1. Introduction
Underwater wireless sensor networks (UWSN) and underwater vehicles (UV) can expand our scientific, commercial, and naval capabilities [
1]. UWSN network exploration has received attention from numerous researchers [
1]. However, security investigation for UWSN and UV, as one network entity, is unavailable based on state-of-the-art technology. Therefore, this research investigates combined UWSN and UV as optimized underwater vehicular wireless sensor networks (UVWSN), has proven useful and visually mapping benthic habitats and inspecting the structures of ships [
2].
UVWSN network tends to automate underwater traffic, utilizing underwater vehicles. UVWSN can be utilized for ocean vehicle monitoring. The underwater acoustic network has increased nowadays. While much effort in the research of UVWSN has shifted, designing network security in UVWSN still needs to be thoughtfully complied with. An incredibly significant aspect is that UVWSNs are vulnerable to malicious node attacks (MNA). This is through the characteristics of underwater acoustic communication channels and the vehicles they deploy. Examples are the long propagation of signal delay, higher bit error rates, and a low communication bandwidth. All these network design challenges have a greater possibility of affecting UVWSN, which this research investigates.
Therefore, UVWSN must provide a higher speed data transmission rate with dependable, secure, and low latency metrics [
3]. An essential feature of the UVWSN network is that it assists in efficiently monitoring and inspecting underwater applications, such as vehicles, including ship structures. However, the efficiency of the network may be possible after deploying the required security mechanism, including secure data aggregation and authentication (SDAA) optimized methods. SDAA-optimized methods include cluster-based network design (CBND) plans. In addition, SDAA methods provide the protection offered in the UVWSN through underwater sensor nodes (USN), which tends to isolate any MNA or vulnerable external nodes [
4]. Another essential feature of the SDAA method is that the base station (BS) is employed to confirm the USN’s legitimacy after being deployed in the UVWSN. Therefore, BS awards trustworthiness/privacy protection through the authentication of each USN before they can be allowed to be part of the UVWSN.
Moreover, multiple mobile sinks (MMS) [
5] have mobile nodes that utilize more energy efficiency mechanisms for convenient use in the network [
5]. In addition, MMS controls the dynamic mobility of the USN [
5]. This adjusts the MMS moving speed and trajectory while traveling in the underwater vehicle, reducing any MNA that may persist in the network. The detection of MNA in the SDAA methods is also due to its high energy-withholding capability.
In addition, the CBND method prolongs the lifetime of UVWSN, utilizing secure data aggregation and authentication methods that deploy MMS arrangements in the network. Moreover, CBND collects specific data from its members, including the cluster head (CH) and cluster node (CN) of USN in the UVWSN, which assist in organizing the underwater environment information and then forwards it to the MMS. The SDAA method compares design concerns with other secure medium access control (MAC) standards protocols that do not utilize CBND in their network deployment, as described below.
The authors in [
6] proposed self-sustaining, efficient, and forward-secure cryptographic constructions for unattended wireless sensor networks (SEFSC). In addition, the authors in [
7] proposed the synopsis diffusion approach (SDA), and the authors in [
8] proposed the energy-efficient and secure transmission scheme based on chaotic compressive sensing in underwater wireless sensor networks (EEST). The authors in [
6,
7,
8], proposed protocols that were investigated based on secure MAC UWSN, but they did not utilize CBND. Moreover, the authors in [
9] proposed authentication methods based on secure MAC UWSN. However, all these proposed secure MAC protocols are independent of CBND deployment, which did not include vehicle deployment scenarios in the UWSN.
Since USN (underwater sensor node) depicts a medium access control (MAC), their credentials in UVWSN, which utilized our proposed SDAA method, should be stored in nearby BS in the CBND method.
In addition, deploying only underwater wireless sensor networks (UWSN) in secure MAC protocols such as SEFSC, SDA, and EEST, which do not utilize multiple mobile sinks (MMS), is observed as a design challenge. One crucial design advantage of our proposed UVWSN is that MMS [
5] deployment in the network assists in making better decisions for appropriately planning the moving path of vehicles, including ships, in the ocean. This helps to avoid any overhead information [
5] exchange with each USN deployed in the network. Therefore, the entire network architectures proposed in secure MAC protocols, including [
6,
7,
8], were vulnerable and exposed to malicious node attackers (MNA).
Consequently, this leads to higher MNA encounters in the network, which also leads to stealing or altering information about their networks’ stored data credentials. In addition, this compromises the trustworthiness/privacy and integrity of the data concerns in the UWSN used in [
6,
7,
8].
However, underwater sensor nodes (USN) deployment in the UWSN network requires sensitive credentials, such as locations and identities. Otherwise, this enables the encounter of a malicious node attacker (MNA) to reveal the location of the physical access of the USN, and this situation could expose the entire network to be compromised. Moreover, it is noteworthy that the identifications (ID) of the sensor nodes (SN) deployed in [
6,
7,
8] used different encryption and decryption methods. Based upon this, the SN credentials must require secure storage mechanisms to preserve the data’s trustworthiness/privacy and integrity. However, the limitations of trustworthiness/confidentiality and data integrity could destroy the deployment of the SN since MNA could steal the location and make it impossible for the UWSN to access data securely in SN.
To detect and remove malicious nodes from the UWSN deployed in secure MAC protocols such as SEFSC [
6], SDA [
7], and EEST [
8] network and to preserve trustworthiness/privacy, many studies have investigated trustworthiness/privacy provisions for UWSN. These studies depend on the authentication of underwater vehicles only in [
9,
10,
11,
12]. However, the studies that rely on detecting malicious nodes can be found only in [
13,
14], which depend on the trustworthiness/privacy provision in UWSN.
Therefore, the need to propose a new underwater sensor network, such as the proposed SDAA protocol, to investigate all the design challenges in secure MAC protocols, including SEFSC [
6], SDA [
7], and EEST [
8], which should utilize CBND, and underwater vehicle system, should be a priority. Therefore, our proposed SDAA method achieves that design requirements and detects and prevents malicious node attackers (MNA) using UVWSN with a sense of urgency [
15].
In addition, our proposed SDAA method introduces secure medium access control (MAC) through USN, which utilizes a protocol design that provides trustworthiness/privacy in the UVWSN (underwater vehicular wireless sensor network).
Therefore, in this paper, we propose a secure MAC protocol, known as the secure data aggregation and authentication (SDAA) optimized methods, that employ MMS (multiple mobile sinks) in cluster-based network design (CBND) that ensures trustworthiness/privacy provision in UVWSN. The application deployment of our proposed UVWSN is for monitoring and inspecting vehicles and ship structures for navigational systems in the ocean. Based upon this, we can reevaluate new performance metrics, such as reduced delay, reliability, packet drop, and energy efficiency in the proposed new UVWSN.
The main contributions of this paper are as follows:
We propose a new secure SDAA method that employs MMS (multiple mobile sinks) in the cluster-based network design (CBND). MMS, including ships, is used for appropriate vehicle path planning and avoids communication overhead. Comparatively, secure MAC protocols, such as SEFSC, SDA, and EEST, do not utilize MMS and CBND in their networks; therefore, the energy efficiency for the network is an issue.
The proposed SDAA protocol method minimizes latency/delay, providing reliability and ensuring energy efficiency provision in USNs (underwater sensor nodes) that improves packet delivery ratio, and reduces packet drop in the network, as compared to secure MAC protocols SEFSC, SDA, and EEST which only detects packet drops and delay, without accounting for any energy efficiency in the network.
We propose a new underwater vehicular sensor network (UVWSN) involving underwater vehicle (UV) deployment in the network that can detect and prevent all forms of malicious node attacks (MNA), for practical wireless sensor monitoring applications for the underwater vehicle (UV), as compared with secure MAC protocols, including SEFSC, SDA, and EEST, in which only UWSN was used to assess malicious attacks, without accounting for any UV.
Therefore, the proposed UVWSN ensures complete trustworthiness/privacy and integrity provision in the network, using trusted encryption–decryption schemes that improve security, compared to other secure MAC protocols, including SEFSC, SDA, and EEST, which only provide privacy without any data integrity provision in their network.
The proposed SDAA protocol includes a cluster-based network design (CBND) that improves energy efficiency and prolongs the network lifetime of the USN for more extended application deployment. Secure MAC protocols, such as SEFSC, SDA, and EEST, use only authentication. However, it is not a cluster-based network (CBND); therefore, it is difficult to account for actual energy efficiency deployment in the UWSN.
The remainder of the paper is as follows:
Section 2 presents the related work of various secure MAC protocol classes;
Section 3 presents design challenges of secure UWSN MAC protocols and models of secure data aggregation and authentication using UVWSN;
Section 4 shows simulation setup and experimental results including discussion.
Section 5 concludes the entire paper as follows.
3. Design Challenges of SEFSC, SDA, and EEST Protocols and Models of Secure Data Aggregation and Authentication Using UVWSN
In this section, we highlight the design challenges of UWSN secure standard MAC protocols, including SEFSC [
6], SDA [
7], and EEST [
8]. We also compare it with our proposed SDAA secure MAC protocol methods.
SEFSC is a secure MAC underwater wireless sensor network (UWSN) MAC protocol, which has operated in hostile underwater conditions since it is deployed in that condition. Based on this, the protocol experienced more significant security challenges in the network. Therefore, the protocol network performance should depend on its collected mobile data. However, due to the channel unreliability nature of UWSN operation in hostile conditions, the protocol needed to achieve reliability of mobile data collection in CBND. In addition, the UWSN, which they investigated, was also vulnerable. Therefore, we anticipate malicious node attacker detection for mitigating channel unreliability challenges in the network. These channel unreliability challenges and hostile node encounters lead to communication overheads in the UWSN. However, SEFSC employed mobile data transmission to investigate UWSN channel operation conditions. Notably, multiple mobile sinks (MMS), which can appropriately plan mobile data routes, are needed to overcome communication overhead in the network. Our proposed SDAA protocol deployed in UVWSN employs MMS and overcomes these challenges.
SDA is a synopsis diffusion approach that is a secure MAC protocol. This protocol solves the challenge of data integrity, which means the protocol needs accountability for the trustworthiness of data or reliability in the UWSN. However, the SDA protocol could not detect malicious node attackers (MNA) in the UWSN. Even though the SDA protocol network architecture deployment utilized a base station (BS), the BS was the only authentication method in the network. Consequently, the SDA protocol used the BS yet could not efficiently detect any MNA. Another design challenge with the SDA protocol was that the protocol only noticed a few MNA. This presupposes that the protocol deployment in the UWSN was on a small scale. Therefore, scalability is a concern, leading to more channel insecurity in the UWSN deployment.
In all these network design challenges, SDA protocol leads to the unreliability nature of the USN (underwater sensor node) or the channels. Based on this, the USN channel’s packet drop and energy efficiency become more challenging. However, our proposed SDAA protocol depends on a clustered-based network design (CBND) that can reorganize the USN channel very well in a more energy-efficient manner. In addition, our proposed SDAA method utilizes multiple mobile sinks (MMS) for planning the appropriate path of underwater vehicle movement. Our proposed SDAA protocol reduces any communication overhead encountered in UVWSN. In addition, the challenge of the packet drop can be resolved through our proposed SDAA protocol using optimized secure data aggregation and authentication method deployed in CBND, which reorganizes the USN channels for greater energy efficiency and reduces packet drop in the network.
EEST secure MAC protocol is an energy-efficient and secure transmission scheme based on chaotic compressive sensing. The development and implementation of EEST aimed to guarantee data security for the USN, or channels, to prolong the UWSN lifetime. EEST used compressive sensing and exploited sensor data spareness using the time domain. Therefore, the protocol used a long-time transmission period. Thus, delay in the network was a pronounced effect, leading to energy efficiency limitations. EEST protocol reduced the number of transmissions of the USN or channel data during data sampling in each frame period, eventually transmitting the data to reduce the energy consumption of each USN in the UWSN. EEST chaotic compression encryption is used only to encrypt data at the end of specific periods.
This presupposes that delay and subsequent packet drop will be an issue. Another limitation is that the EEST protocol does not utilize MMS, and the UWSN architecture deployment was not in CBND.
To solve these challenges in EEST, our proposed SDAA protocol employs authentication and secure data aggregation optimized methods. It deploys the CBND network which utilizes MMS to ensure there is no communication overhead in the USN or channel and that makes the reliability of data transmission in UWSN is possible.
To solve all these design challenges encountered in the secure MAC protocols, such as SEFSC, SDA, and EEST, our proposed SDAA protocol develops a new secure system model and probability analytical models to reevaluate new performance metrics for the reliability, average packet drops, and energy efficiency of the UVWSN.
3.1. Secure Data Aggregation and Authentication Modeling
Secure data aggregation and authentication ensure network reliability and energy efficiency are maintained in the UVWSN in CBND. Therefore, due to the unreliable nature of the USN channel and packet drop deployment found in secure MAC protocols, including SEFSC, SDA, and EEST, our proposed SDAA protocols employ secure data aggregation and authentication-optimized methods based on cluster-based network design (CBND). Based upon this, we modeled a cluster network in [
22] for our proposed SDAA protocol to evaluate data reliability and compare the performance of the network deployment with the other secure MAC protocols, EEST, SDA, and SEFSC.
Therefore, our proposed SDAA protocol employs optimized secure data aggregation and authentication methods to use trustworthiness or data integrity to provide data reliability deployment in CBND for UVWSN Consequently, we can deploy UVWSN to monitor and inspect vehicles, including ship structures [
23]. For the proper authentication of individual USNs (underwater sensor nodes) in the network, the SDAA protocol utilizes the base station (BS). It deploys cluster heads (CH) and cluster nodes (CN) in the UVWSN.
Figure 1 depicts the secure data aggregation and authentication optimized arrangement deployment in CBND that utilizes two steps: The first involves labels 1–4. These steps involve the aggregation process. In step 1, CH sends a registration request to the gateway. In step 2, the request is decrypted and retrieved, and in step 3, the GW generates the hash value of the data. In step 4, the decision of the hash value is determined by CH, if it is yes or no. Secure authentication of cluster heads (CHs) follows. The authentication process also utilizes protected data aggregation (found in the next section).
In the second step, which involves labels 5–9, gateways (GWs) authenticate CHs. The authentication process is required to confirm that the operating CH in each cluster is a valid USN. Based upon these steps, the CH node must also not be compromised. This ensures that the entire cluster is in safe operation. Each USN is used to protect the data transmissions during the authentication process. It uses symmetric encryption (shared key encryption process) and sends the data to the CH. The data are then aggregated securely and transmitted to the base station (BS). Timestamp values are processed whenever compromised data or MNA (malicious node attacks) are detected, confirming the secure network operation.
3.2. System Model
The system model of the proposed SDAA protocol in the UVWSN aims to solve design challenges, including reliability, packet drop, and minimizing delay in UVWSN data transmission, based upon the CBND process, which we introduced by modeling [
23]. Therefore, the system model employs secure data aggregation and an optimized authentication method deployed in similar conditions to the other secure MAC protocols, including SEFSC, SDA, and EEST, without cluster-based network design (CBND) deployment. Based upon this, the SDAA protocol deploys multiple mobile sinks (MMS) (which will be explained in algorithm 4 in the next section) in CBDN. Our proposed SDAA protocol also deploys secure data aggregation and authentication-optimized methods to evaluate the network design challenges, based on the communication overhead, due to malicious node attacks (MNA) in the UVWSN. Therefore, our proposed SDAA protocol utilized the USNs (underwater sensor nodes) or channels deployed in the UVWSN. However, UVWSN has peculiar features of underwater acoustic channels that use low signal propagation speed (approximately 1.5 km/s).
Therefore, the system model utilizes USN, CH (cluster head), GW (gateway), and base station (BS). Consequently, the system model uses UVWSN transmission monitoring techniques.
Figure 2 depicts the proposed system model. Each USN involves at least one cluster managed by CH, and BS associates with CH to the GW through acoustic links. Acoustic links apply to the UVWSN monitoring application. Thus, GW has unlimited energy resources because of optimized secure data aggregation and authentication methods, which use perfect time synchronization of the USN information delivery in the network. The complete energy efficiency capability of the system model is also due to the multiple mobile sinks (MMS) and CBND method deployed in the proposed SDAA protocol. This can reduce overhead information in the network, thereby increasing energy efficiency. During the monitoring operation of the UVWSN application, two or more GWs can link together. This reduces any delays in the network. GWs can communicate with each other through radio frequency (RF) links.
3.3. Secure Authentication of Cluster Head
Secure authentication of cluster head utilizes authentication and secure data aggregation optimized methods to authenticate each USN or cluster node (CN) in the UVWSN. Therefore, cluster heads (CHs) [
23] are a gateway between UNS and BS. CH deployment is vital in securing data aggregation and authentication in the UVWSN.
In addition, through the secure authentication of CH, route establishment among clusters and all the CHs are authenticated to a GW. Here, every CH in the network initially generates a secret key and sends a registration request with a GW. CH further creates a hash value and signs it. Thus, CH uses a secret key and sends a request to another GW. The request is decrypted at GW using the public key of CH. CH also retrieves the time stamp. GW generates registration confirmation using the hash value received, including the time stamp. Both hash values are compared. Whenever any variation is observed, it is ignored, and this further authenticates CH. GW sends a registration response to CH after signing the hash value. Thus, CH uses the secret key of GW. Subsequently, CH determines that it has been authenticated. It does that by decrypting the registration response received using the public key of a GW. The process of CH authentication is also described in Algorithm 1.
Algorithm 1: Cluster head authentication process |
1. Every CH initially generates SKCH. 2. CH creates CHRR which consists of [CHid, GWid, Ts1] 3. CH signs Ts1 with SKCH to create SKCH (Ts1) 4. CH generates a hash value of CHRR as H1 = H (CHid, GWid, Ts1) 5. CH generates MRREQ by signing H1 using SKCH as MRREQ = SKCH [H (CHid, GWid, Ts1)] 6. CH sends SKCH(Ts1) and MRREQ to GW 7. GW decrypts SKCH(Ts1) using PKCH and retrieves Ts1 8. GW decrypts MRREQ using PKCH and retrieves CHRR 9. GW creates hash value of CHRR as H2 = H (CHid, GWid, Ts1) 10. GW compares H1 and H2 If H1 does not match with H2, Then, GW discards MRREQ Else GW confirms that CH is a valid node. GW creates as CHRC [CHid, GWid, Ts2] GW creates hash value of CHRC as H3 = [H(CHRC)] GW signs [H (CHRC, Ts2)] using CKGW to create MRRES as MRRES= SKCH [H(CHRC)] MRRES is sent to CH by GW End If 11. CH decrypts it using PKGW and retrieves H (CHRC, Ts2) 12. CH determines that GW has authenticated it |
Following, a GW individually and securely authenticates every CH. This ensures that any vulnerable or malicious node attacker (MNA) encountered in the UVWSN does not control the cluster operation, protecting the cluster from being compromised.
Table 1 shows the used notation of the proposed secure authentication algorithm.
3.4. Protected Data Aggregation
Protected data aggregation [
24,
25] occurs after ensuring that the selected CH is well-authenticated as a feasible solution for the UVWSN.
This ensures that each USN can transfer data and securely aggregate it to its CH operation. Each USN in the UVWSN deployment is controlled by protected data aggregation. Thus, each USN protects the data transmission using symmetric encryption before sending it to the CH. The data transmission at CH is aggregated securely and further transmitted to base station (BS), where compromised MNAs (malicious node attackers) can be detected, removed, and managed accordingly. This process is described in Algorithm 2.
Algorithm 2 ensures that secure data transmission is well performed in the network. The secure methods used in the algorithm include secure authentication and secure data aggregation by each CH in the UVWSN. Therefore, BS checks the aggregated data for authenticity, and BS checks its time stamp as well. Any detected compromised USN data are discarded, and this ensures the safety of the remaining aggregated data. The detected compromised/malicious node is isolated from the cluster. This maintains network security in the network.
A process flow diagram of the proposed SDAA protocol is used and displayed in
Figure 3 to show the overall processing of information. In
Figure 3, process flows 1 and 2 indicate the CH authentication with its GW. Process flows 3 indicates the symmetric data encryption by the USN, and process flow 4 demonstrates the decryption of received data by the BS. Used notations are shown in
Table 2.
Table 2.
Used notations and description for Algorithm 2.
Table 2.
Used notations and description for Algorithm 2.
Notations | Meaning |
---|
| Sensors |
| |
| Timestamp at which the data are sensed at S |
Km | Master key |
Ki | Encryption key of Si |
Kd | Decryption key of BS |
EncK | Encryption using Ki |
D | Sensed data |
DEnc(i) | Encrypted data at Si |
DEnc(col) | Collection of encrypted data from all Si at CH |
DEnc(CH) | CH’s encrypted data |
DEnc(agg) | Aggregation of encrypted data |
Algorithm 2: Secure data aggregation process |
1. GW initially generates Km and then builds Ki for each in the cluster using H as Ki= H (Km || ) 2. While transmitting D, builds a hash value HMAC as HMAC = MAC (D || ) 3. Si encrypts HMAC along with D and sends it to respective CH. 4. DEnc(i) = EncK [D || HMAC || Sid] 5. CH collects DEnc(i) from all Si and creates DDEnc(col) as D(col) = DEnc (1) + DEnc (2) + … + DEnc(n) because i = 1, 2…, n 6. CH aggregates DDEnc(col) with its own encrypted data DEnc(CH) and send it to BS 7. DEnc(agg) = DDEnc(col) + DEnc(CH) 8. BS decrypts DEnc(agg) using Kd and retrieves D and Ts sent by each Si. 9. BS compare Ts associated with each Si 10. If any Ts is found older than others, 11. Then, the associated Si is confirmed as malicious, and D is discarded. |
3.5. Probability Analytical Model for Malicious Node Attacker(MNA) Detection
This research utilizes a probability analytical model for detecting malicious nodes attackers (MNAs) in the underwater vehicular wireless sensor network (UVWSN), utilizing USN and other network devices. Therefore, using the probability analysis of the proposed SDAA protocol, we determine possible MNAs in UVWSN, deployed in a comparable situation in the other secure MAC protocols, including SEFSC [
6], SDA [
7], and the EEST [
8]. Therefore, we model packet drop in [
6], using the probability analysis for detecting MNA to correct any signature mismatch in the network. Subsequently, we determine the network reliability and packet drop.
The probability of false detection and isolation of MNA, in our proposed SDAA protocol, becomes necessary and is modeled as follows:
In the probability analytical model for MNA detection, the following parameters are used:
= Probability of detecting malicious USN due to mobility and other external factors
= Probability of packet drops in the network
= Packet generation rate of the USN deployment in UVWSN
= Time interval during data transmission and secure data aggregation
= Number of signature mismatches of node among its neighbors
Then, the probability of
exceeding the maximum threshold
is given by Equation (1).
where,
NH is the number of neighbors of node
() is the probability of false detection of node , which is given by Equation (3).
Then, the probability of false isolation
is given by Equation (4).
3.6. Secure Aggregation of Cluster Head Algorithm and Secure Sink Authentication
3.6.1. Secure Aggregation of Cluster Head Algorithm
Algorithm 3, seen below, is implemented in our proposed SDAA protocol. This algorithm was deployed for secure aggregation by the cluster head (CH) and BS in similar conditions with the other secure MAC protocols, including SEFSC, SDA, and EEST, which were deployed without cluster-based network design (CBND). Therefore, the SDAA protocol utilizes optimized secure authentication and securely aggregates a substantial number of underwater sensor nodes (USN), ensuring scalability, utilizing single-hop secure data aggregation in the CBDN method. Based upon this, we can reevaluate the reliability, delay, and energy efficiency based on Algorithm 3.
Algorithm 3: Process of Secure Aggregation and Cluster Head (CH) and BS Single-hop Communication |
1. If CH sends a single-hop broadcast message to all cluster members and authenticates the sensor nodes, then 2. the cluster members use single-hop to receive the query (Q) message, and each sensor node receives information from the CH after authentication. 3. for , then 4. sends and stores secure information to the BS after authentication, then 5. secure data aggregation nodes compute MAC single-hop, then 6. secure aggregated nodes authenticate the secure aggregated data before sending it to BS nodes, and 7. secure aggregated nodes send authenticated data to BS 8. End if |
3.6.2. Secure Sink Authentication
Algorithm 4 is implemented in our proposed SDAA protocol that helps in secure multiple sink deployment, with authentication, and secure data aggregation optimized method, for verifying the legitimacy of new nodes that are deployed, based upon multiple mobile sinks (MMS) nodes in the network. The process is performed with the base station (BS) and the CH in clustered-based network design network (CBDN) methods. Our proposed SDAA protocol is deployed in a similar condition in which other secure MAC protocols, such as SESFC, SDA, and EEST were deployed; however, without CBND and MMS methods in the network. Therefore, in our proposed SDAA protocol, we utilized MMS and optimized protocol [
26,
27] and deployed it in the system model, including secure data aggregation and authentication in CBND. Based upon this, we reevaluate performance metrics for reliability and energy efficiency of the UVWSN network based on Algorithm 4 as below.
Algorithm 4: Secure Multiple Sink Authentication |
BS: base station; : number of Mobile sinks; : cluster head nodes; Cert: certificate of the Mobile sink; : mobile information message. : query messages for , , and ; : Approval; : Mobile sink in the network; : secure data packets : distance between mobile sink; : Broadcast time of Mobile nodes; : valid mobile sink; : legitimate mobile sink; : illegitimate mobile sensor node; : entry into the network 1. Input 2. Output 3. for each member of the mobile sink in the SDAA models do 4. transmits a query message to all its cluster member mobile sink node 5. after receiving , the mobile sink node computes 6. 7. If any new mobile sensor node or mobile sink joins the network 8. then 9. update 10. recall 11. investigate for the 12. 13. check broadcast with 14. If and 15. then 16. approval 17. Else 18. 19. and not approval of 20. End if 21. End if 22. End for |
3.7. Modeling for Secure Underwater Vehicle (UV)
One of the main objectives of the proposed SDAA protocol is to use the protocol to investigate secure underwater wireless sensors (UWSN) utilizing underwater vehicles (UV) [
27]. Since the deployment of UWSN combined with UV results in an underwater vehicular wireless sensor network (UVWSN), the primary responsibility of UVWSN is to deploy the network for monitoring and inspecting vehicles in the ocean, including ship structures, and for navigational purposes.
Therefore, our proposed SDAA protocol was deployed for evaluating the underwater vehicular condition of the UVWSN in a similar condition with other secure MAC protocols, including SEFSC, SDA, and EEST, which were deployed only utilizing UWSN and did not utilize any vehicle (UV). Therefore, our proposed SDAA protocol, which utilizes UVWSN involving the deployment of UV, can detect malicious node attacks (MNA) under similar conditions to the other secure MAC protocols, including SEFSC, SDA, and EEST. Consequently, we assessed new performance based on the reliability of the UVWSN for detecting MNA using our proposed SDAA protocol and compared it with SEFSC, SDA, and EEST under the same monitoring conditions and deployment for the inspection of ship structures.
Therefore, in our proposed SDAA protocol, we deployed USNs in the UVWSN by optimizing [
8] and utilized this in the system model, such that UNS is placed in the rightful position for obtaining the USNs’ data reading in the network. Below, our novelty proposed mathematical model for UVWSN, for evaluating MNA data using the USN, without relying on navigational GPS location, is defined in Equation (5) as below:
denotes the different output positions of different mobile and static USN.
denotes varying times unfairness on different periods.
shows the probability of MNA vulnerabilities present in the system measured.
Equation (5) is used for determining MNA in USN data that could be present during various average times of the UVWSN monitoring operation. This improves performance metrics in measuring the reliability of the USN data in the UVWSN. Moreover, reliability in the network leads to assessing the overall energy efficiency of the proposed SDAA protocol, as explained below.
3.8. Secure Data Energy Evaluation Modeling Method
Secure data energy efficiency of the network can be evaluated by our proposed SDAA protocol and is used to determine energy efficiency in a comparable way in which the energy efficiency of secure MAC protocols, including SCFSC, SDA, and EEST, was determined. This is possible to assess the overall performance metrics of the network, based on the reliability and reduced delay of the entire network, for the measurement of the energy efficiency of the network.
To comply with the performance metrics measurement in the entire network, our proposed SDAA protocol, therefore, optimizes the energy efficiency method used in [
28] to evaluate the performance metrics of the network.
