Next Article in Journal
Amyloid Beta Detection by Faradaic Electrochemical Impedance Spectroscopy Using Interdigitated Microelectrodes
Next Article in Special Issue
Random Access for Underwater Acoustic Cellular Systems
Previous Article in Journal
A Simple Surface-Enhanced Raman Spectroscopic Method for on-Site Screening of Tetracycline Residue in Whole Milk
Previous Article in Special Issue
Impact of MAC Delay on AUV Localization: Underwater Localization Based on Hyperbolic Frequency Modulation Signal
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions

1
Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia
2
School of Computer Science and Electronic Engineering, University of Essex, Colchester CO4 3SQ, UK
3
Tecnologico de Monterrey, Escuela de Ingenieria y Ciencias, Monterrey 64849, Mexico
4
Department of Electronics, University of Peshawar, Peshawar 25000, Pakistan
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(2), 425; https://doi.org/10.3390/s18020425
Submission received: 2 October 2017 / Revised: 12 January 2018 / Accepted: 22 January 2018 / Published: 1 February 2018
(This article belongs to the Special Issue Advances and Challenges in Underwater Sensor Networks)

Abstract

:
Exploring and monitoring the underwater world using underwater sensors is drawing a lot of attention these days. In this field cooperation between acoustic sensor nodes has been a critical problem due to the challenging features such as acoustic channel failure (sound signal), long propagation delay of acoustic signal, limited bandwidth and loss of connectivity. There are several proposed methods to improve cooperation between the nodes by incorporating information/game theory in the node’s cooperation. However, there is a need to classify the existing works and demonstrate their performance in addressing the cooperation issue. In this paper, we have conducted a review to investigate various factors affecting cooperation in underwater acoustic sensor networks. We study various cooperation techniques used for underwater acoustic sensor networks from different perspectives, with a concentration on communication reliability, energy consumption, and security and present a taxonomy for underwater cooperation. Moreover, we further review how the game theory can be applied to make the nodes cooperate with each other. We further analyze different cooperative game methods, where their performance on different metrics is compared. Finally, open issues and future research direction in underwater acoustic sensor networks are highlighted.

1. Introduction

The Earth’s surface is 70% covered by water, where vast amounts of resources lie unexplored. Recent developments in sensor network technologies and emerging underwater sensor networks (UWSNs), have made the development of underwater applications feasible. The importance of underwater applications is attracting the attention of researchers which in turn has led to the rapid growth of research within various areas in Underwater Acoustic Sensor Networks (UASNs) [1]. UASNs comprise sensor nodes capable of sensing, processing and communicating the sensed data to the appropriate destination which are deployed underwater for an effort in backing vast range of applications in collaborative monitoring tasks [2,3]. Recently, many researchers are focusing on how to develop different underwater applications to support the lives of living organisms underwater and even those that are living on the sea floor by the use of collaborative, cooperative and frequent monitoring of underwater environments [4]. Recently, the frequent occurrence of disasters such as the sinking of USS ship name missing [5,6], the Kursk submarine disaster in Russia [5,6], the recent search for survivors of the Argentinian submarine ARA San Juan, and the Deepwater Horizon oil leak in the Gulf of Mexico [6], have encouraged several research teams to carry out various oceanic monitoring applications of UASNs such as oceanic surveillance applications [7], environmental monitoring, chemical exploration, military applications, and safety applications [4].
In UASNs, the exchange of information is the primary goal, and it can be achieved among the nodes within a stipulated network coverage area or outside the network coverage using a gateway device (e.g., sink). Underwater sensors are usually energy constrained since the nodes are battery powered. Therefore, to conserve more energy, transmitting packets in several small hops is helpful. By combining more underwater applications from private companies, government and non-government organizations, a single authority network would not be feasible. Therefore, the network can benefit from multiple authority network, where energy consumption can be reduced by cooperation between different authorities to forward the packets to the surface station. Also, packet delivery reliability can be improved and enhanced by cooperation between authorities. However, a new challenge may arise, where a single selfish authority or node can exploit the cooperation behaviors or in case of a malicious authority the data security can be threatened.
In these regards, cooperative communication techniques providing reliability in packet delivery for UASNs remains unexplored [8]. Acoustic waves are capable of being transmitted through the water to distances that are operationally significant. Because of this, sound is the physical phenomenon used for underwater communications. In underwater applications, an acoustic signal is a sound waveform which is usually produced by transducers. Even with noise and uncertainty, an acoustic signal processor is capable of extracting information from the acoustic signal [9]. In UASNs, sensor nodes are wirelessly interconnected with one or more underwater sinks (UW-sinks) via acoustic links. UW-sink can be connected with sensor nodes by two methods, either through direct links (DL) or through multi-hop (MH) paths [10]. These underwater sinks are responsible in relaying the sensed data collected from the sensor nodes situated in a particular location in the ocean to the surface station [11] as depicted in Figure 1 [11,12].
Each UW-sink is mainly equipped with some form of transceiver such as horizontal transceivers, which are used by underwater sinks for communicating the configuration data and commands with sensor nodes (UW-sink to sensor) and also collect the sensed data (sensor to UW-sink). Vertical transceivers are used by UW-sinks to relay the collected data to the surface station. Since the ocean can be as deep as 10 km, the range of vertical transceivers must be longer than that of the horizontal transceivers as used in deep water applications [11]. Parallel number of communications usually occur in multiple forms from the sinks that are deployed, therefore, to handle these issues the surface station has been equipped with an acoustic transceiver. The surface station can also communicate to the onshore sink (OS-sink) or surface sink (s-sink) using longer range of the radio frequency (RF) or satellite transceiver. There are many challenging factors which characterize the unique features of UASNs. These factors are:
(1)
Sensor nodes are energy constrained because they are battery powered.
(2)
The propagation delay of acoustic channels is five orders of magnitude slower than RF signals in terrestrial channel due to low speed of sound which is 1500 m/s.
(3)
The bandwidth is limited and depends mainly on the distance because of high transmission loss with high frequencies and high environmental noise with low frequencies [13].
(4)
Nodes are prone to failures due to corrosion and fouling.
(5)
Fading and multipath problems make the acoustic channel impaired severely [2,3].
Formation of shadow zone and temporary loss of connectivity in a region where the reception of underwater signal is impaired due to fading and multipath. As the networks become highly populated and more congested, cooperative communication methods grow rapidly and gain attention as a way in which distributed nodes in sensor networks or ad hoc networks with multiple antenna systems can cooperate to achieve performance gains [14]. The unique characteristics of underwater channels make communication very challenging as the underwater nodes cannot directly use the protocols designed for wireless terrestrial scenarios [15,16]. In some underwater applications where autonomous underwater vehicles (AUV) exist, due to the high mobility of AUVs, cooperation within the nodes can be a major challenge which affects the overall performance of the network [17]. However, addressing AUV mobility challenge is not within the scope of this review.
Cooperative forwarding (routing) can be achieved when the nodes involved in the routing vector agree to participate and cooperate with each other. However, the possible existence of malicious nodes in the routing vector makes cooperation a very challenging issue. It is necessary to provide a suitable cooperative mechanism across multiple authority networks specifically designed for an UASN in order to achieve an effective cooperative performance among sensor nodes in UASNs. Underwater networks are more vulnerable to malicious activities due to their challenging characteristics such as high BER, high propagation delay, and low speed of sound, corrosion and bandwidth limitation with its dependency on both distance and frequency [18]. Although, several cooperative techniques have been proposed, more research is needed in the aspect of cooperation to guarantee the reliability of data packet transmission over a network between the sender to the target, as there might be possibilities of having malicious, compromised or selfish agents along the transmission path that would attack, compromise or damage data packets.
In this paper, we aim to investigate game theoretic strategies to support node cooperation in UASNs, in order to secure and effectuate data packet transmission over multiple authority networks. A game theoretic cooperation evaluates players’ cooperation by modelling a two-person game and determine their level of cooperation based on their utilities (payoff) obtained in the game. Therefore, we have conducted an extensive investigation reviewing various factors affecting cooperation in UASNs where network consist of normal and malicious nodes. We study various cooperation techniques used for UASNs from different perspectives while concentrating on security and present a taxonomy for underwater cooperation. We further analyze different cooperative game methods, where their performance on different metrics is compared. Considering the game theory based cooperation, we extensively analyzed the most common methods and provide comparative tables of the existing methods. To summarize, the contributions of this paper can be highlighted as follows:
  • We conduct a comprehensive review of different factors affecting cooperation in UASNs.
  • Various techniques that are used in UASNs are presented and summarized from different perspectives and a taxonomy for underwater cooperation is presented.
  • We further analyze different methods and compare their performance using different metrics in which our analysis shows that cooperative game theoretic based approaches are the most suitable and promising methods to provide cooperation in UASNs.
  • We also discuss open issues and future research directions in UASNs.
The remaining parts of this paper are divided as follows: Section 2 presents the background on UASNs and related issues. A comprehensive review on cooperation in UASNs is presented in Section 3. Taxonomy of UASNs cooperation is described in Section 4. Section 5 presents the summary and discussion of the paper, and the conclusion of our work together with open research issues in UASNs and future research direction are presented in Section 6.

2. Underwater Acoustic Sensor Networks

The field of underwater acoustic networks has attracted a lot of attention in the research community, recently. Many applications such as environmental and pollution monitoring [2,19,20], oceanographic data collection [2], distributed surveillance [17], oceanic sampling [21], offshore exploration [2,20], disaster prevention [2], mine reconnaissance [2] among others are developed. However, there are many challenging issues that contribute to the UASNs performance degradation that include high energy consumption, loss of connectivity, security, routing and cooperation [20,22,23]. These issues in UASN are not well investigated in comparison to other applications such as those in Wireless Sensor Network (WSN) and Mobile ad hoc Network (MANET) applications. However, it is nearly impossible to apply those mechanism on UASNs due to their unique characteristics. Some of the distinguishing factors between terrestrial WSNs and UASNs are summarized in Table 1 and are as follows:
  • WSNs use Radio Frequency (RF) and UASNs use acoustic signals (sound waves).
  • Due to the low bandwidth and using high power amplifiers to produce significant acoustic pressure, UASNs consume more energy compared to its counterpart WSNs for terrestrial environment.
  • The high delay of acoustic signals is five orders of magnitude greater than that of RF in WSNs.
  • Bandwidth of UASNs is limited for some certain range and depends on both frequency and distance which is contrary to the WSNs.
  • UASNs suffer more from connection problems due to high BER and multipath problems compared to WSNs.
Meanwhile, several works have been conducted targeting how to achieve cooperative communication, but reliability remains a major component of secured cooperative communication that is missing [24]. Cooperative communication can be achieved once the nodes involved in the source to destination path cooperate to support the delivery of packets. However, cooperative communication does not guarantee reliability of the data packets [25]. In fact, underwater data collection and reliable communication are challenging tasks. One of the promising solutions to these problems is to use underwater vehicles, which would move around the deployment area of the sensor nodes and collect their sensed data. However, planning the path for underwater vehicles to maximize the amount of data gathered and minimize the amount of time taken to travel in a particular region then becomes another challenge. The authors in [17] designed a behavioral approach based on cooperative forms of algorithms in which they used an underwater autonomous vehicle that is equipped with mobile sensor nodes. They were able to follow rules targeting a completion of a particular mission that is capable of maintaining the network connection link. Their proposed algorithm is robust and could improve the performance in terms of coverage and connection loss within the vehicle in underwater. It can also protect the communication from the denial of service (DoS) attack reactively. These types of cooperative algorithms are usually relied on availability of some information toward other types of sensors and such information may not necessarily be trustworthy and complete. However, sometimes they have been considered trustworthy for underwater oriented applications communication [17]. A schematic representation of cooperative based architecture for UASNs is illustrated in Figure 2 [11,12].
In [18], an automatic repeat scheme based on a particular request for communication in an underwater scenario is proposed, where they used cooperative device nodes for source–destination reliable path identification. It defines and provides alternative paths to certain connections of source–destination, which rely on the inter-node available information and the distance between source–destination and all other possible cooperative nodes available along the path. Upon receiving of any kind of packets that are erroneous (lost or dropped), the receiver would request the retransmission of that packet from the closest cooperative neighbor node . However, this has a high delay since at every time the node needs to buffer the packet for retransmission [26]. Thus, both the Automatic Retransmission reQuest (ARQ) and Stop and Wait (S & W) protocols suffer from long underwater propagation delays, therefore, they are not suitable for ensuring reliability in underwater cooperative environments that would result in better achieved performance.
A cooperative technique which uses virtualization of sensor array from source–destination by adopting the benefits of Multi-input Multi-output (MIMO) systems in diversity space is proposed in [27]. This study adopts two protocols called decode and forward (DF) and amplify and forward (AF), which are cooperative protocols. When the relay node receives the signals, it decodes and forwards them to the destination node. As the source node sends the signal to the relay, it would decode them first and then forwards the decoded signal to the final destination in the DF protocol. Similarly, in the AF protocol, the relay node performs amplifying actions on the received signal and then forwards the amplified signal to the destination node. They provide two methods of transmission, first the direct transmission which is between source-destination and the second is signal transmission which includes the relay node [27].
A study of underwater AF and underwater DF that provides an improvement in the performance of BER in underwater for different configuration channels is presented in [25]. In this research, the focus is on providing reliable communication in which the authors study different underwater applications in three dimensions with cooperative transmission. Moreover, they introduce a hybrid method of forwarding in which the relay nodes have some flexibility and responsibilities of selecting the best scheme for transmission between underwater AF and DF. In order to forward the packet, a source node may look for and locate the relay node that would help the node by forwarding to a certain depth. Upon reception of the packet by the relay node, it would automatically adopt certain forwarding scheme based on the proper conditions of the underwater channels. Thus, these schemes do not provide a mechanism to select the appropriate relay node in a 3D underwater environment. Moreover, it does not take into consideration the energy consumption and the problem of having more than one relay node in the source–destination path. In [28] the authors introduced a cooperative authority method in order to maximize their energy underwater. It is demonstrated by different authorities that cooperation in forwarding the packet of other authorities achieves a maximum lifetime. Thus, the authorities that are selfish exploit the behavior of other cooperative authority. This method of cooperation was investigated by the concept of game theory, i.e., evolutionary game, in which they perform some simple analysis to show an achievement in cooperation even without an incentive mechanism. However, the major drawback of this work is not taking into consideration the mobility of nodes, which results in a dynamic topology and multipath.
A study of network topology for multi-hop communication through diversity of cooperative transmission is introduced in [29], which demonstrates a better multi-hop performance as compared with its direct transmission counterpart. It also reveals that based on a certain distance and some predefined frequency range, multi-hop communication can achieve better performance in cooperative transmission, but this method suffers from multiple node interference (internode). In [30] a centralized position cooperative algorithm was designed which is used for automatic identification of a direct path, and it has demonstrated that it can efficiently achieve cooperative positioning for underwater scenarios. In [31], an autonomous distributed target tracking for cooperative sensor networks that works in two aspects is introduced. The first aspect is an intelligent system for gathering target information of autonomous vehicle behaviors using a control system, and the second aspect deals with a novel approach of multiple functions behavior-based objects using an autonomous vehicle control system with reactive control of multiple environmental constrains. However, it does not consider moving nodes (i.e., mobile sensor nodes) in detecting the target node and tracking vast number of sensor simultaneously, thus, it is not suitable for underwater applications.
UASNs are vulnerable to malicious activities due to the communication medium. Several different types of attacks can be targeted on UASNs such as jamming attacks on the physical layer, acknowledgment spoofing in the link layer or sinkhole attacks and selective forwarding in the network layer.
Figure 3 illustrates how malicious nodes affect the performance of cooperation in UASNs [22,32]. In this scenario node S wants to send message to node R. Node S chooses to send the packet to node n1 as a relay which is inside the routing vector toward the destination. Node n1 initially forwards the packet to n4, and it happens that n4 is a malicious node and n4 drops the packet. Node n1 notices that n4 is malicious, thus n1 sends a message to all its neighbors that n4 is malicious, and n1 selects n3 as a forwarding node which relays the packet to R (destination) [32].
Game Theory-Based Analysis (GTBA) proposed by [33] is an incentive-based cooperative method designed to solve the cooperation issues among regular nodes and malicious nodes. However, GTBA has not considered several attacks such as malicious node attack which makes unsuitable for UASNs. In [24], authors proposed a routing protocol for secure routing in which they utilize the primitive cryptographic concepts for the UASNs mobile nodes and fixed nodes. In [32] authors proposed a Dynamic Bayesian Signaling Game (SRPDBG) model to enhance the routing security to achieve a successful packet forwarding among nodes where they analyze regular nodes and malicious nodes. However, their approaches did not address cooperative mechanisms for end-to-end packet delivery in UASNs.
A game theory approach described in [34] provides a solution to the problem of network security in MANETs which prevents conflict between sensor nodes with high mobility in terms of cooperation. The similar approach is applied in various fields such as computer networks, political science, behavioral biology and economics. In another work, a vector machine in support of attack detection and identification of malicious nodes in underwater wireless sensor networks (UWSNs) was proposed by [18].
Souza et al. [35] discussed an energy evaluation scheme for varieties of digital signature approach to achieve authenticated forwarding and discussed suitability of using digital signature for UASNs despite its challenging features and characteristics. They adopted the concept of cryptographic mechanism of PKCs to achieve confidentiality and authentication. They also evaluate varieties of schemes for digital signature used in UASNs, where they classified them as short and long signature, however, the scheme only focuses on the efficiency of power consumption [35].

3. Cooperation in UASNs

Cooperative communications, in UASNs, remain a challenging concept due to the unique features of UASNs, thus, some of the protocols designed for MANET and WSN cannot be directly applied to the underwater environment. Researchers in [14] conducted an analysis for propagation error in underwater cooperative multi-hop communication, where they examined the expected gains of multi-hop communication. Cooperative multi-hop communication in UASN is illustrated in Figure 4 [36].
A data collection method based on coded cooperative OFDM for an underwater dynamic network is developed by [37], where a mechanism of coded cooperation based on selective relay and dynamic network protocols were proposed. The study of least square cooperative localization for UASNs was proposed by [38]. In their approach, the performance metrics like consistency, coverage and efficiency were analyzed in cooperative localization least square to quantify the localization accuracy deviations.
However, the authors proposed distributed algorithms for least square cooperative localization in which the squared-range is integrated by passing the message to a localization network. Moreover, Ref. [39] proposed paths for data collection of mobile node for cooperative UASNs in order to increase the efficiency of data collection for nodes on the surface station. In [17], an autonomous cooperation of mobile sensors in UASN has been studied, where a novel cooperative algorithm is presented in which every autonomous underwater vehicle (AUVs) is equipped with mobile sensors. Moreover, the algorithms take into consideration the maximum communication constrain between the agents based on communication range. A motion algorithm based on the control is decentralized to enable every vehicle to perform some maneuvers in order to achieve minimal error of acoustic source localization. Every autonomous vehicle in an underwater environment is equipped with a hydrophone array custom designed for it to perform some bearing angle measurements between an acoustic source and an array.
Acoustic cooperative transmission for underwater communication that utilizes cooperative communication is proposed by [40], where various schemes of transmission for cooperative underwater communication which are specifically designed for communication that uses radio signal were analyzed. By considering the sound speed they also developed a new cooperative scheme for wave transmission, where they applied the concept of AF protocol along source–destination. These cooperative underwater transmission techniques reduce the limitations of the channel and improve the acoustic underwater channel throughput.
The acoustic channel is characterized by long propagation delays and high BER. Therefore, it is challenging to design an efficient energy consumption method to achieve reliability in data transfer for time based applications. To overcome this issue authors in [41] proposed the Multi-path Power-control Transmission (MPT) scheme that improves the performance of the network in terms of energy efficiency, delay and low error rate of packet forwarding. MPT uses a scheme that combines the method of power-control with the method of multi-path forwarding. Moreover, the destination combines the packet received and the storage is designed for power-control. As it does not require retransmissions of packets, it uses less energy compared with its counterpart schemes using single path transmission. MPT also achieves less delay since it does not use a hop-by-hop transmission scheme. However, MPT does not solve the long delay problem of UASNs.
A cluster method for achieving cooperative communication is studied and analyzed by [42] where they use sensor nodes in every cluster for gathering of data related to a particular deployment area and forward the gathered data to the cluster head (sink) in a collaborative and cooperative manner. Several sensors are modeled as a dependent variable that are randomly dependent on both realization of noise and channel in which the optimization issues of multi-variable is formulated for minimizing the total consumption of energy. Moreover, an investigation for energy efficiency which is affected by power transmission allocation was conducted. However, the method can only work on a homogeneous network with the same parameters. Acoustic distributed monitoring was implemented in the novel work of [43] that is based on storage of sensors and a trace system of data retrieval for a particular application domain which is designed for recording or storing of data in acoustic networks. They used a scheme of recording in a cooperative pattern and a mechanism of storage balance distribution for resolving the challenges of the large volume of storage and acoustic sampling with high frequency, but this scheme does not solve the unreliability problem for underwater communication.
A system of cooperative storage developed by [44] aims to maximize the overall storage of a distributed node system that is disconnected. It uses data mules to forward the data among nodes in an opportunistic network. However, the method does not consider the collaboration of several mules for cooperative underwater monitoring. Moreover, the policies for the replacement of data to have flexibility in the information, not only the data which is already stored, is not considered in the paper. Analysis of multi-hop cooperative propagation is presented in [14] in which they study the most common issues of propagation errors in multi-hop and compared it with its Direct Transmission (DT) counterpart which reviled that Multi-Hop (MH) can provide higher cooperative underwater packet forwarding than DT. This analysis was conducted using a Markov grid and linear networks, however, as the scheme does not work with a multi-channel environment it is inadequate for underwater scenarios. In [45] the authors proposed sensor robot cooperative techniques for underwater monitoring activities. They designed an architectural based system to provide control support for power navigation using cooperative algorithms, mulling data application and cooperative experimental navigation characterization that support long monitoring of underwater robots. A survey of comprehensive localization schemes is presented in [46] that classified the algorithms based on three components of the mobility in the sensor called mobile, stationary and hybrid algorithms. Furthermore, an analysis and comparison of algorithms for localization was performed to determine the direction of future research in underwater. However, they did not cover collaboration among nodes that may result in cooperation that makes it unsuitable to achieve cooperation in UASNs.
Location identification of sensor nodes in UASNs is an important aspect of cooperation. In this context the authors in [47] introduced a free anchor localization method for UASNs. They analyzed and concluded that the existing methods using GPS are not suitable for underwater localization. They also designed UASNs active-restrict to solve the problems of GPS which does not require the node information, but uses the node adjacency relationship for localization and is used in dynamic and static networks. However, there is no cooperation between distinct characteristics of communication in underwater and it is also not suitable for reliable cooperative communication in an environment like underwater. In this section, we provided a broad view of cooperation in UASNs. We have discussed some related works and the weaknesses of each method. In the next section, we take a closer look at the cooperation in UASNs by categorizing the existing works and analyzing them in more details.

