Wireless information and power transfer(WIPT) enables simultaneously communications and sustainable power supplement without the erection of power supply lines and the replacement operation of the batteries for the te...Wireless information and power transfer(WIPT) enables simultaneously communications and sustainable power supplement without the erection of power supply lines and the replacement operation of the batteries for the terminals. The application of WIPT to the underwater acoustic sensor networks(UWASNs) not only retains the long range communication capabilities, but also provides an auxiliary and convenient energy supplement way for the terminal sensors, and thus is a promising scheme to solve the energy-limited problem for the UWASNs. In this paper, we propose the integration of WIPT into the UWASNs and provide an overview on various enabling techniques for the WIPT based UWASNs(WIPT-UWASNs) as well as pointing out future research challenges and opportunities for WIPT-UWASNs.展开更多
Underwater Acoustic Sensor Network(UASN) has attracted significant attention because of its great influence on ocean exploration and monitoring. On account of the unique characteristics of underwater environment, loca...Underwater Acoustic Sensor Network(UASN) has attracted significant attention because of its great influence on ocean exploration and monitoring. On account of the unique characteristics of underwater environment, localization, as one of the fundamental tasks in UASNs, is a more challenging work than in terrestrial sensor networks. A survey of the ranging algorithms and the network architectures varied with different applications in UASNs is provided in this paper. Algorithms used to estimate the coordinates of the UASNs nodes are classified into two categories: rangebased and range-free. In addition, we analyze the architectures of UASNs based on different applications, and compare their performances from the aspects of communication cost, accuracy, coverage and so on. Open research issues which would affect the accuracy of localization are also discussed, including MAC protocols, sound speed and time synchronization.展开更多
With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media a...With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media access control (MAC) protocols, which allow multiple users to share the common medium fairly and efficiently, are essential for the performance of UASNs. However, the design of MAC protocols is confronted with the challenges of spatial unfairness, data eruption, and low energy efficiency. In this paper, we propose a novel data concurrent transmission (DCT) MAC protocol, which is able to exploit long propagation delay and conduct concurrent transmission. Specifically, we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes. In addition, simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption. Finally, we give some typical future applications of UASNs and discuss the demands on MAC protocol design.展开更多
This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node ind...This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.展开更多
Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UA...Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.展开更多
This work proposes an innovative approach to evaluate the functional characteristics of a heterogeneous underwater wireless acoustic sensor network(UWASN)using a stochastic model and the network connectivity criterion...This work proposes an innovative approach to evaluate the functional characteristics of a heterogeneous underwater wireless acoustic sensor network(UWASN)using a stochastic model and the network connectivity criterion.The connectivity criterion is probabilistic and considers inherently distinct groups of parameters:technical parameters that determine the network function at specific levels of the communication stack and physical parameters that describe the environment in the water area.The proposed approach enables researchers to evaluate the network characteristics in terms of energy efficiency and reliability while considering specific network and environmental parameters.Moreover,this approach is a simple and convenient tool for analyzing the effectiveness of protocols in various open systems interconnection model levels.It is possible to assess the potential capabilities of any protocol and include it in the proposed model.This work presents the results of modeling the critical characteristics of heterogeneous three-dimensional UWASNs of different scales consisting of stationary sensors and a wave glider as a mobile gateway,using specific protocols as examples.Several alternative routes for the wave glider are considered to optimize the network’s functional capabilities.Optimal trajectories of the wave glider’s movement have been determined in terms of ensuring the efficiency and reliability of the hybrid UWASN at various scales.In the context of the problem,an evaluation of different reference node placement was to ensure message transmission to a mobile gateway.The best location of reference nodes has been found.展开更多
As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this...As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this paper,a cooperative security monitoring mechanism aided by multiple slave cluster heads(SCHs)is proposed to keep track of the data security of a CH.By designing a low complexity“equilateral triangle algorithm(ETA)”,the optimal SCHs(named as ETA-based multiple SCHs)are selected from the candidate SCHs so as to improve the dispersion and coverage of SCHs and achieve largescale data security monitoring.In addition,by analyzing the entire monitoring process,the close form expression of the probability of the failure attack identification for the SCHs with respect to the probability of attack launched by ordinary nodes is deduced.The simulation results show that the proposed optimal ETA-based multiple SCH cooperation scheme has lower probability of the failure attack identification than that of the existing schemes.In addition,the numerical simulation results are consistent with the theoretical analysis results,thus verifying the effectiveness of the proposed scheme.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 62171187the Guangdong Basic and Applied Basic Research Foundation under Grant 2022A1515011476+1 种基金the Science and Technology Program of Guangzhou under Grant 201904010373the Key Program of Marine Economy Development (Six Marine Industries) Special Foundation of Department of Natural Resources of Guangdong Province (GDNRC [2020]009)。
文摘Wireless information and power transfer(WIPT) enables simultaneously communications and sustainable power supplement without the erection of power supply lines and the replacement operation of the batteries for the terminals. The application of WIPT to the underwater acoustic sensor networks(UWASNs) not only retains the long range communication capabilities, but also provides an auxiliary and convenient energy supplement way for the terminal sensors, and thus is a promising scheme to solve the energy-limited problem for the UWASNs. In this paper, we propose the integration of WIPT into the UWASNs and provide an overview on various enabling techniques for the WIPT based UWASNs(WIPT-UWASNs) as well as pointing out future research challenges and opportunities for WIPT-UWASNs.
基金supported by National Natural Science Foundation of China under Grants 61001067,61371093and 61172105Natural Science Foundation of Zhejiang Prov.China under Grants LY13D060001
文摘Underwater Acoustic Sensor Network(UASN) has attracted significant attention because of its great influence on ocean exploration and monitoring. On account of the unique characteristics of underwater environment, localization, as one of the fundamental tasks in UASNs, is a more challenging work than in terrestrial sensor networks. A survey of the ranging algorithms and the network architectures varied with different applications in UASNs is provided in this paper. Algorithms used to estimate the coordinates of the UASNs nodes are classified into two categories: rangebased and range-free. In addition, we analyze the architectures of UASNs based on different applications, and compare their performances from the aspects of communication cost, accuracy, coverage and so on. Open research issues which would affect the accuracy of localization are also discussed, including MAC protocols, sound speed and time synchronization.
基金supported in part by the National Natural Science Foundation of China under Grant 62171405in part by the National Science Fund for Distinguished Young Scholars under Grant 62225114
文摘With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media access control (MAC) protocols, which allow multiple users to share the common medium fairly and efficiently, are essential for the performance of UASNs. However, the design of MAC protocols is confronted with the challenges of spatial unfairness, data eruption, and low energy efficiency. In this paper, we propose a novel data concurrent transmission (DCT) MAC protocol, which is able to exploit long propagation delay and conduct concurrent transmission. Specifically, we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes. In addition, simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption. Finally, we give some typical future applications of UASNs and discuss the demands on MAC protocol design.
基金supported in part by National Key Research and Development Program of China under Grants No.2016YFC1400200 and 2016YFC1400204National Natural Science Foundation of China under Grants No.41476026,41676024 and 41376040Fundamental Research Funds for the Central Universities of China under Grant No.220720140506
文摘This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.
基金Supported by the National Natural Science Foundation of China under Grant No.62171310the Marine Defense Innovation Fund JJ-2020-701-09Lanzhou Jiaotong University-Tianjin University Co-Funding under Grant No.2022064。
文摘Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.
基金partially funded by the Ministry of Science and Higher Education of the Russian Federation as a part of World-class Research Center Program:Advanced Digital Technologies(contract No.075-15-2022-312 dated 20 April 2022).
文摘This work proposes an innovative approach to evaluate the functional characteristics of a heterogeneous underwater wireless acoustic sensor network(UWASN)using a stochastic model and the network connectivity criterion.The connectivity criterion is probabilistic and considers inherently distinct groups of parameters:technical parameters that determine the network function at specific levels of the communication stack and physical parameters that describe the environment in the water area.The proposed approach enables researchers to evaluate the network characteristics in terms of energy efficiency and reliability while considering specific network and environmental parameters.Moreover,this approach is a simple and convenient tool for analyzing the effectiveness of protocols in various open systems interconnection model levels.It is possible to assess the potential capabilities of any protocol and include it in the proposed model.This work presents the results of modeling the critical characteristics of heterogeneous three-dimensional UWASNs of different scales consisting of stationary sensors and a wave glider as a mobile gateway,using specific protocols as examples.Several alternative routes for the wave glider are considered to optimize the network’s functional capabilities.Optimal trajectories of the wave glider’s movement have been determined in terms of ensuring the efficiency and reliability of the hybrid UWASN at various scales.In the context of the problem,an evaluation of different reference node placement was to ensure message transmission to a mobile gateway.The best location of reference nodes has been found.
基金supported in part by the Joint Fund of Science and Technology Department of Liaoning Province and State Key Laboratory of Robotics,China under Grant 2021-KF-22-08in part by the Basic Research Program of Science and Technology of Shenzhen,China under Grant JCYJ20190809161805508in part by the National Natural Science Foundation of China under Grant 62271423 and Grant 41976178.
文摘As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this paper,a cooperative security monitoring mechanism aided by multiple slave cluster heads(SCHs)is proposed to keep track of the data security of a CH.By designing a low complexity“equilateral triangle algorithm(ETA)”,the optimal SCHs(named as ETA-based multiple SCHs)are selected from the candidate SCHs so as to improve the dispersion and coverage of SCHs and achieve largescale data security monitoring.In addition,by analyzing the entire monitoring process,the close form expression of the probability of the failure attack identification for the SCHs with respect to the probability of attack launched by ordinary nodes is deduced.The simulation results show that the proposed optimal ETA-based multiple SCH cooperation scheme has lower probability of the failure attack identification than that of the existing schemes.In addition,the numerical simulation results are consistent with the theoretical analysis results,thus verifying the effectiveness of the proposed scheme.