|Table of Contents|

Citation:
 Yishan Su,Yao Liu,Rong Fan,et al.A Cooperative Jamming Scheme Based on Node Authentication for Underwater Acoustic Sensor Networks[J].Journal of Marine Science and Application,2022,(2):197-209.[doi:10.1007/s11804-022-00277-8]
Click and Copy

A Cooperative Jamming Scheme Based on Node Authentication for Underwater Acoustic Sensor Networks

Info

Title:
A Cooperative Jamming Scheme Based on Node Authentication for Underwater Acoustic Sensor Networks
Author(s):
Yishan Su1 Yao Liu1 Rong Fan1 Luyu Li1 Huili Fan2 Shu Zhang2
Affilations:
Author(s):
Yishan Su1 Yao Liu1 Rong Fan1 Luyu Li1 Huili Fan2 Shu Zhang2
1. School of Electrical and Information Engineering, Tianjin University, Tianjin, 300072, China;
2. China Ship Development and Design Center, Wuhan, 430000, China
Keywords:
underwater acoustic sensor networks (UASNs)|physical layer security|cooperative jamming|physical layer authentication|trust management mechanism
分类号:
-
DOI:
10.1007/s11804-022-00277-8
Abstract:
Cooperative jamming (CJ) is one of the important methods to solve security problems of underwater acoustic sensor networks (UASNs). In this paper, we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes. In the node authentication, all nodes will be identified by their trust value (TV). TV is calculated according to three types of evidence:channel-based trust evidence, behavior-based trust evidence and energy-based trust evidence. Besides, to deal with cases where legal nodes may be suspected, the historical TV and trust redemption will be considered when calculating TV. In cooperative jamming, according to the link quality, several nodes are selected to jam illegal nodes. Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.

References:

Arifeen MM, Islam AA, Rahman MM, Taher KA, Islam MM, Kaiser MS (2019) ANFIS based trust management model to enhance location privacy in underwater wireless sensor networks. 2019 international conference on electrical, computer and communication engineering (ECCE), Cox’s bazar, bangladesh. Doi:https://doi.org/10.1109/ECACE.2019.8679165
Chen Y (2014) Time-Reversal Wireless Paradigm for Green Internet of Things:An Overview. IEEE Internet of Things Journal, 1(1), 81-98. Doi:https://doi.org/10.1109/JIOT.2014.2308838
Diamant R, Casari P, Tomasin S (2019) Cooperative authentication in underwater acoustic sensor networks. IEEE transactions on wireless communications, 18(2), 954-968. Doi:https://doi.org/10.1109/TWC.2018.2886896
Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing, 14(12), 2447-2459. Doi:https://doi.org/10.1109/TMC.2015.2402120
Huang Y, Xiao P, Zhou S, Shi Z (2016) A half-duplex self-protection jamming approach for improving secrecy of block transmissions in underwater acoustic channels. IEEE sensors journal, 16(11), 4100-4109. Doi:https://doi.org/10.1109/JSEN.2015.2446465
Liao RF (2020) Multiuser physical layer authentication in internet of things with data augmentation. IEEE internet of things journal. 73, 2077-2088, Doi:https://doi.org/10.1109/JIOT.2019.2960099
Liu J, Refaey A, Wang X, Tang H (2015) Reliability enhancement for CIR-based physical layer authentication. Secur. Commun. Netw, 8(4), 661-671.
Liu J, Wang X (2016) Physical layer authentication enhancement using two-dimensional channel quantization. IEEE transactions on wireless communications, 15(6), 4171-4182. Doi:https://doi.org/10.1109/TWC.2016.2535442
Paris JF (2014) Statistical Characterization of κ-μShadowed Fading. IEEE Transactions on Vehicular Technology, 63(2), 518-526. Doi:https://doi.org/10.1109/TVT.2013.2281213
Su Y, Ma S, Zhang H, Jin Z, Fu X (2021) A redeemable SVM-DS fusion-based trust management mechanism for underwater acoustic sensor networks. IEEE sensors journal, 21(22), 26161-26174. Doi:https://doi.org/10.1109/JSEN.2021.3117056
Xiao L, Greenstein LJ, Mandayam NB, Trappe W (2008) Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications, 7(7), 2571-2579.
Xie N, Chen J, Huang L (2021) Physical-layer authentication using multiple channel-based features. IEEE transactions on information forensics and security, 16, 2356-2366. Doi:https://doi.org/10.1109/TIFS.2021.3054534
Zeng K, Govindan K, Mohapatra P (2010) Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Communications, 17(5), 56-62.
Zhao R, Khalid M, Dobre OA, Wang X (2022) Physical Layer Node Authentication in Underwater Acoustic Sensor Networks Using Time-Reversal. IEEE Sensors Journal, 22(4), 3796-3809. Doi:https://doi.org/10.1109/JSEN.2022.3142160
Zhou H, He D, Wang H (2020) Joint relay and jammer selection for secure cooperative networks with a full-duplex active eavesdropper. IET Communications, 14(6), 1043-1055.

Memo

Memo:
Received date: 2022-05-27;Accepted date:2022-06-16。
Foundation item:Supported by the National Natural Science Foundation of China under Grant No. 62171310, the Marine Defense Innovation Fund JJ-2020-701-09, and Lanzhou Jiaotong University-Tianjin University Co-Funding under Grant No. 2022064
Corresponding author:Yao Liu,E-mail:liuyao2020@tju.edu.cn
Last Update: 2022-08-17