Next Article in Journal
Improving Video Segmentation by Fusing Depth Cues and the Visual Background Extractor (ViBe) Algorithm
Next Article in Special Issue
AEKF-SLAM: A New Algorithm for Robotic Underwater Navigation
Previous Article in Journal
Characterizing Dynamic Walking Patterns and Detecting Falls with Wearable Sensors Using Gaussian Process Methods
Previous Article in Special Issue
A Probabilistic and Highly Efficient Topology Control Algorithm for Underwater Cooperating AUV Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks

1
Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China
2
Department of Automation, Shanghai Jiao Tong University, Shanghai 200240, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(5), 1168; https://doi.org/10.3390/s17051168
Submission received: 31 March 2017 / Revised: 14 May 2017 / Accepted: 18 May 2017 / Published: 20 May 2017

Abstract

:
Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs consist of two kinds of nodes, i.e., sensor nodes (SNs), which cannot move autonomously, and actuator nodes (ANs), which can move autonomously according to the performance requirement. With the cooperation of SNs and ANs, the intruder detection probability is defined. Then, a virtual lattice-based monitor (VLM) algorithm is proposed to detect the intruder. In order to reduce the redundancy of communication links and improve detection probability, an optimal and coordinative lattice-based monitor patrolling (OCLMP) algorithm is further provided for UWSNs, wherein an equal price search strategy is given for ANs to find the shortest patrolling path. Under VLM and OCLMP algorithms, the detection probabilities are calculated, while the topology connectivity can be guaranteed. Finally, simulation results are presented to show that the proposed method in this paper can improve the detection accuracy and save the energy consumption compared with the conventional methods.

1. Introduction

In recent years, underwater wireless sensor networks (UWSNs) have been proposed to explore the ocean and support solutions for time-critical aquatic applications, such as port surveillance, environment monitoring, disaster prevention and mine reconnaissance; see [1,2,3] and the references therein. Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of UWSNs, especially when confidentiality has prime importance. For instance, in order to ensure the tracking performance, target surveillance applications often require detecting the absence or presence of an underwater intruder [4].
For terrestrial wireless sensor networks, the intrusion detection problem has been extensively studied, and barrier coverage is one of the most popular strategies to detect the existence of an intruder [5]. Since barrier coverage only needs a few nodes to construct a continuous barrier spanning the protected region, it is particularly efficient and low cost for intruder detection applications compared with area coverage. Early research in barrier coverage is focused on static sensors [6,7,8]. More recent research has examined barrier coverage with mobile sensor nodes. For instance, [9] jointly exploited sensor mobility and intruder arrival information to improve barrier coverage. In [10], a strong barrier coverage problem was investigated where the maximum moving distance of mobile sensor nodes is minimized. In [11], a maximum lifetime barrier coverage problem was investigated, whose goal is to maximize the lifetime of the barrier coverage offered by the hybrid sensor networks. However, these barrier coverage-based algorithms are only suitable for two-dimensional terrestrial environment, and they cannot be directly applied to the three-dimensional underwater environment.
To make up the shortcoming mentioned above, [12] derived the notion of three-dimensional stealth distance to measure how far a submarine can travel in a sensor network before being detected. In [13], a deployment strategy for the three-dimensional underwater environment was proposed, whose objective is to determine the minimum number of sensors to achieve optimal sensing and communication coverage. The work in [14] focused on the connectivity and k-coverage issues in the three-dimensional environment, where the minimum sensor spatial density was given to ensure k-coverage of sensor networks. To maximize the lifetime of sensor nodes and ensure the quality of intrusion detection, [15] proposed an outermost shell coverage algorithm to guarantee the recognition quality of intruding events in the three-dimensional environment. In these literature works, the nodes are static, and this design limits the autonomy of intrusion detection. For instance, in order to cover an area, the sensor nodes are required to be deployed with perfect positions; however, the static property of sensors and the dynamic property of the current prevent the perfect deployment. Inspired by this, some scholars put forward the deployment of underwater autonomous underwater vehicles (AUVs) to improve the autonomy. For instance, [16] developed the “Suave” (i.e., swarm underwater autonomous vehicle localization) algorithm to localize swarms of AUVs operating in rough waters, whose purpose is to ensure that all AUVs arrive at their destinations by preserving localization throughout the entire mission. Nevertheless, these underwater mobile nodes are very expensive due to the more complex underwater transceivers and to the hardware protection needed in the extreme underwater environment. Then, how to achieve the intrusion detection with a small number of mobile nodes becomes a new issue. Moreover, the transmission power for underwater acoustic communications is much higher than that in terrestrial radio communications, while batteries installed on underwater sensors are harder to recharge. Under these constraints, sensors near the sink that are consistently retransmitting data easily deplete their energy. Based on this, how to save the underwater communication energy becomes another issue. Normally, the so-called neighbor rule is widely used to illustrate the topology relationship of sensor nodes. For instance, a neighbor rule-based routing algorithm was analyzed for underwater static and moving nodes in [17]. Analyzing the network topology with the neighbor rule reveals that many interactions between sensors are redundant. The redundancy sometimes makes the communication complex and inefficient. In our previous work [18,19], a rigid graph-based dynamic coverage strategy was proposed to save the communication consumption of nodes. However, it is still unknown whether the rigid graph-based optimization can improve the intrusion detection performance in the underwater environment.
In this paper, we investigate the intrusion detection problem in the three-dimensional underwater environment, where connectivity and detection probability are both considered. The UWSNs are composed of a large number of SNs and multiple mobile actuator nodes (ANs). The roles of SNs and ANs are to detect the environment and perform monitor patrolling actions based on the detected data, respectively. Compared with traditional static sensor networks, this architecture not only has the capacity of detecting the environment, but also can make decisions based on the observations and perform monitor patrolling actions. On the other hand, only a small number of mobile ANs is used, and then, it is more economical compared with mobile sensor networks. Then, we propose a virtual-lattice-based monitor (VLM) algorithm to detect the intruder. An optimal and coordinative lattice-based monitor patrolling (OCLMP) algorithm is also provided for UWSNs to reduce the redundancy of communication links and improve detection probability. Under the VLM and OCLMP algorithms, the detection probabilities are both calculated, while the topology connectivity can be guaranteed. Comparing with [9], the proposed algorithm does not need to know the intruder prior information. In addition, the energy efficiency in this paper can be improved by compared with neighbor rule-based method [20].
The remainder of this paper is organized as follows: Section 2 includes the problem formulation and preliminaries. The main results of the intrusion detection algorithms are presented in Section 3. To verify the validity of the algorithm, some simulation results are given in Section 4. Finally, the conclusion and future work are given in Section 5.

2. Problem Formulation and Preliminaries

In this section, we first give the sensing model of SNs and ANs, then the energy model of the communication consumption is constructed. In addition, the average intruder detection probability is defined, and then, some preliminaries on graph theory are provided. In order to clarify and simplify the algorithms, it is assumed that nodes are time-synchronized and that each node knows its location, from some time synchronization techniques [21] and location schemes [22].

2.1. Sensing Model of SNs and ANs

As shown in the left part of Figure 1, the three-dimensional underwater space is described by small cubes [23]. Each layer of the space can be presented by a two-dimensional surface, as shown in the right part of Figure 1. We assume that each node (i.e., SN or AN) has a Boolean sensing model [24] with the sensing range R s , and the communication range is denoted by R c , where R c 2 R s . SNs and ANs can sense the environment and detect intruders within their sensing region, and the sensing region is described by the disk of radius R s centered at the node. In addition, AN can autonomously move in the region of interest (ROI). An intruder is said to be detected by an SN or AN if it has been located inside the sensing region of the SN or AN.

2.2. Energy Model for Communication Consumption

In the underwater environment, the energy consumption of nodes in the information transmission process is much greater than the ones in information sensing, processing and receiving [25]. Based on this, we use a common communication consumption model to describe the energy model of SNs and ANs, as proposed in [26]. Define p r as the power threshold for a node to receive the information package, and d is the transmitting distance. The energy consumption for transmitting information is denoted by E t x ( d ) , and it can be calculated as:
E t x ( d ) = T p · A ( d ) · p r
where T p denotes the transmitting time of the data package.
In Equation (1), T p is defined as:
T p = M b S v
where M b and S v are the size and transmission speed of the information package, respectively.
In addition, A ( d ) denotes the energy attenuation with the transmitting distance d, and it can be calculated as:
A ( d ) = d λ · β d
where λ is the energy spreading factor related to sensing model ( λ is 1 for cylindrical, 1.5 for practical and 2 for spherical spreading).
The parameter β = 10 α ( f ) / 10 is determined by the underwater acoustic absorption coefficient α ( f ) , and it can be given as:
α ( f ) = 0 . 11 10 3 f 2 1 + f 2 + 44 10 3 f 2 4100 + f 2 + 2 . 75 × 10 7 f 2 + 3 × 10 6
where f is the frequency of the carrier acoustic signal in kHz, and α ( f ) is in dB/m.
Denote the time of information package transmitting as t n , and the communication range is R t . With Equation (1), the energy model for communication consumption in node i is denoted by C e i , which is shown as:
C e i = E t x ( R t ) · t n

