Next Article in Journal
The Wide-Area Coverage Path Planning Strategy for Deep-Sea Mining Vehicle Cluster Based on Deep Reinforcement Learning
Previous Article in Journal
Optimizing AUV Navigation Using Factor Graphs with Side-Scan Sonar Integration
Previous Article in Special Issue
Robust Underwater Acoustic Channel Estimation Method Based on Bias-Free Convolutional Neural Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs

1
School of Electronic and Information Engineering, South China University of Technology, Guangzhou 510640, China
2
School of Computer Science and Information Engineering, Guangzhou Maritime University, Guangzhou 510725, China
3
School of Internet Finance and Information Engineering, Guangdong University of Finance, Guangzhou 510521, China
*
Author to whom correspondence should be addressed.
J. Mar. Sci. Eng. 2024, 12(2), 314; https://doi.org/10.3390/jmse12020314
Submission received: 9 January 2024 / Revised: 30 January 2024 / Accepted: 8 February 2024 / Published: 11 February 2024
(This article belongs to the Special Issue Underwater Acoustic Communication and Network)

Abstract

:
Due to the space–time coupling access, we find that anti-eavesdropping opportunities exist in underwater acoustic networks (UANs), where packets can be successfully received only by the intended receiver, but collide at the unintended receivers. These opportunities are highly spatially dependent, and this paper studies the case that linearly deployed sensor nodes directly report data toward a single collector. We found an eavesdropping ring centered around these linearly deployed sensor nodes, where the eavesdropper could steal all the reported data. Since the typical receiving-alignment-based scheduling MAC (TRAS-MAC) will expose the relative spatial information among the sensor nodes with the collector, the eavesdropper can locate the eavesdropping ring. Although moving the collector into the one-dimensional sensor node chain can degrade the eavesdropping ring to a point that constrains the eavesdropping risk, the collector’s location will be subsequently exposed to the eavesdropper. To efficiently protect the reported data and prevent the exposure of the collector’s location, we designed a slotted- and receiving-alignment-based scheduling MAC (SRAS-MAC). The NS-3 simulation results showed the effectiveness of the SRAS-MAC and the TRAS-MAC in protecting data from eavesdropping, which protect 90% of the data from eavesdropping in the one-eavesdropper case and up to 80% of data from eavesdropping in ten-eavesdropper cases. Moreover, unlike TRAS-MAC, which will expose the collector’s location, SRAS-MAC provides multiple positions for the collector to hide, and the eavesdropper cannot distinguish where it is.

1. Introduction

Underwater acoustic sensor networks (UASNs) have been deployed to acquire various data of interest beneath the water surface for decades [1,2]. In recent years, data-driven approaches have been widely adopted in acoustic channel estimation, geoacoustic inversion, and so on, causing a geometric growth in the underwater data volume [3,4]. This fact requires the advancement of an efficient and secure medium access control (MAC) mechanism to collect the data from the UASNs.
The current efforts on the MAC design in underwater acoustic networks (UANs) are mainly focused on improving access efficiency from the perspective of time division, since the narrow available bandwidth and the harsh underwater acoustic channel limit the use of frequency division and code division [5,6]. The challenge is basically attributed to the non-negligible propagation delay caused by the relatively slow propagation speed, which is about 1500 m/s and five orders slower than the radio wave propagated through the air [7]. This results in space–time coupling access in UANs and makes the MAC more complicated than in terrestrial radio networks (TRNs) [8,9]. On the one hand, since the spatial distance from its sender to its receiver jointly decides the packet’s arrival time, solely separating the sending times at the sending sides cannot guarantee their packets are collision-free at the receiving sides. On the other hand, the extra spatial factor provides more opportunities to align designated packets and aggregate interference (The other arriving packets.) at each node [10]. It has been proven that the upper-bound of normalized throughput for mesh-connected UANs is N 2 , which is greater than can be achieved in TRNs [11]. For the star-connected UANs, allocating the sending times of senders according to their spatial distances to the common receiver to achieve perfect receiving-alignment in the receiver can reach the upper-bound of normalized throughput, which is alwaysone [8].
Two techniques have been used to promote data confidentiality in UANs, including encryption and physical layer security (PLS) [12]. Encryption uses a secret key to encrypt the message before data dissemination. The idea of the PLS approach is to utilize the random nature of wireless channels to promote the secrecy rate between legal users. Unfortunately, the cost and challenge are heavier for implementing encryption and the PLS in UANs than in TRNs. First, a portion of limited bandwidth is taken for regular updates of the secret key, not for data transmission [13,14]. Second, the security rate of the PLS approach is directly related to the estimation accuracy on the dynamic multi-path acoustic channel and underwater noise [15,16]. As it stands currently, both of these methods are decoupled from the MAC layer in UANs.
Owing to the open nature of wireless communication, a wireless signal can be overheard by all the nodes within the coverage of its sender. Since the arrival time is only determined by the sending time in TRNs, as shown in Figure 1a, the collision-free multiple access to the intended receiver also means collision-free multiple access to any other unintended nodes within the coverage of the senders. On the contrary, due to the space–time coupling characteristic, the well-scheduled sending times toward the intended receiver are unlikely to match with the relative distances toward the unintended receiver. As illustrated in Figure 1b, the packets can only be successfully received by the legal receiver and collide at the eavesdropper. Therefore, the space–time coupling characteristics of UANs naturally have opportunities for anti-eavesdropping. In this sense, it is recommended to integrate a receiving-aggregation design that creates heavy packet collisions at unintended receivers while ensuring collision-free access for intended receivers in UANs.
Actually, the adversary receiver is also incentivized to exploit the space–time coupling access to maximize the number of packets it can successfully receive without collision. A MAC protocol without anti-eavesdropping concerns might create some areas where numerous or even all the packets can be successfully received without collision. The eavesdropper is eager to acquire the spatial information and the legal nodes’ sending times to find such eavesdropping areas to facilitate its eavesdropping performance. Therefore, it is required to carefully design the MAC protocol and expose as little spatial information as possible.
This paper aims to exploit the space–time coupling characteristic to achieve both efficient and secure MAC while a group of linearly deployed underwater sensor nodes report their data to a single collector. The linear and grid topology constructed by multiple linear node chains are the most-common patterns and are widely applied in UANs [17,18,19]. As a result, the network performance of linearly deployed UANs still attracts the interest of some researchers.
The contributions of this paper are summarized as follows:
  • Anti-eavesdropping opportunities of space–time coupling access: The anti-eavesdropping opportunity and the rest of the risk of being eavesdropped in the MAC layer of UANs are first discussed in this paper. This anti-eavesdropping capability is achieved by causing continuous packet collisions on unintended receivers through MAC layer design. As a result, there are no additional hardware requirements compared to the existing MAC in UANs. It is expected to encourage the study of integrating and promoting the anti-eavesdropping ability while achieving efficient MAC in UANs.
  • Eavesdropping from linearly deployed sensor nodes: For a star-connected network formed by a group of linearly deployed sensor nodes and a single receiver, we find an eavesdropping ring centered around the node chains, where all the packets sent by the sensor nodes can be successfully received. The typical receiving-alignment-based MAC (TRAS-MAC) needs to allocate and notice the sending time of each sensor node one by one. In this case, the spatial information, i.e., relative distances among sensor nodes to the receiver, can be easily acquired by the adversary eavesdropper. If the eavesdropper acquires the positions of these anchored sensor nodes, the eavesdropper can locate the eavesdropping ring and steal all the packets. The anti-eavesdropping can be shrunk into a single point when the legal receiver is also located inside the same one-dimensional space where sensor nodes are located, which essentially limits the possibility of perfect eavesdropping. Moreover, we prove that assigning the distance-dependent arrival order of packets at the legal receiver, i.e., closer distance, earlier arrival and farther distance, earlier arrival, perform better in anti-eavesdropping than using random order. We also find that an even number of sensor nodes causes more collision in the eavesdropper than an odd number of sensor nodes while using a distance-dependent arrival order of packets.
  • Anti-eavesdropping MAC design: Since the spatial information is still exposed to the eavesdropper and can precisely locate the legal receiver in the one-dimensional space, the TRAS-MAC must be improved. We propose a slotted- and receiving-alignment-based MAC protocol (SRAS-MAC) to achieve safe and efficient medium access from linearly deployed sensor nodes to a single receiver. The SRAS-MAC chose a proper packet size according to the network information, e.g., spacing distance between two neighboring sensor nodes, amount of sensor nodes, and so on, to achieve perfect receiving-alignment and attain maximal capacity. Since the sending time remains the same and periodic among all sensor nodes, the eavesdropper cannot deduce spatial information from it. Furthermore, the SRAS-MAC provides a group of optional locations for the legal receiver, each of which can achieve similar network and anti-eavesdropping performance. Therefore, the proposed SRAS-MAC can also protect the location privacy of the legal receiver since the adversary eavesdropper cannot distinguish where the legal receiver is located.