4. Taxonomy of Cooperation in UASNs

The taxonomy of cooperation in UASNs is presented in Figure 5, where it is classified into three main categories which are reputation-based, price-based and game theory-based cooperation. This review mainly focuses on the game theoretic-based cooperation aspect, providing a thorough investigation on the current literature in cooperative game theory applied to UASNs to reveal the most suitable cooperation techniques to ensure reliable cooperation in UASNs.

4.1. Reputation-Based Cooperation

Reputation is a mechanism used to determine the trustworthiness of an individual node that is involved in an ad hoc routing process. It is employed in various fields of underwater research that require successful packet forwarding among nodes. It detects the historical behavior of the opponent for decision making as well as future behavior expectation prediction under uncertainty based on trust [48]. It has been used for different scenarios to demonstrate the degree or level of trust among the variety of participants in a cooperative domain, and to apply some punishment methods for non-trustworthy nodes based on some stipulated threshold level. It can also be applied in the determination of the trustworthy routes, which do not contain malicious nodes in the route [49]. A reputation system cooperation can be achieved by evaluating the trustworthiness of each node using the behavior of such node and use the reputation values to detect the misbehaving nodes. Every node can maintain their reputation table record regarding the other nodes reputation values, where they used a threshold to differentiate between the cooperative nodes and misbehaving nodes [50]. Cooperation can be achieved when the involved node attains the high reputation values (cooperative node) and whenever the node obtains a value lower than the threshold, it is considered as misbehaving node. Every cooperative node with high value of reputation can be selected as a relay for routing a particular packet to the target [51].

4.1.1. Direct Reputation (First-Hand)

A direct reputation (first-hand) is a system in which a particular node observes the behavior of other nodes, and based on the observed reputation, the node calculates the reputation value of other nodes and store it in the reputation table. The node punishes the nodes with low reputation value (below the threshold) that are detected by isolating them from the network and not using them for information exchange based on a particular reputation system [52]. In [53,54], authors allow a particular node (ender) to select the relay node that has high reputation as the next-hop in order to route the packet to the target node to achieve maximum cooperation and reliability. In OCEN [53] they do not accept (second-hand) indirect reputation observation forms of information, but rather they use a direct observation to achieve a secure cooperation. In [55] authors introduced the idea of expanding the node behavior observation scope to more than one hop.

4.1.2. Indirect Reputation (Second-Hand)

An indirect reputation is introduced by [56,57] that allows the periodic exchange of the observed behavior of a node with other nodes. In CONFIDENT [58,59] and CORE [56] there is a monitor module that continuously observes the behavior of the neighboring nodes in the network. This module detects the misbehaving nodes and broadcasts an alert about them to other nodes. When other nodes receive such alert, they delete them from their list; so that, they will be gradually isolated from the network. Although, most of the common methods of adjusting the reputation can be either by linear method [55] or by nonlinear method [57], the selfish clever node may maintain a high reputation threshold by forwarding other node’s packet which makes it undetected. In [57], a reputation-based method that uses direct reputation information so that each node can maintain the rating and information about the reputation of other nodes is introduced. Furthermore, they designed a reputation-based approach which takes into account the indirect reputation and accepts the modified reputation rating information. A reputation information-based rating with indirect reputation compatibility for trust updating and rating is proposed in [60], where the historical behavior of the opponent node is captured and the expected future behavior for such opponent node is predicted by the use of trust. In reputation based approaches, usually two forms of information are obtained, one is obtained by interacting directly to the neighbor (intermediate) and the other is obtained by the direct neighbors’ aggregation.

4.2. Price-Based Cooperation

A price-based cooperation is one of the classifications of underwater cooperation that relies on the price (i.e., virtual currency) system in forwarding the packet form source to destination via intermediate nodes. Price-based cooperation techniques consider forwarding packets similar to transaction services which use virtual credits (virtual currency), in a way that every node that provides the forwarding services should be “paid” by the node that receives the service [60]. In price-based methods, a node that requests the service should pay the node that provides such a service and the payment can be in the form of points, money or any kind of valuable objects [61,62,63,64]. Nuglet is one of the price-based methods introduced in [61], where every forwarding action requires credit in the forms of nuglets for managing transaction services. A study to determine how such credit should be used and evaluated is investigated in [63] which identifies the method to evaluate the price to encourage cooperation among nodes in UASNs. In [65], authors proposed a defense method to avoid cheating in providing forwarding services, i.e., a node may receive the credit and deny service or request a credit for fake services. In [62], an analysis of incentive scheme based on the trust management for allocation of resources problem for collaborative network in a context of intrusion detection is introduced. They formulate the related and relevant cooperative game where they obtain the Nash equilibrium of the game by using their proposed dynamic algorithms.

4.3. Game Theoretic-Based Cooperation

Game theory is a well-developed field of mathematics which is a suitable way to analyze outcomes of group behavior players are basically rational. A rational player chooses an action that maximizes its outcome given its belief about other players’ preferences. The game analysis predicts the final outcome when rational players play against rational players. They provide information and instructions to determine the attacks, but they are unable to provide concrete solutions to the identified problems [66,67,68,69,70,71]. In [49], authors study various game theory approaches and their impact on network security applications. They provide solutions to a vast number of problems in network security based on an approach based on the theoretic concept of games. The authors in [69] classified and categorized various number of attack strategies against UASNs. According to [48] “reputation- based Bayesian game is type of game described as a non-zero-sum game where players can compute payoffs for each action based on reputation and estimated degree of the opponents”.

4.3.1. Repeated Game or Decision Making-Based Games

Game theory uses mathematics to express the phenomena of decision making among more than one agent [68]. It focuses on providing a mechanism for optimality in the network as well as providing reliability in the cooperative routing and forwarding the packets. All players in this type of game are usually assumed to be completely biased in that they only focus on their expected gain in the particular strategic game [72]. The authors in [73] use game theory to model the interactions between a society of agents as a repeated game. They analyzed distributed search for resources in networks where agents interact with each other and offer services and consume these services. They have associated a cost to every agent in a non-homogeneous manner to study which network structures are more appropriate to promote cooperation. These forms of security problems are mostly addressed in the forms of attacker (i.e., malicious node) and defender which can be either transceiver or the receiver using a repeated game. It is a decision-making (DM) game such that a DM has advantage or information about the opponent player. It can also be a collaboration toward achieving a particular target if the decision making cooperates in a coalitional or cooperative game. The game of interaction among players can be modeled in a way to improve the privacy of both players in the game. A game of incomplete information can be modeled to evaluate the issues of the repeated game, which can contain simultaneous movement of players. Because these incomplete information games are dynamic, there is always a trade-off in terms of privacy and trust in the game of theoretic concept which is based on the trust formulation [34]. Some forms of game classes can be applied to the dynamic uncertainty in which the domain of uncertainty can be modeled and represented as a decision process in the game [74]. An algorithm for path planning based on scheduling proposed in [75] overcomes the Traveling Salesperson Problem (TSP). It provides a multi-node communication and improves the performance of path selection. To achieve this, there is a need for a robust protocol for scheduling that solves the problem of channel interference and variation. Mathematical comparison of repeated games approaches is presented in Appendix A. Repeated games permit a drastic defect that allows the players to behave selfishly and obtain maximum payoff (Nash Equilibrium), and there is no sufficient punishment to the selfish participant, which makes it not suitable to encourage cooperation in UASNs.

4.3.2. Dynamic Bayesian Game

In [32,76] the authors proposed an enhanced secured routing scheme using a concept of signaling game in dynamic Bayesian model in which they analyze the regular strategy profile of malicious nodes and how to protect the nodes from anonymous behavior. The authors in [77] proposed a Secure and Distributed Reprogramming Protocol (SDRP) which uses identity-based cryptography to reduce the storage requirement and communication of every node based on secure reprogramming. A convergence in terms of true cooperation for Bayesian game was designed in [48], which uses the concepts of reputation values to analyze the payoff for the game. They define two different types of participants, honest type and dishonest type. They illustrate the sustainability of true cooperation based on repeated game even on the dynamic application, and there is an increase in the average players’ reputation over a given time in a certain coverage.
A routing model based on the concepts of a dynamic Bayesian game was proposed by [78] where they analyzed routing concepts theoretically to fill the gap between decision making of non-simultaneous and information history which is also incorporated in the process of theoretically routing modeling in the approach of game theory. However, the problem with this approach is that it does not provide the practical test of different functions of utilities and the probability distribution in the game on different parameters of networks such as node mobility rate and selfish node in order to have fair comparison with existing works. A scheme for secure and robust routing is proposed in [79], where an interaction between sender node and receiver node was modeled on the basis of a game model. In this work, a dynamic Bayesian game were used based on node opinion about the opponent in which the destination node established the mechanism of acknowledgement for the reception of the packet from a participating node in the game. Jiang et al. [80] proposed a scheme based on the game theory of interaction, coding theory and establishment of trust for the restriction of attacks and colluding. In these schemes, the message availability is guaranteed whenever there exists a legitimate path. This scheme also shows that it achieves efficiency in terms of latency, energy consumption as well as availability of paths, but the scheme does not provide reliability of message delivery among nodes.
In [81], Jin et al. studied, analyzed and addressed a vast number of privacy and security problems for different applications in computer science such as mobile and network applications, where they organized their work into several modules that addressed a particular problem in the aspect of security. They also designed a mechanism for security and conducted an analysis under equilibrium, where they highlight the advantages and disadvantages of game theory. However, the work only covers the theoretical part, which is helpful in terms of developing solutions to the problem of security of the network using a game theory approach [34]. An access based on point pricing modeling for dynamic game is proposed in [82], where they modeled a two-person game between the access point owner and client, in which both have some set of symmetric information. However, the client has more information than the owner of the access provider. It is found that a client has a utility function which is the web browser and the Nash equilibrium which enables the provider to take advantage of the client and change the constant price charge for the client for a given unit of time. A majority of the security game classes define a two-person strategic game where one of the players would act as an attacker trying to hack and damage the system in order to degrade the performance. However, in this study the game is different due to the fact that the game is an n-person strategic game, where all the players are rational, and these players always prefer to take actions that would benefit them. Mathematical comparison of Bayesian games are presented in Appendix B and Appendix C, where the papers in Appendix B take all the cooperation metrics into consideration such as payoff calculation, player strategy profiles, player best response, player belief, payoff matrix and Nash equilibrium, and the papers in Appendix C only considered three cooperation metrics such as payoff formulation, player belief and Nash equilibrium. This class of game is the most suitable for maximizing cooperation in UASNs since players must cooperate with their opponents to obtain maximum payoff (utility). The degree of cooperation among the players is always equal to the degree of their payoff. Therefore, the more players cooperate the more degree of payoff would be and vice versa. All the players of this game are assumed to be rational and they only focus on maximizing their expected payoff at all times.

