An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario
Abstract
:1. Introduction
- Establish a multi-attacker model. Considering the cooperative behavior among attackers, attackers can launch active attacks in addition to common passive attacks. In this paper, we use game theory to analyze the cooperation and competition between multiple attackers so as to design a comprehensive defense strategy against multiple threats;
- A virtual coordinate system transformation method is proposed as a means to protect the location privacy of source nodes. The real location information of the source node is effectively hidden to reduce the success probability of potential attackers;
- A new relay node selection strategy is proposed. The number of hops between the source node and the target node is increased to confuse the attacker’s inference about the source node location, thus reducing the possibility that the attacker can obtain the location of the source node by monitoring network traffic and strengthening the network’s defense against passive attacks. Furthermore, a secure data transmission method based on fountain codes is proposed to resist the active attack of attackers. By introducing redundant information, the reliability of data transmission is improved, the feedback and control overhead is reduced, the transmission efficiency is improved, and it can be adapted to different network environments and application requirements;
- A source location privacy protection scheme based on game theory is proposed. The interaction process between the attacker and the source node is described by evolutionary game equilibrium analysis, the balance point under different strategies is evaluated in time, and the defense strategy of the source node is dynamically adjusted to deal with multiple threats in time to ensure the security of source location privacy.
2. Related Work
2.1. Source Location Privacy Protection in WSNs
2.2. Source Location Privacy Protection in UASNs
3. System Architecture and Assumptions
3.1. Network Model
3.2. Underwater Acoustic Communication Model
3.3. Multiple-Attacker Model
4. SLP-MACGT Model Design
4.1. Network Initialization
4.2. Transformation Method Based on a Virtual Coordinate System
4.3. Relay Node Selection Strategy
- Limited Flooding: The source node uses limited Flooding to transmit messages within the monitoring range, and the number of hops is limited to to achieve directional routing. Once the target enters the monitoring range, the source node sets a timer and broadcasts the message to the nodes within the range of hops, and the of the sensor node is used as a unique identifier. is set to the maximum transmission time , which decreases with the transmission time until it reaches zero, when the receiving node stops forwarding messages. A node receiving message is marked as visible if its is less than (communication radius < eavesdropping distance). During the Flooding process, each node receiving message can obtain the minimum hop count from the source node to the node itself;
- H-hop-directed routing: According to the minimum number of hops from neighboring nodes to the source node, the next-hop node is selected for H-hop-directed routing to participate in packet forwarding. The forwarding time starts at zero and is increased by one for each execution until is reached. The farthest H-hop neighbor node acts as participant M and is responsible for forwarding the packet from the source node;
- Greedy quantitative routing: The length of greedy quantitative routing is defined as , and the relay node N forwards the data packet to the sink node with a transmission time of . In this process, care should be taken to randomly select a relay node N from the unseen region;
- Multi-path forwarding routing based on relay nodes: Node N generates angle , where , and randomly completes a variable length equal-hop path in the counterclockwise or clockwise direction to reach the next relay node O. Node O randomly selects an I-step equal-hop route to reach the sink node.
Algorithm 1: Relay Node Selection Strategy |
Input: Source Node, Communication Radius, Monitoring Range Output: Selected Relay Nodes |
Limited Flooding: |
1: to a predefined value; |
2: Initialize the hop count to limit the number of hops for directional routing; |
3: Broadcast a message within the monitoring range; |
4: Nodes receiving the message mark themselves as visible if their distance is less than the communication radius ; |
5: Calculate the minimum hop count from the source node to each visible node; |
Relay Node Selection: |
6: Identify relay nodes based on the minimum hop count and visibility; |
7: The farthest neighbor node of the hop acts as participant M and forwards the data packet away from the source node; |
8: The node that forwards the packet to the Sink node by forwarding time is selected as the next relay node N; |
9: The relay node N generates angle and randomly completes a variable length equal-hop path to reach the next relay node O; |
10: Node O randomly selects an I-step equal-hop route to reach the sink node; |
11: Ensure the relay node is positioned to obscure the actual location of the source node; |
Path Establishment: |
12: Establish secure transmission paths through selected relay nodes; |
13: Ensure data packets are forwarded through relay nodes to reach the sink node; |
14: Maintain the integrity and confidentiality of data transmission; |
End of Transmission: |
15: Stop the transmission process once data packets reach the sink node. |
4.4. Secure Data Transmission Based on Fountain Codes
4.4.1. Data Encoding
4.4.2. Data Decoding
4.5. Game Process between Sensor Nodes and Attackers
4.5.1. Basic Assumptions of the Game Model
4.5.2. Establishment of an Evolutionary Game Model
4.5.3. Replication Dynamic Equation of Tripartite Evolutionary Game
4.5.4. Nash Equilibrium of the Tripartite Game
5. Experimental Simulation and Analysis
5.1. Simulation Setup
- Packet delivery ratio (PDR): PDR is the probability of successfully forwarding data packets from the source node to the sink node;
- Network safety time: Network safety time refers to the time between the activation of the source node and the successful detection of the source node by the attacker under the premise that the source node continues to send packets;
- End-to-end delay: End-to-end delay represents the time required to transmit a data packet from a source node to the sink node;
- Energy consumption: Energy consumption represents the energy consumption of transmitting and receiving data and controlling data packets during a simulation run.
5.2. Performance of the SLP-MACGT Model
5.2.1. Effect of the Network Side Length on Performance
5.2.2. Effect of the Communication Radius on Performance
5.2.3. Effect of the Number of Attackers on the Safety Time
5.3. SLP-MACGT Comparison with Other SLP Schemes
5.3.1. Network Safety Time
5.3.2. End-to-End Delay
5.3.3. Packet Delivery Ratio
5.3.4. Energy Consumption
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Lyu, C.; Hu, X.; Niu, Z.; Yang, B.; Jin, J.; Ge, C. A light-weight neural network for marine acoustic signal recognition suitable for fiber-optic hydrophones. Expert Syst. Appl. 2024, 235, 121235. [Google Scholar] [CrossRef]
- Uyan, O.G.; Akbas, A.; Gungor, V.C. Machine learning approaches for underwater sensor network parameter prediction. Ad. Hoc Netw. 2023, 144, 103139. [Google Scholar] [CrossRef]
- Han, G.; Chen, Y.; Wang, H.; He, Y.; Peng, J. AUV-Aided Data Importance Based Scheme for Protecting Location Privacy in Smart Ocean. IEEE Trans. Veh. Technol. 2022, 71, 9925–9936. [Google Scholar] [CrossRef]
- Wang, Z.; Du, J.; Jiang, C.; Zhang, Z.; Ren, Y.; Han, Z. Dynamic Packet Routing Based on Acoustic Signal Curve Propagation in the AUV-Assisted IoUT. IEEE Internet Things J. 2023, 11, 9854–9869. [Google Scholar] [CrossRef]
- Han, G.; Shen, S.; Song, H.; Yang, T.; Zhang, W. A Stratification-Based Data Collection Scheme in Underwater Acoustic Sensor Networks. IEEE Trans. Veh. Technol. 2018, 67, 10671–10682. [Google Scholar] [CrossRef]
- Wang, Y.; Tian, Z.; Sun, Y.; Du, X.; Guizani, N. Preserving location privacy in UASN through collaboration and semantic encapsulation. IEEE Netw. 2020, 34, 284–290. [Google Scholar] [CrossRef]
- Sendra, S.; Lloret, J.; Jimenez, J.M.; Parra, L. Underwater acoustic modems. IEEE Sens. J. 2015, 16, 4063–4071. [Google Scholar] [CrossRef]
- Zia, M.Y.I.; Poncela, J.; Otero, P. State-of-the-art underwater acoustic communication modems: Classifications, analyses and design challenges. Wirel. Pers. Commun. 2021, 116, 1325–1360. [Google Scholar] [CrossRef]
- Abdalzaher, M.S.; Muta, O. A game-theoretic approach for enhancing security and data trustworthiness in IoT applications. IEEE Internet Things J. 2020, 7, 11250–11261. [Google Scholar] [CrossRef]
- Shokri, R.; Theodorakopoulos, G.; Troncoso, C. Privacy games along location traces: A game-theoretic framework for optimizing location privacy. ACM Trans. Priv. Secur. TOPS 2016, 19, 1–31. [Google Scholar] [CrossRef]
- Tian, X.; Du, X.; Wang, L.; Zhao, L.; Han, D. LSLPR: A Layering and Source-Location-Privacy-Based Routing Protocol for Underwater Acoustic Sensor Networks. IEEE Sens. J. 2023, 23, 23676–23691. [Google Scholar] [CrossRef]
- Wang, H.; Han, G.; Hou, Y.; Guizani, M.; Peng, Y. A Multi-Channel Interference Based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks. IEEE Trans. Veh. Technol. 2022, 71, 2058–2069. [Google Scholar] [CrossRef]
- Yanti, Y.; Away, Y.; Arif, T.Y.; Nasaruddin, N. Routing technique in location source privacy for wireless sensor network: A review. AIP Conf. Proc. 2024, 3082, 050002. [Google Scholar]
- Yang, G.; Dai, L.; Wei, Z. Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors 2018, 18, 3907. [Google Scholar] [CrossRef] [PubMed]
- Luo, J.; Chen, Y.; Wu, M.; Yang, Y. A survey of routing protocols for underwater wireless sensor networks. IEEE Commun. Surv. Tutor. 2021, 23, 137–160. [Google Scholar] [CrossRef]