Related Work

Work can be found in understanding the space–time coupling characteristic, but it solely focuses on decreasing interference and prompting normalized throughput in the MAC layer.
In distributed MAC design, a protection interval is always used to eliminate the spatial impact during the medium access in UANs [5]. However, this inevitably causes long waiting or decreased access opportunities, while floor acquisition or random access are used, respectively [20,21,22,23,24].
Our work relates more to a scheduling-based MAC protocol, which takes advantage of the long propagation delay to promote the network throughput [8,10,11,25,26,27]. The upper-bound about the throughput of N-node Ad Hoc UANs in the MAC layer have been proven to be N 2 by Chitre et al., which is greater than the N-node Ad Hoc TRNs [11]. An efficient approach to solve the scheduling problem is formulating it into an optimization problem with the goal of maximizing throughput, where the sending times and packet duration are the optimal solutions to this problem [10]. However, the Computational complexity increases as the number of nodes grows. On the other hand, the upper-bound for the throughput on star-connected networks remains at one regardless of the number of senders. This can be achievable by the receiving-alignment-based MAC proposed by Chen et al., which assigns the sending times of each sender one by one based on the spatial information and the arrival order of the packets in the receiver [8]. Wang et al. proved that spatial reuse can be achieved while using the slotting technique in the star-connected network as long as the slot length is greater than two-times the packet duration, which helps to understand further the impact of space–time coupling on the slotted-based MAC in UANs [9].
Our work is also related to the medium access control among multiple linearly deployed sensor nodes. Current research mainly focuses on solving this by using hop by hop relaying and the throughput under different considerations, e.g., partially overlapping collision domain with single traffic flow and single collision domain with unicast traffic, which have been discussed by Bai et al. and Said et al., respectively. However, relaying faces a series of challenges, such as complex interference, unbalanced traffic load, hot zones in energy consumption, and so on. Although Chen et al. have shown that multi-hop forwarding faces less energy consumption compared to direct access due to less path loss [28], the adopted frequencies for both direct access and multi-hop forwarding are 100kHz, which limits the discussion in a small-scale network. Actually, whether single-hop or multi-hop transmission performs better in a linear network is still an open question in wireless networks. Sikora et al. revealed that single-hop communication is more suitable for the bandwidth-limited scenario compared to multi-hop communication in an equidistantly deployed linear wireless network [29]. Li et al. found that direct access is more energy efficient if the transmission distance is less than an open distance in UANs [30]. Using direct access, these linearly deployed sensor nodes and the collector construct a star-connected network.
The remainder of this paper is arranged as follows. Section 2 describes the system we studied. The security risks in the linearly deployed and star-connected network are discussed in Section 3. In Section 4, we propose a slotted and receiving-alignment-based MAC protocol to protect the location privacy of the collector. The NS-3 simulation results are used in the verification and evaluation in Section 5. Finally, Section 6 concludes this paper.

2. System Description

2.1. System Model

As illustrated in Figure 2, we suppose N sensor nodes are deployed far away from offshore to collect the data of interest. These sensor nodes are anchored at the same depth and deployed in a line to cover a large-scale area. The spacing distance between two neighboring sensor nodes is up to several kilometers for large-scale monitoring coverage. These sensor nodes first store their collected data in their local storage, and an AUV (The AUV is well-equipped, such that it can precisely locate itself beneath the water.) will regularly arrive at the target sea area to gather these data.
Let N denote the sender nodes’ set. We sort the sender nodes according to their distance to the collector and let n i denotes the i-th closest sender to the receiver, where n i N . Let d i denote the distance from the sender node n i to the collector, and the value of d i satisfies the following condition:
d 1 d 2 d N .
Since the battery inside each sensor node is neither easily charged nor replaced, energy efficiency is the primary concern throughout the life cycle of a sensor node. Normally, communication is the primary cause of energy consumption.
Different from the work of Chen et al. [28], we discuss the path loss and the energy consumption between direct access and multi-hop relaying based on the parameters (i.e., maximal communication range, center frequency, and data rate) of commercial acoustic modems from three manufacturers. We selected two modems for each manufacturer, one capable of short-range communication and the other sustaining longer communication. The parameters of the selected modems are listed in Table A1 in Appendix A. We illustrate the ratio ρ 1 , i.e., the energy consumption ratio of multi-hop relaying to direct access of one packet, and ratio ρ 2 , i.e., the network energy consumption ratio of multi-hop relaying to direct access, in Figure 3. The detailed calculations of ρ 1 and ρ 2 are summarized and arranged in Appendix A.
Figure 3 shows that using direct access can save more energy compared to multi-hop relaying among these selected modems. Moreover, the energy consumption of relaying is about dozens of times the energy consumption of direct access for long-range communication (e.g., Sercel case). Therefore, in order to improve energy efficiency and reduce redundant information in such a large-scale network illustrated in Figure 2, this paper supposes sensor nodes directly transmit data to the collector and form a star-connected network. To maximize the number of sensor nodes a collector can access directly, the collector is deployed in the central region of these linearly deployed sensor nodes. Let l denote the spacing distance between two neighboring sensor nodes and l d denote the depth of the sensor nodes to the water surface. Depending on the parity of the number of sensor nodes, the central regions are illustrated in Figure 4.
As illustrated in Figure 2, we considered some adversary eavesdroppers hiding in the central region of this linearly deployed sensor network, which wants to eavesdrop on the reported data from sensor nodes and find the location of the legal collector. We supposed the eavesdropper can achieve time synchronization with the sensor nodes.
In order to achieve efficient data gathering, the collector needs to avoid collision among those arriving data sent by sensor nodes. We adopted the protocol transmission model to define the collision between two arbitrary packets as follows:
T i T j + d i d j v T f ,
where T i denotes the transmission time of the current packet from node n i , T f denotes the packet duration, and v denotes the speed of the underwater acoustic wave. Based on (2), a collision occurs when a new packet has already arrived, but the current packet is not fully received at a receiver.

2.2. Overview of the TRAS-MAC Protocol

The receiving-alignment-based scheduling approach can achieve maximal throughput in a star-connected network by aligning the arriving packets one after another at the receiver. Then, the sending time of these packets can be deduced according to T f and d i .
For fairness, each sender periodically transmits one packet in a period T, where T = N T f . These packets arrive in the receiver in a fixed order periodically. Two spatially dependent arrival orders of the packets are shown in Figure 5, i.e., the closer distance, earlier arrival (CD-EA) order and the farther distance, earlier arrival (FD-EA) order. Actually, the periodical receiving-alignment approach can be achieved in an arbitrary arrival order of packets.
Let O denote an arrival order and o k denote the k-th element of O; we have o 1 = 1 and o 1 = N for the CD-EA order and FD-EA order, respectively. Supposing the transmission time of the node o 1 at T o 1 = T 0 , the transmission time of the other sensor nodes can be sequentially calculated as follows:
T o k = T o k 1 + d o k 1 v + T f d o k v .
Based on the periodical receiving-alignment, a typical receiving-alignment scheduling MAC (TRAS-MAC) protocol is proposed. The TRAS-MAC is initiated by the collector to notify each sensor node about their first transmission time and the period T before data collection. The whole notification is divided into two stages.
In the first notification stage, the collector will sequentially notify each sensor node about the common accessing period T and their sending delay from the starting time of the data collection through a two-way handshake. Take n i as an example, where i     N 1 . The collector sends a 1st-Inipacket to n i and waits for the ACK packet from n i . As the collector has successfully received the ACK packet from sensor n i , it continues to notify n i + 1 . If the collector does not receive the ACK packets during the waiting time, it will send a new 1st-Ini packet again to n i and wait for its ACK packet. The structures of the 1st-Ini packet and ACK packet are shown in Figure 6a,b, respectively. The first notification stage is finished as the sensor node has accomplished the two-way handshake with n N .
In the second notification stage, the collector broadcasts the 2nd-Ini packet to notify the sensor nodes about the beginning time of data collection and waits for the responded ACK from the sensor nodes. The structure of the 2nd-Ini packet is shown in Figure 6c. Each sensor node that has successfully received the 2nd-Ini packet will update its transmission time (The first transmission time T i is equal to the sending delay contained in the 1st-Ini packet plus the starting time contained in the 2nd-Ini packet.) T i immediately and repose the ACK back to the collector after a random back-off time. At the end of the waiting time, the collector will check whether it successfully received the ACK packets from all sensor nodes. If it has, it is ready to receive the incoming reported data from the sensor nodes. Otherwise, the collector will renew an 2nd-Ini packet and start the notification stage again.
An example of the working process of the TRAS-MAC protocol is illustrated in Figure 7. It is noted that the reason why we need to separate the notification process into two stages is that the possible failure will input an extra delay during the first notification stage, shown in Figure 7. This failure inevitably causes the scheduled transmission times of the sensor nodes that have completed the handshakes with the collector to be out of date.

3. The Security Risks in Linearly Deployed and Star-Connected Networks

This section discusses some emerging security risks while using the TRAS-MAC protocol. One is the existence of eavesdropping positions where all packets can be successfully eavesdropped on, and another is exposing the collector’s location.

3.1. The Eavesdropping Risk

3.1.1. The Eavesdropping Ring

The collector can achieve the maximal throughput at arbitrary locations while adopting the TRAS-MAC protocol described in Section 2.2. However, if the collector is located outside the one-dimensional space of the sensor nodes’ chain, an eavesdropping ring centered on these linearly deployed sensor nodes exists, as illustrated in Figure 8. The radius of the eavesdropping ring is equal to the vertical distance from the legal receiver to the sensor node chain. Owing to the symmetry, the distance from an arbitrary position in the eavesdropping ring to sensor node n i also equals d i . Therefore, the receiving-alignment toward the legal receiver also means receiving-alignment toward any unintended receiver located in the eavesdropping ring.
In this sense, if the collector’s location is exposed to the eavesdropper, the adversary eavesdropper can easily find the eavesdropping ring and move to any position in there to steal all the reported data from the sensor nodes successfully.
It is noted that the channel is occupied by the two-way handshake between the collector and a sensor node during the first notification stage. In this case, unfortunately, an adversary eavesdropper can successfully receive the broadcasting 1st-Ini packet and decode the scheduled sending time of the sensor node. According to (3), the distance difference for the sequential sensor nodes can be deduced through the sending time T i as follows:
d o 2 d o 1 = v T o 1 T o 2 + T f d o 3 d o 2 = v T o 2 T o 3 + T f d o N d o N 1 = v T o N 1 T o N + T f .
According to localization theory, the eavesdropper can obtain the eavesdropping ring centered around the sensor node chain based on the time difference of arrival (TDOA) information in (4) and the location of anchored sensor nodes. In the worst case, if the locations of anchored sensor nodes have been acquired by the eavesdropper, the eavesdropper can deduce the eavesdropping ring, move there, and eavesdrop all the reported data successfully.

3.1.2. Solution and Analysis toward Anti-Eavesdropping

It is noted that the radius of the eavesdropping ring is the vertical distance from the legal collector to the sensor node chain. Therefore, moving the collector into the one-dimensional space of the sensor node chain can force the eavesdropping ring to degrade into a single point, which is exactly the collector’s location. As shown in Figure 9, it is impossible for the eavesdropper to find a location that can successfully receive all the reported data without collision.
As the collector and the sensor nodes are located in the same one-dimensional space, the distance d i can be expressed as
d i = l ¯ + ( i 1 ) l 2 , i mod 2 = 1 , l l ¯ + ( i 2 1 ) l , i mod 2 = 0 ,
where l ¯ denotes the distance from the collector to n 1 , l ¯ l 2 , and we have d 1 = l ¯ .
Actually, as if the eavesdropper is also located inside the one-dimensional space of the sensor nodes chain, we have the following findings regarding the anti-eavesdropping ability. First, there is the the impact of the arrival order.
Proposition 1.
The CD-EA and FD-EA orders illustrated in Figure 5 outperform the other arrival orders in anti-eavesdropping.
Proof. 
For these two arrival orders, i.e., CD-EA and FD-EA, the senders of two arbitrary neighboring arrival packets are located on two different sides of the receiver. Therefore, as the packet arrives in the eavesdropper, which is also located in the one-dimensional chain, continuous collisions are supposed to happen between two arrival packets, and the proof is completed. □
Second, there is the impact of the parity of the value of N.
Proposition 2.
The even network can cause more collisions in the eavesdropper than the odd network when using CD-EA or FD-EA orders.
Proof. 
As we know from Proposition 1, continuous collisions are supposed to happen between two arrival packets while using CD-EA or FD-EA orders. In this sense, all the reported packets will collide in the eavesdropper as N in an even value. However, there is the possibility that one packet during a transmission period does not interfere with the other arrived packets as N is an odd value, and the proof is completed. □
In this sense, the adversary is better off deploying multiple eavesdroppers in different locations outside the one-dimensional chain to increase its eavesdropping probability.

3.2. Exposure of the Collector’s Location

As discussed above, the eavesdropper cannot precisely locate the collector’s location in the eavesdropping ring if the collector is outside the one-dimensional space formed by the sensor node chain. Although moving the collector into the one-dimensional space can highly promote the anti-eavesdropping ability, the position of the collector will be exposed to the eavesdropper subsequently.
The exposure of the collector’s location can be attributed to two main reasons. First, the floor acquisition of the channel during the notification stage enables the eavesdropper to receive all the 1st-Ini packets successfully. Second, the relative spatial information is embedded inside the transmission strategies and broadcast through the 1st-Ini packet. On these bases, if the location of the anchored sensor nodes is exposed to the eavesdropper, the one-dimensional location of the collector can be easily deduced. Then, the collector is directly threatened by tracking or even an attack.
The slotting technique is promising to solve the exposure problem. On the one hand, when using slotted accessing, sensor nodes only need to transmit their collected data at the beginning of each slot without any additional activities required. Therefore, the collector only needs to broadcast the common transmission strategy (i.e., slot length and the packet duration) instead of notifying each sensor node of their specific transmission time. On the other hand, the slotting technique can erase the relative distance information from the broadcast transmission strategies, which protects the location privacy of the collector.
However, achieving receiving-alignment at the receiver is more challenging when using the slotting technique, as will be discussed in the next section.

4. SRAS-MAC: Slotted- and Receiving-Alignment-Based Scheduling MAC

In this section, we first study achieving the receiving-alignment in the receiver while using the slotting technique and further design the SRAS-MAC. Then, we discuss why the proposed SRAS-MAC can protect the location privacy of the collector. We further give an overview of the proposed SRAS-MAC protocol.

4.1. Spatial Reuse through Slotting Accessing

Let T s l o t denote the slot length, which is given as
T s l o t = T f + β T d ,
where T d denotes the maximal propagation delay from the sensor nodes to the collector and β is a guard coefficient, which satisfies 0 β 1 . In a star-connected network, collision-free regions (CFRs) exist when the slot length is greater than two-times the packet duration [9]. In this sense, the slot length setting should satisfy the following condition so as to achieve spatial reuse:
2 T f < T s l o t T f + T d .
As shown in Figure 10a, the CFRs corresponding to a tagged sender are a group of concentric annuli centered on the receiver and inside the coverage of the receiver. It is noted that, except for the CFRs at two ends, the width of each CFR is equal to v ( T s l o t T f ) , and the locations of the corresponding CFRs of each sender are determined by d i and T s l o t .
We take two sensor nodes (i.e., n 1 , n 2 ) as examples to discuss how to exploit the CFRs so as to achieve spatial reuse while using the slotting technique. We assumed n 1 and n 2 are fully loaded and going to access the channel at each slot. As shown in Figure 10b, n 1 and n 2 are located at the CFRs of each other. In this case, the simultaneously transmitted packets from n 1 and n 2 will not collide at the receiver, which achieves spatial reuse. On the contrary, it is also possible that these two nodes keep interfering with each other because they are located outside each other’s CFRs, as shown in Figure 10c.
The examples illustrated in Figure 10 suggest an opportunity to achieve spatial reuse by adjusting the relative distance difference d i d j among the senders to the receiver. Since the sensors are anchored, it is better to adjust the relative distances from the receiver side. This inspired us to find suitable locations for the collector where spatial reuse among sensor nodes can be achieved. At the same time, a corresponding design of the time slot is also required to achieve optimal channel utilization.

4.2. Design of SRAS-MAC

Let k denote the order of the slots and T S k denote the beginning time of the k-th slot, which can be expressed as
T S k = ( k 1 ) T s l o t , k N + .
Since the sender can only send a data packet at the beginning of each slot, each sender at most has one packet arrive at the receiver during a period equal to T s l o t .
Proposition 3.
Supposing node n 1 sends a packet at slot k, for the other packets arriving at the receiver from time d 1 v + T s k till time d 1 v + T s k + 1 , their sending slot is before slot k + 1 .
Proof. 
Assuming a packet is sent from n i at k ^ slot, its arrival time satisfies
d 1 v + T S k < d i v + T S k ^ < d 1 v + T S k + 1 ,
where i { 1 , , N } and k ^ k + 1 . The left side of (9) is always satisfied. However, based on the right side of (9), the difference between the sending slot and sending position should satisfy the condition as
T S k ^ T S k + 1 < d 1 d i v .
The upper-bound and lower-bound of the two sides in (10) are given as follows:
T S k ^ T S k + 1 0 , d 1 d i v 0 .
Since the condition in (11) contradicts (10), the proof is completed. □
Let m i denote the sending slot difference between n 1 and the other nodes. According to (8) and Proposition 3, m i can be expressed as
m i = d i d 1 v T s l o t 1 , i { 1 , , N } .
Based on (12), taking n 1 as the reference node, the distance d i can be transformed into d ^ i as follows:
d ^ i = d i v m i T s l o t d 1 , 0 d ^ i v T s l o t .
Using the transformed distance d ^ i in (13), we only need to solve the scheduling problem within one slot. The transformed d ^ i v is the arrival time of those packets in the slot. Similar to the protocol model shown in (2), based on the transformed distance (13), the collision-free condition in a slot can be written as follows:
d ^ i d ^ j v T f , i j .
It is noted that, for arbitrary two nodes j and k that satisfy d j d k , it does not mean d ^ j d ^ k .
As shown in Equations (12) and (13), given the slot length, adjusting the collector position will change the arrival order of packets sent by sensor nodes. On the contrary, we can also first select an arrival order of packets (e.g., d ^ i / v ) to satisfy (14) and, then, try to find an achievable location for the collector that satisfies the selected arrival orders. Furthermore, in order to achieve maximal throughput, we want to find a perfect location for the collector under the minimum slot length.
Since all the senders periodically send their packets with interval T s l o t , N data packets at most are sent to the receiver in T s l o t time. Therefore, the minimum slot length is given as follows:
T s l o t = N · T f .
We selected the CD-EA order to achieve receiving-alignment at the receiver since it is proven in Proposition 1 that it can achieve higher anti-eavesdropping ability. The d ^ i under CD-EA order can be expressed as follows:
d ^ i v = ( i 1 ) · T f , i { 1 , , N } .
Proposition 4.
To achieve the receiving-alignment shown in (16), the distances’ set { d i } , 1 i N , should strictly satisfy
d 1 < d 2 < < d N .
Proof. 
Assuming d i = d i + 1 , according to (13), the transformed distance satisfies
d ^ i = d ^ i + 1 ,
which contradicts (14). Therefore, the proof is completed. □
According to (5), (13), and (16), m i T s l o t should satisfy
v m i T s l o t = ( i 1 ) ζ , i mod 2 = 1 , ( i 1 ) ζ + ξ , i mod 2 = 0 .
where i { 1 , , N } , ζ = l 2 v T f , and ξ = l 2 2 l ¯ .
Let a | b denote that b is divisible by a. Therefore, the receiving-alignment (16) is achievable if T s l o t satisfies
v T s l o t | ζ ,
v T s l o t | { ( i 1 ) ζ + ξ , i { 1 , , N } } .
In (20) and (21), it is hard to find the common division of { ζ , ( i 1 ) ζ + ξ , i { 1 , , N } } .
Proposition 5.
When l ¯ is equal to v T f 2 or l 4 , the receiving-alignment (16) is achievable if (20) is satisfied.
Proof. 
When l ¯ is equal to v T f 2 , the m i T s l o t can be expressed as follows:
v m i T s l o t = ( i 1 ) ζ , i mod 2 = 1 , i ζ , i mod 2 = 0 .
When l ¯ is equal to l 4 , the m i T s l o t can be expressed as follows:
v m i T s l o t = ( i 1 ) ζ .
In both (22) and (23), ζ always is the division of v m i T s l o t . Therefore, in these two positions, the receiving-alignment (16) can be achieved as long as (20) is satisfied, which completes the proof. □
Based on Proposition 5 and (15), in order to satisfy the condition in (20), we can adjust the packet duration as follows:
T f = l 2 v N · z + 1 ,
where z { 0 , N + } . Let B denote the packet size (in Byte), which is determined by T f as follows:
B = T f · r / 8 ,
where r denotes the data rate of the acoustic modem (in bit/s).

4.3. Trade-Off between Anti-Eavesdropping and Location Privacy of Collector

Proposition 5 has given two special l ¯ (i.e., l ¯ = v T f 2 and l ¯ = l 4 ) for the receiver that can achieve receiving-alignment using the slotting technique. Due to the symmetry of the topology, four optional locations are available for the collector. In this case, the eavesdropper cannot distinguish which one is the final choice of the collector, and the risk of the location being exposed is reduced from 100% to 25%.
Basically, the greater T f leads to the greater P c , so we intuitively want to use the greatest T f to achieve the highest P c . As shown in (24), the maximal packet duration for SRAS-MAC is achieved by setting z in 0. However, as the z was set to 0, we have v T f 2 = l 4 , which indicates that the number of available locations is halved into two available locations.
Therefore, a trade-off exists between anti-eavesdropping ability and the location privacy of the collector. If the location privacy of the collector is the primary object, z is better set to 1, and we have
T f = l 2 v N + 1 ,
where the probability of exposing the location of the collector is 1 4 . On the contrary, if the confidentiality of the reported data is the primary object, z is better set to 0, and we have
T f = l 2 v ,
where the probability of exposing the location of the collector is 1 2 .

4.4. The Overview of the SRAS-MAC Protocol

An example of the working process of the SRAS-MAC protocol is illustrated in Figure 11a. SRAS-MAC is also initiated by the collector. The collector first derives the packet duration based on (24). Then, it randomly selects one of the optional positions and moves there. As the collector has settled in the selected location, it activates the notification stage. The collector will assemble the beginning timestamp of the first slot and the accessing period into an Ini packet, whose structure is shown in Figure 11b.
The Ini packet will be broadcast to all sensor nodes, and the collector will wait for the acknowledgment from the sensor nodes. As a sensor node has successfully received the Ini packet, it will immediately update the accessing strategies and wait for a delay to send its ACK packet back to the collector. Owing to the regularity of these linearly deployed sensor nodes, the sensor node only needs to wait for a time greater than one duration of the Ini packet and can avoid the collision of the ACK packet and the Ini packet in the other sensor.
After waiting for two-times the maximal propagation delay, the collector will check whether it has successfully received the ACK packets from all the sensor nodes. If all the ACK packets have been successfully received, the collector is ready to receive the incoming reported data from the sensor nodes. Otherwise, the collector will renew an Ini packet and start the notification stage again.

5. Simulation Results

5.1. Simulation Settings’ Description

We used the NS-3 simulation results to evaluate the anti-eavesdropping abilities and time consumption of TRAS-MAC and SRAS-MAC in UANs. The underwater acoustic networks were modeled through the UAN module in the NS-3 simulator.
We propose the anti-eavesdropping ratio as a performance metric to evaluate the confidentiality of transmitted data and the anti-eavesdropping effect in the MAC layer. Let P c denote the anti-eavesdropping ratio, which can be calculated as
P c = 1 N e N s ,
where N e is the number of reported packets successfully received by the eavesdropper and N s is the number of the total packets sent by all the sensor nodes.
In these simulations, the sensor nodes are linearly deployed with the same spacing distance l between two neighboring nodes, and their depth l d was fixed at 500 m. Each sensor node is equipped with a half-duplex acoustic modem whose data rate r was set at 2 kbps. During each simulation, each sensor node needs to deliver 100,000 B of data to the collector. For the SRAS-MAC, the collector’s location is randomly selected from four optional positions. For the TRAS-MAC, the collector’s location is randomly selected within the one-dimensional deployment area. The eavesdropper is randomly deployed within the one-dimensional or three-dimensional deployment area. We used UniFormRandomVariable provided by NS-3 to generate the coordinates of the collector in TRAS-MAC and the eavesdroppers. Each simulation result is the expectation based on 1000 runs of simulations.

5.2. The Impact of Arrival Order and Parity of N to P c

First, we discuss the impact of the arrival order and the parity of N to the anti-eavesdropping ratio P c of TRAS-MAC. The selected arrival order of receiving-alignment includes “CD-EA”, “FD-EA”, and random order. In this discussion, the eavesdropper is also deployed within the one-dimensional deployment area. The spacing distance l was set at 15 km, and the packet size B was fixed at 125 B.
From Figure 12, we can observe that the TRAS-MAC with random arrival order had a lower performance compared to the TRAS-MAC with the CD-EA or FD-EA order, which both achieved similar P c values for a given N. Hence, Proposition 1 is validated. Then, as illustrated in Figure 12, the parity of N had the same impact on the value of P c under both CD-EA or FD-EA orders. Specifically, TRAS-MAC performed better when N was an even value than when N was an odd value. Hence, Proposition 2 is also validated.
In addition, it is easy to notice that the P c was close to 1 for the TRAS-MAC under arbitrary arrival orders when N = 2 . According to (15), the slot length equaled two-times T f when N = 2 . Therefore, one slot duration was left in a scheduling period that was too short to tolerate the change of propagation delay toward the eavesdropper, resulting in almost all the overheard packets colliding with the eavesdropper. On the contrary, there was two-times the packet duration left when N = 3 , and there existed the possibility that one packet can be easily eavesdropped at the eavesdropper when the N was an odd value. Hence, we can observe that the value of P c greatly decreased from N = 2 to N = 3 .
The simulation results illustrated in Figure 12 have shown that the eavesdropper was constrained when it was located within the one-dimensional space, i.e., almost a few data can be eavesdropped for the case that N was an even value. In the following discussions and evaluations, the eavesdroppers were randomly located within the central region with size l × l × 2 l d , as shown in Figure 3.

5.3. The Impact of Packet Duration T f to P c

As discussed in Section 4.2, SRAS-MAC needs to adjust the packet duration to achieve collision-free receiving-alignment, and there is a trade-off between the anti-eavesdropping ability and the location privacy of the collector. In this discussion, the spacing distance l was also set at 15 km, and the packet duration of SRAS-MAC and TRAS-MAC was set according to (26) and (27) for z = 1 and z = 0 , respectively.
Considering the impact of parity of N, as we discussed in Section 5.2, the P c under the network that N is an even value and N is an odd value are illustrated in Figure 13a,b, respectively.
As shown in Figure 13a, P c was still close to 1 for both SRAS-MAC and TRAS-MAC under arbitrary arrival orders and arbitrary values of T f when N = 2 , whose reason has been discussed above. Also, we noticed that, for the case of setting z to 0, the achieved P c of SRAS-MAC and TRAS-MAC using the CD-EA order still grows as the value of N increases in Figure 13a,b, respectively. Moreover, it is noticed in Figure 13b that SRAS-MAC outperforms the TRAS-MAC in P c when the value of N is in 13 and 15.
Then, for the SRAS-MAC and TRAS-MAC under the CD-EA order, we can observe that they achieved greater P s in most cases where z was 0 than in cases where z was 1. On the contrary, for the TRAS-MAC under random arrival order, the achieved P s performed worse when z was 0 than when z was 1. It can be understood that the longer time slot while setting z in 0 will result in a greater spatial reuse opportunity. As we discussed in Proposition 1, using the CD-EA order can efficiently constrain the spatial reuse opportunity, but not using the random arrival order.

5.4. The Impact of the Number of Eavesdroppers to P c

As shown in Figure 13, for the only one-eavesdropper case, the available P c of SRAS-MAC and TRAS-MAC were always over 0.75. Moreover, for SRAS-MAC, at most three fake collector locations existed. Therefore, we were interested in studying the anti-eavesdropping abilities of multiple eavesdroppers.
We illustrate the values of P c encountering an increasing number of eavesdroppers (i.e., from 1 to 10) in Figure 14, where l was set to 15 km, N was set to 16, and the eavesdroppers were still randomly located within the three-dimensional deployment area.
It is clear that the more eavesdroppers join the network, the lower the P c that can be achieved. However, the SRAS-MAC and TRAS-MAC with the CD-EA arrival order z set to 0 still achieved 0.8 in P c under the cases where ten eavesdroppers were located inside the deployment area. On the contrary, compared to the case of z set to 0, the anti-eavesdropping ratio of the other schemes declined more quickly setting z to 1. It is noted that, as the eavesdroppers increased to four, about 60% of the data could still be saved using SRAS-MAC with z set to 1. Since it is hard to guarantee the location privacy of the collector even in SRAS-MAC, as the number of eavesdroppers was greater than four, it was better to use the maximal packet duration ( z = 0 ) to maximize the security of the reported information.

5.5. The Impact of l and N on the Time Consumption

Finally, we want to discuss the time consumption among SRAS-MAC and TRAS-MAC with different packet duration settings. The values of the time consumption were calculated as follows:
  • The total time consumption: from the time that the collector sent the first control packet to the time that the collector received the last reported data packet.
  • The time consumption of data collection: from the time that one of the sensor nodes sent the first data packet to the time that the collector received the last reported data packet.
  • The time consumption of initialization: the difference between the total time consumption and the time consumption of data collection.
For the simulation with different settings of N, which was from 2 to 16, l was set to 15 km, and the results are illustrated in Figure 15. As shown in Figure 15a, the TRAS-MAC protocol consumed more time collecting the same size of data and increased more quickly as the value of N grew. Specifically, for the case that N = 16 , the TRAS-MAC protocol consumed a quarter more time than the SRAS-MAC protocol. The reason can be found in Figure 15b. Since an extra two-way handshake existed between the collector and each sensor node, the time consumption during the initialization of the TRAS-MAC protocol was much greater than the SRAS-MAC protocol and grew more quickly as the value of N grew. On the contrary, as shown in Figure 15c, there was little difference between the TRAS-MAC protocol and the SRAS-MAC protocol in the time consumption during data gathering.
For the simulation results for different settings of l, i.e., from 6 km to 20 km, N was set at 16, and the results are illustrated in Figure 16. Similar to the results in Figure 15, as illustrated in Figure 16a, the total time consumption of the TRAS-MAC protocol was greater than the SRAS-MAC protocol. However, it can be observed that the total time consumption of the TRAS-MAC grew as the value of l increased. In the same cases, the total time consumption of the SRAS-MAC remained stable. However, the difference can be found in the initialization and data-collection stages. As shown in Figure 16b, the time consumption of the TRAS-MAC protocol during initialization increased more quickly than the SRAS-MAC protocol as the value of l increased. Moreover, as shown in Figure 16c, the time consumption of the data collection of the TRAS-MAC setting z to 0 also increased as the value of l increased, which led to greater total time consumption.

6. Conclusions

This paper is the first work to reveal the security nature of space–time coupling access in UANs. We studied this in a data-gathering scenario in which a group of linearly deployed sensor nodes directly sends their packet to a single receiver. We discovered an eavesdropping ring centered on those deployed sensor nodes, where the eavesdropper can successfully steal all the reported packets. We found that the typical receiving-alignment-based scheduling MAC (TRAS-MAC) exposed the relatively spatial information among sensor nodes with the collector to the eavesdropper, which enabled the eavesdropper to locate the eavesdropper ring and steal all the reported data. We discovered that the eavesdropping ring could be degraded into a point by deploying the collector within the one-dimensional space of the linear sensor node chain, which alleviates the eavesdropping risk. However, the collector’s location will be exposed to the eavesdropper, and its security is at risk. We proposed a slotted- and receiving-alignment-based scheduling MAC (SRAS-MAC) protocol, which can provide at most four optional positions to the collector to hide its location. The analysis and the simulation results showed that using closer distance, earlier arrival and farther distance, earlier arrival orders can efficiently prevent the data from being eavesdropped when the eavesdropper is also located inside the one-dimensional deployment area. We also found that the eavesdropper can steal fewer packets as if the number of sensor nodes is an even compared to an odd value. Further evaluations of the packet duration and the number of eavesdroppers when the eavesdropper is located inside the three-dimensional deployment area were conducted through NS-3 simulations. The simulation results showed that, if the maximal packet duration is adopted, the proposed SRAS-MAC achieved similar anti-eavesdropping performance as TRAS-MAC using the CD-EA order. Moreover, SRAS-MAC can efficiently prevent eavesdropping attacks from multiple eavesdroppers, e.g., less than 20% of the data can be stolen under the ten-eavesdropper case. The simulation results also showed that SRAS-MAC performed better than TRAS-MAC in the time consumption.
In future work, on the one hand, we plan to analyze the anti-eavesdropping ability under a more-general topology and design anti-eavesdropping scheduling protocols accordingly; on the other hand, we will consider exploring the applicability and robustness of the proposed SRAS-MAC protocol through field tests.

Author Contributions

Conceptualization, Y.W., F.J. and Q.G.; methodology, Y.W., F.J. and Q.G.; software, Y.W., H.Z. and K.Y.; validation, Y.W., H.Z. and K.Y.; formal analysis, Y.W., H.Z. and K.Y.; investigation, Y.W., H.Z. and K.Y.; resources, Y.W., H.Z. and K.Y.; data curation, Y.W., H.Z. and K.Y.; writing—original draft preparation, Y.W., Q.G. and W.C.; writing—review and editing, Y.W., Q.G. and W.C.; visualization, Y.W.; supervision, F.J., Q.G. and W.C.; project administration, F.J., Q.G. and W.C.; funding acquisition, F.J., Q.G. and W.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grants U23A20281, 62192712, 62341129, and 62001128 and the Science and Technology Planning Project of Guangdong Province of China under Grant 2023A0505050097.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Raw data were generated using the NS-3 simulator. The derived data supporting the findings of this study are available from the corresponding author (Q.G.) upon request.

Acknowledgments

The authors would like to thank the anonymous reviewers for their careful reading and valuable comments.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Definition and Calculation of ρ1 and ρ2

The attenuation nature of the channel makes the sender adopt a higher transmission power compared to the required power strength of successful reception P 0 at the receiver [31,32,33]. Let E denote the energy consumption while transmitting a T f duration of the packet, which can be derived as follows:
E ( x , f ) = P 0 A ( x , f ) T f .
In (A1), A ( x , f ) denotes the attenuation of the acoustic signal with central frequency f (in kHz) transmitting x (in km) distance. Normally, A ( x , f ) can be calculated as
A ( x , f ) = x / x 0 k 10 x / x 0 α ( f ) / 10 ,
where k is the spreading factor, x 0 is the reference range (always set to 1 m), and α ( f ) (in dB/km) denotes the frequency-dependent absorption coefficient. Normally, α ( f ) is calculated by Thorp’s expression as
α ( f ) = 0.11 f 2 1 + f 2 + 44 f 2 4100 + f 2 + 2.75 · 10 4 f 2 + 0.003 .
As shown in (A2), the attenuation of the acoustic signal is dependent on both the frequency (f) and the transmission range (x).
Table A1. Parameters of the modems from three manufacturers.
Table A1. Parameters of the modems from three manufacturers.
ManufacturerModel NumberMaximal RangeCenter FrequencyData Rate
LinkQuest [34]UWM2000
 UWM4000
1 km
 4 km
71.4 kHz
 17 kHz
35,700 bps
 8500 bps
Evologics [35]S2CR 40/80
 S2CR 7/17
2 km
 8 km
51 kHz
 12 kHz
27,700 bps
 6900 bps
Sercel [36]MATS 3G 34 kHz
 MATS 3G 12 kHz
5 km
 15 km
34.5 kHz
 12.5 kHz
24,600 bps
 7400 bps
Between two selected models compared in Table A1, let { x 1 , x 2 } , { f 1 , f 2 } , and { r 1 , r 2 } denote their communication ranges, frequencies, and data rates, respectively, which satisfy x 1 < x 2 , f 1 > f 2 , and r 1 > r 2 . The hop count h of relaying comparing with direct access can be calculated by h = x 2 x 1 .
First, we discuss the ratio ρ 1 of the energy consumption of h hops relaying to direct access as follows:
ρ 1 = i = 1 h 1 E ( x 1 , f 1 ) + E ( x ¯ 1 , f 1 ) E ( x 2 , f 2 ) = T p 1 h 1 A ( x 1 , f 1 ) + A ( x ¯ 1 , f 1 ) T p 2 A ( x 2 , f 2 ) ,
where x ¯ 1 = x 2 h 1 x 1 , T p 1 = 8 B / r 1 , and T p 2 = 8 B / r 2 .
Then, we considered the case that all h nodes have a packet being delivered to the receiver, which means that the nodes located between the farther sensor node and the receiver need to transmit both their own packets and the packets from the nodes of the previous hops. The ratio ρ 2 of the total network energy consumption is as follows:
ρ 2 = i = 1 h 1 h i E ( x 1 , f 1 ) + h E x ¯ 1 , f 1 = 1 h 1 E ( i x 1 + x ¯ 1 , f 2 ) = T p 1 h ( h 1 ) A ( x 1 , f 1 ) + h A ( x ¯ 1 , f 1 ) 2 T p 2 i = 1 h 1 A ( i x 1 + x ¯ 1 , f 2 ) + A ( x ¯ 1 , f 2 ) .

References

  1. Qiu, T.; Zhao, Z.; Zhang, T.; Chen, C.; Chen, C.P. Underwater internet of things in smart ocean: System architecture and open issues. IEEE Trans. Ind. Informat. 2020, 16, 4297–4307. [Google Scholar] [CrossRef]
  2. Coutinho, R.; Boukerche, A.; Vieira, L.; Loureiro, A. Underwater sensor networks for smart disaster management. IEEE Trans. Consum. Electron. 2020, 9, 107–114. [Google Scholar] [CrossRef]
  3. Zhao, H.; Ji, F.; Li, Q.; Guan, Q.; Wang, S.; Wen, M. Federated meta-learning enhanced acoustic radio cooperative framework for ocean of things. IEEE J. Sel. Top. Signal Process. 2022, 16, 474–486. [Google Scholar] [CrossRef]
  4. Liu, M.; Niu, H.; Li, Z.; Liu, Y.; Zhang, Q. Deep-learning geoacoustic inversion using multi-range vertical array data in shallow water. J. Acoust. Soc. Am. 2022, 151, 2101–2116. [Google Scholar] [CrossRef]
  5. Jiang, S. State-of-the-art medium access control (MAC) protocols for underwater acoustic networks: A survey based on a MAC reference model. IEEE Commun. Surv. Tutor. 2018, 20, 96–131. [Google Scholar] [CrossRef]
  6. Guqhaiman, A.; Akanbi, O.; Aljaedi, A.; Chow, C. A survey on MAC protocol approaches for underwater wireless sensor networks. IEEE Sens. J. 2021, 21, 3916–3932. [Google Scholar] [CrossRef]
  7. Stojanovic, M.; Preisig, J. Underwater acoustic communication channels: Propagation models and statistical characterization. IEEE Commun. Mag. 2009, 47, 84–89. [Google Scholar] [CrossRef]
  8. Chen, W.; Guan, Q.; Yu, H.; Ji, F.; Chen, F. Medium access control under space–time coupling in underwater acoustic networks. IEEE Internet Things J. 2021, 8, 12398–12409. [Google Scholar] [CrossRef]
  9. Wang, Y.; Guan, Q.; Ji, F.; Chen, W. Impact and analysis of space–time coupling on slotted MAC in UANs. IEEE/ACM Trans. Netw. 2023, 1–13. [Google Scholar] [CrossRef]
  10. Anjangi, P.; Chitre, M. Propagation-Delay-Aware unslotted schedules with variable packet duration for underwater acoustic networks. IEEE J. Ocean. Eng. 2017, 42, 977–993. [Google Scholar] [CrossRef]
  11. Chitre, M.; Motani, M.; Shahabudeen, S. Throughput of networks with large propagation delays. IEEE J. Ocean. Eng. 2012, 37, 645–658. [Google Scholar] [CrossRef]
  12. Aman, W.; Al-Kuwari, S.; Kumar, A.; Rahman, M. Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook. Ad Hoc Netw. 2023, 142, 103114. [Google Scholar] [CrossRef]
  13. Liu, L.; Xi, Z.; Wu, J.; Xu, J. Noise-based-protection message dissemination method for insecure opportunistic underwater sensor networks. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1610–1623. [Google Scholar] [CrossRef]
  14. Diamant, R.; Tomasin, S.; Ardizzon, F.; Eccher, D.; Casari, P. Secret key generation from route propagation delays for underwater acoustic networks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3318–3333. [Google Scholar] [CrossRef]
  15. Sklivanitis, G.; Pelekanakis, K.; Yıldırım, S.; Petroccia, R.; Alves, J.; Pados, D.A. Physical Layer Security against an Informed Eavesdropper in Underwater Acoustic Channels: Reconciliation and Privacy Amplification. In Proceedings of the 2021 Fifth Underwater Communications and Networking Conference (UComms), Lerici, Italy, 31 August 2021–2 September 2021; pp. 1–5. [Google Scholar] [CrossRef]
  16. Aman, W.; Rahman, M.; Haider, Z.; Qadir, J.; Nawaz, M.W.; Sidhu, G.A. Maximizing secrecy rate of an orthogonal frequency division multiplexing-based multihop underwater acoustic sensor network. Trans. Emerg. Telecommun. 2020, 31, e4106. [Google Scholar] [CrossRef]
  17. Morozs, N.; Mitchell, P.; Zakharov, Y. Linear tda-mac: Unsynchronized scheduling in linear underwater acoustic sensor networks. IEEE Netw. Lett. 2019, 1, 120–123. [Google Scholar] [CrossRef]
  18. Pelekanakis, K.; Petroccia, R.; Fountzoulas, Y.; Green, D.; Fioravanti, S.; Alves, J.; Pecknold, S. A simulation study for long-range underwater acoustic networks in the high north. IEEE J. Ocean. Eng. 2019, 44, 850–864. [Google Scholar] [CrossRef]
  19. Goetz, M.; Nissen, I.; Otnes, R.; van Walree, P. Performance analysis of underwater network protocols within international sea trial. In Proceedings of the OCEANS 2015, Genova, Italty, 18–21 May 2015; pp. 1–7. [Google Scholar] [CrossRef]
  20. Marcal, M.; Milica, S. Slotted FAMA: A MAC protocol for underwater acoustic networks. In Proceedings of the OCEANS 2006—Asia Pacific, Singapore, 16–19 May 2006; pp. 1–7. [Google Scholar] [CrossRef]
  21. Ng, H.H.; Soh, W.S.; Motani, M. A bidirectional-concurrent MAC protocol with packet bursting for underwater acoustic networks. IEEE J. Ocean. Eng. 2013, 38, 547–565. [Google Scholar] [CrossRef]
  22. Ahn, J.; Syed, A.; Krishnamachari, B.; Heidemann, J. Design and analysis of a propagation delay tolerant ALOHA protocol for underwater networks. Ad Hoc Netw. 2011, 9, 752–766. [Google Scholar] [CrossRef]
  23. Han, Y.; Fei, Y. A delay-aware probability-based MAC protocol for underwater acoustic sensor networks. In Proceedings of the 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA, 16–19 February 2015; pp. 938–944. [Google Scholar] [CrossRef]
  24. Júnior, E.; Vieira, L.; Marcos, A. UW-SEEDEX: A pseudorandom-based MAC protocol for underwater acoustic networks. IEEE Trans. Mobile Comput. 2022, 21, 3402–3413. [Google Scholar] [CrossRef]
  25. Hsu, C.; Lai, K.; Chou, C.; Lin, K.C. ST-MAC: Spatial-temporal MAC Scheduling for Underwater Sensor Networks. In Proceedings of the IEEE INFOCOM, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 1827–1835. [Google Scholar] [CrossRef]
  26. Bai, W.; Motani, M.; Wang, H. On the Throughput of Linear Unicast Underwater Networks. In Proceedings of the IEEE GLOBECOM, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  27. Lmai, S.; Chitre, M.; Laot, C.; Houcke, S. Throughput-efficient super-TDMA MAC transmission schedules in Ad Hoc linear underwater acoustic networks. IEEE J. Ocean. Eng. 2017, 42, 156–174. [Google Scholar] [CrossRef]
  28. Chen, Y.; Lien, C.; Chuang, S.; Shih, K.P. DSSS: A TDMA-based MAC protocol with dynamic slot scheduling strategy for underwater acoustic sensor networks. In Proceedings of the OCEANS 2011 IEEE-Spain, Santander, Spain, 6–9 June 2011; pp. 1–6. [Google Scholar] [CrossRef]
  29. Sikora, M.; Laneman, J.; Haenggi, M.; Costello, D.J.; Fuja, T.E. Bandwidth- and power-efficient routing in linear wireless networks. IEEE Trans. Inf. Theory 2006, 52, 2624–2633. [Google Scholar] [CrossRef]
  30. Li, Y.; Y, Z.; Zhou, H.; Jiang, T. To relay or not to relay: Open distance and optimal deployment for linear underwater acoustic networks. IEEE Trans. Commun. 2018, 66, 3797–3808. [Google Scholar] [CrossRef]
  31. Dhanak, M.; Xiros, N. Springer Handbook of Ocean Engineering; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
  32. Sozer, E.; Stojanovic, M.; Proakis, J. Underwater acoustic networks. IEEE J. Ocean. Eng. 2000, 25, 72–83. [Google Scholar] [CrossRef]
  33. Berkhovskikh, L.; Lysanov, Y. Fundamentals of Ocean Acoustics; Springer: Berlin/Heidelberg, Germany, 1982. [Google Scholar]
  34. LinkQuest Inc. SoundLink Underwater Acoustic Modems. Available online: http://www.link-quest.com (accessed on 10 September 2023).
  35. EvoLogics GmbH. S2C Underwater Acoustic Modems. Available online: https://www.evologics.de/ (accessed on 10 September 2023).
  36. Sercel. MATS 3G Underwater Acoustic Modems. Available online: http://www.sercel.com (accessed on 10 September 2023).
Figure 1. The different anti-eavesdropping abilities between TRNs and UANs during medium accessing. (a) The propagation delay can be neglected during medium accessing in TRNs. Therefore, the collision-free multiple access to the legal receiver also means collision-free multiple access to the eavesdroppers. (b) The propagation delay cannot be neglected during medium accessing in UANs. The different propagation delays from the sender to different receivers mean the packet can be successfully received only by the legal receiver and collide at the eavesdropper.
Figure 1. The different anti-eavesdropping abilities between TRNs and UANs during medium accessing. (a) The propagation delay can be neglected during medium accessing in TRNs. Therefore, the collision-free multiple access to the legal receiver also means collision-free multiple access to the eavesdroppers. (b) The propagation delay cannot be neglected during medium accessing in UANs. The different propagation delays from the sender to different receivers mean the packet can be successfully received only by the legal receiver and collide at the eavesdropper.
Jmse 12 00314 g001
Figure 2. Illustration of application scenario where linearly deployed sensor nodes directly send packets to the AUV and the eavesdropper is also eavesdropping.
Figure 2. Illustration of application scenario where linearly deployed sensor nodes directly send packets to the AUV and the eavesdropper is also eavesdropping.
Jmse 12 00314 g002
Figure 3. The energy consumption ratios of multi-hop relaying to direct access while using three commercial modems.
Figure 3. The energy consumption ratios of multi-hop relaying to direct access while using three commercial modems.
Jmse 12 00314 g003
Figure 4. The illustrations of the central region depend on the parity of N. (a) N is an odd value. (b) N is an even value.
Figure 4. The illustrations of the central region depend on the parity of N. (a) N is an odd value. (b) N is an even value.
Jmse 12 00314 g004
Figure 5. The illustrations of the closer distance, earlier arrival (CD-EA) order and the farther distance, earlier arrival (FD-EA) order of arriving packets in the intended receiver during one scheduling period of time. (a) The illustration of the CD-EA order. (b) The illustration of the FD-EA order.
Figure 5. The illustrations of the closer distance, earlier arrival (CD-EA) order and the farther distance, earlier arrival (FD-EA) order of arriving packets in the intended receiver during one scheduling period of time. (a) The illustration of the CD-EA order. (b) The illustration of the FD-EA order.
Jmse 12 00314 g005
Figure 6. The structures of control packets used in the TRAS-MAC protocol. (a) The 1st-Ini control packet. (b) The ACK packet. (c) The 2nd-Ini control packet.
Figure 6. The structures of control packets used in the TRAS-MAC protocol. (a) The 1st-Ini control packet. (b) The ACK packet. (c) The 2nd-Ini control packet.
Jmse 12 00314 g006
Figure 7. The illustration of an example process of typical receiving-alignment-based scheduling MAC (TRAS-MAC), where we have d 1 < d 2 < d 3 .
Figure 7. The illustration of an example process of typical receiving-alignment-based scheduling MAC (TRAS-MAC), where we have d 1 < d 2 < d 3 .
Jmse 12 00314 g007
Figure 8. The illustration of the eavesdropping ring centered on the linearly deployed sensor nodes.
Figure 8. The illustration of the eavesdropping ring centered on the linearly deployed sensor nodes.
Jmse 12 00314 g008
Figure 9. The eavesdropping ring degrades into the location of the legal receiver as the legal receiver is inside the one-dimensional space of the sensor node chain.
Figure 9. The eavesdropping ring degrades into the location of the legal receiver as the legal receiver is inside the one-dimensional space of the sensor node chain.
Jmse 12 00314 g009
Figure 10. Spatial reuse when 2 T f < T s l o t T f + T d . (a) Illustration of the CFRs in a star network. (b) Senders n 1 and n 2 are located inside each other’s CFR, achieving spatial reuse. (c) Senders n 1 and n 2 are located outside each other’s CFR, causing continuous interference.
Figure 10. Spatial reuse when 2 T f < T s l o t T f + T d . (a) Illustration of the CFRs in a star network. (b) Senders n 1 and n 2 are located inside each other’s CFR, achieving spatial reuse. (c) Senders n 1 and n 2 are located outside each other’s CFR, causing continuous interference.
Jmse 12 00314 g010
Figure 11. The illustrations of the slotted- and receiving-alignment-based scheduling MAC (SRAS-MAC). (a) The illustration of an example process of the SRAS-MAC protocol. (b) The structure of the Ini control packet.
Figure 11. The illustrations of the slotted- and receiving-alignment-based scheduling MAC (SRAS-MAC). (a) The illustration of an example process of the SRAS-MAC protocol. (b) The structure of the Ini control packet.
Jmse 12 00314 g011
Figure 12. The anti-eavesdropping ratio of TRAS-MAC using different arrival orders of packets versus the number of the linearly deployed sensor nodes N, where the size of data packet B is 125 B and the eavesdropper is also located in a one-dimensional space formed by the sensor nodes’ chain.
Figure 12. The anti-eavesdropping ratio of TRAS-MAC using different arrival orders of packets versus the number of the linearly deployed sensor nodes N, where the size of data packet B is 125 B and the eavesdropper is also located in a one-dimensional space formed by the sensor nodes’ chain.
Jmse 12 00314 g012
Figure 13. The anti-eavesdropping ratios of the SRAS-MAC and TRAS-MAC protocols (using CD-EA and random orders) in two data packet lengths versus the number of sensor nodes. (a) The simulation results when N is an even value. (b) The simulation results when N is an odd value.
Figure 13. The anti-eavesdropping ratios of the SRAS-MAC and TRAS-MAC protocols (using CD-EA and random orders) in two data packet lengths versus the number of sensor nodes. (a) The simulation results when N is an even value. (b) The simulation results when N is an odd value.
Jmse 12 00314 g013
Figure 14. The anti-eavesdropping ratio of the SRAS-MAC and TRAS-MAC protocols (using CD-EA and random orders) in two data packet lengths versus the number of eavesdroppers.
Figure 14. The anti-eavesdropping ratio of the SRAS-MAC and TRAS-MAC protocols (using CD-EA and random orders) in two data packet lengths versus the number of eavesdroppers.
Jmse 12 00314 g014
Figure 15. The time consumption of the SRAS-MAC protocol and the TRAS-MAC protocol (using CD-EA and random orders) in two packet duration settings versus the value of N, where l is set to 15 km (a) The total time consumption. (b) The time consumption during initialization. (c) The time consumption during data collection.
Figure 15. The time consumption of the SRAS-MAC protocol and the TRAS-MAC protocol (using CD-EA and random orders) in two packet duration settings versus the value of N, where l is set to 15 km (a) The total time consumption. (b) The time consumption during initialization. (c) The time consumption during data collection.
Jmse 12 00314 g015
Figure 16. The time consumption of the SRAS-MAC protocol and the TRAS-MAC protocol (using CD-EA and random orders) in two settings of the data packet versus the value of l, where N is set to 16 (a) The total time consumption. (b) The time consumption during initialization. (c) The time consumption during data collection.
Figure 16. The time consumption of the SRAS-MAC protocol and the TRAS-MAC protocol (using CD-EA and random orders) in two settings of the data packet versus the value of l, where N is set to 16 (a) The total time consumption. (b) The time consumption during initialization. (c) The time consumption during data collection.
Jmse 12 00314 g016
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Y.; Ji, F.; Guan, Q.; Zhao, H.; Yao, K.; Chen, W. Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs. J. Mar. Sci. Eng. 2024, 12, 314. https://doi.org/10.3390/jmse12020314

AMA Style

Wang Y, Ji F, Guan Q, Zhao H, Yao K, Chen W. Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs. Journal of Marine Science and Engineering. 2024; 12(2):314. https://doi.org/10.3390/jmse12020314

Chicago/Turabian Style

Wang, Yan, Fei Ji, Quansheng Guan, Hao Zhao, Kexing Yao, and Weiqi Chen. 2024. "Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs" Journal of Marine Science and Engineering 12, no. 2: 314. https://doi.org/10.3390/jmse12020314

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop