A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks
Abstract
:1. Introduction
- Implements a blockchain framework to manage underwater nodes by clustering, utilizing AUVs as blockchain nodes for enhanced security in identity verification.
- Introduces an innovative clustering algorithm specifically designed to minimize energy consumption and extend the operational lifespan of networks under the unique constraints of underwater environments.
- Develops a group signature and authentication mechanism based on blockchain technology, featuring a two-round block verification process to secure node communications against consensus attacks.
- Conducts security analyses to validate the effectiveness of the proposed group signature scheme, demonstrating its resilience against various security threats in underwater settings.
2. Related Work
2.1. Clustering Algorithms for Underwater Wireless Sensor Networks
2.2. Blockchain Consensus Security
Category | Solution | Key Features | References |
---|---|---|---|
Blockchain-Based Security Solutions | Multi-AUV Cooperative Scheme | Enhances security using encryption algorithms in blockchain to secure multi-AUV communication | [21] |
Decentralized Identity Verification | Uses distributed ledger technology to enable secure underwater data exchange | [22] | |
Blockchain Consensus Mechanism Vulnerabilities | Double-Spend Attack Resistance | Double-spend attack resistance | [26] |
Increasing Block Confirmations | Increases the number of block confirmations to resist double-spend attacks | [27] |
3. Network Model
4. Blockchain-Based Collaborative Node Authentication Clustering Network Model
4.1. Clustering Method for Underwater Network
4.1.1. Improved LEACH Clustering Algorithm
- In the cluster head selection stage, each node generates a random constant . The base station broadcasts the ratio of the previous round’s cluster heads among all nodes. Afterwards, nodes compute their own election function value . Based on the comparison of these values, nodes decide whether to become cluster heads. If a normal node’s computed value is smaller than the threshold , the node is selected as the cluster head for that round; otherwise, the node becomes a cluster member. The threshold formula for is calculated asIn Equation (1), p is the proportion of cluster heads in the entire WSN; r is the current iteration cycle; and G is the set of nodes that have not been selected as cluster heads in the last rounds;
- Nodes successfully elected as cluster heads will broadcast their information, including their ID and threshold function. Non-cluster-head nodes will select the most suitable cluster to join based on the signal strength or position information from the received messages and then send a join request to the selected cluster head. The cluster head node determines whether to accept the node into the cluster. Ultimately, the network will form several clusters. Once all non-cluster-head nodes join a cluster head, the clustering process is complete;
- In the LEACH protocol’s data transmission stage, cluster members send the collected information to the cluster head using the time slots allocated by the cluster head. The cluster head aggregates the collected data and transmits the aggregated data to the surface base station. This stage continues until the network enters the next cluster head election process, where a new cluster structure is formed to begin the next round of clustering and data transmission. In the blockchain-collaborative node authentication clustering network model, the LEACH algorithm’s clustering process is shown in Figure 3.
4.1.2. Chaos-Particle Swarm Optimization-Based LEACH Clustering Algorithm
- Initialize the relevant parameters of the CPSO-LEACH algorithm, including the individual learning factor , the social learning factor , the inertia weight w, the population size m of the particle swarm, the particle dimension d, the maximum number of iterations , and the upper and lower bounds of particle velocity and . The updated equations for particle velocity and position are given by
Algorithm 1 CPSO-LEACH Clustering Algorithm. - 1:
- Initialize parameters: , , w, swarm size m, dimensions d, max iterations , ,
- 2:
- Initialize particle positions and velocities using Tent mapping
- 3:
- for each iteration n until do
- 4:
- for each particle to m do
- 5:
- Calculate fitness using LEACH-IMP clustering
- 6:
- if better than then
- 7:
- Update
- 8:
- end if
- 9:
- Update particle velocity :
- 10:
- Update particle position :
- 11:
- end for
- 12:
- if better than then
- 13:
- Update
- 14:
- end if
- 15:
- Evaluate global best and update if necessary
- 16:
- end for
- 17:
- Output optimal clustering strategy based on best fitness
- The Tent map strategy is used for population initialization and velocity initialization in the chaotic particle swarm optimization (CPSO) algorithm. The CPSO algorithm then calls LEACH-IMP for clustering. Once the clustering is completed, the initial fitness value is calculated, which is followed by the comparison of individual and global extrema. The iteration process for optimization begins. The fitness function is given byIn the above formula, N represents the total number of nodes, n denotes the total number of cluster heads, is the remaining energy of the cluster head nodes, and is the remaining energy of general nodes. In Formula (5), f is the energy evaluation factor, which represents the ratio of the total remaining energy of non-cluster-head nodes to the total remaining energy of the network. evaluates the energy dispersion of the clustering performed by the LEACH-IMP algorithm. The higher is, the higher the remaining energy of the cluster head is considered to be.In Formula (5), is the clustering compactness evaluation factor. is the distance from a regular node to the base station, and is the distance from a cluster head node to the base station. represents the ratio of the sum of the distances from all nodes to the base station to the sum of the distances from competing cluster heads to the base station. The larger the value of , the denser the clustering.Formula (6) provides the fitness calculation formula for the i-th iteration, where and are impact factors, and . From the fitness calculation formula, it can be seen that clustering with higher compactness and higher remaining energy of cluster head nodes results in a higher fitness evaluation of the clustering;
- Based on the updated fitness function formula, the individual best and global best values are updated. The positions and velocities of the particles are updated according to Formula (3), and the particle sequence undergoes chaotic optimization. The process continues until the maximum number of iterations is reached. The global best value is output, and the optimal particle best value corresponds to the optimal p value that results in the best clustering threshold.