4.3.3. Evolutionary Game

In [71] an Evolutionary Game-Theoretic (EGT) approach is proposed, where they study trust decision and its dynamics to illustrate the evolutionary process of sensor nodes (SNs) in selecting their action and approaches that can lead the SNs to choose the action trust as their final behavior. The authors in [51,83,84] proposed an intension recognition-based method that employs a repeated dilemma special context and evolutionary game, where the internal dynamic trust of intention recognizer and opponents were assessed. Moreover, they use direct interaction method of the past to predict their opponents’ next move, and as a result they are able to prevail on the famous cooperative strategy of the repeated dilemmas. A model of adaptive trust on the basis of Request as well as Authentications (ATRAM) was proposed in [50,85], where a game theory and the information history of interaction within peers is employed. The proposed scheme guarantees secure data transmissions in a mobile peer-to-peer network regardless of whether each of the peer node can have access to the trust information about the peer and risk information about the other peer or not. The scheme has been further categorized into four types of models that are called game-based, trust-based, risk-based and role-based. In [86,87], an analysis of game theory which defines the factors of adaptive and cooperation development using EGT is proposed. It utilizes the assumption for zero-state information and non-zero state information between peers (i.e., trust value and risk). The designed model ensures that the priority is given to requested peers for a connection with a peer of resource. However, due to trade-off in terms of performance and security aspects, this model does not adequately address reliability of data packet among nodes. A comparative table of equations applied in evolutionary games is presented in Appendix D. Moreover, in this class of games rational behavior of a player can be possibly combined with pure strategy for enhancing the characteristics of their population (authority or group) and since players are not rational players this method is not suitable for UANSs cooperation.

4.3.4. Bargaining Game

In a bargaining game, the problem is usually modeled and represented as two agents (competitors) that might cooperate with one another. This game is also known as a Nash Bargaining Game (NBG) which is modeled on the concept of an interaction bargaining among two agents (players) that would seek (request) for the benefit of the same fraction [88,89]. Resources allocation in a communication networks can be modeled using bargaining game, where the players are targets to exploit a spectrum for the same benefit that would be allocated among the players fairly. In NBG, whenever there exists a number of requests that exceeded the resources that are available from the two agents or players, such requests would be discarded. However, if there exists a request from those agents that does not exceed the available resources, such requests would be completely accomplished. Pareto-inefficiency occurs because of non-cooperative players which is solved in NBG solution. In the method proposed in [90] the resources must be enough to satisfy both of the players’ requests. When all their requests are granted other requests would be discarded and this is the main problem with bargaining game. Hence this class of game does not provide suitable cooperation in UASNs. A comparison of bargaining games is presented in Appendix E.

4.3.5. Coalition Game

A player’s best response is an action chosen by the opponent player which would lead or enable the player to maximize his/her payoff or achieve maximum payoff or Nash equilibrium of the game (coalition value) [88,91]. A Nash equilibrium is a vector in payoff matrix where both the players have achieved a maximum payoff (i.e., all players reach their highest payoff). A player’s best response can only emerge if and only if the action chosen by an individual player results in the maximum payoff or expected gain of the opponent player [92].
Due to the facts that both players are assumed to be rational, they are expected to be biased in selecting actions that will favor them to have a maximum outcome at the end of every round in the game. The players are biased in the sense that they always consider themselves as a priority [24,93]. In coalition forms of game, it can either be in partition forms or strategic form. In a partition form of coalition, the players participant number would be determined by the coalition value which is regardless of establishment of the network [72]. A comparative table of equations applied in coalition games is presented in Appendix F. However, this class of game depends on how many participants are playing the game (coalition depends on participants) instead of the establishment of the entire network, which makes it not suitable for UASNs cooperative communication (routing).

5. Discussion and Summary

In this work, we have considered the cooperation issues in UASNs that would degrade the performance of the network which is mainly attributed by the presence of malicious or misbehaving nodes in the routing vector (source-destination path). We conducted a comprehensive review for investigating different factors affecting cooperation in UASNs. We study various techniques used in UASNs from different perspectives and present a taxonomy for underwater cooperation. We further analyzed different game methods and compared their performance using different metrics, in which our analysis shows that cooperative game theoretic-based approaches are the most suitable and promising method for providing cooperation in UASNs. A comprehensive summary of different game approaches is presented in Table 2, which summarizes the addressed problems, the applied methods, the main contributions and their limitations. In summary, based on our study there is no work that has high performance in all the metrics we have analyzed as shown in Table 3. In Table 3, a Yes means the paper considers that issue and solves it to a certain level (degree), and No means that the paper does not, in any way, solve that issue.
An analysis and evaluation of existing literature works is highlighted in Table 3 where many metrics are compared and it is demonstrated that there is a gap which need to be filled in order to achieve maximum effective, efficient and reliable cooperation among nodes in UASNs. However, there is a need for providing an efficient cooperative mechanism that would take all the performance metrics into consideration by maximizing packet delivery ratio, coverage, selfish detection, security and reliability, at the meantime minimizing energy consumption, delay and routing overhead.

6. Conclusions, Open Issues and Research Directions

In this work, we have conducted a review investigating different factors that affect cooperation in UASNs. We study various techniques applied in UASNs from different perspectives and we present a taxonomy for underwater cooperation. We further analyzed different game methods and compared their performance based on different metrics in which our analysis shows that a cooperative game theoretic based approach is the most suitable and promising method for providing cooperation in UASNs. Games will let the network nodes decide the best options based on interaction through game rules, so a malicious sensor would need to interact using the game rules, and that interaction would not necessarily result in a successful transaction. In contrast, reputation- and price- based techniques would not be so effective in scenarios where malicious nodes come and steal identities from good nodes, since they only need to announce their reputation or price and interchange messages to be considered as reputable nodes. The competition included inherently in games would make it difficult for a malicious node to get trust from other sensors.
Competition brings the best result for all the players, that is why the use of game theory provides a platform for competition under a framework of rules, whereas the other two techniques (reputation-based and price-based are based on bonuses or punishments, thus creating an environment where individuals try to excel (having the highest reputation, or having the best price of a service to be used by others), not necessarily in a cooperative way that benefits more individuals. Game theory on the other hand creates these environments where cooperation achieves a common goal or network objective without the interest to excel individually.
Through our literature review, we have found that none of the current research considers all the performance metrics that are necessary for an optimum network performance. There are many aspects or components which support and contribute to better achieving cooperation performance in UASNs, see last column of Table 2. Therefore, the exploration of those components is yet to be addressed in future research as an integral part of the cooperative game. A suggestion of some of the necessary aspects of the network that need to be included in cooperative game methods and need to be studied further are:
  • Reliability: This is one important aspect to have a reliable successful forwarding and delivery of information among participating players of sensor node in UASNs. It is a key point that guarantees various forms of reliability such as data reliability, hop-by-hop reliability and end-to-end reliability. Cooperative game methods need to consider strategies such as information protection, packet repetition, route redundancy and maintenance, to provide reliability. This means that cooperative methods to be developed need to be extended to include reliability issues such as those mentioned at the same time of performing cooperation. Reliability guarantees a successful delivery of data between players participating in cooperative or collaborative activities. The investigation in this research found that this very important key component of cooperation is missing in most of the current literature in UASNs, and therefore, it is required to come up with a cooperative mechanism that will take this reliability into consideration.
  • Efficiency: Efficiency is strongly required in a communication network to provide an efficient cooperative method and to facilitate cooperation among players. Based on our investigation of the current work, it has been found that there is no scheme, method, approach, or mechanism which takes into account this aspect. Cooperative or collaborative monitoring activities require an efficient mechanism for a successful packet forwarding and delivery in UASNs. Efficiency needs also to be included in cooperative game techniques to use resources that ensure an efficient delivery of information, if not, then the cost of such information delivery will increase, i.e., delays, throughput, integrity of information, etc. The cooperative game methods used that integrate reliability and efficiency, can establish a base on which a quality of service (QoS) model for UASN can be built.
  • Motivation: Since misbehaving (malicious/selfish) that would try to damage, attack, and compromise or degrade the performance of the system nodes might be present in the network, a motivation mechanism is needed to influence and change the behavior of such nodes. Motivation is a way to make nodes react to conditions in order to get more cooperation or to improve network performance. Games have always motivated people based on competition, hence, such motivation can be included so that sensors participate in more cooperative actions for the improvement of network performance. Motivation is very important in cooperative forwarding activities, and providing motivation to misbehaving nodes in UASNs becomes necessary to ensure a successful delivery of data packets among the participating players. These motivations will improve the cooperative performance of regular and misbehaving nodes which will result in improvements in the cooperative packet forwarding processes in UASNs.
  • End-to-End authentication: End-to-End authentication can provide security to the packet forwarding process among participating nodes, and can prevent the data in the packets from being compromised by devious misbehaving nodes. Authentication is important in any network, but when cooperative games are involved, it can be achieved in several contexts. For example, it can be used to authenticate locally in a network by using only previously authenticated one-hop network nodes, but the cooperative games allow to also implement authentication from the perspective of an end-to-end connection. Cooperative games need to be modified to address this context because the process of end-to-end authentication could be accompanied at the same time by reliability (e.g., routing redundancy or delay), by efficiency (e.g., use the right resources that ensures quality) and by motivation (e.g., route competition to choose the best path), in order to deliver a solution with quality to the transmission of information in the network. Authenticating data before forwarding it to the target destination is an important aspect of cooperation that guarantees the security of information forwarding between source and destination in a communication network.

Acknowledgments

This work was supported by the SEP-CONACyT Research Project 255387, the School of Engineering and Sciences and the Telecommunications and Networks Focus Group at Tecnologico de Monterrey. The authors would like to thank the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper.

Author Contributions

Dalhatu Muhammed has written the majority of the manuscript. Mohammad Hossein Anisi, Mahdi Zareei and Cesar Vargas-Rosales have organized the flow of the work and revised and improved the manuscript. Anwar Khan has revised and improved the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Mathematical comparison of repeated game approach.
Table A1. Mathematical comparison of repeated game approach.
Reference[73][34][74][75]
Set of finite agents N = [ 1 , 2 , 3 , , n ] T i , i = 1 , 2 , , N T = ( t i , , t y ) P = [ x v ( 1 ) , x v ( 2 ) , , x v ( T ) ]
Set of neighbor agents N i = [ j | M i j = 1 ] P = [ P ( i , j ) ] S i = n ( S i , a i ) S = X × Y × Z × 2 N
Agent set of action A i = [ σ i , 1 , 2 , , k i , ] V β = [ v β ( S ) ] s S M D P = ( S i , A i , T i , R i ) C ( x v , x n ) = f ( D ( x v , x n ) )
Payoff u i t ( θ i , a i t , a t _ i , S ) = c u i t ( θ i , a i t , a t _ i , S ) = 0 u i ( S ) = u i = ( S i , S i ) u i = x i ( s 1 , a i , s i ) R i R ( x v ) = n N P ( x v , x n ) L ( Y n )
Utility function u i ( θ i , σ i , σ i , S ) = t > 0 u i t ( θ i , a i t , a i , S ) R ( S ( k ) , m , l ) = [ 1 i f m / L k & m l ] x i ( s 1 , a i , s i ) = t x φ ( t , π ) θ ( t 1 , s 1 , a i , s i ) R ( S , S ) = n F L ( Y n ) 1 c ( x s , x s )
History/Set of history H t = U t 0 H t
H t = U t 0 H t
i = 1 n T = T M = t | S i | A i | Z = L ( Y n , Y m )
Set of action profile u i = min max u i ( θ i , a i , a i ) a i A i , a i A i S = [ S i ] i = 1 n
S = [ S i ] i = 1 n
w i ( s i , a i ) 0 s i , a i P * = arg max R ( P ) 1
Payoff vector V : = [ x = ( x 1 , , x n ) F : x 1 u 1 i N ] v β = v a l [ R ( S , V β ) ] x i ( s 1 , a i , s i ) = w i ( s i , a i ) T i ( s 1 , a i , s i ) s 1 , a i , s i c ( x v , x n ) = p ( x v , x n )

Appendix B

Table A2. Mathematical Comparison of Dynamic Bayesian games.
Table A2. Mathematical Comparison of Dynamic Bayesian games.
Reference[32][76]
No of prayers/No of actions2/22/2
Type of actionsamedifferent
SPC & RPC u 1 = ( σ 1 , σ 2 , θ ) = a 1 a 2 σ 1 ( a 1 | Θ ) σ 2 ( a 2 | a 1 ) u 1 ( a 1 , a 2 , Θ ) and u 2 = ( σ 1 , σ 2 , θ ) = Θ P ( Θ ) a 1 a 2 σ 1 ( a 1 | Θ ) σ 2 ( a 2 | a 1 ) u 2 ( a 1 , a 2 , Θ ) u 1 = ( σ 1 , σ 2 , θ ) = a 1 a 2 σ 1 ( a 1 | Θ ) σ 2 ( a 2 | a 1 ) u 1 ( a 1 , a 2 , Θ ) and u 2 = ( σ 1 , σ 2 , θ ) = Θ P ( Θ ) a 1 a 2 σ 1 ( a 1 | Θ ) σ 2 ( a 2 | a 1 ) u 2 ( a 1 , a 2 , Θ )
Strategy Profile of PBE of S & R P s : Θ , u 1 ( σ 1 * , σ 2 * , θ ) u 1 ( σ 1 , σ 2 * , θ ) and P R : Θ , u 2 ( σ 1 * , σ 2 * , μ * ) u 2 ( σ 1 * , σ 2 , μ * ) P s : Θ , u 1 ( σ 1 * , σ 2 * , θ ) u 1 ( σ 1 , σ 2 * , θ ) and P R : Θ , u 2 ( σ 1 * , σ 2 * , μ * ) u 2 ( σ 1 * , σ 2 , μ * )
Belief of their type Θ & message m P B : μ * ( Θ | a 1 ) = P D ( θ ) σ * ( a 1 | Θ ) θ Θ P ( θ ) σ 1 * ( a 1 | Θ ) and P ( θ | m ) = P ( θ ) σ ( m | θ ) P ( θ ) σ ( m | θ )
P ( θ | m ) = P ( θ ) σ ( m | θ ) P ( θ ) σ ( m | θ )
P B : μ * ( Θ | a 1 ) = P D ( θ ) σ * ( a 1 | Θ ) θ Θ P ( θ ) σ 1 * ( a 1 | Θ ) and P ( θ | m ) = P ( θ ) σ ( m | θ ) P ( θ ) σ ( m | θ )
Best Response of S & R α A ρ ( α | m ) μ ( m , α , θ ) and V ( α , σ ) m M θ Θ ρ ( θ ) σ ( m | θ ) v ( m , α ( m ) , θ ) α A ρ ( α | m ) μ ( m , α , θ ) and V ( α , σ ) m M θ Θ ρ ( θ ) σ ( m | θ ) v ( m , α ( m ) , θ )
Payoff Matrix and NashSenders messageNodes typeReceivers actionS messageNodes typeReceivers action
NormalmaliciouscooperateDeclineregularmaliciouscooperateDecline
PSPS1, P−1, P − 1PSPS1, P−1, P − 1
PSSMP, PP, 0PSSMP, PP, 0
SMPS1 − P, 0P − 1, P − 1SMPS1 − P, 0P − 1, P − 1
SMSM0, 0−1, P-1SMSM0, 0−1, P − 1
(PS PS,C) & (SM SM,D)(PS PS,C) & (SM SM,D)

Appendix C

Table A3. Mathematical Comparison of Dynamic Bayesian games continuation.
Table A3. Mathematical Comparison of Dynamic Bayesian games continuation.
Reference No. of PlayersType of Action Payoff Formulation Player Belief Nash
[34]2Same X * : = ( x i ) i n = 1 μ 0 = ( 1 + β ) ω + c m ( 2 α + β 1 ) ω μ i ( S i * , S i * ) μ i ( S i * , S i * ) s i * S i )
[48]2Different f i j = r i j + 1 2 × d i j max d i
μ ( T ( n , δ ) = t = 1 u t ( T ) δ t
f i j = r i j + 1 2 × d i j max d i C t r u e C f a l s e ( D D )
[78] 2Same u x = u ( h j i ( t k + 1 ) , a i , a j , θ i , θ j ) μ i j ( t k + 1 ) = ρ ( θ i j ( t k ) h i j ( t k ) , f i j ( t k ) )
[81]2Same u i ( T ) = ( G p C p ) P ( 1 θ j ) + ( G p C p ) ( 1 P ) + ( C p ) P θ j μ i ( t j ( h j t , a j ( t ) ) ) = μ ( t j | ( h j t ) ) P ( a j ) ( t ) ( h j t , t j ) t T j μ i ( t j | ( h j t ) ) P ( a j ) ( t ) ( h j t , t j ) ( σ j , σ i , C ) ( σ j , σ i , O )
[83]2Same F ( T , T ) t = 1 T P t , t = 1 T P t P ( U > p U > p * ) = P ( U > p ) 1 P ( U > p * ) S C * ( W B ) S C * ( F T )
[77]2Different P K j = H 1 ( U I D j | | Pr i j ) G ê ( σ j P ) = ê ( H 2 ( m ) S K j P ) = ê ( H 2 ( m ) S P K j P ) ( P K j , S K j , Pr i j ) ( S K j , U j )
[79]2Different G S ( W S ) G S ( W S ) = ( G c h + G m ) + ( f a p a t t a p s a + f b p a t t b p s b ) C W D ) P W a S = C a + G c h , P W a S G c h + G c a = P s a = C a + G c h G c h + G c a
[80]2Same ϕ = ( G C C C ) / ( ( G C + G A ) θ ) u = 12 α β ( α + β ) 2 ( α + β + 1 ) ( σ j σ i , A ) o r ( σ j σ i C ) ( σ j σ i , ϕ ) o r ( σ j σ i ρ )

Appendix D

Table A4. Mathematical Comparison of Evolutionary Games.
Table A4. Mathematical Comparison of Evolutionary Games.
Author(s) & Year [51,83,84][71][50,85][86,87]
Population behavior S = ( a 1 , a 2 , , a n ) S = ( S 1 , S 2 , , S k ) S = ( S 1 , S 2 , , S k ) r = ( r 1 , r 2 , r 3 , , r n ) ω = ( ω 1 , ω 2 , , ω n )
Individual pure strategy θ ( t ) = ( θ 1 ( t ) , θ 2 ( t ) , , θ n ( t ) ) X = ( x 1 , x 2 , , x k ) X = ( x 1 , x 2 , , x k ) X = ( x 1 , x 2 , x 3 , , x n ) a = ( a 1 , a 2 , , a n )
Population mixed strategy θ i ( t ) = ϕ i ( t ) i ϕ i ( t ) u ( X , X ) = i S X j u ( i , X ) u ( X , X ) = j S X j u ( i , X ) P ( X t i | X 11 ) = λ p ( X t i | X 11 ) P g i ( α ) = ω p ( ω | α ) u i ( α i , ω i )
Individual payoff μ ( a i , θ ( t ) i θ j ( t ) μ ( a i , a j ) F ( X i ) = X i [ u ( i , X ) u ( X , X ) ] F ( X i ) = X i j S X j [ p j i ( X ) p i j ( X ) ] U ( q p + ( 1 q ) ) > U ( q p + ( 1 q ) U i ( S C , S C ) U i ( S α , S C )
Population payoff μ ( θ ( t ) , θ ( t ) ) i θ i ( t ) μ ( a i , θ ( t ) ) F ( X i ) = X i i S X i [ p j i ( X ) p i j ( X ) ] F ( X i ) = X i [ u ( i , X ) u ( X , X ) ] u i ( α ) = θ Θ u i ( α i , α i , θ i ) Pr o b U i ( θ i | α i ) X * = [ u ( S * , S C ) u ( S C , S C ) ]
Payoff Metrix ω T + ω C + α T + 2 β + ω T + α T β γ ω M + ω C β ω M G T + G C + α T 2 C 2 α T C 2 L G T + α T 2 C 2 L G C + α T C 2 G T + G C + α T 2 C 2 α T C 2 L G T + α T 2 C 2 L G C + α T C 2 b ( 1 p e ) c b ( 1 p e ) 0 u ( S * , S * ) u ( S * , S C ) u ( S C , S * ) u ( S C , S C )
Trust evaluation δ 3 * = ( ω M + β + γ + ω T α T γ F ( X ) = X ( 1 X ) [ ω 2 G T + α T ( ω ω 2 ) C 1 ω 2 C 2 ]

Appendix E

Table A5. Mathematical Comparison of Bargaining Games.
Table A5. Mathematical Comparison of Bargaining Games.
Papers[89][90]
Potential Buyer n 0 U i ( b i )
Group of Potential sellers N = ( n 1 , n 2 , , n N ) ( U 1 ( b 1 ) , , U n ( b n ) ) U
Buyer request n 0 N N S ( m ) ( U 1 ( b 1 ) , , U n ( b n ) ) U
Bidding price & b 0 n 0   i f   r 0 b 0 F ( U , d ) = [ I B S ] I = i = 1 β i v i , i = 1 β i = 1 , β i i ]
Sealed offer b 0 & S i ( 1 < i < N )   f o r   ( n 0 & N N S ) U i ( b i ) = b i R 0 i , R 0 i > 0 , k 0
Set of coalition C = [ C 2 N S i b 0 & | C | min C N ]
Bargaining @ agreed price P = ε X b 0 + ( 1 ε ) X S i B S = ( S ( S i , , S n ) = B   max R 0 i , S i > 0 , i

Appendix F

Table A6. Mathematical Comparison of Coalition Games.
Table A6. Mathematical Comparison of Coalition Games.
Reference [91][92][24][72]
Players N = [ 1 , 2 , , N ] T = ( t 1 , t 2 , , t m ) I = [ 1 , 2 , , M ] X = [ 1 , 2 , , X ]
Coalition S N S 1 , S 2 N S 1 S i S i I Z X X Z
Transferable utility i N X i = v ( N ) i S P i h i = γ i i S P i k = P i i Y X i = V ( X )
In characteristics form v ( s 1 , [ s 2 , s 3 ] ) = v ( s 1 , [ s 4 ] ) = v ( s 1 ) v ( s 1 s 2 ) v ( s 1 ) + v ( s 2 ) S X * ( a i , a i ) Q i s ( X , [ a i , a i ] ) v ( Z 1 , [ Z 2 , Z 3 ] ) = v ( Z 1 , [ Z 4 ] ) = v ( Z 1 )
In partition form v ( s 1 , [ s 2 , s 3 ] ) v ( s 1 , [ s 4 ] ) v ( s 1 s 2 ) v ( s 1 ) + v ( s 2 ) S X * ( a i , a i ) Q i s ( X , [ a i , a i ] ) v ( Z 1 , [ Z 2 , Z 3 ] ) v ( Z 1 , [ Z 4 ] )
In graph form v ( G S 1 ) v ( G S 2 ) G i S P i = p t x g t S * S i , S i S i * v ( C S 1 ) v ( C S 2 )
Payoff vector [ X : X i = v ( N ) & X i v ( S ) ] S N v ( S ) = i s p i p 0 i f   γ s , R , d > γ u i ( P , A i ) = β i , R i ( P , A i ) [ Y : X i = v ( X ) & X i v ( S ) ] S N

References

  1. Jiang, Z. Underwater acoustic networks–issues and solutions. Int. J. Intell. Control Syst. 2008, 13, 152–161. [Google Scholar]
  2. Jha, V.; Gupta, P.; Ahuja, U. QoS Issues in Underwater Sensor Networks. Comput. Sci. Inf. Technol. 2012, 2, 45–51. [Google Scholar]
  3. Pompili, D.; Melodia, T.; Akyildiz, I.F. Distributed routing algorithms for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 2010, 9, 2934–2944. [Google Scholar] [CrossRef]
  4. Manjula, R.; Manvi, S.S. Issues in underwater acoustic sensor networks. Int. J. Comput. Electr. Eng. 2011, 3, 101. [Google Scholar]
  5. IAEA. Inventory of Accidents and Losses at Sea Involving Radioactive Material; International Atomic Energy Agency: Vienna, Austria, 2001. [Google Scholar]
  6. Pocock, R. Nuclear marine propulsion. J. Inst. Nucl. Eng. 1980, 21, 174–179. [Google Scholar]
  7. Macias, E.; Suarez, A.; Chiti, F.; Sacco, A.; Fantacci, R. A hierarchical communication architecture for oceanic surveillance applications. Sensors 2011, 11, 11343–11356. [Google Scholar] [CrossRef] [PubMed]
  8. Han, G.; Jiang, J.; Sun, N.; Shu, L. Secure communication for underwater acoustic sensor networks. IEEE Commun. Mag. 2015, 53, 54–60. [Google Scholar] [CrossRef]
  9. Garcia, M.; Sendra, S.; Atenas, M.; Lloret, J. Underwater wireless ad-hoc networks: A survey. In Mobile Ad Hoc Networks: Current Status and Future Trends; CRC Press: Boca Raton, FL, USA, 2011; pp. 379–411. [Google Scholar]
  10. Jin, X.; Chen, Y.; Xu, X. The analysis of hops for multi-hop cooperation in Underwater Acoustic Sensor Networks. In Proceedings of the 2016 IEEE/OES China Ocean Acoustics (COA), Harbin, China, 9–11 January 2016; pp. 1–5. [Google Scholar]
  11. Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  12. Pompili, D.; Melodia, T.; Akyildiz, I.F. Three-dimensional and two-dimensional deployment analysis for underwater acoustic sensor networks. Ad Hoc Netw. 2009, 7, 778–790. [Google Scholar] [CrossRef]
  13. Stojanovic, M. On the relationship between capacity and distance in an underwater acoustic communication channel. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2007, 11, 34–43. [Google Scholar] [CrossRef]
  14. Carbonelli, C.; Chen, S.-H.; Mitra, U. Error propagation analysis for underwater cooperative multi-hop communications. Ad Hoc Netw. 2009, 7, 759–769. [Google Scholar] [CrossRef]
  15. Das, A.P.; Thampi, S.M. Simulation tools for underwater sensor networks: A survey. Netw. Protoc. Algorithms 2017, 8, 41–55. [Google Scholar] [CrossRef]
  16. Liu, B.; Garcin, F.; Ren, F.; Lin, C. A study of forward error correction schemes for reliable transport in underwater sensor networks. In Proceedings of the 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Francisco, CA, USA, 16–20 June 2008; pp. 197–205. [Google Scholar]
  17. Caiti, A.; Calabro, V.; Dini, G.; Lo Duca, A.; Munafo, A. Secure cooperation of autonomous mobile sensors using an underwater acoustic network. Sensors 2012, 12, 1967–1989. [Google Scholar] [CrossRef] [PubMed]
  18. Ahmed, M.R.; Tahsien, S.M.; Aseeri, M.; Kaiser, M.S. Malicious attack detection in underwater wireless sensor network. In Proceedings of the 2015 IEEE International Conference on Telecommunications and Photonics (ICTP), Dhaka, Bangladesh, 26–28 December 2015; pp. 1–5. [Google Scholar]
  19. Zuba, M.; Shi, Z.; Peng, Z.; Cui, J.H.; Zhou, S. Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks. Secur. Commun. Netw. 2015, 8, 2635–2645. [Google Scholar] [CrossRef]
  20. Lal, C.; Petroccia, R.; Conti, M.; Alves, J. Secure underwater acoustic networks: Current and future research directions. In Proceedings of the 2016 IEEE Third Underwater Communications and Networking Conference (UComms), Lerici, Italy, 30 August–1 September 2016; pp. 1–5. [Google Scholar]
  21. Liu, C.-G.; Chao, C.-H.; Leou, C.-W.; Li, J.-S. Iterative key distribution based on MAD neighborhood in underwater mobile sensor networks. Comput. J. 2012, 55, 1467–1485. [Google Scholar] [CrossRef]
  22. Silva, B.M.; Rodrigues, J.J.; Kumar, N.; Han, G. Cooperative strategies for challenged networks and applications: A survey. IEEE Syst. J. 2015, 11, 2749–2760. [Google Scholar] [CrossRef]
  23. Tariq, M.; Latiff, M.S.A.; Ayaz, M.; Coulibaly, Y.; Wahid, A. Pressure Sensor Based Reliable (PSBR) Routing Protocol for Underwater Acoustic Sensor Networks. Ad Hoc Sens. Wirel. Netw. 2016, 32, 175–196. [Google Scholar]
  24. Dini, G.; Lo Duca, A. A secure communication suite for underwater acoustic sensor networks. Sensors 2012, 12, 15133–15158. [Google Scholar] [CrossRef] [PubMed]
  25. Wang, P.; Zhang, L.; Li, V.O. Asynchronous cooperative transmission for three-dimensional underwater acoustic networks. IET Commun. 2013, 7, 286–294. [Google Scholar] [CrossRef]
  26. Lee, J.W.; Cheon, J.Y.; Cho, H.-S. A Cooperative ARQ Scheme in Underwater Acoustic Sensor Networks. In Proceedings of the OCEANS 2010 IEEE-Sydney, Sydney, Australia, 24–27 May 2010; pp. 1–5. [Google Scholar]
  27. Han, J.-W.; Ju, H.-J.; Kim, K.-M.; Chun, S.-Y.; Dho, K.-C. A study on the cooperative diversity technique with amplify and forward for underwater wireless communication. In Proceedings of the OCEANS 2008-MTS/IEEE Kobe Techno-Ocean, Kobe, Japan, 8–11 April 2008; pp. 1–3. [Google Scholar]
  28. Garcin, F.; Manshaei, M.H.; Hubaux, J.-P. Cooperation in Underwater Sensor Networks. In Proceedings of the 2009 International Conference on Game Theory for Networks, Istanbul, Turkey, 13–15 May 2009; pp. 540–548. [Google Scholar]
  29. Carbonelli, C.; Mitra, U. Cooperative multihop communication for underwater acoustic networks. In Proceedings of the 1st ACM international workshop on Underwater Networks, Los Angeles, CA, USA, 25 September 2006; pp. 97–100. [Google Scholar]
  30. Tan, X.; Li, J. Cooperative positioning in underwater sensor networks. IEEE Trans. Signal Process. 2010, 58, 5860–5871. [Google Scholar] [CrossRef]
  31. Eickstedt, D.P.; Benjamin, M.R. Cooperative target tracking in a distributed autonomous sensor network. In Proceedings of the OCEANS 2006, Boston, MA, USA, 18–21 September 2006; pp. 1–6. [Google Scholar]
  32. Kaliappan, M.; Paramasivan, B. Enhancing secure routing in mobile ad hoc networks using a dynamic bayesian signalling game model. Comput. Electr. Eng. 2015, 41, 301–313. [Google Scholar] [CrossRef]
  33. Li, F.; Yang, Y.; Wu, J. Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs. IEEE Trans. Syst. Man Cybern. Part B Cybern. 2010, 40, 612–622. [Google Scholar]
  34. Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.-P. Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 2013, 45, 25. [Google Scholar] [CrossRef]
  35. Souza, E.; Wong, H.C.; Cunha, I.; Loureiro, A.A.; Vieira, L.F.M.; Oliveira, L.B. End-to-end authentication in under-water sensor networks. In Proceedings of the 2013 IEEE Symposium on Computers and Communications (ISCC), Split, Croatia, 7–10 July 2013; pp. 000299–000304. [Google Scholar]
  36. Senel, F.; Akkaya, K.; Erol-Kantarci, M.; Yilmaz, T. Self-deployment of mobile underwater acoustic sensor networks for maximized coverage and guaranteed connectivity. Ad Hoc Netw. 2015, 34, 170–183. [Google Scholar] [CrossRef]
  37. Chen, Y.; Sun, H.; Wan, L.; Wang, Z.; Zhou, S.; Xu, X. Dynamic network coded cooperative OFDM for underwater data collection. In Proceedings of the 2012 Oceans, Hampton Roads, VA, USA, 14–19 October 2012; pp. 1–4. [Google Scholar]
  38. Van Nguyen, T.; Jeong, Y.; Shin, H.; Win, M.Z. Least square cooperative localization. IEEE Trans. Veh. Technol. 2015, 64, 1318–1330. [Google Scholar] [CrossRef]
  39. Chen, Y.; Jin, X.; Xu, X. Mobile data collection paths for node cooperative underwater acoustic sensor networks. In Proceedings of the OCEANS 2016-Shanghai, Shanghai, China, 10–13 April 2016; pp. 1–5. [Google Scholar]
  40. Han, Z.; Sun, Y.L.; Shi, H. Cooperative transmission for underwater acoustic communications. In Proceedings of the 2008 IEEE International Conference on Communications, Beijing, China, 19–23 May 2008; pp. 2028–2032. [Google Scholar]
  41. Zhou, Z.; Cui, J.-H. Energy efficient multi-path communication for time-critical applications in underwater sensor networks. In Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, Hong Kong, China, 26–30 May 2008; pp. 221–230. [Google Scholar]
  42. Zhou, Z.; Zhou, S.; Cui, S.; Cui, J.-H. Energy-efficient cooperative communication in a clustered wireless sensor network. IEEE Trans. Veh. Technol. 2008, 57, 3618–3628. [Google Scholar] [CrossRef]
  43. Luo, L.; Cao, Q.; Huang, C.; Abdelzaher, T.; Stankovic, J.A.; Ward, M. Enviromic: Towards cooperative storage and retrieval in audio sensor networks. In Proceedings of the 27th International Conference on Distributed Computing Systems, Toronto, ON, Canada, 25–27 June 2007; p. 34. [Google Scholar]
  44. Luo, L.; Huang, C.; Abdelzaher, T.; Stankovic, J. Envirostore: A cooperative storage system for disconnected operation in sensor networks. In Proceedings of the IEEE INFOCOM 2007—26th IEEE International Conference on Computer Communications 2007, Barcelona, Spain, 6–12 May 2007; pp. 1802–1810. [Google Scholar]
  45. Dunbabin, M.; Corke, P.; Vasilescu, I.; Rus, D. Experiments with cooperative control of underwater robots. Int. J. Robot. Res. 2009, 28, 815–833. [Google Scholar] [CrossRef]
  46. Han, G.; Jiang, J.; Shu, L.; Xu, Y.; Wang, F. Localization algorithms of underwater wireless sensor networks: A survey. Sensors 2012, 12, 2026–2061. [Google Scholar] [CrossRef] [PubMed]
  47. Guo, Y.; Liu, Y. Localization for anchor-free underwater sensor networks. Comput. Electr. Eng. 2013, 39, 1812–1821. [Google Scholar] [CrossRef]
  48. Lee, J.; Oh, J.C. Convergence of True Cooperations in Bayesian Reputation Game. In Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, 24–26 September 2014; pp. 487–494. [Google Scholar]
  49. Roy, S.; Ellis, C.; Shiva, S.; Dasgupta, D.; Shandilya, V.; Wu, Q. A survey of game theory as applied to network security. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, Honolulu, HI, USA, 5–8 January 2010; pp. 1–10. [Google Scholar]
  50. Tang, C.; Li, A.; Li, X. When reputation enforces evolutionary cooperation in unreliable MANETs. IEEE Trans. Cybern. 2015, 45, 2190–2201. [Google Scholar] [CrossRef] [PubMed]
  51. Wang, X.; Wu, Y.; Ren, Y.; Feng, R.; Yu, N.; Wan, J. An evolutionary game-based trust cooperative stimulation model for large scale MANETs. Int. J. Distrib. Sens. Netw. 2013, 9, 245017. [Google Scholar] [CrossRef]
  52. Aldini, A. A formal framework for modeling trust and reputation in collective adaptive systems. arXiv, 2016; arXiv:1607.02232. [Google Scholar]
  53. Bansal, S.; Baker, M. Observation-based cooperation enforcement in ad hoc networks. arXiv, 2003; arXiv:cs/0307012. [Google Scholar]
  54. Balakrishnan, K.; Deng, J.; Varshney, V. TWOACK: Preventing selfishness in mobile ad hoc networks. In Proceedings of the 2005 IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 13–17 March 2005; pp. 2137–2142. [Google Scholar]
  55. Liu, K.; Deng, J.; Varshney, P.K.; Balakrishnan, K. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mob. Comput. 2007, 6, 536–550. [Google Scholar] [CrossRef]
  56. Michiardi, P.; Molva, R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security; Springer: Berlin, Germany, 2002; pp. 107–121. [Google Scholar]
  57. Refaei, M.T.; DaSilva, L.A.; Eltoweissy, M.; Nadeem, T. Adaptation of reputation management systems to dynamic network conditions in ad hoc networks. IEEE Trans. Comput. 2010, 59, 707–719. [Google Scholar] [CrossRef]
  58. Buchegger, S.; Le Boudec, J.-Y. Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, 9–11 June 2002; pp. 226–236. [Google Scholar]
  59. Li, Z.; Shen, H. Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 2012, 11, 1287–1303. [Google Scholar] [CrossRef]
  60. Bogliolo, A.; Polidori, P.; Aldini, A.; Moreira, W.; Mendes, P.; Yildiz, M.; Ballester, C.; Seigneur, J.-M. Virtual currency and reputation-based cooperation incentives in user-centric networks. In Proceedings of the 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol, Cyprus, 27–31 August 2012; pp. 895–900. [Google Scholar]
  61. Buttyán, L.; Hubaux, J.-P. Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 2003, 8, 579–592. [Google Scholar] [CrossRef]
  62. Jakobsson, M.; Hubaux, J.-P.; Buttyán, L. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Lecture Notes in Computer Science, Proceedings of the 7th International Conference on Financial Cryptography and Data Security, Guadeloupe, French, 27–30 January 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 15–33. [Google Scholar]
  63. Crowcroft, J.; Gibbens, R.; Kelly, F.; Östring, S. Modelling incentives for collaboration in mobile ad hoc networks. Perform. Eval. 2004, 57, 427–439. [Google Scholar] [CrossRef]
  64. Janzadeh, H.; Fayazbakhsh, K.; Dehghan, M.; Fallah, M.S. A secure credit-based cooperation stimulating mechanism for MANETs using hash chains. Future Gener. Comput. Syst. 2009, 25, 926–934. [Google Scholar] [CrossRef]
  65. Shen, H.; Li, Z. ARM: An account-based hierarchical reputation management system for wireless ad hoc networks. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 370–375. [Google Scholar]
  66. Sonja, B.; Boudec, J. A robust reputation system for peer-to-peer and mobile ad-hoc networks. In Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (P2PEcon 2004), Cambridge, MA, USA, 4–5 June 2004. [Google Scholar]
  67. Mohammed, N.; Otrok, H.; Wang, L.; Debbabi, M.; Bhattacharya, P. A mechanism design-based multi-leader election scheme for intrusion detection in MANET. In Proceedings of the 2008 IEEE Wireless Communications and Networking Conference, Las Vegas, NV, USA, 31 March–3 April 2008; pp. 2816–2821. [Google Scholar]
  68. Ng, S.-K.; Seah, W.K.G. Game-theoretic model for collaborative protocols in selfish, tariff-free, multihop wireless networks. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 216–220. [Google Scholar]
  69. Dong, Y.; Liu, P. Security considerations of underwater acoustic networks. In Proceedings of the 20th International Congress on Acoustics (ICA’10), Sydney, Australia, 23–27 August 2010; pp. 23–27. [Google Scholar]
  70. Rafsanjani, M.K.; Aliahmadipour, L.; Javidi, M.M. A hybrid Intrusion Detection by game theory approaches in MANET. Indian J. Sci. Technol. 2012, 5, 2123–2131. [Google Scholar]
  71. Li, Y.; Xu, H.; Cao, Q.; Li, Z.; Shen, S. Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 818903. [Google Scholar] [CrossRef]
  72. Abdalzaher, M.S.; Seddik, K.; Elsabrouty, M.; Muta, O.; Furukawa, H.; Abdel-Rahman, A. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey. Sensors 2016, 16, 1003. [Google Scholar] [CrossRef] [PubMed]
  73. Martínez-Cánovas, G.; Del Val, E.; Botti, V.; Hernández, P.; Rebollo, M. A formal model based on game theory for the analysis of cooperation in distributed service discovery. Inf. Sci. 2016, 326, 59–70. [Google Scholar] [CrossRef]
  74. Jiang, A.X.; Yin, Z.; Zhang, C.; Tambe, M.; Kraus, S. Game-theoretic randomization for security patrolling with dynamic execution uncertainty. In International Foundation for Autonomous Agents and Multiagent Systems, Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, St. Paul, MN, USA, 6–10 May 2013; ACM: New York, NY, USA; pp. 207–214.
  75. Hollinger, G.A.; Choudhary, S.; Qarabaqi, P.; Murphy, C.; Mitra, U.; Sukhatme, G.S.; Stojanovic, M.; Singh, H.; Hover, F. Underwater data collection using robotic sensor networks. IEEE J. Sel. Areas Commun. 2012, 30, 899–911. [Google Scholar] [CrossRef]
  76. Paramasivan, B.; Prakash, M.J.V.; Kaliappan, M. Development of a secure routing protocol using game theory model in mobile ad hoc networks. J. Commun. Netw. 2015, 17, 75–83. [Google Scholar] [CrossRef]
  77. He, D.; Chen, C.; Chan, S.; Bu, J. SDRP: A secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 2012, 59, 4155–4163. [Google Scholar] [CrossRef]
  78. Nurmi, P. Modelling routing in wireless ad hoc networks with dynamic Bayesian games. In Proceedings of the 2004 IEEE SECON First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, USA, 4–7 October 2004; pp. 63–70. [Google Scholar]
  79. Ayday, E.; Fekri, F. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Netw. 2010, 8, 181–192. [Google Scholar] [CrossRef]
  80. Jiang, J.; Han, G.; Shu, L.; Chan, S.; Wang, K. A Trust Model based on Cloud Theory in Underwater Acoustic Sensor Networks. IEEE Trans. Ind. Inform. 2015, 13, 342–350. [Google Scholar] [CrossRef]
  81. Jin, X.; Pissinou, N.; Pumpichet, S.; Kamhoua, C.A.; Kwiat, K. Modeling cooperative, selfish and malicious behaviors for trajectory privacy preservation using bayesian game theory. In Proceedings of the 2013 IEEE 38th Conference on Local Computer Networks (LCN), Sydney, Australia, 21–24 October 2013; pp. 835–842. [Google Scholar]
  82. Musacchio, J.; Walrand, J. WiFi access point pricing as a dynamic game. IEEE/ACM Trans. Netw. (TON) 2006, 14, 289–301. [Google Scholar] [CrossRef]
  83. Anh, H.T.; Moniz Pereira, L.; Santos, F.C. Intention recognition promotes the emergence of cooperation. Adapt. Behav. 2011, 19, 264–279. [Google Scholar]
  84. Shen, S.; Huang, L.; Fan, E.; Hu, K.; Liu, J.; Cao, Q. Trust dynamics in WSNs: An evolutionary game-theoretic approach. J. Sens. 2016, 2016, 4254701. [Google Scholar] [CrossRef]
  85. Li, Z.; Bi, J. An adaptive trusted request and authorization model for mobile peer-to-peer networks. In Proceedings of the 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, Zhangjiajie, China, 13–15 November 2013; pp. 1274–1280. [Google Scholar]
  86. Wang, W.; Chatterjee, M.; Kwiat, K. Cooperation in wireless networks with unreliable channels. IEEE Trans. Commun. 2011, 59, 2808–2817. [Google Scholar] [CrossRef]
  87. Seredynski, M.; Bouvry, P. Analysing the development of cooperation in MANETs using evolutionary game theory. J. Supercomput. 2013, 63, 854–870. [Google Scholar] [CrossRef]
  88. Han, Z. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  89. Yunchuan, G.; Lihua, Y.; Licai, L.; Binxing, F. Utility-based cooperative decision in cooperative authentication. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 1006–1014. [Google Scholar]
  90. Pal, R.; Gupta, B.; Cianca, E.; Patel, A.; Kaligotla, S.; Gogar, A.; Wardana, S.; Lam, V.T.; Ganguly, B. Playing ‘games’ with human health the role of game theory in optimizing reliability in wireless health networks. In Proceedings of the 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL), Roma, Italy, 7–10 November 2010; pp. 1–5. [Google Scholar]
  91. Saad, W.; Han, Z.; Debbah, M.; Hjorungnes, A.; Basar, T. Coalitional game theory for communication networks. IEEE Signal Process. Mag. 2009, 26, 77–97. [Google Scholar] [CrossRef] [Green Version]
  92. Khayatian, H.; Saadat, R.; Mirjalily, G. Distributed power allocation based on coalitional and noncooperative games for wireless networks. In Proceedings of the 2010 5th International Symposium on Telecommunications (IST), Tehran, Iran, 4–6 December 2010; pp. 367–372. [Google Scholar]
  93. Akkarajitsakul, K.; Hossain, E.; Niyato, D.; Kim, D.I. Game theoretic approaches for multiple access in wireless networks: A survey. IEEE Commun. Surv. Tutor. 2011, 13, 372–395. [Google Scholar] [CrossRef]
Figure 1. Cluster-based architecture of UASNs.
Figure 1. Cluster-based architecture of UASNs.
Sensors 18 00425 g001
Figure 2. Cooperative-based architecture of UASNs.
Figure 2. Cooperative-based architecture of UASNs.
Sensors 18 00425 g002
Figure 3. A Scenario with 32 nodes with 10 malicious nodes.
Figure 3. A Scenario with 32 nodes with 10 malicious nodes.
Sensors 18 00425 g003
Figure 4. Cooperative multi-hop UASNs.
Figure 4. Cooperative multi-hop UASNs.
Sensors 18 00425 g004
Figure 5. Taxonomy of cooperation in UASNs.
Figure 5. Taxonomy of cooperation in UASNs.
Sensors 18 00425 g005
Table 1. Comparison of WSNs and UASNs.
Table 1. Comparison of WSNs and UASNs.
Comparison Parameters WSNsUASNs
Communication MethodRadio Frequency (RF)Acoustic Signal (Sound waves)
Energy Consumption Low High (due to energy cost of submitting packets)
Propagation Delay LowHigh (five orders of magnitude greater than WSNs)
Bandwidth HighLow (depend on distance & Frequency)
Connectivity Lost Low High (due to high bit error rate)
Table 2. Summary of cooperative game methods in UASNs.
Table 2. Summary of cooperative game methods in UASNs.
Paper ProblemMethodContribution Weakness
[50]Problem of one hop cooperative packet forwarding due to noise a packet lost Evolutionary game theory with dynamic strategy of cooperative Guarantee the cooperation convergence by driving the ratio of cost-to-benefit thresholdDo not focus on any security issues and hence no mechanism for malicious node detection
[51]Dynamic trust cooperative under high malicious ratio Evolutionary game-based trust cooperative simulation model Convergence optimal strategy which maximize payoff and trust strategy preferential Reliability issues in the packet delivery has not been tackled
[59]Analysis of cooperative incentives Integrated system of Game theory Detection of selfish node and Effective cooperative incentives The security issues, attack or node that are compromised has not been addressed
[33]Regular and Malicious Node Strategy Analysis Dynamic Bayesian Signaling GameFormulation of Bayesian game framework to study the strategy of regular and malicious nodeThe game does not solve multi attack collision of regular or malicious node
[24]Security issues such as confidentiality and integrity in underwater Cryptography method and Secure routing Practical and efficient to confidentiality and integrity bin UASNsIt does not fully encourage cooperation in UASNs
[32]Lack of centralized control and secure routing Dynamic Bayesian Signaling GameFormulate a two-player game and analyzed the Nash Equilibrium strategy These is no any suitable mechanism for long running game to solve various attack issues
[72]Preventing malicious attack and Assuring trustworthiness Evolutionary game theoretic approachPrevent nodes form attack and guarantee trustworthiness of dataThese is no much impasses on cooperation issues
[70]Consumption of resources and selfish detection Bayesian Game Method Performance improvement in recourse consumption and effective security These is no motivation to cooperation enforcement
[71]Trust evaluation and Trust decision issues in individual strategy adjustment Trust Strategy based Evolutionary game model Data retransmission after Packet lost, build a trust strategy and strategy adjustment No trust value calculation and trust management for security basis
[40]Interaction for decision making and malicious behavior of entityBayesian Game model with dynamic repeated type Motivation to answer the request trustfully and promoting node to be honest & cooperativeNo adequate solution to the selfish detection and therefore is not secured
[81]Unknown malicious Selfish, nodes cooperative & trustworthiness Bayesian Game theory model of TPP Trustworthiness of unknown node evaluation and drive the equilibrium strategy of the game TPP game is not a multi-player game and hence cannot handle multiple payoff game
[28]Cooperation between different authorities to reduce energy consumption and maximize lifetime Evolutionary game theory with reactive & non-reactive strategy Show Cooperation can emerge underwater without incentives and highlight factors affecting cooperation and the way they affect itDid not consider propagation in multipath & dynamic nature of underwater topology
[35]Authentication problem for security issues Digital signature schemeEnergy cost evaluation using digital signature scheme (end-to-end) authentication Lack of cooperation mechanism among the participating node
[83]Behavioral evolution interaction recognition Bayesian network model by Repeated Prisoner’s Dilemma (PD) and evolutionary game theory Assessing the internal dynamic trust between intention recognizers and their opponents and predict the next move of their opponents based on the past direct interaction Intention recognition achieved high performance of cooperation in homogeneous network only
[21]Illegal accessed of transmission in underwater communicationIterative key distribution scheme with secure routing method based on the Focused Beam Routing Protocol Reduce the redundant keys in the key distribution system and adopt the mobility model to capture the movement of sensors node floating on the seaThis scheme did not consider the impaired channel caused by path loss, noise, multi-path and fading in underwater environment
[48]Centralized and distributed reputation management in massive number of entities.Bayesian Reputation Game They found that trust cooperation is sustained when the game is repeated and the average reputation values of the players increase over time and coverageThe approach does not focus on the security issues among nodes and hence is not reliable
[59]Investigating the effectiveness of nodes cooperation incentives Used game theory to analyse cooperative incentive by Integrated System which combine the Reputation system and Price-based systemThey found that the strategies of using threshold to find the trustworthiness node in Reputation system and Price-based system can be manipulated by clever or selfish node. Integrated System achieved high performance in effectiveness of incentiveThe limitation of these method is it does not provide solution to the security issues among nodes
[60]Motivate to share services and resources and to avoid selfish nodes to hinder the functioning of the entire networkVirtual currency and reputation mechanism methodThey exploit the willingness of member to share their resources/services in order to increase collective welfare and to extend the reach of existing infrastructuresTheir scheme does not guarantee security of data, since a selfish or clever node can manipulate the threshold value
Table 3. Evaluation and comparison of the approaches based on the performance metrics satisfied.
Table 3. Evaluation and comparison of the approaches based on the performance metrics satisfied.
PaperEnergyDelayRouting OverheadPacket DropSelfish DetectionCoverageSecurityReliability
[59]NoNoNoNoYesYesNoNo
[24]YesNoYesNoNoYesNoYes
[32]NoNoYesYesYesYesYesNo
[72]NoNoNoYesYesNoYesNo
[21]YesNoYesNoNoNoYesNo
[70]YesNoYesYesYesNoYesNo
[71]YesYesYesYesNoNoNoNo
[48]NoYesNoNoNoYesNoNo
[81]NoNoNoYesYesNoYesNo
[28]YesYesNoNoNoYesNoNo
[35]YesYesYesNoNoYesYesYes
[83]NoYesNoYesYesYesYesNo
[60]YesYesNoYesNoYesNoNo
[51]YesNoYesYesYesYesNoNo
[33]NoNoYesYesYesYesNoNo
[40]NoYesYesNoNoYesNoNo
[50]NoYesNoYesNoYesNoYes
[59]NoYesNoYesYesYesNoNo

Share and Cite

MDPI and ACS Style

Muhammed, D.; Anisi, M.H.; Zareei, M.; Vargas-Rosales, C.; Khan, A. Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions. Sensors 2018, 18, 425. https://doi.org/10.3390/s18020425

AMA Style

Muhammed D, Anisi MH, Zareei M, Vargas-Rosales C, Khan A. Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions. Sensors. 2018; 18(2):425. https://doi.org/10.3390/s18020425

Chicago/Turabian Style

Muhammed, Dalhatu, Mohammad Hossein Anisi, Mahdi Zareei, Cesar Vargas-Rosales, and Anwar Khan. 2018. "Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions" Sensors 18, no. 2: 425. https://doi.org/10.3390/s18020425

APA Style

Muhammed, D., Anisi, M. H., Zareei, M., Vargas-Rosales, C., & Khan, A. (2018). Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions. Sensors, 18(2), 425. https://doi.org/10.3390/s18020425

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop