1. Introduction
The harsh underwater environment takes its toll on the performance of underwater communication networks. The highly dynamic nature of the communication channel, the relatively low channel capacity, the extremely long propagation delays, and the limited energy availability affect the design of all layers of underwater networks [
1]. Underwater sensor networks routing protocols are designed to cope with intermittent connectivity, frequent topology changes, and the lack of precise node positioning. Consequently, the design of efficient routing strategies has become a central research focus, serving as the foundation for higher-level performance improvements in underwater communication systems [
2].
Depth-based routing (DBR) [
3] is a very successful class of underwater routing protocols due to its energy efficiency in the absence of full node localization. DBR opportunistically utilizes relay nodes to deliver packets from source nodes, which are typically at deeper levels, to the sink nodes, which are typically at the surface level. Due to its efficiency and low cost, DBR has attracted a lot of interest and is the basis of plenty of research effort aiming to improve DBR performance.
Unfortunately, a particular vulnerability known as the depth-spoofing attack, described in [
4], allows adversaries to severely hinder the ability of DBR protocols to deliver packets. In this attack, a malicious node exploits the opportunistic nature of DBR by claiming to be close to the surface, thus inhibiting nearby relay nodes from participating in routing. A few mechanisms for resisting the depth-spoofing attack can be found in the literature. In RPR [
5], the depth-spoofing attack is mitigated by using a forwarding-node selection technique instead of purely opportunistic routing. However, forwarding-node selection incurs high control overhead to keep up with highly dynamic underwater network topologies. In [
6], the author utilized shared-key signed packet headers to secure depth information to protect against depth-spoofing by adversaries. However, the shared-key pre-distribution limits scalability.
The depth-based probabilistic routing protocol (DPR), recently proposed in [
4], tackles the depth-spoofing attack by encouraging suboptimal relay nodes to randomly forward packets, thus circumventing any potential attempts by a malicious neighbor to deter packet delivery. By increasing the probability of unqualified forwarding, denoted
, DPR achieves high packet delivery ratios (PDRs) in the presence of a depth-spoofing attacker, comparable to the delivery ratios under normal operation, thus mitigating the effect of this attack.
However, as the unqualified forwarding probability increases, energy consumption proportionally increases even when the network is not under attack. In lightly loaded networks, DPR can incur up to a 30% energy overhead compared to DBR when the network is not under attack. Therefore, careful adjustment of the forwarding probability is crucial for optimizing the tradeoff between delivery ratio and energy efficiency. When the network state is dynamic, the existing DPR static adjustment methodology of the unqualified forwarding probability fails to achieve the desirable delivery ratio or maintain energy efficiency. An unqualified forwarding probability that is optimal at a certain traffic load may not be optimal for another. It is worth noting that simulation results of DPR show that denser networks require a smaller than that required by more sparse networks to achieve the same level of depth-spoofing resistance. Moreover, it is desirable to activate the unqualified probabilistic forwarding mechanism only when the network is under attack and disable it otherwise.
Periodically adjusting the forwarding probability to cope with the dynamic status of the network can mitigate this issue. This requires estimating the status of the network and adjusting the forwarding probability accordingly. We refer to the time it takes the network to collectively respond to a change in network status as the convergence time. Fast convergence is crucial for ensuring timely and reliable data delivery, especially in dynamic environments, where network topology may change frequently due to node failures, mobility, or environmental conditions.
In this paper, we propose an adaptive probabilistic forwarding mechanism, in which the sink node measures the delivery ratio and broadcasts a periodic update message to notify all nodes to update their individual forwarding probability correspondingly. We develop three algorithms for updating forwarding probability and evaluating their performance in comparison to one another and to existing protocols.
The proposed Adaptive Localization-free Secure Routing (ALSR) protocol introduces three new features: (1) detection of depth-spoofing attacks and identification of affected sources by monitoring delivery ratio of each source node, (2) mitigation of depth-spoofing attacks using novel energy-efficient algorithms for dynamically adjusting the forwarding probability, , for each relay node based on the network density to achieve the desirable delivery ratio, and (3) investigate the convergence time of various probability update algorithms at the onset of a depth-spoofing attack.