Based upon this, the energy consumption of the proposed SDAA protocol is divided into two parts: the first is secure data energy consumption
, and the second is secure data transmission energy consumption
. Consequently, we define the secure total energy consumption as:
Here,
is the energy of secure energy consumption of authenticated and aggregated data collected in the CBND,
is the secure energy consumption of authenticated and aggregated data collected, and
denotes the secure time collection of
data bits of the authenticated and aggregated data in the network.
In addition, the energy consumption of secure data transmission is influenced by bandwidth, transmission loss, and transmission delay. Secure data transmission energy consumption comprises of two parts: secure transmission energy consumption due to vulnerability or malicious node attacker (MNA) detection. The energy consumption of the secure data transmission is defined based on [
4,
23,
28]:
Here,
is the energy of the secure data transmission by the legitimate USN and vulnerable nodes in the UVWSN,
is the time of secure data transmission,
is the distance between CH and legitimate USN and the vulnerable sender and receiver underwater sensor nodes (USNs) energy loss, and
is the distance between the sender and receiver of the USN utilized in UVWSN.
In this research, the UVWSN network comprises the USN of the target legitimate USN and vulnerable nodes that securely collect the data through secure data aggregation and authentication methods deployed in the proposed SDAA protocol. This securely transmits data in the network using multiple mobile sinks (MMS) nodes, utilizing radio links in the CBND.
Since the speed is very rapid in underwater monitoring conditions, the secure data transmission time that utilizes the UVWSN monitoring application, which deploys MMS, CH, and BS, should be given priority. This will assist in measuring accurate energy efficiency and reduce delays in the network while utilizing USN links. This process is securely protected through the authentication of the secure aggregation methods in the network.
Consequently, different delays experienced in the network lead to obtaining accurate secure data collection delays, which include secure a computation delay
and time
used in the UVWSN network that involves target legitimate USN and vulnerable sensor nodes during secure data collection and waiting time
, determined as:
Here,
denotes the distance between USNs and other entities, such as MMS, CH, and BS, deployed in the UVWSN. Thus, target legitimate USN and vulnerable sensor nodes are denoted as
which include cluster head (CH) target legitimate USN, and vulnerable nodes used to collect secure data. Moreover,
is the average moving speed the USN uses from the present position to the target legitimate USN and vulnerable sensor nodes, denoted as
position.
4. Simulation Setup, Result Analysis, and Discussion
For the simulation setup of the proposed SDAA protocol models, we simulate an underwater vehicular wireless sensor network (UVWSN) scenario. We simulated this scenario using low-power radios. These radios include a high asymmetrical coverage ratio communication range and stochastic link features. Simulating UVWSN application occurs in realistic results scenarios.
Therefore, UVWSN propagation utilizing USN (underwater sensor node) channel model is simulated through the proposed SDAA protocol. The simulation was developed and implemented in the network using the Omnet++ network simulation tool. We used IEEE 802.15.4 low power UVWSN compatible medium access control protocol and considered using an area size 1400 × 1400 square meters. The simulation time is 600 s, and 250 sensor nodes are used in the entire simulation area.
We chose 90% of sensor nodes to be static USNs (underwater sensor nodes), and the remaining 10% are considered mobile USNs that could move due to water waves and other physical interference. We generated a malicious node attacker (MNA) scenario for 1–18 attackers to assess and determine the effectiveness of the proposed SDAA protocol methods. The proposed SDAA protocol compares with other state-of-the-art similar types of approaches, including self-sustaining, efficient, and forward-secure cryptographic (SEFSC) secure data aggregation (SDA) and energy-efficient and secure transmission (EEST), which were deployed in the UVWSN in similar simulation condition.
The simulator parameters are shown in
Table 3. Based upon this, we observed that similar scenarios of the simulation parameters are used throughout the investigation, which have been generated for the proposed SDAA protocol and the other competing standard secure MAC protocols, including SFSC, SDA, and the EEST. This is used to evaluate the effectiveness of the protocols. Based on the simulation results, we determine the following performance metrics.
End-to-end delay
Reliability ratio
Drop package
Energy consumption
Table 3.
Simulation Parameters.
Table 3.
Simulation Parameters.
Parameters | Parameters Value |
---|
Number of nodes | 250 |
Simulation time | 600 s |
Pause time | 5 s |
MAC protocols compared | SFSC, SDA, EEST, and SDAA |
Traffic rate generated | 60 Kb/s |
Attackers generated | 1 to 18 |
Propagation method used | Two ray ground |
Antenna used | Omni antenna |
The initial energy of each node | 50 J |
Received power | 0.8 W |
Transmission power | 2.5 W |
Mobile sink location | (300, 400) |
4.1. End-to-End Delay
We analyze and discuss the end-to-end delay of the simulation result of the proposed SDAA protocols and compare it to the other standard secure MAC protocols, including SFSC, SDA, and EEST, for determining the network’s end-to-end (E2E) delay. Thus, the E2E delay of the network is determined by the total time data takes to reach base station (BS). This includes encryption time at underwater sensor nodes (USN), aggregation time at CH, transmission time from CH to BS, and decryption time at BS.
Figure 4 depicts the results of the end-to-end delay for all the approaches. When malicious attackers are increased from 1 to 18, as shown in
Figure 4, the delay of the proposed SDAA protocol increases from 0.017 to 0.039. However, the delay of the SDA approach increases from 0.018 to 0.043, the delay of EEST increases from 0.018 to 0.047, and the delay of SEFSC increases from 0.018 to 0.048. Hence, the delay of the SDAA protocol is 18.2% lesser than other contending approaches.
4.2. Average Data Reliability Ratio
In the simulation result, we determined the average data reliability ratio of the proposed SDAA protocol. We compared it with the other standard secure MAC protocols, including SFSC, SDA, and EEST. The average data reliability ratio in the network is the ratio of data packets received successfully to the total number of packets transmitted in the network. The average data reliability ratio reflects the efficiency and reliability of the network.
Figure 5 depicts the results of the data reliability ratio for all the approaches. From
Figure 5, as attackers increased from 1 to 18, the average delivery ratio of the SDAA protocol decreased from 100% to 98.4%, and the delivery ratio of EEST decreased from 100% to 74.3%. The delivery ratio of SEFSC decreases from 100% to 80%, and the delivery ratio of SDA drops from 100% to 88.2%. Hence, the proposed SDAA protocol gets a 10.2% to 24.1% higher delivery ratio than other contending approaches.
4.3. Average Packet Drop
We analyzed the simulation result of the proposed SDAA protocol and compared it with the other contending standard secure MAC protocols, including SFSC, SDA, and EEST. Based on the result of the average packet drop in the network due to malicious node attacker (MNA) in the network. The average packet drop in the network is determined as the number of packets dropped due to MNA attacks experienced in the network.
Figure 6 depicts the results of the average packet drop for the proposed SDAA approach and the other contending approaches. As depicted in
Figure 6, when the number of MNA attackers increases from 1 to 18, the packet drops in the network were observed at 34 with the proposed SDAA protocol and 36, 41, and 44 for SEFSC, EEST, and SDA, respectively. Hence, the packet drop of the proposed SDAA protocol is 4–20% lesser than other competing approaches. The reason for fewer average packet drops for our proposed SDAA protocol is the result of the robust authentication method and secure aggregated data optimized method deployed in CBND, as compared to the other contending approaches, such as SEFSC, SDA, and EEST, which did not utilize CBND and secure authentication methods in their networks.
4.4. Average Energy Consumption
We determined the average energy consumption of the proposed SDAA protocol. We compared it with the other contending standard secure MAC protocols, including SEFSC, SDA, and EEST, based on the simulation result obtained in the network. The average energy consumption in the presence of a malicious node attacker (MNA)of the network is determined as the amount of energy consumed by the underwater sensor nodes (USN) during data transmissions. This is expressed as the average energy consumption of all the network USNs and the mobile nodes during the simulation.
Figure 7 depicts the average energy consumption for all the approaches.
The trend in the graph shows that more energy is consumed when the number of attackers increases from 1 to 18. Based upon this, the proposed SDAA protocol consumes 30 J, and the energy consumption of SEFSC, SDA, and EEST is 37, 42, and 44, respectively. Hence, the SDAA protocol consumes 7–14 J less energy than other competing approaches.
5. Conclusions
In this research, we have proposed secured data aggregation and authentication-optimized methods in a cluster-based based network design (CBND) deployed in an underwater vehicular wireless sensor network termed UVWSN. UVWSN utilizes application monitoring and the inspecting of a vehicle or ship structures for the navigational system in the ocean. Performance metrics of the network depend on reliability, energy efficiency, and the average packet drop of the USNs (underwater sensor nodes) based on multiple mobile sinks (MMSs) deployed in the CBND UVWSN. Performance metrics assessment depends on malicious node attacker (MNA) detection in the network. Performance metric measurements, including energy efficiency and average packet drop evaluation in our proposed SDAA protocols, were determined and compared with the other contending standard secure MAC protocols, such as SEFSC, SDA, and EEST, deployed in similar simulation conditions in the network.
Models of the proposed SDAA protocols were developed. They were deployed in the UVWSN scenario, which evaluates the network in the same condition as the other contending secure MAC protocol for measuring reliability, packet drop, delay, and energy efficiency in the network. In analyzing the simulation results based on the model developed for the proposed SDAA protocol, the proposed SDAA protocol guarantees higher data security in terms of reliability, packet drop, end-to-end delay, and average energy consumption. Therefore, the proposed SDAA protocol achieved higher energy efficiency of 30 J, less packet drop ratio, and less delay, as compared to the other contending standard secure MAC approaches, including EEST, which had 44 J, SEFSC had 37 J, and SDA had 42 J.
For future work, we plan to improve the proposed SDAA protocol by analyzing and detecting specific types of attacks, such as DDoS and collision attacks, at the MAC layer.