Liu, Linfeng</creator><creator>Xi, Zhiyuan</creator><creator>Wu, Jiagao</creator><creator>Xu, Jia</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-0523-9673</orcidid><orcidid>https://orcid.org/0000-0002-0824-6203</orcidid><orcidid>https://orcid.org/0000-0003-3109-2553</orcidid></search><sort><creationdate>2022</creationdate><title>Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks</title><author>Liu, Linfeng ; Xi, Zhiyuan ; Wu, Jiagao ; Xu, Jia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-a5b7250baa3e7ff7d12d2667cfc47bbe192b38f919a71f3596c5032437a00ea3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Acoustic waves</topic><topic>Acoustics</topic><topic>Authentication</topic><topic>Cryptography</topic><topic>eavesdropper</topic><topic>Eavesdropping</topic><topic>environmental noise</topic><topic>Messages</topic><topic>Nodes</topic><topic>Noise</topic><topic>Opportunistic underwater sensor networks</topic><topic>Relays</topic><topic>Routing</topic><topic>Sensors</topic><topic>Similarity</topic><topic>Theft</topic><topic>theft ratio</topic><topic>Underwater detectors</topic><topic>Wireless sensor networks</topic><topic>Working environment noise</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Linfeng</creatorcontrib><creatorcontrib>Xi, Zhiyuan</creatorcontrib><creatorcontrib>Wu, Jiagao</creatorcontrib><creatorcontrib>Xu, Jia</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, Linfeng</au><au>Xi, Zhiyuan</au><au>Wu, Jiagao</au><au>Xu, Jia</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2022</date><risdate>2022</risdate><volume>17</volume><spage>1610</spage><epage>1623</epage><pages>1610-1623</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Opportunistic Underwater Sensor Networks (OUSNs) are deployed for various underwater applications, such as underwater creature tracking and tactical surveillance. In an OUSN invaded by some eavesdroppers, the data messages disseminated by sensor nodes are probably stolen (captured and cracked) by the eavesdroppers. The data messages are disseminated through acoustic waves which could be altered by the environmental noises, i.e., the acoustic waves containing data messages could be superimposed by the environmental noises. To protect the data messages from being stolen by eavesdroppers and guarantee the required delivery ratio of data messages, we propose a Noise-based-protection Message Dissemination Method (NMDM). In NMDM, the acoustic waves containing data messages are superposed by the environmental noises and converted into some pseudo data messages. The environmental noises around source nodes are identified, encoded, and encrypted into some noise messages. Then, the pseudo data messages and noise messages are individually disseminated to the sink node. Such mechanism makes the eavesdroppers difficult to steal the data messages. Besides, the required delivery ratio of data messages is achieved by measuring the similarities between the nodes and the sink node, i.e., the pseudo data messages and noise messages are preferentially disseminated to the nodes with larger similarities to the sink node. Finally, simulation results demonstrate the superior performance of NMDM. NMDM can reduce the theft ratio of data messages and guarantee the required delivery ratio of data messages effectively.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2022.3167911</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-0523-9673</orcidid><orcidid>https://orcid.org/0000-0002-0824-6203</orcidid><orcidid>https://orcid.org/0000-0003-3109-2553</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2022, Vol.17, p.1610-1623 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_2656879582 |
source | IEEE Electronic Library (IEL) |
subjects | Acoustic waves Acoustics Authentication Cryptography eavesdropper Eavesdropping environmental noise Messages Nodes Noise Opportunistic underwater sensor networks Relays Routing Sensors Similarity Theft theft ratio Underwater detectors Wireless sensor networks Working environment noise |
title | Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T01%3A54%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Noise-Based-Protection%20Message%20Dissemination%20Method%20for%20Insecure%20Opportunistic%20Underwater%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Liu,%20Linfeng&rft.date=2022&rft.volume=17&rft.spage=1610&rft.epage=1623&rft.pages=1610-1623&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2022.3167911&rft_dat=%3Cproquest_RIE%3E2656879582%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2656879582&rft_id=info:pmid/&rft_ieee_id=9758770&rfr_iscdi=true |