2. Background and Related Work
In this study, we focus on localization-free underwater routing protocols and their secure extensions. Localization-free routing protocols depend on depth information, which avoids full localization. Accurate one-dimensional depth information is readily available through simple pressure sensors, whereas accurate underwater localization uses telemetry, which is a resource-intensive task due to acoustic channel characteristics, long propagation delays, and limited bandwidth.
From a security standpoint, depth-based routing protocols introduce a well-known vulnerability known as depth-spoofing (sinkhole) attacks, which directly exploit falsified depth advertisements. Classical depth-based routing protocol, DBR, and other energy-efficient variants such as EEDBR [
7], LDBR [
8], EECOR [
9], and related protocols inherit the same fundamental reliance on advertised depth information for routing eligibility. Therefore, they share vulnerability to depth-spoofing attacks. As a result, the proposed ALSR anti-depth-spoofing mechanism is applicable to all such depth-based routing protocols to enhance their resilience while preserving their original energy-optimization objectives.
Classical DBR protocol and its recently improved versions are discussed in this section, emphasizing the key differences that set our approach apart from existing versions. In addition, we show the importance of curve-fitting methodology in our proposed model.
2.1. Depth-Based Routing (DBR) Protocol
The initial and fundamental concept of the DBR protocol was to circumvent the dependency on complex localization information for each node in the network and instead rely solely on depth information to design a lightweight routing algorithm [
3]. Besides its localization-free advantage, DBR requires minimal control overhead. DBR does not rely on periodic neighbor discovery, route setup, or explicit coordination messages. Instead, nodes implicitly coordinate by advertising their depth values within the headers of forwarded data packets, making DBR particularly suitable for dynamic and energy-constrained underwater environments.
The DBR algorithm determines forwarding eligibility based on the depth of each receiving node. A node with a lower depth has higher priority than its neighbors to forward received packets, while packets from deeper nodes are discarded. Each eligible node applies a holding time calculation, ensuring that the node closest to the surface is prioritized to forward before its neighbors. The holding time for a potential forwarder can be calculated as follows:
where
is the acoustic signal propagation speed,
is the node communication range,
is the hop depth gain, and
is a constant that determines the maximum holding time. Using this simplified methodology, each node waits a holding time then forwards the held packet only if it hears no neighbor closer to the surface forwarding the same packet.
2.2. Enhanced Depth-Based Routing Protocols
The advancement in DBR has attracted numerous researchers to enhance its performance for different metrices. To ensure energy-efficient routing based on depth-routing strategies, EEDBR [
7], LDBR [
8], and EECOR [
9] enhance the forwarding eligibility process by considering residual energy and other optimization factors. Upon making a forwarding decision, EEDBR and LDBR attempt to extend the overall network lifetime by considering remaining energy levels in addition to depth feature. Unlike in DBR protocol, the sender in EEDBR protocol selects candidate forwarders by ensuring two conditions: each chosen neighbor must have a smaller depth than the sender and sufficient residual energy so that forwarding tasks are distributed more evenly. By combining depth with residual energy as selection criteria, this enhancement leads to balanced energy consumption across the network and avoids routing holes. To ensure better selection of eligible forwarders, DCEER [
10] utilizes data fusion strategies to eliminate any potential duplicated transmission. Nodes with higher residual energy will be selected over lower residual energy ones based on genetic algorithms and an enhanced cluster head selection method. Closely related to this approach, the authors in [
11] introduced the Energy-Efficient Clustering Protocol EECP, which was proposed to address energy conservation and network lifetime. The network is divided into depth-based horizontal layers. Within each layer, a cluster head (CH) is selected primarily on residual energy. The improved version, EECP-NN, refines this by also considering the distance to the nearest neighbor/sink as a secondary metric for CH election. Results show that the integration of depth-based clustering with adaptive CH selection maximizes energy conservation, balances node load, and extends the overall lifetime of underwater wireless sensor networks. Depth-based routing has also been utilized along with edge-assisted election protocol to minimize energy consumption and prolong network lifetime. The Edge-Assisted Depth-Based Stable Election Protocol EA-DBSEP-IoUT [
12] integrates residual energy, depth, and connectivity factors for intelligent cluster head election, while leveraging reinforcement learning and edge-assisted data aggregation to minimize redundant transmissions.
Since underwater wireless networks are highly vulnerable to the harsh marine environment and are constrained by limited energy resources, adaptive mechanisms have emerged as some of the most effective solutions to overcome these challenges. In [
13], the authors introduced the SEEC (CTPSEEC) algorithm, which uses adaptive techniques to control node transmissions. This helped to maintain acceptable power levels and minimize unnecessary energy consumption. In addition to that, SEEC utilizes a cluster-based protocol to split sparse areas into equal sub-areas and adjust sink locations to enhance power consumption. In similar work, the authors in [
14,
15] incorporated adaptive power mechanisms to control forwarding decisions. Each node keeps an up-to-date neighbor table with information about depth and residual energy levels to be used for selecting next-hop relay nodes. The study in [
14] focused on integrating residual energy awareness with hole-avoidance strategies to maintain efficient routing under dynamic underwater conditions. In contrast, the more recent work in [
15] advanced this approach by introducing a dual-weight adjustment mechanism with cross-layer design, incorporating both local link quality (via received signal strength) and global stability (through a Link Energy Stability Factor), which further enhanced energy efficiency and prolonged network lifetime by nearly 39% compared with EEDBR [
7]. Thus, while both works emphasized adaptive power mechanisms, the second contribution extended the benefits by combining energy-aware forwarding with global stability considerations. Overall, adaptive power control was shown to significantly reduce redundant transmissions and balance energy usage across nodes, thereby extending the network lifetime and improving delivery reliability.
2.3. Depth-Based Routing Protocol Security
It has been shown that depth-based routing schemes are vulnerable to the security threat known as the depth-spoofing attack. In this attack, a malicious node is placed within the transmission range of a source node. The malicious node then advertises a falsified depth value to mislead neighboring nodes into relying on this malicious node as the preferred forwarder. As a result, all packets forwarded by a malicious node may be dropped, delayed, or misrouted, ultimately preventing them from reaching the sink and severely degrading the overall network performance. Several countermeasure strategies have been proposed to secure the depth-spoofing (sinkhole) attack. For example, the resilient pressure-based routing (RPR) protocol prevents depth-spoofing by combining cryptography techniques with routing algorithms. Each node has a certified key pair to sign its packets so that only legitimate nodes can process them. Upon forwarding a packet, the sender assigns two depth thresholds for selecting a window of neighbors that are allowed to participate in forwarding the packet. Payloads are also protected with the gateway’s public key, preventing unauthorized modifications and impersonation attempts. In addition to that, the fixed depth-gain threshold used in forwarding decisions of a packet as in DBR is enhanced by the sliding window mechanism having both lower and upper bound threshold values in each packet’s header. Only the nodes that have depth in this threshold window are allowed to forward the packet. Although this randomization process, along with encryption, can prevent depth-spoof attacks from succeeding for a high percentage of time, RPR suffers high transmission costs since the use of randomized threshold windows generally results in path formations with more hops relative to the opportunistic DBR approach. Moreover, key management processes are considered very challenging in the underwater environment due to several factors such as water currents, temperature, and salinity, which affect communication, causing packet loss, signal attenuation, and even the loss of cryptographic keys [
16]. In [
6], the authors proposed a methodology based on encrypting only the packet header of DBR packet rather than the entire payload. This selective encryption strategy reduces the computational and energy overhead associated with decrypting full data packets. While this approach is effective in mitigating depth-spoofing attacks and securing routing decisions, it depends on pre-distributed cryptographic keys which limit the scalability of the network. It also suffers from a weakness: compromising a single node could expose the keys to potential intruders.
2.4. Depth-Based Probabilistic Routing (DPR)
The DPR protocol [
4] mitigates the effect of depth-spoofing by utilizing probabilistic methods to handle duplicate packets. Unlike traditional forwarding/dropping decisions in DBR and RPR, DPR keeps received packets within candidate forwarders to decide—based on a set probability—whether to forward or drop them when the timer expires. This adjustment ensures that even when a malicious node attempts to spoof its depth so that all other candidate forwarders drop received packets, a fraction of them are still successfully delivered. By carefully tuning the forwarding probability according to network density, DPR maintains strong resistance to spoofing while keeping energy overhead under control. Although DPR effectively resists depth-spoofing attacks by introducing probabilistic forwarding, its main shortcoming lies in the dependency of a static unconditional forwarding probability. The optimal probability requires careful adaptation on the network’s topology, traffic load, and whether an attack is taking place—factors that are inherently dynamic in underwater acoustic networks. If the probability is set too low, DPR fails to deliver enough packets under attack, weakening its resilience. Conversely, if it is set too high, the protocol triggers redundant retransmissions even when no attack is present, leading to wasted energy and unnecessary overhead.
Table 1 provides a summary of state-of-the-art secure localization-free depth-based routing protocols, their security properties, and their key limitations.
3. Adaptive Localization-Free Secure Routing Protocol (ALSR)
3.1. Assumptions and Definitions
We assume that the network is centrally controlled by a sink node, which is collecting data from underwater nodes. The underwater nodes cooperatively participate in the relaying of data packets generated by a subset of nodes called the source nodes, . We assume that nodes can authenticate control traffic originating from the sink node. We assume that the sink node knows the minimum desired data flow rate from each source node and can use this information to identify nodes that are suffering from connectivity problems. We assume that the header of each data packet will contain an authenticated source-generated sequence number. The sink node can estimate whether the flow from a certain source is affected by a black hole or a gray hole attack, based on the delivery ratio calculated by counting the number of missing sequence numbers from this source.
We define a security parameter called the desired delivery ratio, denoted , which determines the acceptable per-source delivery ratio when the network is under a black hole or a gray hole attack.
3.2. ALSR Protocol Description
The main idea of ALSR is to dynamically circumvent sinkhole attacks. While relay nodes cannot directly detect the presence of a malicious node performing depth-spoofing attack, the sink node can detect the drop in packet delivery ratio (PDR) when such an attack is active. When the PDR is unsatisfactory, the sink node assumes there is an active sinkhole and adjusts the unqualified forwarding probability accordingly to increase the chances of delivery of packets affected by the sinkhole.
The proposed routing protocol classifies packets according to their source, s, and assigns to each packet a forwarding probability, , corresponding to the packet source. By employing this classification, the sink can respond to attacks which affect the packets originating from a subset of sources without unnecessarily increasing all network traffic. Only those packets affected by the depth-spoofing attack will be given a higher forwarding probability. The optimal forwarding probability, , for packets originating from the source node, , is affected by the network density and the threat level, , affecting the packet stream from . The protocol is designed with the goal of automatically finding and enforcing the optimal forwarding probability. This is achieved through an iterative update process.
The operation of the proposed ALSR protocol divides the time into equal intervals called update periods. At the beginning of each update period, the sink node broadcasts a signed update packet using simple flooding. The update packet for the
th period contains a list of pairs
for each source node,
. Upon receiving the update packet from the sink, relay nodes use the forwarding probabilities received to tune the DPR protocol operation for delivering packets from sources to the sink. At the end of each period, the sink estimates the current threat level corresponding to each source node and adapts the forwarding probabilities accordingly. The protocol operation is illustrated by a UML sequence diagram in
Figure 1.
Two types of packets are employed by the protocol. The first type is “Update Packets”, which are generated by the sink and broadcast to all nodes to tune the per-source forwarding probability. The other type is “Data Packets”, which are generated by source nodes and forwarded using probabilistic depth-based routing to be received by the sink. The formats of the two types of packets are illustrated in
Figure 2 and
Figure 3, respectively.
Figure 2 depicts the format of update packets sent periodically by the sink. The update packet starts with the iteration number field,
, which serves as a sequence number of the update packet. The next field is the number of sources,
, which identifies the number of update pairs included in the update packet. Consequently, the packet contains
pairs of node Id and probability,
. Finally, the update packet is protected against tampering using a digital signature generated by the sink node.
Figure 3 depicts the format of a data packet, which is composed of a header and a payload. The header contains the Id of the source node,
, a source-unique sequence number,
, and the depth,
, of the packet latest sender.
In the following subsection, we present algorithms for calculating updated forwarding probabilities at the end of each update period.
3.3. ALSR Probability Update Algorithms
3.3.1. Lightly Loaded ALSR (ALSR-LL)
The sink node first calculates a threat probability
for each source node
using the following heuristic approach based on (a) the previous threat estimate
, and (b) the delivery ratio of data coming from node s during this period, denoted
, as follows
The corresponding forwarding probability is given by the formula.
where
denotes the minimum node degree, i.e., the minimum number of neighbor nodes within the node’s communication range. To justify Equation (3), let us calculate the probability of a successful sinkhole attack corresponding to an unqualified forwarding probability,
. If the attacker, denoted
A, has
neighbors within its range, the probability of a successful attack is equal to the probability of dropping a packet received from
by all
’s neighbors, which is at most
. Substituting
from Equation (3), the probability of a successful attack,
is
Since
is the minimum node degree, then
.
Omitting losses due to the network’s intrinsic limitations, the actual delivery ratio,
, can be calculated as
For ALSR-LL to successfully converge while the attack is active, we would like the steady state actual delivery ratio . Equation (2) has a fixed point when , which is the desired delivery ratio.
3.3.2. Fast-Recovery ALSR (ALSR-FR)
The threat probability is updated as follows. If the delivery ratio,
, is below the desired delivery ratio,
, by more than a tolerance threshold
, i.e.,
, the forwarding probability is increased by
where
is a tunable parameter. On the other hand, if the delivery ratio is above the desired delivery ratio by more than the tolerance threshold, i.e.,
, the forwarding is decreased.
where
is another tunable parameter. Otherwise, if the delivery ratio is within the desirable range, i.e.,
, the forwarding probability remains as it is, i.e.,
The three rules can be combined in the following formula.
where
The two parameters
and
can be tuned to adjust the convergence speed, and consequently, the stability of the system.
When the desired delivery ratio is small, a high convergence speed causes the algorithm to overshoot, reaching a forwarding probability greater than the optimal value. On the other hand, when the desired delivery ratio is large, a low convergence speed requires many iterations to reach the optimal forwarding probability. Through experiments, we propose the following empirical formula for calculating a suitable convergence speed.
3.3.3. Polynomial-Fitting ALSR (ALSR-PF)
Two factors affect the relationship between the forwarding probability and the delivery ratio: (1) network congestion, and (2) resilience to depth-spoofing attack. As forwarding probability increases, more packets are forwarded by unqualified forwarders, causing an increase in network traffic, and hence, higher levels of interference and collisions. Thus, higher forwarding probabilities can potentially reduce successful delivery ratios. On the other hand, when the network is under attack, a higher forwarding probability increases the probability of circumventing the attacker and thus increases the delivery ratio. The optimal forwarding probability is the point that maximizes the utility function, i.e., the delivery ratio, by striking a balance between the effect of higher traffic load and the effect of the depth-spoofing attack, if any.
The utility function is modeled as a polynomial with one peak which is obtained and used for optimizing the forwarding probability using the following distributed algorithm.
Initialize forwarding probability , for all sources
At the end of the first period, set , for all such that .
At the end of th update period,
Upon receiving an update packet, a relay node verifies the sink signature, then updates its local forwarding probability table with the new pairs
When a relay node, , receives a packet originating from source , with sequence number , the packet is held in the local buffer for the holding time, which is calculated using the classical DBR mechanism.
If the relay node, , overhears a retransmission of the same packet, i.e., originating from with sequence number :
If the forwarding probability in the local forwarding table, the buffered packet is dropped immediately.
Otherwise, the packet is marked for dropping but remains in the buffer.
If a packet holding time expires:
If the packet has been marked for dropping, it is forwarded with probability .
Otherwise, i.e., if the packet was not marked for dropping, it is forwarded unconditionally.
The utility function is modeled as a fourth-degree polynomial because as the degree of the polynomial fitting is increased above the fourth degree, the noise in measurements causes anomalies in the resulting function. Our experiment results show that the approximation function does not behave better when the polynomial degree is increased beyond that.
5. Results and Discussion
Figure 5 shows an example of the response of the ALSR-LL algorithm to the depth-spoofing attack. The response caused by ALSR-LL to a sudden drop in delivery ratio is a fast rise in the corresponding forwarding probability. This response guarantees a fast mitigation of the black-hole attack. However, if the new delivery ratio after threat mitigation is above the desired ratio,
, the proposed algorithm reduces the forwarding probability to minimize the overhead. In some cases, such as those shown in
Figure 5, the forwarding probability converges to the minimum value that achieves the delivery ratio requirement with minimal overhead cost. However, ALSR-LL has some limitations. One limitation of ALSR-LL occurs when the network is moderately loaded such that when the forwarding probability is
, severe contention occurs, and the delivery ratio drops below the desired level. An example of such a case is Network #2, shown in
Figure 4b. When the forwarding probability exceeds 0.65, the delivery ratio drops below the desired
monotonically. Once ALSR-LL increases the forwarding probability beyond this point, ALSR-LL reacts to the declining delivery ratio by further increasing the forwarding probability, which further decreases the delivery ratio. ALSR-LL eventually becomes stuck at the maximum forwarding probability
, which is equivalent to flooding.
Figure 6 illustrates this limitation of ALSR-LL when handling an attack on this network, leading the network to fail to deliver any packets successfully. Another limitation of ALSR-LL can be seen in some lightly loaded networks, such as Network #3, in which ALSR-LL might oscillate and never reach steady state, as shown in
Figure 7. When ALSR-LL raises the forwarding probability beyond what is necessary, the delivery ratio exceeds the desired level. Subsequently, ALSR-LL reduces the forwarding probability to reduce the energy wasted in unnecessary forwarding. The decrease, however, causes the delivery ratio to fall below the desired level. This pattern may continue to occur, causing oscillatory behavior like the one shown in
Figure 7. To avoid prolonged instability, the ALSR-FR algorithm controls the convergence speed using the
and
parameters.
Figure 8 demonstrates how ALSR-FR resolves the oscillatory behavior exhibited by ALSR-LL when it first overestimates the forwarding probability required to achieve the desired delivery ratio. ALSR-FR slowly reduces the forwarding probability to reduce excessive forwarding while approaching the desired delivery ratio.
Moreover, ALSR-FR resolves the first limitation of ALSR-LL in moderately loaded networks. As shown in
Figure 9, ALSR-FR successfully achieves the desired delivery ratio in sample network #2 by avoiding the excessive growth of forwarding probability. Although ALSR-FR resolves oscillatory behavior, it may still fail to handle highly loaded networks properly. The behavior of ALSR-FR for Network #4, shown in
Figure 10, demonstrates this limitation. When this network is under attack, ALSR-FR first sets the forwarding probability to 0.6. However, the achieved delivery ratio is just 0.51, which is less than the desired
. When ALSR-FR attempts to increase the forwarding probability to 0.68, the interference increases, and the delivery ratio drops to 45%. As long as the observed delivery ratio is less than desired, ALSR-FR will always attempt to increase the forwarding probability. Initially during the transient period, ALSR-FR behaves slightly better than ALSR-LL but eventually causes the network to fail to deliver packets after a few iterations.
As evident from
Figure 10, when the utility function being maximized is monotonic, i.e., when the network is lightly loaded, both ALSR-FR and ALSR-PF algorithms will achieve the desired delivery ratio. However, if the utility function is nonmonotonic, i.e., when the network becomes congested as the forwarding probability increases, ALSR-FR may fail to achieve the desired delivery ratio. The ALSR-PF algorithm keeps track of past (forwarding probability, delivery ratio) pairs and uses them to approximately calculate the steady state operating point that satisfies the desired delivery ratio. As shown in
Figure 11, ALSR-PF manages to handle the depth-spoofing attack against the heavily loaded Network #4 to achieve the maximum possible delivery ratio, which is slightly lower than the desired level.
To compare the evaluation metrics of the proposed update algorithms, namely, the packet delivery ratio, the energy cost at steady state, the convergence speed, and the routing resilience, we simulate 300 networks divided among the categories defined in
Table 4, and for different cases of the desired delivery ratio,
. For each network simulation, we observe (1) whether the delivery ratio converged to the desired value, (2) the number of iterations the update algorithm takes to converge, (3) the total number of data packet transmissions throughout the network, and (4) the number of packets successfully delivered to the sink. The results for K = 0.5, K = 0.8, and K = 1.0 are summarized in
Table 5,
Table 6, and
Table 7, respectively. The performance metrics for traditional DBR under normal conditions are provided for reference. Results show that ALSR-PF achieves the best delivery ratio and energy efficiency for all values of
. Moreover, the ALSR-PF algorithm achieves the best energy efficiency in steady state. On the other hand, the ALSR-LL and ALSR-FR algorithms achieve better convergence speed by reaching the desired delivery ratio within as low as one update iteration on average iterations when
, which is several times faster than the convergence speed of the ALSR-PF algorithm. Moreover, ALSR-PF achieves the best routing resilience by succeeding in delivering packets under attack in 99% of the simulated networks. It is worth noting that DBR protocol without attack achieves only 95% routing resilience, which means that ALSR-PF can be helpful in avoiding routing dead ends that hinder classical greedy DBR protocol from delivering packets.
Due to the approximation nature of the proposed update algorithms, they may partially achieve the desired delivery ratio under attack,
. Since achieving a delivery ratio greater than the desired ratio is not considered an error, we define a one-sided RMSE metric which only considers underperforming as an error, as follows.
where
is the delivery ratio at steady state,
is the desired delivery ratio, and
is an error indicator, which takes the value 1 if
, and 0 otherwise. The results of evaluating OSRMSE for each of the three update algorithms has been included in
Table 5,
Table 6 and
Table 7.
To gain more insight into the error behavior of the update algorithms, the distribution of the actual delivery ratio is reported in
Table 8. The simulation is repeated with varying desired delivery ratios,
= 0.5,
, or
. For each value of
K, we vary the tolerance between 0.01 and 0.2 and count the percentage of networks in which the actual delivery ratio is at least
. The results highlighted in bold font show that for
, the ALSR-FR and ALSR-PF algorithms succeed in at least 80% of the simulated networks. The behavior of the ALSR-LL algorithm is acceptable at
, but it is unreliable for lower values of
. Therefore, it is recommended to set
if ALSR-LL is applied.
6. Conclusions and Future Work
In this paper, we presented a comprehensive framework for adaptive forwarding probability tuning in underwater acoustic sensor networks under depth-spoofing attacks, with three specialized update algorithms: Lightly Loaded ALSR (ALSR-LL), Fast-Recovery ALSR (ALSR-FR), and Polynomial-Fitting ALSR (ALSR-PF). Through rigorous simulation in the Underwater Acoustic Network Simulator (UANSim) across four network density categories (sparse, medium, dense), we demonstrate that ALSR-PF achieves the highest routing resilience and delivery efficiency for real-world deployment. Specifically, ALSR-PF consistently attains a high delivery ratio within a limited tolerance from the desired delivery ratio, with a high probability in all simulated network conditions. ALSR resolves oscillatory instability, avoiding catastrophic failure in congested networks, and maximizing delivery ratios in highly loaded scenarios, whereas ALSR-LL and ALSR-FR suffer from limitations. ALSR-LL provides fast mitigation for lightly loaded networks, but it suffers from oscillatory divergence or complete delivery failure in highly loaded networks. ALSR-FR provides the fastest convergence while mitigating oscillations, but it fails to achieve the desired delivery ratio in some highly congested networks. Distinctly, ALSR-PF’s polynomial curve-fitting approach dynamically balances traffic load and attack resilience by identifying the optimal forwarding probability that maximizes the utility function, i.e., the delivery ratio.
The work provided in this paper paves the way for several future directions. Although the performance of ALSR-PF is encouraging, we recognize that there is room for improvement beyond its convergence speed and error tolerance. This could be one direction that future work can explore. The design of the ALSR-PF protocol has several desirable features: it can flexibly support different desired delivery ratios, , for different sources, providing differentiated service based on the priorities of information sources. Exploring scenarios having multiple sources is another future direction. ALSR, in general, is designed to respond to situations where multiple depth-spoofing attackers might exist in the network. Exploring the effect of depth-spoofing attacks coordinated by multiple malicious nodes and evaluating the resilience of ALSR in the face of such attacks is the third direction for future work.