2.3. Average Intruder Detection Probability

Without loss of generality, let the detection area R be a thin cuboid, which is partitioned into many virtual lattices. It is assumed that SNs are independently deployed with a random uniform distribution. These SNs can be air-dropped or launched via artillery in battlefields or unfriendly environments. It has been proven in [27] that the Poisson process can well describe the deployment of SNs. Based on this, we denote the density of the Poisson process as λ , and the distribution is described in Figure 2. In a region R , the number of located SNs, i.e., N ( R ) , follows a Poisson distribution with parameter λ R , where R represents the volume of the region. Then, the probability of the SN quantity is given by:
P ( N ( R ) = k ) = e λ R ( λ R ) k k ! )
The coverage rate P c is defined as:
P c = 1 e k π R s 2 R
Obviously, it needs to deploy a large number of static sensors if the coverage rate P c approaches one. In order to improve the coverage rate with a small quantity of SNs, the deployment of ANs is necessary. In general, the intruder is assumed to stochastically arrive at each virtual lattice i, where i = 1 , 2 , , q . At an arbitrary lattice i, the intruder arrival time t is a random variable with a distribution of cumulative function F ( t ) . Due to the temporal correlation of intruder arrival times, we use the Weibull distribution to describe the arrival time of the intruder. The Weibull distribution can well characterize the temporal correlation of the arrival time of the intruder, and it has been widely applied to model many real-world random events, especially in a sparse environment. Based on this, the density is denoted as f ( t ) , and Figure 3 is given to show the distribution with different β . The cumulative function F ( t ) is described in Figure 4, wherein the probability between two arrival times is very small. The definition of F ( t ) is given as:
f ( t ) = β λ ( t λ ) β 1 e ( t λ ) β
F ( t ) = 1 e ( t λ ) β
where t 0 , λ 0 , and β 1 . When β = 1 , Weibull distribution becomes the well-known Poisson distribution.
The state of intruder arrival is denoted by O j t . O j t = 1 if an intruder arrives at lattice j during time slot t, and O j t = 0 otherwise. The state of SNs in lattice j is denoted by S j t . S j t = 1 if there are at least two SNs during time slot t in lattice j, and S j t = 0 otherwise. The state of ANs in lattice j is denoted by A j t , A j t = 1 if there is at least one AN staying at lattice j at time slot t, and A j t = 0 otherwise. Then, we characterize the state of lattice j at time slot t as L j t = ( O j t , S j t , A j t ) . Figure 5 illustrates that if an intruder arrives at lattice j during time slot t and there are at least two SNs, i.e., O j t = 1 and S j t = 1 , then the intruder is detected. Meanwhile, if an intruder arrives at lattice j during time slot t and the number of SNs is less than two, however, there is at least one AN staying at lattice j during the same time slot, i.e., O j t = 1 , S j t = 0 and A j t = 1 , then the intruder is also considered to be detected. From the above description, we can draw a truth table of state L j t to show the relationships among O j t , S j t and A j t . As stated in Figure 6, their relationship can be described as follows:
L j t = O j t S j t + O j t S ¯ j t A j t
As mentioned above, we define the following important performance metrics.
Definition 1 (average intruder detection probability): Given a sequence of states L j t = ( O j t , S j t , A j t ) , j = 1 , 2 , , m , the average intruder detection probability γ is defined as:
γ = lim t t = 1 t j = 1 m O j t S j t + t = 1 t j = 1 m O j t S ¯ j t A j t t = 1 t j = 1 m O j t
In Equation (11), we use states L j t to define the average intruder detection probability γ , which is calculated by the ratio of the number of detected intruders to all arriving intruders. This design models the arrival of the intruder at a specific lattice as a renew process. In Equation (11), the average intruder detection probability γ consists of two parts, i.e., deterministic intruder detection probability θ and monitoring intruder detection probability α . For instance, when the value of γ is 0.5, it means that half of the intruders can be detected by the SNs or ANs. Now, we present the following two definitions.
Definition 2 (deterministic intruder detection probability): If there is at least one SN in lattice j, the intruder can be monitored no matter when it arrives at this lattice. Then, the deterministic intruder detection probability θ is defined as:
θ = lim t t = 1 t j = 1 m O j t S j t t = 1 t j = 1 m O j t
Definition 3 (monitoring intruder detection probability): In the process of AN monitoring, the periodic intruder detection probability α is defined as:
α = lim t t = 1 t j = 1 m O j t S ¯ j t A j t t = 1 t j = 1 m O j t

2.4. Problem Definition

Given the previous discussions, the intrusion detection problem can now be stated as follows.
Problem 1: Considering the energy consumption and topology connectivity constraints, we aim to design a monitoring algorithm for SNs to detect the existence of an attacker in the three-dimensional underwater environment. Based on the lattice topology, we attempt to design a monitor patrolling algorithm for SNs and ANs to optimize the communication links and improve the detection probability.

2.5. Graph Preliminaries

In the following, we introduce rigid graph and optimally rigid graph, which are important notions about connectivity in topology optimization scheme. The topology relationship of AN-assisted UWSNs is represented by an undirected graph G . It consists of a center vertex set V = I i I i = 1 , 2 , , m , where I i is the ID number of virtual lattices, h i 3 is the positions, E = ( i , j ) V × V , i j is the edge set, and ( i , j ) represents the interconnection edges among the vertices. In addition, the SNs and ANs are denoted by S S N = S 1 , S 2 , , S c and S A N = S 1 , S 2 , , S n , respectively. This alternating sequence of distinct vertices and edges in the graph is called a ‘path’, and the graph G is ‘connected’ if there is a path between any pair of distinct nodes. Now, we first present the definitions of connectivity and rigid graph.
Definition 4 (connectivity) [28]: The graph is connected if there is a path between any pair of SNs in the active state.
Definition 5 (rigid graph) [29]: A framework (or graph) is rigid iff continuous motion of the points of the configuration maintaining the bar constraints comes from a family of motions of all Euclidean space, which are distance-preserving. A graph that is not rigid is said to be flexible.
Good connectivity is one characteristic of rigidity. Figure 7a is flexible, because the distance between Vertex 2 and Vertex 4 can be continuously changed freely; while Figure 7b is rigid, in which each vertex has at least two adjacent edges. Another two important notions are minimal rigidity and minimally weighted rigidity. A minimally-rigid graph is a rigid graph that no edge can be removed from without losing rigidity. As shown in Figure 7c and Figure 7d, the two frameworks are the same shape apart from the edge in Figure 7c and the edge in Figure 7d. To compare the two edge weights, the edge is equal to 2.5 less than the edge that equals 3.19. Then, we call the framework in Figure 7c as the minimally-weighted rigidity graph.
Generally, communication consumption of the network comes from two factors: (i) the number of links; and (ii) the sum of the length for all edges. Obviously, these factors are represented by the minimally-rigid graph. Thus, the minimally-rigid graph is adopted in this paper to optimize the communication consumption of the network. In order to ensure the rigid maintenance, the following lemmas are needed.
Lemma 1 [28]: The initial subgraph formed by one node and its n 1 neighbors is a rigid graph with 2 n 3 edges at least if R s satisfies R s R c 8 .
Notice that the communication range of a sensor node R c is an arbitrary value; thus, we give Lemma 2 to show the necessary condition to generate a rigid graph in a heterogeneous model.
Lemma 2 [28]: The initial subgraph formed by one node and its n 1 neighbors is a rigid graph with 2 n 3 edges at least if r satisfies r ( 1 D O I ) R m / 8 .
In framework G , we assume q i ( t ) is a differentiable function for each vertex i. If V ( i , j ) E satisfies q i q j = γ > 0 and ( q i q j ) T ( q ˙ i q ˙ j ) = 0 at the initial rotation time t 0 , we say that q ˙ = ( q ˙ 1 , q ˙ 2 ,⋯, q n ) is an infinitesimal flex. An infinitesimal flex is trivial if it results from a rigid motion of the framework. A framework is said to be infinitesimally rigid if it only has trivial infinitesimal flex. The infinitesimal rigidity of a framework is a stronger condition than rigidity, where all infinitesimally-rigid networks are rigid. Then, we build a matrix M , whose rows and columns correspond to the edges and coordinates of the vertices, respectively. Then, the row corresponding to the edge ( i , j ) is given as:
q 1 1 q 1 2 . . . q i 1 q i 2 . . . q j 1 q j 2 . . . q N 1 q N 2 ( i , j ) [ 0 0 . . . q i 1 q j 1 q i 2 q j 2 . . . q j 1 q i 1 q j 2 q j 1 . . . 0 0 ]
Lemma 3 shows the relationship between the infinitesimally-rigid graph and the rigidity matrix.
Lemma 3 [28,30]: M is a rigidity matrix of a general structure with n vertices. In two-dimensional space, if and only if when r a n k ( M ) = 2 n 3 , this structure is infinitesimal rigid.

3. Algorithm Description and Analysis

3.1. Virtual-Lattice-Based Monitor Algorithm

In this section, we describe the VLM algorithm to detect the arrival of an intruder. The monitoring area is regarded as a thin sea surface in underwater space. Similar to [31], the monitoring area can be divided into multiple equally-sized virtual lattices. Then, a set of SNs is randomly deployed in the sea surface. The roles of SNs are to collect data from the environment and to stay at a lattice to monitor the intruder. In order to better grasp the regional information, a set of ANs is allocated to monitor the intruder. Each AN dynamically changes its position and locally broadcasts a HELLO message with its max transmission range to all nodes at that lattice. Then, we record whether an AN has received the HELLO-ACK message. In the end, SNs and ANs cooperatively monitor the intruder arrival. The detailed process is given in Algorithm 1.
Algorithm 1 Virtual Lattice-Based Monitor Algorithm
1:
Input: S S N = S 1 , S 2 , , S c , the position of all SNs
2:
S A N = S 1 , S 2 , , S n , the position of all ANs
3:
With GAF, a cuboid is partitioned into many virtual small lattices, their ID set is denoted by I = I 1 , I 2 , , I m .
4:
for i I , ( i = 1 , 2, ⋯, m ) do
5:
 AN S z locally broadcasts a HELLO message to all nodes in lattice I i with its max transmission range.
6:
if AN S z receives a number of HELLO-ACK message which is greater than or equal to two then
7:
  Record I i P
8:
else
9:
  AN S z receives a number of HELLO-ACK message which equal to one
10:
  Record I i Q
11:
end if
12:
 Record center coordinates set I i = ( x i , y i , z i ) .
13:
end for
14:
Delete I i P and corresponding center coordinates from ID set I and I i .
15:
Record new ID set I i I , new center coordinates set I i I i .
16:
Output: The lattices that are required to be patrolled by ANs, and the ID set is I i .
The objective of Algorithm 1 is to find the lattices that are not satisfied with the two-coverage condition, and these lattices are required to be patrolled by ANs. Inspired by this, each AN locally broadcasts a HELLO message to all nodes in the lattice. By judging the received number of HELLO-ACK, ANs can record the ID set of lattices that are required to be patrolled by ANs. Especially, one-hop transmission is considered in each lattice, because the range of each lattice is relative small. To analyze the performance of Algorithm 1, the following theorem is given.
Theorem 1. In VLM, the average intruder detection probability γ is a constant under the ideal situation, where γ = θ + k m · n k = θ + n m , and n denotes the number of ANs.
Proof of Theorem 1.
According to Definition 1, the average intruder detection probability γ consists of two independent probability, i.e., the deterministic intruder detection probability θ and the periodic intruder detection probability α . Notice that θ is a deterministic value, and it does not change with time; while, the value of α depends on the number of intruders. In VLM, each AN does not need to know the intruder prior information; however, each lattice can always be selected to be monitored by ANs. It is assumed that the probability of intruder arrival at each time slot is F ¯ . Then, the number of ANs that have detected intruders is n F ¯ . In addition, k F ¯ denotes the remaining lattices that can accommodate the intruders. k is the difference between the number of all lattices and the lattices that have detected the intruders. These judgments are based on the k m , which is the premise of the monitoring intruder detection probability. Therefore, γ can be calculated as:
γ = θ + k m · n F ¯ k F ¯ = θ + n m
which completes the proof. ☐
Remark 1: As shown in Algorithm 1, each lattice is always monitored by an SN or AN. Based on this, the intruder can be detected by the AN-assisted UWSNs. If θ , n and m do not change with time, the average intruder detection probability γ will be a fixed value.

3.2. The Optimal and Coordinate Lattice Monitor Algorithm

In order to improve γ , this section proposes the OCLMP algorithm, which can be regarded as a weak barrier coverage. This algorithm is divided into two steps, and the first step is to generate and optimize the network topology. The optimized topology has good connection and low energy dissipation. If an intruder appears at a lattice with a optimized topology, the intruder can be detected. The second step is to coordinate the monitor patrolling of ANs. With the collaboration of ANs, the AN-assisted UWSNs can yield a much higher average intruder detection probability γ compared with the result in Section 3.1.
The OCLMP algorithm is described in Algorithm 2. A rigid graph is generated according to its neighbor rules among SNs (see Lines 1–9 in Algorithm 2). To decrease the complexity of the initial rigid topology, we delete some links that do not belong to global optimally-rigid graph by using locally-collected information (see Lines 1–17). Based on this, a low-energy dissipation network that is at least two-connected can be built.
Algorithm 2 Optimal Lattice Monitor Path Algorithm
1:
Input: s j S S c
2:
Compute all the neighbor links E i j and sequence it by length in an increasing way
3:
Initialize the M i , let M i = M i Δ ( 1 )
4:
j = 1 : E i j
5:
if ( r a n k ( M i ) 2 ( I i + 1 ) 3 ) then
6:
M i = M i M i Δ ( j + 1 )
7:
if ( M i is full rank) then
8:
  According to M i , record the edge E i j
9:
end if
10:
end if
11:
for l = { I i , i } do
12:
for k = { I i , i, k l } do
13:
  if ( ( k , l ) E i j ) then
14:
   Delete ( k , l )
15:
   Draw the edge of E i j
16:
  end if
17:
end for
18:
end for
As shown in Algorithm 2, the optimized graph can be given through the “drawing” and “deleting” implementations. In a broadcast medium, the implementations of “drawing” and “deleting” mean the changes of topology. That is to say, we can change the communication topology of UWSNs to design a desired routing relationship of SNs and ANs. If they are in each other’s transmission range, the deletion implementation means the change of topology. Similarly, the implementation of adding is also the change of topology. If intruders break into a lattice from any direction, they can be detected by the AN-assisted UWSNs. Next, a theorem is first introduced.
Theorem 2. In OCLMP, γ n + s m , where m is the total number of monitoring lattices.
Proof of Theorem 2.
This proof is similar to the proof in Theorem 1. Denote the average probability of intruder arrival at each time slot by F ¯ . Hence, the number of all lattices that can monitor intruders is m F ¯ . All actuators can detect the number of intruders n F ¯ ; s F ¯ is the number of lattices that can monitor intruders doubtlessly. Then, pulsing n F ¯ with s F ¯ , this means the total number ANs and SNs can detect the intruders at time slot t. The average intruder detection probability γ can be calculated as:
γ = n F ¯ + s F ¯ m F ¯ = n + s m
which completes the proof. ☐
Remark 2: In Theorem 2, when t goes to infinity, γ remains at the same value. However, the case of the value of γ equaling n + s m is an ideal situation. In general, the locations of SNs do not follow a uniform distribution. Inspired by this, we deploy ANs to patrol and collaborate with SNs. As stated in Lemma 3, the geometric relationships between neighbor nodes can expand the monitoring scope. Thus, the intruders can be detected if they travel through the expanded monitoring scope. Hence, it can be obtained that γ > n F ¯ + s F ¯ m F ¯ .
In order to find the shortest patrolling path, an equal price search strategy is further given for ANs. From Algorithm 2, some independent lattices are not monitored by ANs or SNs. These independent lattices are put in a set Q , and I i Q is its ID number, where i = 1 , 2 , ⋯, m . With the equal price search method, all of the independent lattices can be linked to the shortest road by the ID number. That is to say, this method is to find the shortest road for AN monitor patrolling. There are five points, i.e., A, B, C, D and E. Begin with Point A, and expand it by the ascending order to four new nodes, AB (7), AC (5), AD (3) and AE (10), where 7, 5, 3 and 10 are the distances between AB, AC, AD and AE, respectively. In addition, mark A as an expanded node, while AB, AC, AD and AE as waitingexpanded nodes. Compare the distance information among the four new nodes, and find the shortest distance to expand continuously. Then, AD (3) has the shortest distance, and we expand it to three new nodes, i.e, ADB (6), ADC (9) and ADE (11). Meanwhile, mark AD as the expanded node, and ADB, ADC and ADE as waiting expanded nodes. Then, comparing all of the waiting expand nodes, AC (5) has the shortest distance. Once more, expand AC to three new nodes ACB (8), ACD (13), ACE (14), and mark AC as the expanded node, while ACB, ACD, ACE are marked as the waiting expanded nodes. Update the waiting expand nodes, and find the node that has the shortest distance. ADB has the shortest distance. Then, repeat the above operation until all five points appear in a new expanded node. The shortest link among A, B, C, D and E can be built up. At last, ANs are assigned to monitor these independent lattices along this link. The pseudocodes can be found in Algorithm 3.
Algorithm 3 Equal Price-Basedd Search Method With Coordination SNs Monitor Patrolling Algorithm
1:
Input: New ID set I i Q , ( i = 1 , 2, ⋯, m ) and sequence it in an increasing way.
2:
Initialization, set the min ID I i in the waiting expand node list D k , set the have expanded node list H k = 0 .
3:
Take I i from D k and expand I i to I i I i + 1 , I i I i + 2 , ⋯, I i I m , meanwhile record the corresponding distance d i , i + 1 , d i , i + 2 , ⋯, d i , m . At last, put I i I i + 1 d i , i + 1 , I i I i + 2 d i , i + 2 , ⋯, I i I m d i , m into D k and I i into H k , respectively.
4:
Take min D k continue to expand, i.e., I i I i + 2 d i , i + 2 is the minimum node, expand it to I i I i + 2 d i , i + 2 , j i , j i + 2 , then update D k and H k .
5:
Continue Step 4 until a new expanded lattice with all of the ID sequence I i I i + 1 I i + 2 I m appeared.
6:
Set t = 0 , I i = 0 . According to the new ID sequence, assign each ANs to monitor one lattice.
7:
If there is no ANs monitoring at ID I i , Set I i = I i + 1 ; otherwise I i = 0
8:
Call algorithm 2.
9:
t = t + 1 , If an AN detects an intruder at time slot t 1 , then it claims itself not busy. Count the total number of not busy ANs n ¯ , if n ¯ > 0 , continue.
10:
The n ¯ ANs are newly selected to monitor lattices with ID I i = I i + 1 .
11:
Continue Step 6 until all ANs run out of energy.

