A survivability opportunistic routing protocol for Secure Underwater Acoustic Sensor Networks

Yifan Yuan, Xiaohong Shen, Yong Wang, Lin Sun, Shilei Ma

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Survivability helps ensure that underwater acoustic sensor networks (UASN) provide essential services under conditions of attacks, failures, and accidents. In this paper, a survivable opportunistic routing protocol is presented to improve the security of UASN. Firstly, whole network node's importance is continuously counted by sink node in the process of node information exchange. Then, by dynamic adjusting the node's hold-time (HT) based on node's importance at the opportunistic routing candidate set selection stage, we can improve the survivability of the UASN. Give the packet delivery rate (PDR) and end-to-end delay two measures to define the survivability of UASN. By simulating attacks, failures and accidents, the PDR and end-to-end delay results show that the proposed secure opportunistic routing protocol can greatly improve the survivability of the network.

Original languageEnglish
Title of host publication2022 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665469722
DOIs
StatePublished - 2022
Event2022 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2022 - Xi'an, China
Duration: 25 Oct 202227 Oct 2022

Publication series

Name2022 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2022

Conference

Conference2022 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2022
Country/TerritoryChina
CityXi'an
Period25/10/2227/10/22

Keywords

  • network security
  • sink node
  • survivability
  • Underwater acoustic sensor networks

Fingerprint

Dive into the research topics of 'A survivability opportunistic routing protocol for Secure Underwater Acoustic Sensor Networks'. Together they form a unique fingerprint.

Cite this