A secure and energy-efficient opportunistic routing protocol with void avoidance for underwater acoustic sensor networks

A secure and energy-efficient opportunistic routing protocol with void avoidance for underwater acoustic sensor networks

Recently, underwater acoustic sensor networks (UASNs) have gained wide attention due to their numerous applications in underwater surveillance, oil leakage detection, assisted navigation, and disaster prevention. With unique characteristics like increased propagation delay, constant mobility of sensor nodes, high error rate, and limitations in energy and interference, efficient routing of data packets from the source node to the destination is a major challenge in UASNs. Most of the protocols proposed for traditional sensor networks do not work well in UASNs. Although many protocols have been specifically proposed for underwater environments, the aim of most of them is to improve only the quality of service (QoS) in the network. The security of the transmitted data, energy efficiency of the participating nodes, and handling of communication voids are three significant challenges that need to be adequately addressed in UASNs. In this research work, a secure and energy-efficient opportunistic routing protocol with void avoidance (SEEORVA) is proposed. This protocol uses the latest opportunistic routing strategy for reliable data delivery in the network and also provides priority to the nodes having energy above a specific threshold in the forwarding process, thereby increasing the lifetime and energy efficiency in the network. The transmitted messages are encrypted using a secure lightweight encryption technique. The protocol is also integrated with a strategy to handle the communication voids in the network. Simulation results with Aqua-Sim validate the better performance of the proposed system compared to the existing ones

___

  • [1] Jouhari M, Ibrahimi K, Tembine H, Ben-Othman J. Underwater wireless sensor networks: A survey on enabling technologies, localization protocols, and internet of underwater things. IEEE Access 2019; 7: 96879-96899. doi: 10.1109/ACCESS.2019.2928876
  • [2] Menon V. Opportunistic routing protocols in underwater acoustic sensor networks: issues, challenges, and future directions. In: Fei Hu (editor). Magnetic Communications: From Theory to Practice. USA: CRC Press, 2017, pp. 127-148.
  • [3] Ang K, Seng J. Application specific Internet of Things (ASIoTs): taxonomy, applications, use case and future directions. IEEE Access 2019; 7: 56577-56590. doi: 10.1109/ACCESS.2019.2907793
  • [4] Anavangot V, Menon V, Nayyar A. Distributed big data analytics in the internet of signals. In: Proceedings of the IEEE International Conference on System Modelling and Advancement in Research Trends (SMART); Moradabad, India; 2018. pp. 73-77. doi: 10.1109/SYSMART.2018.8746983
  • [5] Liou EC, Kao CC, Chang CH, Lin YS, Huang CJ. Internet of underwater things: challenges and routing protocols. In: Proceedings of the IEEE International Conference on Applied System Invention; Chiba, Japan; 2018. pp. 1171-1174. doi: 10.1109/ICASI.2018.8394494
  • [6] Menon V, Joeprathap PM. Comparative analysis of opportunistic routing protocols for underwater acoustic sensor networks. In: Proceedings of the IEEE International Conference on Emerging Technological Trends (ICETT); Kollam, India; 2016. pp. 1-5. doi: 10.1109/ICETT.2016.7873733
  • [7] Alzubi JA, Almomani O, Alzubi OA, Al-shugran M. Intelligent and dynamic neighbourhood entry lifetime for position-based routing protocol using fuzzy logic controller. International Journal of Computer Science and Infor- mation Security 2016; 14(1): 118-128.
  • [8] Zorzi M, Casari P, Baldo N, Harris A. Energy-efficient routing schemes for underwater acoustic networks. IEEE Journal on Selected Areas in Communications 2008; 26(9): 1754-1766. doi: 10.1109/JSAC.2008.081214
  • [9] Coutinho RWL, Boukerche A. Opportunistic routing in underwater sensor networks: potentials, challenges and guidelines. In: Proceedings of 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS); Ottawa, Canada; 2017. pp. 1-2. doi: 10.1109/DCOSS.2017.42
  • [10] Menon V, Joeprathap PM. Analysing the behaviour and performance of opportunistic routing protocols in highly mobile wireless ad hoc networks. International Journal of Engineering and Technology 2016; 8(5): 1916-1924. doi: 10.21817/ijet/2016/v8i5/160805409
  • [11] Irandoost A, Taheri S, Movaghar A. PL-MAC: ProLonging network lifetime with a MAC layer approach in wireless sensor networks. In: Proceedings of the Second International Conference on Sensor Technologies and Applications; Cap Esterel, France; 2008. pp. 109-114. doi: 109-114.10.1109/SENSORCOMM.2008.120
  • [12] Alrabea A, Alzubi OA, Alzubi JA. A task-based model for minimizing energy consumption in WSNs. Energy Systems 2019. https://doi.org/10.1007/s12667-019-00372-w
  • [13] Almomani O, Al-Shugran M, Alzubi JA, Alzubi OA. Performance evaluation of position-based routing protocols using different mobility models in manet. International Journal of Computer Applications 2015; 119(3): 43-48.
  • [14] Kaur K, Kumar N, Garg S, Rodrigues JPC. EnLoc: data locality-aware energy-efficient scheduling scheme for cloud data centers. In: Proceedings of the IEEE International Conference on Communications (ICC); Kansas City, USA; 2018, pp. 1-6. doi: 10.1109/ICC.2018.8422225
  • 15] Kaur K, Garg S, Kaddoum G, Gagnon F, Kumar N et al. An energy-driven network function virtualization for multi-domain software defined networks. In: Proceedings of the IEEE INFOCOM - IEEE Conference on Com- puter Communications Workshops (INFOCOM WKSHPS); Paris, France; 2019. pp. 121-126. doi: 10.1109/INF- COMW.2019.8845314
  • [16] Kaur K, Garg S, Kaddoum G, Bou-Harb E, Choo KR. A big data-enabled consolidated framework for energy efficient software defined data centers in IoT setups. IEEE Transactions on Industrial Informatics 2020; 16(4): 2687-2697. doi: 10.1109/TII.2019.2939573
  • [17] Jiang S. On securing underwater acoustic networks: A survey. IEEE Communications Surveys and Tutorials 2019; 21(1): 729-752. doi: 10.1109/COMST.2018.2864127
  • [18] Menon V, Joeprathap PM. Opportunistic routing with virtual coordinates to handle communication voids in mobile dd hoc networks. In: Proceedings of the Second International Symposium on Signal Processing and Intelligent Recognition Systems; Trivandrum, India; 2015. p. 323-334.
  • [19] Rajesh S, Paul V, Menon V G, Khosravi M. A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 2019; 11(2): 293. doi:10.3390/sym11020293
  • [20] Xie P, Zhou Z, Peng Z, Yan H, Hu T et al. Aqua-Sim: An NS-2 based simulator for underwater sensor networks. In: Proceedings of the OCEANS 2009, MTS/IEEE Biloxi - Marine Technology for Our Future: Global and Local Challenges; Biloxi, USA; 2009. pp. 1-7. doi: 10.23919/OCEANS.2009.5422081
  • [21] Su Y, Fan R, Fu X, Jin Z. DQELR: An adaptive deep Q-network-based energy and latency-aware routing protocol design for underwater acoustic sensor networks. IEEE Access 2019; 7: 9091-9104. doi: 10.1109/ACCESS.2019.289159
  • [22] Mulla A, Jadhav V. Energy efficient routing protocol for underwater acoustic sensor network. In: Proceedings of the Second International Conference on Intelligent Computing and Control Systems; Madurai, India; 2018. pp. 1707-1712. doi: 10.1109/ICCONS.2018.8662952
  • [23] Bouabdallah F, Zidi C, Boutaba R, Mehaoua A. Collision avoidance energy efficient multi-channel MAC protocol for underwater acoustic sensor networks. IEEE Transactions on Mobile Computing 2019; 18(10): 2298-2314. doi: 10.1109/TMC.2018.2871686
  • [24] Ateniese G, Capossele A, Gjanci P, Petrioli C, Spacciniet D. SecFUN: Security framework for underwater acous- tic sensor networks. In: Proceedings of OCEANS 2015; Genova, Italy; 2015. pp. 1-9. doi: 10.1109/OCEANS- Genova.2015.7271735
  • [25] Shahapur S, Khanai R. Localization, routing and its security in UWSN - A survey. In: Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT); Chennai, India; 2016. pp. 1001-1006. doi: 10.1109/ICEEOT.2016.7754836
  • [26] Huang Y, Xiao P, Zhou S, Shi Z. A half-duplex self-protection jamming approach for improving secrecy of block transmissions in underwater acoustic channels. IEEE Sensors Journal 2016; 16(11): 4100-4109. doi: 10.1109/JSEN.2015.2446465
  • [27] Sonali J, Menon V, Nayyar A. Simulation-based performance analysis of location-based opportunistic routing protocols in underwater sensor networks having communication voids. In: Proceedings of Data Management, Analytics and Innovation; New Delhi, India; 2019. pp. 697-711.
  • [28] Wang Z, Han G, Qin H, Zhang S, Sui Y. An energy-aware and void-avoidable routing protocol for underwater sensor networks. IEEE Access 2018; 6: 7792-7801. doi: 10.1109/ACCESS.2018.2805804
  • [29] Peng X, Cui J, Lao L. VBF: vector-based forwarding protocol for underwater sensor networks. In: Proceed- ings of the International conference on research in networking; Coimbra, Portugal; 2006. pp. 1216-1221. doi: 10.1007/11753810_111
  • [30] Peng X, Zhou Z, Peng Z, Cui JZ, Zhi Z. Void avoidance in three-dimensional mobile underwater sensor networks. In: Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications; Boston, MA, USA; 2009. pp. 305-314. doi: 10.1007/978-3-642-03417-6_30