4. Simulation Results

In this section, simulation results are provided to validate the effectiveness of the proposed method. A stationary two-dimensional Poisson point process is used to model the locations of SNs. Meanwhile, each virtual lattice is considered to be fully covered if at least one SN is located in this lattice. Accordingly to Lemma 3, the maximal transmission range is chosen as R m = 8 / ( 1 D O I ) , where D O I = 0 . 1 . The length of each virtual lattice is designed as a constant, i.e., r = 5 . Similar to the assumption in [32], the arrival time of the intruder in this paper is assumed to follow the independent and identically distributed Weibull distribution. In addition, it is designed that λ = 10 .
Based on the above design, 60 SNs are randomly deployed in the 50 × 50 region, and this region is divided into 100 virtual lattices. In Figure 8, the positions of SNs follow a Poisson distribution, and there exist gaping holes in the coverage lattice. Meanwhile, Figure 9 shows the coverage results of SNs, and it can been seen that most of the region can achieve multiple coverage. In order to improve the coverage rate and intrusion detection probability, the ANs in corresponding lattices are activated, and it can be seen that the region is fully covered by the SNs and ANs as shown in Figure 10. Obviously, the AN-assisted UWSNs can achieve full coverage with a minimal amount of activated ANs. Correspondingly, the invasive monitoring probability can be improved, and the improved full coverage can be seen in Figure 11.
Next, we evaluate the performance of BLMP, which is performed in an ideal condition. In Figure 12, we fix β = 4 , and the number of ANs is n = 10 . When N = 40 , which includes 30 SNs, the average intruder detection probability γ does not change with time slot T , as shown in Figure 12. To be more convincing, we change the value of N to 50, 60, 70 and 80. From Figure 12, it can be obtained that γ does not change during the continuous monitoring time slot T , and the values of γ satisfy the result in Theorem 1.
To investigate the impact of β on γ , we give a similar simulation result in Figure 13. Keeping N = 50 (40 SNs and 10 ANs), we fix the values of β to 4, 5, 6 and 7, and the results are the same when time slot T is varying. Finally, we set N = 40 and β = 5 as a comparison in Figure 14. It is clearly shown that only N can impact the value of γ . Intuitively, the optimal network structure constructed in Algorithm 2 is shown in Figure 15. According to (5), the energy consumption of SNs is computed, and Figure 16 shows the energy consumption comparison between the two topology structures. Compared with the non-optimization topology [20], the optimized network structure in this paper can improve the energy efficiency.

5. Conclusion and Future Work

In this paper, we investigate the underwater intrusion detection problem with AN-assisted UWSNs. In order to detect the attacker, a virtual-lattice-based monitor patrolling algorithm is first proposed. Meanwhile, an optimal and coordinative lattice-based monitor patrolling algorithm is also provided to reduce the redundancy of communication links and improve detection probability. In addition, an equal price search strategy is further given for ANs to find the shortest patrolling path. Different from the previous works, the optimized topology can save the communication energy consumption, and the mobility of ANs can improve the detection probability. In the end, simulation results are provided to show the effectiveness of the proposed method.
In our future work, the cooperation control of multiple ANs can be designed to further expedite the underwater intrusion detection problem, such that the ubiquitous monitoring capability can be enhanced with the cooperation of SNs and ANs.

Acknowledgments

The work was partially supported by NSFC under 61503320, 61375105 and 61603328, by the China Postdoctoral Science Foundations under 2015M570235, 2016M600195 and 2016T90214, by the NSF of Hebei Province under F2016203117 and F2017203159, by the Youth Foundation of Hebei Educational Committee under QN2015187, by the Postdoctoral Science Foundation of Hebei Province under B2015003018, by the Open Project Programs of Key Laboratory of System Control and Information Processing Ministry of Education under Scip201501 and Scip201606 and by the Yanshan University under 14LGA010 and B2015003018.

Author Contributions

Jing Yan and Xiaoyuan Luo conceived of the original idea of the paper. Jing Yan and Xiaolei Li performed the experiments. Xinping Guan collaborated to the development of the idea, critical revision and improvement of the paper. Jing Yan and Xiaolei Li wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.; Pompili, D.; Melodia, T. Underwater Acoustic Sensor Networks: Research Challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  2. Zeng, Z.; Fu, S.; Zhang, H.; Dong, Y.; Cheng, J. A survey of underwater optical wireless communications. IEEE Commun. Surv. Tutor. 2017, 19, 204–238. [Google Scholar] [CrossRef]
  3. Kim, H.; Cho, H. SOUNET: Self-organized underwater wireless sensor network. Sensors 2017, 17, 283. [Google Scholar] [CrossRef] [PubMed]
  4. Braca, P.; Goldhahn, R.; Ferri, G.; Lepage, K. Distributed information fusion in multistatic sensor networks for underwater surveillance. IEEE Sens. J. 2015, 16, 4003–4014. [Google Scholar] [CrossRef]
  5. Xu, B.; Zhu, Y.; Kim, D.; Li, D.; Jiang, H.; Tokuta, A. Strengthening barrier-coverage of static sensor network with mobile sensor nodes. Wire. Netw. 2016, 22, 1–10. [Google Scholar] [CrossRef]
  6. Ma, H.; Yang, M.; Li, D.; Hong, Y. Minimum camera barrier coverage in wireless camera sensor networks. In Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 217–225. [Google Scholar]
  7. Chen, J.; Li, J.; Lai, T. Energy-Efficient Intrusion Detection with a Barrier of Probabilistic Sensors: Global and Local. IEEE Trans. Wirel. Commun. 2012, 12, 118–126. [Google Scholar] [CrossRef]
  8. Chen, A.; Kumar, S.; Lai, T. Local barrier coverage in wireless sensor networks. IEEE Trans. Mob. Comput. 2010, 9, 491–504. [Google Scholar] [CrossRef]
  9. He, S.; Chen, J.; Li, X.; Shen, X.; Sun, Y. Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans. on Mob. Comput. 2014, 13, 1268–1282. [Google Scholar]
  10. Li, S.; Shen, H. Minimizing the maximum sensor movement for barrier coverage in the plane. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 244–252. [Google Scholar]
  11. Kim, D.; Wang, W.; Son, J.; Wu, W.; Lee, W.; Tokuta, A. Maximum lifetime combined barrier-coverage of weak static sensors and strong mobile sensors. IEEE Trans. Mob. Comput. 2017, in press. [Google Scholar] [CrossRef]
  12. Kumar, S.; Lai, T.; Arora, A. Barrier coverage with wireless sensors. Wirel. Netw. 2007, 13, 817–834. [Google Scholar] [CrossRef]
  13. Pompili, D.; Melodia, T.; Akyildiz, I. Three-dimensional and two-dimensional deployment analysis for underwater acoustic sensor networks. Ad Hoc Netw. 2009, 7, 778–790. [Google Scholar] [CrossRef]
  14. Ammari, H.; Das, S. A study of k-coverage and measures of connectivity in 3D wireless sensor networks. IEEE Trans. Comput. 2010, 59, 243–257. [Google Scholar] [CrossRef]
  15. Lin, K.; Xu, T.; Song, J.; Sun, Y. Node scheduling for all-directional intrusion detection in SDR-based 3D WSNs. IEEE Sens. J. 2016, 16, 7332–7341. [Google Scholar] [CrossRef]
  16. Liu, J.; Wang, Z.; Peng, Z.; Cui, J.; Fiondella, L. Suave: Swarm underwater autonomous vehicle localization. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Toronto, ON, Canada, 27 April–2 May 2014; pp. 64–72. [Google Scholar]
  17. Namesh, C.; Ramakrishnan, D. Analysis of VBF protocol in underwater sensor network for static and moving nodes. Int. J. Comput. Netw. Appl. 2015, 2, 20–26. [Google Scholar]
  18. Luo, X.; Feng, L.; Yan, J.; Guan, X. Dynamic coverage with wireless sensor and actor networks in underwater environment. J. Autom. Sin. 2015, 2, 274–281. [Google Scholar]
  19. Yan, J.; Chen, C.; Luo, X.; Yang, X.; Hua, C.; Guan, X. Distributed formation control for teleoperating cyber-physical system under time delay and actuator saturation constrains. Inf. Sci. 2016, 370–371, 680–694. [Google Scholar] [CrossRef]
  20. Barr, S.; Wang, J.; Liu, B. An efficient method for constructing underwater sensor barriers. J. Commun. 2011, 6, 370–383. [Google Scholar] [CrossRef]
  21. Liu, J.; Wang, Z.; Zuba, M.; Peng, Z.; Cui, J.; Zhou, S. DA-Sync: A doppler-assisted time-synchronization scheme for mobile underwater sensor networks. IEEE Trans. Mob. Comput. 2014, 13, 582–595. [Google Scholar] [CrossRef]
  22. Yan, J.; Xu, Z.; Wan, Y.; Chen, C.; Luo, X. Consensus estimation-based target localization in underwater acoustic sensor networks. Int. J. Robust Nonlin. Control 2017, 27, 1607–1627. [Google Scholar] [CrossRef]
  23. Cayirci, E.; Tezcan, H.; Dogan, Y.; Coskun, V. Wireless sensor networks for underwater survelliance systems. Ad Hoc Netw. 2006, 4, 431–446. [Google Scholar] [CrossRef]
  24. Liu, B.; Ren, F.; Lin, C.; Yang, Y.; Zeng, R.; Wen, H. The redeployment issue in underwater sensor networks. In Proceedings of the Global Telecommunications Conference, New Orleans, LO, USA, 30 November–4 December 2008; pp. 1–6. [Google Scholar]
  25. Partan, J.; Kurose, J.; Levine, B. A survey of practical issues in underwater networks. SIGMOBILE Mob. Comput. Commun. Rev. 2007, 11, 23–33. [Google Scholar] [CrossRef]
  26. Sozer, E.; Stojanovic, M.; Proakis, J. Underwater acoustic networks. IEEE Ocean Eng. 2000, 25, 72–83. [Google Scholar] [CrossRef]
  27. Wang, Y.; Wang, X.; Xie, B.; Wang, D.; Agrawal, D. Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans. Mob. Comput. 2008, 7, 698–711. [Google Scholar] [CrossRef]
  28. Luo, X.; Yan, Y.; Li, S.; Guan, X. Topology control based on optimally rigid graph in wireless sensor networks. Comput. Netw. 2013, 57, 1037–1047. [Google Scholar] [CrossRef]
  29. Maehara, H. Distance graphs in Euclidean space. Ryukyu Math. J. 1992, 5, 33–51. [Google Scholar]
  30. Yan, J.; Chen, C.; Luo, X.; Liang, H.; Yang, X.; Guan, X. Topology optimization based distributed estimation in relay assisted wireless sensor networks. IET Control Theor. Appl. 2014, 8, 2219–2229. [Google Scholar] [CrossRef]
  31. Jiang, P.; Feng, Y.; Wu, F. Underwater sensor network redeployment algorithm based on wolf search. Sensors 2016, 16, 1754. [Google Scholar] [CrossRef] [PubMed]
  32. Mostafaei, H.; Meybodi, M. An energy efficient barrier coverage algorithm for wireless sensor networks. Wirel. Pers. Commun. 2014, 77, 2099–2115. [Google Scholar] [CrossRef]
Figure 1. The intrusion detection over actuator-assisted underwater sensor networks.
Figure 1. The intrusion detection over actuator-assisted underwater sensor networks.
Sensors 17 01168 g001
Figure 2. The probability of the Poisson distribution.
Figure 2. The probability of the Poisson distribution.
Sensors 17 01168 g002
Figure 3. The density of the Weibull distribution.
Figure 3. The density of the Weibull distribution.
Sensors 17 01168 g003
Figure 4. The probability between two arrival times for the intruder.
Figure 4. The probability between two arrival times for the intruder.
Sensors 17 01168 g004
Figure 5. An example of L j t for the the state of lattice j at time slot t.
Figure 5. An example of L j t for the the state of lattice j at time slot t.
Sensors 17 01168 g005
Figure 6. The truth table of state L j t .
Figure 6. The truth table of state L j t .
Sensors 17 01168 g006
Figure 7. Flexible and rigid frameworks. (a) is flexible, while (b), (c) and (d) are rigid. Particularly, (c) is minimally rigid, and (d) is minimally weighted rigid.
Figure 7. Flexible and rigid frameworks. (a) is flexible, while (b), (c) and (d) are rigid. Particularly, (c) is minimally rigid, and (d) is minimally weighted rigid.
Sensors 17 01168 g007
Figure 8. 60 sensors randomly deployed in 50 × 50 region.
Figure 8. 60 sensors randomly deployed in 50 × 50 region.
Sensors 17 01168 g008
Figure 9. The k-coverage of the region by the sensors.
Figure 9. The k-coverage of the region by the sensors.
Sensors 17 01168 g009
Figure 10. The wireless sensors and actuators’ network.
Figure 10. The wireless sensors and actuators’ network.
Sensors 17 01168 g010
Figure 11. The improved coverage via activated actuators.
Figure 11. The improved coverage via activated actuators.
Sensors 17 01168 g011
Figure 12. The intruder detection probability γ varies with T and N, which contains actuator nodes (ANs) and sensor nodes (SNs).
Figure 12. The intruder detection probability γ varies with T and N, which contains actuator nodes (ANs) and sensor nodes (SNs).
Sensors 17 01168 g012
Figure 13. The intruder detection probability γ varies with T and β .
Figure 13. The intruder detection probability γ varies with T and β .
Sensors 17 01168 g013
Figure 14. The intruder detection probability γ varies with different SNs’ number in different conditions.
Figure 14. The intruder detection probability γ varies with different SNs’ number in different conditions.
Sensors 17 01168 g014
Figure 15. The optimal network structure in Algorithm 2.
Figure 15. The optimal network structure in Algorithm 2.
Sensors 17 01168 g015
Figure 16. The energy consumption comparison between the two network topologies.
Figure 16. The energy consumption comparison between the two network topologies.
Sensors 17 01168 g016

Share and Cite

MDPI and ACS Style

Yan, J.; Li, X.; Luo, X.; Guan, X. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks. Sensors 2017, 17, 1168. https://doi.org/10.3390/s17051168

AMA Style

Yan J, Li X, Luo X, Guan X. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks. Sensors. 2017; 17(5):1168. https://doi.org/10.3390/s17051168

Chicago/Turabian Style

Yan, Jing, Xiaolei Li, Xiaoyuan Luo, and Xinping Guan. 2017. "Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks" Sensors 17, no. 5: 1168. https://doi.org/10.3390/s17051168

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop