Trust-Aware and Fuzzy Logic-Based Reliable Layering Routing Protocol for Underwater Acoustic Networks
Abstract
:1. Introduction
- (1)
- The propagation speed of the acoustic waves in water is 1500 m/s, which leads to a long propagation delay.
- (2)
- The channel error rate is high due to the influence of the Doppler effect, path loss, ship noises, etc.
- (3)
- The acoustic signals can decay with increasing transmission distance when transmitted underwater; the exponential decay factor increases with increasing frequency; thus, low-frequency signals are more preferable for long-range communications, which results in a low bit rate.
- (4)
- The underwater node is powered by the battery, and it is difficult to recharge or replace the battery in harsh underwater environments, which results in the energy of the node being limited. However, underwater acoustic modems consume more energy in packet transmission than terrestrial radio frequency modems.
- (5)
- (1)
- A layering algorithm is proposed to configure a layer for each node according to the minimum hop count, which improves the delivery rate of packets by avoiding the problem of void area.
- (2)
- A fuzzy logic-based trust evaluation mechanism for underwater nodes, called FLTEM, is proposed. Considering the residual energy and different forwarding behaviors between HELLO packets and DATA packets, a fuzzy comprehensive evaluation decision model is introduced to calculate the direct trust value (DTV) of a neighbor node, and then the indirect trust value (ITV) is calculated according to the DTVs of the public neighbor nodes. Finally, the comprehensive trust value (CTV) can be obtained based on the DTV and ITV, and CTV can be used to effectively identify the MNs in the network. For instance, node n calculates the DTVn,a for its neighboring node a based on the communication behavior of node a, node a calculates the DTVa,k for its neighboring node k based on the communication behavior of node k; thus, the ITV of node k for node n is DTVn,a × DTVa,k. The CTV is the weighted sum of DTV and ITV. The calculation of DTV, ITV, and CTV is detailed in Section 4.
- (3)
- A trust-aware and fuzzy logic-based reliable layering routing protocol, called TAFLRLR, is proposed to achieve transmission reliability. TAFLRLR takes the CTV and node density (ND) of a candidate node as the input of FCS and the FP as the output. The candidate node with the maximum FP will be selected as the best next-hop node.
- (4)
- Simulation results in NS3 show that the TAFLRLR protocol has superior performance in terms of transmission reliability, routing reliability and energy efficiency.
2. Attacks in Underwater Acoustic Networks
- (1)
- A HELLO packet flooding attack occurs when an MN sends HELLO packets with higher power than that from a good node, which causes the nodes receiving the HELLO packet to consider the MN as their neighbor. In the subsequent data forwarding, the nodes that have received the HELLO packets from the MN may choose the MN as the best next-hop node and send the data packets to the MN. However, the transmission power of the normal nodes is less than that of the MN, which means that the data packets are unable to reach either the sink node or the MN.
- (2)
- Another HELLO packet flooding attack is considered in this paper. It occurs when an MN frequently floods HELLO packets in the network, which interferes heavily with the normal communication in UANs, intensifies the packet re-transmission, increases the network energy consumption, and reduces the packet delivery rate.
- (3)
- In a selective forwarding attack, the MN masquerades as a normal node in the network and drops packets with a certain probability, resulting in packet loss. So, selective forwarding attacks exacerbate packet re-transmissions, reduce the packet delivery rate, and consume much energy, which is unfavorable for energy-limited UANs.
3. Network Model and Network Initialization
3.1. Network Model
- (1)
- Each node in the network has a unique ID.
- (2)
- All the legal nodes in the network are isomorphic and have the same parameter settings, such as receiving power, transmitting power, idle power, sleeping power, and communication radius.
- (3)
- The source node generates packets periodically.
- (4)
- The CTV of each node in the network is initialized to 0.5 in the network initialization. Moreover, the value range of the CTV/DTV/ITV is [0, 1].
3.2. Network Initialization
3.3. Layering Algorithm
Algorithm 1: Layer update procedure | |
1: | Network initialization; |
2: | Lsink = 0; |
3: | Lcur = 0xFF; |
4: | HELLO_seq_num = 0; |
5: | When node N within the communication range of node M receives a HELLO packet; |
6: | if (Received_HELLO_seq_num != HELLO_seq_num) |
7: | if (Lcur == 255) then |
8: | Lcur = Lsend + 1; |
9: | Node N updates the header and load information of the HELLO packet and forwards it; |
10: | else |
11: | If (layer_aging_timer > 0 and Lcur < Lsend +1) then |
12: | Node N discards the HELLO packet and does not update its layer; |
13: | else |
14: | Lcur = Lsend + 1; |
15: | Node N updates header and load information of the HELLO packet and forwards it; |
16: | end if |
17: | end if |
18: | else |
19: | Node N updates its neighbor information table; |
20: | end if |
4. Trust Evaluation Mechanism
4.1. Direct Trust Value of Nodes
- (1)
- Construct the factor set , where u1, u2, and u3 represent HPFBTF, DPFBTF, and RERTF, respectively.
- (1)
- Construct the evaluation set to indicate the degree of trust for each trust factor (i.e., u1, u2, u3), where v1, v2, and v3 represent untrusted, trusted, and very trusted, respectively.
- (2)
- Get the membership degree matrix R. Membership degree of trust factors u1, u2 and u3 is obtained via the triangle membership function, which is shown in Figure 3.
- (1)
- Obtain the evaluation result. Given a fuzzy subset , , where wi represents the weight of the ith trust factor, and the weight is adjustable. Then, by utilizing the weighted average model [25], the evaluation result B can be obtained:
4.2. Indirect Trust Value of Nodes
4.3. Comprehensive Trust Value of Nodes
5. TAFLRLR Protocol
5.1. Overview of the TAFLRLR Protocol
- (1)
- With the TAFLRLR protocol, a layer is configured for each node, and DATA packets are transmitted layer by layer from a node with a higher layer to the sink node with layer 0, so the reliability of the routing is guaranteed.
- (2)
- The TAFLRLR is essentially a single-path routing, in which one path is established between a source node and the sink node. In each hop, the forwarding node is determined by the sender of the previous hop. Compared with multi-path routing, TAFLRLR can decrease the probability of packet collision and effectively reduce energy consumption.
- (3)
- The FLTEM mechanism is proposed for the trust evaluation of nodes. Specifically, with the consideration of HELLO packet forwarding behavior, DATA packet forwarding behavior, and residual energy, a fuzzy comprehensive evaluation decision model is introduced to calculate DTV for each node. In addition, combined with the DTV and ITV, the CTV is calculated to identify the MNs in UANs as well as select the best forwarding node.
- (4)
- The best forwarding node in the TAFLRLR is decided by the forwarding probabilities (FPs) of candidate forwarding nodes; the candidate forwarding node with the maximum FP is chosen as the best forwarding node. To improve the performance of the routing for UANs, the FP is calculated through a fuzzy control system (FCS) since the FCS has many advantages, such as low computational complexity and excellent adaptability [17,26]. In the FCS, the NDs and the CTVs of candidate nodes are taken as the input variables of the FCS, and the outputs of the FCS are the FPs of the input nodes.
5.2. Best Forwarding Node Selection and Data Forwarding
- (1)
- The linguistic values (i.e., fuzzy sets) are set for ND, CTV, and FP, respectively, as shown in Table 3.
- (2)
- By using the triangular membership function and the trapezoidal membership function, membership functions of linguistic values of ND and CTV are fuzzified and expressed as shown in Equations (14)–(16):
- (3)
- (4)
- Establish the rules of fuzzy control. The if–then rule is adopted in the FCS. The total fuzzy rules employed by the control engine are shown in Table 4. For example, if the ND is “Medium” and the CTV is “High”, the FP of the candidate forwarding node is “High”.
- (5)
- FP is obtained in this step through defuzzification. The center of gravity method is used to find the center of the area enclosed by the curve of membership degree function and the x-axis. The value of the horizontal coordinate corresponding to the center is the output value FP. Assume that the domain is discrete, and f(xi) is the membership degree of xi. Then, FP can be calculated via Equation (17).
- (6)
- Select the best forwarding node. The sending node takes the candidate node with the largest FP in step (5) as the best forwarding node and sends the DATA packet to the best forwarding node.
5.3. DATA Receiving
6. Performance Evaluation
6.1. Performance Metrics
6.2. Simulation Results Analysis
6.2.1. The Change of Trust Value of the Normal Node and MN
6.2.2. PDR with FLTEM and without FLTEM of the Network with Stationary Topology
6.2.3. PDR with FLTEM and without FLTEM of the Network with Dynamic Topology
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Zhang, Y.; Zhang, Z.; Chen, L.; Wang, X. Reinforcement Learning-Based Opportunistic Routing Protocol for Underwater Acoustic Sensor Networks. IEEE Trans Veh. Technol. 2021, 70, 2756–2770. [Google Scholar] [CrossRef]
- Luo, J.; Chen, Y.; Wu, M.; Yang, Y. A Survey of Routing Protocols for Underwater Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2021, 23, 137–160. [Google Scholar] [CrossRef]
- Ruby, R.; Zhong, S.; Elhalawany, B.M.; Luo, H.; Wu, K. SDN-Enabled Energy-Aware Routing in Underwater Multi-Modal Communication Networks. IEEE ACM Trans. Netw. 2021, 23, 965–978. [Google Scholar] [CrossRef]
- Jin, Z.; Ding, M.; Li, S. An Energy-Efficient and Obstacle-Avoiding Routing Protocol for Underwater Acoustic Sensor Networks. Sensors 2018, 18, 4168. [Google Scholar] [CrossRef] [PubMed]
- Li, C.; Gong, Z.; Su, R.; Zhang, D.; Venkatesan, R. An Adaptive Asynchronous Wake-Up Scheme for Underwater Acoustic Sensor Networks Using Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 2021, 70, 1851–1865. [Google Scholar] [CrossRef]
- Liu, J.; Yu, M.; Wang, X.; Liu, Y.; Wei, X.; Cui, J. RECRP: An Underwater Reliable Energy-Efficient Cross-Layer Routing Protocol. Sensors 2018, 18, 4148. [Google Scholar] [CrossRef] [PubMed]
- Zhao, Y.; Tian, B.; Chen, Z.; Liu, Y.; Ding, J. An Energy-Efficient Key Agreement Mechanism for Underwater Sensor Networks. In Proceedings of the IT Convergence and Security 2017, Singapore, 5 September 2018; pp. 146–158. [Google Scholar]
- Zhang, M.Y.; Cai, W.Y.; Zhang, H.T. Secure and Reliable Multi-Path Transmission Scheme on Underwater Acoustic Sensor Networks. In Proceedings of the International Conference on Computer & Electrical Engineering, Singapore, 11–14 December 2012. [Google Scholar]
- Du, X.; Peng, C.; Li, K. A secure routing scheme for underwater acoustic networks. Int. J. Distrib. Sens. Netw. 2017, 13, 1–13. [Google Scholar] [CrossRef]
- Peng, C.; Du, X. Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks. Comput. Eng. Appl. 2020, 56, 76–81. [Google Scholar]
- Jiang, J.; Han, G.; Zhu, C.; Chan, S.; Rodrigues, J.J.P.C. A Trust Cloud Model for Underwater Wireless Sensor Networks. IEEE Commun. Mag. 2017, 55, 110–116. [Google Scholar] [CrossRef]
- Krishnaswamy, V.; Manvi, S.S. Trusted node selection in clusters for underwater wireless acoustic sensor networks using fuzzy logic. Phys. Commun. 2021, 47, 101388. [Google Scholar] [CrossRef]
- Han, Y.; Hu, H.; Yao, M. Trust-Aware Secure Routing Protocol for Wireless Sensor Networks. Compu. Engin. 2021, 47, 145–152. [Google Scholar]
- Wei, Z.; Yang, G.; Cong, Y. Security of underwater Sensor Networks. Chin. J. Comput. 2012, 35, 1594–1606. [Google Scholar] [CrossRef]
- Gao, X.; Sun, Y. Research on key technologies of underwater wireless communication network security. Internet Things Technol. 2022, 12, 45–47. [Google Scholar]
- Hong, L.; Hong, F.; Peng, B.; Chen, J. Defend against Wormhole Attack Based on Neighbor Trust Evaluation in MANET. Comput. Sci. 2006, 33, 130–133. [Google Scholar]
- Han, D.; Du, X.; Liu, X.; Tian, X. FCLR: Fuzzy Control-Based Layering Routing Protocol for Underwater Acoustic Networks. IEEE Sens. J. 2022, 22, 23590–23602. [Google Scholar] [CrossRef]
- Xiu-Juan, D.U.; Huang, K.J.; Lan, S.L.; Feng, Z.X.; Liu, F. LB-AGR: Level-based adaptive geo-routing for underwater sensor network. J. China Univ. Posts Telecommun. 2014, 1, 56–61. [Google Scholar] [CrossRef]
- Zhu, J.; Du, X.; Han, D.; Wang, L.; Li, M. LEER: Layer-Based Energy-Efficient Routing Protocol for Underwater Sensor Networks. Mobile Netw. Appl. 2020, 27, 502–509. [Google Scholar] [CrossRef]
- Qin, D.; Jia, S.; Yang, S.; Ma, J. Research on trust sensing based secure routing mechanism for wireless sensor network. J. Commun. 2017, 38, 60–70. [Google Scholar] [CrossRef]
- Liu, J. Research on Trust Evaluation Models and Methods for Wireless Sensor Network. Master’s Thesis, Beijing Jiaotong University, Beijing, China, 2015. [Google Scholar]
- Zhang, Z.; Sun, Z. Node Credible Security Routing Protocol for Wireless Sensor Network Based on ACO. Chin. J. Sens. Actuators 2016, 29, 256–263. [Google Scholar] [CrossRef]
- Ganeriwal, S.; Balzano, L.K.; Srivastava, M.B. Reputation-based framework for high integrity sensor networks. ACM T Sens. Netw. 2003, 4, 1–37. [Google Scholar] [CrossRef]
- Yang, G.; Yin, G.; Yang, W.; Geng, G. Reputation model based on behaviors of sensor nodes in WSN. J. Commun. 2009, 30, 18–26. [Google Scholar] [CrossRef]
- Xie, J.J.; Liu, C.P. Fuzzy Mathematics Method and Its Application, 3rd ed.; Huazhong University of science and Technology Press: Wuhan, China, 2000. [Google Scholar]
- Hou, J.; Qiao, J.; Han, X. Energy-Saving Clustering Routing Protocol for Wireless Sensor Networks Using Fuzzy Inference. IEEE Sens. J. 2022, 22, 2845–2857. [Google Scholar] [CrossRef]
Bits | 8 | 16 | 8 | 16 | 2 | … | 16 | 8 | … |
Fields | Layer | S_ID | Layer | R_ID | Packet type 0:DATA 1: ACK 2: HELLO | … | Er | ND | … |
SN | RN | ||||||||
Position | Head | Load |
ID | Ln | Er | Nn_c | Na_c | Nn_d | Na_d | … |
---|---|---|---|---|---|---|---|
3 | 0 | Er3 | Nn_c3 | Na_c3 | Nn_d3 | Na_d3 | …. |
17 | 1 | Er17 | Nn_c17 | Na_c17 | Nn_d17 | Na_d17 | … |
41 | 2 | Er41 | Nn_c41 | Na_c41 | Nn_d41 | Na_d41 | … |
105 | 3 | Er105 | Nn_c105 | Na_c105 | Nn_d105 | Na_d105 | … |
⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ |
Input/Output Variables | Linguistic Values | ||||
---|---|---|---|---|---|
ND | Low | Medium | High | - | - |
CTV | Low | Medium | High | - | - |
FP | Rather Low | Low | Medium | High | Rather High |
Rule | ND | CTV | FP |
---|---|---|---|
1 | Low | Low | Rather Low |
2 | Low | Medium | Low |
3 | Low | High | Medium |
4 | Medium | Low | Low |
5 | Medium | Medium | Medium |
6 | Medium | High | High |
7 | High | Low | Medium |
8 | High | Medium | High |
9 | High | High | Rather high |
Simulation Parameter | Value | Unit |
---|---|---|
Simulation scene range | 500 × 500 × 500 | m |
Simulation time | 800 | s |
Proportion of MNs | 10–30% | |
DATA packet size | 154 | Bytes |
The moving speed of the nodes | 1–3 | m/s |
Transmitting power | 2.0 | w |
Receiving power | 0.1 | w |
Idle power | 0.01 | w |
Topology | Fixed/Random | |
Initial energy | 1000 | J |
Number of experiments | 30 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Han, D.; Du, X.; Wang, L.; Liu, X.; Tian, X. Trust-Aware and Fuzzy Logic-Based Reliable Layering Routing Protocol for Underwater Acoustic Networks. Sensors 2023, 23, 9323. https://doi.org/10.3390/s23239323
Han D, Du X, Wang L, Liu X, Tian X. Trust-Aware and Fuzzy Logic-Based Reliable Layering Routing Protocol for Underwater Acoustic Networks. Sensors. 2023; 23(23):9323. https://doi.org/10.3390/s23239323
Chicago/Turabian StyleHan, Duoliang, Xiujuan Du, Lijuan Wang, Xiuxiu Liu, and Xiaojing Tian. 2023. "Trust-Aware and Fuzzy Logic-Based Reliable Layering Routing Protocol for Underwater Acoustic Networks" Sensors 23, no. 23: 9323. https://doi.org/10.3390/s23239323