4.2. Blockchain-Based Edge Computing Group Signature and Authentication Mechanism
4.2.1. Node Registration and Authentication
4.2.2. Group Signature and Authentication Mechanism Based on Blockchain Edge Computing
4.2.3. Two-Round Block Authentication
5. Security and Algorithm Complexity Analysis
5.1. Security Analysis
- Publishing their private chain within their group;
- Attempting to broadcast their private chain across the entire blockchain network.
5.2. Group Signature Mechanism Analysis
5.3. Algorithm Complexity Analysis
6. Simulation Results
6.1. Clustering Algorithm Evaluation
6.2. Analysis of Resisting Double-Spend Attack
6.3. Discussion
6.3.1. Computational Overhead of the Proposed Model
6.3.2. Deployment Scenarios and Operational Challenges
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Xing, G.; Chen, Y.; Hou, R.; Dong, M.; Zeng, D.; Luo, J. Game-theory-based clustering scheme for energy balancing in underwater acoustic sensor networks. IEEE Internet Things J. 2021, 8, 9005–9013. [Google Scholar] [CrossRef]
- Zhu, R.; Boukerche, A.; Long, L.; Yang, Q. Design Guidelines on Trust Management for Underwater Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2024, 26, 2547–2576. [Google Scholar] [CrossRef]
- Busacca, F.; Galluccio, L.; Palazzo, S.; Panebianco, A.; Raftopoulos, R. Adaptive Modulation in Underwater Acoustic Networks (AMUSE): A Multi-Armed Bandit Approach. In Proceedings of the ICC 2024—IEEE International Conference on Communications, Denver, CO, USA, 9–13 June 2024. [Google Scholar]
- Hao, Z.; Li, W.; Zhang, Q. Efficient clustering data collection in AUV-aided underwater sensor network. In Proceedings of the OCEANS 2023-MTS/IEEE US Gulf Coast, Biloxi, MS, USA, 25–28 September 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–6. [Google Scholar]
- Xu, Y.; Kong, X.; Cai, Z. Cross-validation strategy for performance evaluation of machine learning algorithms in underwater acoustic target recognition. Ocean Eng. 2024, 299, 117236. [Google Scholar] [CrossRef]
- Zhu, R.; Boukerche, A.; Huang, X.; Yang, Q. GHL-SAR: Secure and Adaptive Routing Based on GMM-HMM-LSTM for UASNs. In Proceedings of the IEEE Global Communications Conference (GLOBECOM 2023), Kuala Lumpur, Malaysia, 4–8 December 2023; pp. 4540–4545. [Google Scholar]
- Aman, W.; Al-Kuwari, S.; Muzzammil, M.; Rahman, M.M.U.; Kumar, A. Security of Underwater and Air–Water Wireless Communication: State-of-the-Art, Challenges, and Outlook. Ad Hoc Netw. 2023, 142, 103114. [Google Scholar] [CrossRef]
- He, M.; Liang, W.; Chen, G.; Chen, Q. Topology of underwater mobile wireless sensor networks. Control Decis. 2013, 28, 1761–1770. [Google Scholar]
- Mertens, J.S.; Panebianco, A.; Surudhi, A.; Prabagarane, N.; Galluccio, L. Network Intelligence vs. Jamming in Underwater Networks: How Learning Can Cope with Misbehavior. Front. Commun. Netw. 2023, 4, 1179626. [Google Scholar] [CrossRef]
- Yang, H.H.; Li, J.H.; Shen, S.; Xu, G.H. A deep convolutional neural network inspired by auditory perception for underwater acoustic target recognition. Sensors 2019, 19, 1104. [Google Scholar] [CrossRef] [PubMed]
- Zhu, R.; Boukerche, A.; Yang, Q. An Efficient Secure and Adaptive Routing Protocol Based on GMM-HMM-LSTM for Internet of Underwater Things. IEEE Internet Things J. 2024, 11, 16491–16504. [Google Scholar] [CrossRef]
- He, S.; Li, Q.; Khishe, M.; Salih Mohammed, A.; Mohammadi, H.; Mohammadi, M. The optimization of nodes clustering and multi-hop routing protocol using hierarchical chimp optimization for sustainable energy efficient underwater wireless sensor networks. Wirel. Netw. 2024, 30, 233–252. [Google Scholar] [CrossRef]
- Benelhouri, A.; Idrissi-Saba, H.; Antari, J. An evolutionary routing protocol for load balancing and QoS enhancement in IoT-enabled heterogeneous WSNs. Simul. Model. Pract. Theory 2023, 124, 102729. [Google Scholar] [CrossRef]
- Subramani, N.; Mohan, P.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. An efficient metaheuristic-based clustering with routing protocol for underwater wireless sensor networks. Sensors 2022, 22, 415. [Google Scholar] [CrossRef]
- Domingo, M.C.; Prior, R. A distributed clustering scheme for underwater wireless sensor networks. In Proceedings of the 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Athens, Greece, 3–7 September 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 1–5. [Google Scholar]
- Sun, H.; Pan, D.; Wang, D.; Meng, Z. LPLL-LEACH: A study of a low-power and low-delay routing protocol based on LEACH. Ad Hoc Netw. 2023, 140, 103064. [Google Scholar] [CrossRef]
- Tian, W.; Zhao, Y.; Hou, R.; Dong, M.; Ota, K.; Zeng, D. A centralized control-based clustering scheme for energy efficiency in underwater acoustic sensor networks. IEEE Trans. Green Commun. Netw. 2023, 7, 668–679. [Google Scholar] [CrossRef]
- Abdulzahra, A.M.K.; Al-Qurabat, A.K.M.; Abdulzahra, S.A. Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods. Internet Things 2023, 22, 100765. [Google Scholar] [CrossRef]
- Shah, S.M.; Hussain, T.; Shah, B.; Ali, F.; Zaman, K.; Kwak, K.S. CEER: Cooperative energy-efficient routing mechanism for underwater wireless sensor networks using clusters. Comput. Syst. Sci. Eng. 2023, 45, 2587–2602. [Google Scholar] [CrossRef]
- Misra, S.; Mukherjee, A.; Roy, A.; Saurabh, N.; Rahulamathavan, Y.; Rajarajan, M. Blockchain at the edge: Performance of resource-constrained IoT networks. IEEE Trans. Parallel Distrib. Syst. 2020, 32, 174–183. [Google Scholar] [CrossRef]
- Li, X.; Guo, Y.; Yan, L.; Xu, X. Energy-aware blockchain for multiple autonomous underwater vehicles cooperative operation. In Proceedings of the 2021 40th Chinese Control Conference (CCC), Shanghai, China, 26–28 July 2021; pp. 3005–3010. [Google Scholar]
- Yazdinejad, A.; Parizi, R.M.; Srivastava, G.; Dehghantanha, A.; Choo, K.K.R. Energy efficient decentralized authentication in internet of underwater things using blockchain. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 557–564. [Google Scholar]
- Iqbal, M.; Matulevičius, R. Exploring sybil and double-spending risks in blockchain systems. IEEE Access 2021, 9, 76153–76177. [Google Scholar] [CrossRef]
- Heilman, E.; Kendler, A.; Zohar, A.; Goldberg, S. Eclipse attacks on Bitcoin’s peer-to-peer network. In Proceedings of the 24th USENIX Security Symposium, Washington, DC, USA, 12–14 August 2015; pp. 129–144. [Google Scholar]
- Zhang, S.; Lee, J.H. A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J. 2019, 7, 4557–4565. [Google Scholar] [CrossRef]
- Ramezan, G.; Leung, C.; Wang, Z.J. A strong adaptive, strategic double-spending attack on blockchains. In Proceedings of the 2018 IEEE International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber, Physical and Social Computing and IEEE Smart Data, Halifax, NS, Canada, 30 July–3 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1219–1227. [Google Scholar]
- Zhu, R.; Boukerche, A.; Li, D.; Yang, Q. Delay-aware and reliable medium access control protocols for UWSNs: Features, protocols, and classification. Comput. Netw. 2024, 110631. [Google Scholar] [CrossRef]
- Singh, S.K.; Kumar, P.; Singh, J.P. A survey on successors of LEACH protocol. IEEE Access 2017, 5, 4298–4328. [Google Scholar] [CrossRef]
- Khan, W.; Wang, H.; Anwar, M.S.; Ayaz, M.; Ahmad, S.; Ullah, I. A multi-layer cluster-based energy efficient routing scheme for UWSNs. IEEE Access 2019, 7, 77398–77410. [Google Scholar] [CrossRef]
- Balamurugan, A.; Janakiraman, S.; Priya, M.D.; Malar, A.C.J. Hybrid marine predators optimization and improved particle swarm optimization-based optimal cluster routing in wireless sensor networks (WSNs). China Commun. 2022, 19, 219–247. [Google Scholar] [CrossRef]
- Yao, Y.; Xie, D.; Li, Y.; Wang, C.; Li, Y. Routing protocol for wireless sensor networks based on Archimedes optimization algorithm. IEEE Sens. J. 2022, 22, 15561–15573. [Google Scholar] [CrossRef]
- Grunspan, C.; Perez-Marco, R. Double spend races. Int. J. Theor. Appl. Financ. 2018, 5, 105–111. [Google Scholar] [CrossRef]
- Zhu, R.; Liu, L.; Li, P.; Chen, N.; Feng, L.; Yang, Q. DC-MAC: A Delay-aware and Collision-free MAC Protocol Based on Game Theory for Underwater Wireless Sensor Networks. IEEE Sens. J. 2024, 24, 6930–6941. [Google Scholar] [CrossRef]
Algorithm | Key Feature | Contributions | Refs |
---|---|---|---|
Metaheuristic Algorithm | Cluster head selection and routing optimization | Efficiently selects cluster heads and determines optimal routing paths for data transmission | [14] |
DUCS | Non-flooding routing, proactive routing, dynamic synchronization | Minimizes data loss and maintains communication quality in underwater networks | [15] |
LEACH protocol optimization | LEACH Protocol Optimization | Optimizes cluster head election and communication cost functions to address energy and delay issues | [16] |
Central Control-based Scheme | Node density-adaptive clustering and relay optimization | Extends network lifetime by achieving global energy balance optimization | [17] |
Fuzzy Unequal Clustering | Unequal clustering based on fuzzy logic | Optimizes cluster head selection and incorporates sleep scheduling | [18] |
AUV-Assisted Data Collection | Autonomous Underwater Vehicle (AUV) assistance | Reduces collection delay and optimizes transmission strategies for AUV-assisted UWSNs | [4] |
ECERO | Skipjack Tuna Optimization Algorithm (ECERO) | Optimizes energy consumption and solves the hotspot issue with energy-efficient cluster head selection | [1] |
CEER | Cooperative energy-efficient routing (CEER) | Improves network performance by optimizing clustering and cooperation strategies | [19] |
Parameters | Definition |
---|---|
MU | Normal nodes |
ES | Edge computing server |
RC | Registry |
AS | Authorization server |
GM | Group administrator |
Group i group public key | |
p | Proportion of cluster heads in the network |
Individual learning factor | |
Social learning factor | |
w | Inertia weight |
m | Population size of the particle swarm |
d | Particle dimension |
Maximum number of iterations | |
, | Upper and lower bounds of particle velocity |
, | Random numbers used in particle velocity calculation |
Position of particle i in dimension j | |
Velocity of particle i in dimension j | |
Best position of a particle | |
Best known position among all particles |
Parameters | Definition |
---|---|
Node deployment range | 100 m × 100 m |
Number of nodes | 100 |
Initial energy | 5 kJ |
Base station location | (50, 50) |
Packet size | 500 bit |
( 1, 2) | (0.6, 0.4) |
Population size | 3 |
Speed upper and lower limits | (5, −5) |
Individual learning rate | 1.49445 |
Group learning rate | 1.49445 |
Number of evolutions | 20 |
Chaos coefficient | 0.5 |
Number of Outgoing Blocks | Attack Hashrate = 0.2 | Attack Hashrate = 0.3 | Attack Hashrate = 0.4 |
---|---|---|---|
1 | 22.21% | 24.97% | 28.48% |
2 | 39.55% | 43.70% | 48.84% |
3 | 52.94% | 57.74% | 63.40% |
4 | 63.53% | 68.29% | 75.53% |
5 | 70.92% | 76.21% | 81.26% |
6 | 78.11% | 82.23% | 87.73% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, Y.; Li, Z.; Zhu, R. A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks. J. Mar. Sci. Eng. 2025, 13, 27. https://doi.org/10.3390/jmse13010027
Chen Y, Li Z, Zhu R. A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks. Journal of Marine Science and Engineering. 2025; 13(1):27. https://doi.org/10.3390/jmse13010027
Chicago/Turabian StyleChen, Yanxia, Zhe Li, and Rongxin Zhu. 2025. "A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks" Journal of Marine Science and Engineering 13, no. 1: 27. https://doi.org/10.3390/jmse13010027
APA StyleChen, Y., Li, Z., & Zhu, R. (2025). A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks. Journal of Marine Science and Engineering, 13(1), 27. https://doi.org/10.3390/jmse13010027