- Ozturk, C.; Zhang, Y.; Trappe, W.; Ott, M. Source-location privacy for networks of energy-constrained sensors. In Proceedings of the Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, Vienna, Austria, 12 May 2004; pp. 68–72. [Google Scholar]
- Koh, J.Y.; Leong, D.; Peters, G.W.; Nevat, I.; Wong, W.-C. Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2105–2114. [Google Scholar] [CrossRef]
- Chen, Y.; Sun, J.; Yang, Y.; Li, T.; Niu, X.; Zhou, H. PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int. J. Intell. Syst. 2021, 37, 1204–1221. [Google Scholar] [CrossRef]
- Sun, J.; Chen, Y.; Lv, X.; Qian, X. A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node. In Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Espoo, Finland, 22–25 August 2022; pp. 280–286. [Google Scholar]
- Wu, X.; Ji, G.; Dou, W.; Yu, S.; Qi, L. Game Theory for Mobile Location Privacy. In Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Taipei, Taiwan, 6 October 2020; pp. 106–116. [Google Scholar]
- Han, G.; Wang, H.; Ansere, J.A.; Jiang, J.; Peng, Y. SSLP: A Stratification-Based Source Location Privacy Scheme in Underwater Acoustic Sensor Networks. IEEE Netw. 2020, 34, 188–195. [Google Scholar] [CrossRef]
- Wang, H.; Han, G.; Zhang, Y.; Xie, L. A Push-Based Probabilistic Method for Source Location Privacy Protection in Underwater Acoustic Sensor Networks. IEEE Internet Things J. 2022, 9, 770–782. [Google Scholar] [CrossRef]
- Liu, Y.; Han, G.; Wang, H.; Jiang, J. FPTSA-SLP: A Fake Packet Time Slot Assignment-based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks. In Proceedings of the 2021 Computing, Communications and IoT Applications (ComComAp), Shenzhen, China, 26–28 November 2021; pp. 307–311. [Google Scholar]
- Han, G.; Liu, Y.; Wang, H.; Zhang, Y. A Collision-Free-Transmission-Based Source Location Privacy Protection Scheme in UASNs Under Time Slot Allocation. IEEE Internet Things J. 2023, 10, 1546–1557. [Google Scholar] [CrossRef]
- Wang, H.; Han, G.; Liu, Y.; Li, A.; Jiang, J. AUV-Assisted Stratified Source Location Privacy Protection Scheme based on Network Coding in UASNs. IEEE Internet Things J. 2023, 10, 10636–10648. [Google Scholar] [CrossRef]
- Jian, Y.; Chen, S.; Zhang, Z.; Zhang, L. A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Trans. Wirel. Commun. 2008, 7, 3769–3779. [Google Scholar] [CrossRef]
- Wang, Q.; Dai, H.N.; Li, X.; Wang, H.; Xiao, H. On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks. Sensors 2016, 16, 721. [Google Scholar] [CrossRef]
- Li, F.; Ren, P.; Yang, G.; Sun, Y.; Wang, Y.; Wang, Y.; Li, S.; Zhou, H.; Li, W. An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. Secur. Commun. Netw. 2021, 2021, 6670847. [Google Scholar] [CrossRef]
- Ghoshal, R.; Mitra, N. Underwater explosion induced shock loading of structures: Influence of water depth, salinity and temperature. Ocean Eng. 2016, 126, 22–28. [Google Scholar] [CrossRef]
- Ozmen, A.; Yildiz, H.U.; Tavli, B. Impact of minimizing the eavesdropping risks on lifetime of underwater acoustic sensor networks. In Proceedings of the 2020 28th Telecommunications Forum (TELFOR), Belgrade, Serbia, 24–25 November 2020; pp. 1–4. [Google Scholar]
- Zhao, H.; Gong, Z.; Yan, J.; Li, C.; Guan, X. Unsynchronized Underwater Localization with Isogradient Sound Speed Profile and Anchor Location Uncertainties. IEEE Trans. Veh. Technol. 2024, 1–14. [Google Scholar] [CrossRef]
- Puducheri, S.; Kliewer, J.; Fuja, T.E. The design and performance of distributed LT codes. IEEE Trans. Inf. Theory 2007, 53, 3740–3754. [Google Scholar] [CrossRef]
- Bian, Y.; Lin, H.; Song, Y. Game model of attack and defense for underwater wireless sensor networks. In Proceedings of the 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 17–19 June 2022; pp. 559–563. [Google Scholar]
- Adami, C.; Schossau, J.; Hintze, A. Evolutionary game theory using agent-based methods. Phys. Life Rev. 2016, 19, 1–26. [Google Scholar] [CrossRef] [PubMed]
- Wang, H.; Han, G.; Lai, W.; Hou, Y.; Lin, C. A Multi-Round Game-based Source Location Privacy Protection Scheme with AUV enabled in Underwater Acoustic Sensor Networks. IEEE Trans. Veh. Technol. 2023, 72, 7728–7742. [Google Scholar] [CrossRef]
- Xing, G.; Chen, Y.; Hou, R.; Dong, M.; Zeng, D.; Luo, J.; Ma, M. Game-theory-based clustering scheme for energy balancing in underwater acoustic sensor networks. IEEE Internet Things J. 2021, 8, 9005–9013. [Google Scholar] [CrossRef]
Feature | Single Attacker | Multiple Attackers |
---|---|---|
Number of attackers | One attacker | Multiple attackers |
Attack complexity | Usually independent operations, relatively simple attacks | More sophisticated coordinated attack strategies |
Difficulty of detection | Easier to detect because it is a single entity | Complex to detect due to distributed actions |
Network influence | Some privacy impact | Significant privacy threat, especially when acting in concert |
Countermeasures to the attack | Easier to develop coping strategies | More sophisticated coping strategies may be required |
Attack surface | Limited to the capabilities of a single attacker | Broader attack surface with diverse strategies and resources |
Crypticity | Relatively easy to remain hidden and hard to detect | Difficult to remain completely hidden |
Strategy combination | |
Payoff of source node gain | |
Payoff of attacker A gain | |
Payoff of attacker B gain |
The Equilibrium Point | Eigenvalue 1 | Eigenvalue 2 | Eigenvalue 3 |
---|---|---|---|
Parameters | Default Values |
---|---|
Scale of the space | 1000 m × 1000 m × 1000 m |
Number of nodes | 250 |
Node placement method | Random placement |
Range of communication | 200 m |
Initial energy | 100 J |
Data packet size | 1024 bits |
Control package size | 128 bits |
Transmit power | 2 W |
Received power | 0.2 W |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, B.; Yue, X.; Hao, K.; Liu, Y.; Li, Z.; Zhao, X. An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario. Sensors 2024, 24, 2851. https://doi.org/10.3390/s24092851
Wang B, Yue X, Hao K, Liu Y, Li Z, Zhao X. An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario. Sensors. 2024; 24(9):2851. https://doi.org/10.3390/s24092851
Chicago/Turabian StyleWang, Beibei, Xiufang Yue, Kun Hao, Yonglei Liu, Zhisheng Li, and Xiaofang Zhao. 2024. "An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario" Sensors 24, no. 9: 2851. https://doi.org/10.3390/s24092851
APA StyleWang, B., Yue, X., Hao, K., Liu, Y., Li, Z., & Zhao, X. (2024). An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario. Sensors, 24(9), 2851. https://doi.org/10.3390/s24092851