An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario
Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high commun...
Saved in:
| Published in: | Sensors (Basel, Switzerland) Vol. 24; no. 9; p. 2851 |
|---|---|
| Main Authors: | , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Switzerland
MDPI AG
01.05.2024
|
| Subjects: | |
| ISSN: | 1424-8220, 1424-8220 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP. |
|---|---|
| AbstractList | Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP. Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP.Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP. |
| Audience | Academic |
| Author | Zhao, Xiaofang Liu, Yonglei Li, Zhisheng Hao, Kun Wang, Beibei Yue, Xiufang |
| Author_xml | – sequence: 1 givenname: Beibei surname: Wang fullname: Wang, Beibei – sequence: 2 givenname: Xiufang surname: Yue fullname: Yue, Xiufang – sequence: 3 givenname: Kun surname: Hao fullname: Hao, Kun – sequence: 4 givenname: Yonglei orcidid: 0000-0002-9617-6144 surname: Liu fullname: Liu, Yonglei – sequence: 5 givenname: Zhisheng orcidid: 0000-0003-0178-6917 surname: Li fullname: Li, Zhisheng – sequence: 6 givenname: Xiaofang surname: Zhao fullname: Zhao, Xiaofang |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38732958$$D View this record in MEDLINE/PubMed |
| BookMark | eNptkk1vEzEQhi1URNvAgT-AVuICh7T-3F0fQwSlUhFIbc-r2fFs67BZB68XlH-PSUKEKuTDeEbPvJ7xzDk7GcJAjL0W_EIpyy9HqbmVtRHP2JnQUs9rKfnJP_dTdj6OK86lUqp-wU5VXSlpTX3GpsVQ3A-O4i9IFIvbMEWk4iYgJB-G4lv0PwG32YZEuAvd4iOtqfgAI7ki-1eQvbtHCnFb-KGA4svUJz9fpAT4PUsuQ9hQhEMuDRB9eMmed9CP9OpgZ-z-08e75ef5zder6-XiZo7aqDQXQqGyVDkQ6BxCZ0TXWV1yga0wWCkCaSUprVtXGlm71lQWnSQjBZAiNWPXe10XYNVsol9D3DYBfLMLhPjQQEwee2qySlcKUhyl1KVWILXSKFq0nWxdLmfG3u21NjH8mGhMzdqPSH0PA4VpbBQ3ypZW8Tqjb5-gq_yvQ-50R0lRacMzdbGnHiC_74cupAiYj6O1xzzhzuf4orLKlFbsZN8cZKd2Te7Yz99pZuD9HsAYxjFSd0QEb_5sSnPclMxePmHRp92UchW-_0_GbxVGvYw |
| CitedBy_id | crossref_primary_10_1016_j_jksuci_2024_102128 |
| Cites_doi | 10.1109/ComComAp53641.2021.9652976 10.1109/TVT.2018.2867021 10.1109/JIOT.2021.3085586 10.1016/j.plrev.2016.08.015 10.1063/5.0201634 10.1016/j.adhoc.2023.103139 10.1109/T-WC.2008.070182 10.1109/JIOT.2023.3324311 10.1007/s11277-020-07431-x 10.1109/TVT.2021.3135438 10.1016/j.eswa.2023.121235 10.1109/ITAIC54216.2022.9836681 10.1109/JSEN.2015.2434890 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00073 10.1016/j.oceaneng.2016.08.019 10.1109/TELFOR51502.2020.9306557 10.1109/JSEN.2023.3305544 10.1109/TVT.2022.3178379 10.1109/JIOT.2020.2996671 10.1109/JIOT.2022.3208319 10.1109/MNET.001.1900478 10.1109/MNET.001.1900534 10.3390/s18113907 10.1109/TIFS.2017.2698424 10.1109/TIT.2007.904982 10.1109/TVT.2024.3360252 10.1002/int.22666 10.1109/COMST.2020.3048190 10.1109/JIOT.2023.3240179 10.1109/TVT.2023.3237653 10.1109/JIOT.2021.3055857 10.1145/3384943.3409427 10.3390/s16050721 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2024 MDPI AG 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: COPYRIGHT 2024 MDPI AG – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI 7X8 DOA |
| DOI | 10.3390/s24092851 |
| DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni Edition) PML(ProQuest Medical Library) ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition MEDLINE - Academic DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | Publicly Available Content Database MEDLINE - Academic PubMed CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_e34f61e30c224643a2434c1bc9f2bd45 A793569108 38732958 10_3390_s24092851 |
| Genre | Journal Article |
| GrantInformation_xml | – fundername: Chunhui Cooperation Program of the Ministry of Education grantid: HZKY20220590-202200265 – fundername: National Natural Science Foundation of China grantid: 61902273 |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. ABJCF ALIPV ARAPS HCIFZ KB. M7S NPM PDBOC 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI 7X8 |
| ID | FETCH-LOGICAL-c453t-113c39e7da1cddcaf51ff94601cb15c73ea292e344bd6528db579cd2e521ae3e3 |
| IEDL.DBID | 7X7 |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001220042800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Fri Oct 03 12:34:14 EDT 2025 Sun Nov 09 11:13:45 EST 2025 Tue Oct 07 07:46:25 EDT 2025 Tue Nov 04 18:24:18 EST 2025 Wed Feb 19 02:04:55 EST 2025 Tue Nov 18 22:11:59 EST 2025 Sat Nov 29 07:11:56 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 9 |
| Keywords | underwater acoustic sensor networks evolutionary game theory network coding passive attacks source location privacy virtual coordinate system |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c453t-113c39e7da1cddcaf51ff94601cb15c73ea292e344bd6528db579cd2e521ae3e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0003-0178-6917 0000-0002-9617-6144 |
| OpenAccessLink | https://www.proquest.com/docview/3053217450?pq-origsite=%requestingapplication% |
| PMID | 38732958 |
| PQID | 3053217450 |
| PQPubID | 2032333 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_e34f61e30c224643a2434c1bc9f2bd45 proquest_miscellaneous_3053969308 proquest_journals_3053217450 gale_infotracacademiconefile_A793569108 pubmed_primary_38732958 crossref_primary_10_3390_s24092851 crossref_citationtrail_10_3390_s24092851 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-05-01 |
| PublicationDateYYYYMMDD | 2024-05-01 |
| PublicationDate_xml | – month: 05 year: 2024 text: 2024-05-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2024 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | Wang (ref_22) 2022; 9 Wang (ref_4) 2023; 11 Uyan (ref_2) 2023; 144 Jian (ref_26) 2008; 7 ref_14 Koh (ref_17) 2017; 12 Adami (ref_34) 2016; 19 Han (ref_3) 2022; 71 ref_33 ref_31 ref_30 Ghoshal (ref_29) 2016; 126 Han (ref_5) 2018; 67 ref_19 Wang (ref_25) 2023; 10 Han (ref_24) 2023; 10 Puducheri (ref_32) 2007; 53 ref_16 Wang (ref_35) 2023; 72 Shokri (ref_10) 2016; 19 Tian (ref_11) 2023; 23 Chen (ref_18) 2021; 37 Wang (ref_6) 2020; 34 Luo (ref_15) 2021; 23 Xing (ref_36) 2021; 8 Sendra (ref_7) 2015; 16 ref_23 ref_20 Zia (ref_8) 2021; 116 Wang (ref_12) 2022; 71 Abdalzaher (ref_9) 2020; 7 ref_27 Yanti (ref_13) 2024; 3082 Han (ref_21) 2020; 34 Lyu (ref_1) 2024; 235 Li (ref_28) 2021; 2021 |
| References_xml | – ident: ref_23 doi: 10.1109/ComComAp53641.2021.9652976 – volume: 67 start-page: 10671 year: 2018 ident: ref_5 article-title: A Stratification-Based Data Collection Scheme in Underwater Acoustic Sensor Networks publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2018.2867021 – volume: 9 start-page: 770 year: 2022 ident: ref_22 article-title: A Push-Based Probabilistic Method for Source Location Privacy Protection in Underwater Acoustic Sensor Networks publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3085586 – volume: 19 start-page: 1 year: 2016 ident: ref_34 article-title: Evolutionary game theory using agent-based methods publication-title: Phys. Life Rev. doi: 10.1016/j.plrev.2016.08.015 – volume: 3082 start-page: 050002 year: 2024 ident: ref_13 article-title: Routing technique in location source privacy for wireless sensor network: A review publication-title: AIP Conf. Proc. doi: 10.1063/5.0201634 – volume: 144 start-page: 103139 year: 2023 ident: ref_2 article-title: Machine learning approaches for underwater sensor network parameter prediction publication-title: Ad. Hoc Netw. doi: 10.1016/j.adhoc.2023.103139 – volume: 7 start-page: 3769 year: 2008 ident: ref_26 article-title: A novel scheme for protecting receiver’s location privacy in wireless sensor networks publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/T-WC.2008.070182 – volume: 11 start-page: 9854 year: 2023 ident: ref_4 article-title: Dynamic Packet Routing Based on Acoustic Signal Curve Propagation in the AUV-Assisted IoUT publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2023.3324311 – volume: 116 start-page: 1325 year: 2021 ident: ref_8 article-title: State-of-the-art underwater acoustic communication modems: Classifications, analyses and design challenges publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-020-07431-x – ident: ref_16 – volume: 71 start-page: 2058 year: 2022 ident: ref_12 article-title: A Multi-Channel Interference Based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2021.3135438 – volume: 235 start-page: 121235 year: 2024 ident: ref_1 article-title: A light-weight neural network for marine acoustic signal recognition suitable for fiber-optic hydrophones publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.121235 – ident: ref_33 doi: 10.1109/ITAIC54216.2022.9836681 – volume: 16 start-page: 4063 year: 2015 ident: ref_7 article-title: Underwater acoustic modems publication-title: IEEE Sens. J. doi: 10.1109/JSEN.2015.2434890 – ident: ref_19 doi: 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00073 – volume: 126 start-page: 22 year: 2016 ident: ref_29 article-title: Underwater explosion induced shock loading of structures: Influence of water depth, salinity and temperature publication-title: Ocean Eng. doi: 10.1016/j.oceaneng.2016.08.019 – ident: ref_30 doi: 10.1109/TELFOR51502.2020.9306557 – volume: 23 start-page: 23676 year: 2023 ident: ref_11 article-title: LSLPR: A Layering and Source-Location-Privacy-Based Routing Protocol for Underwater Acoustic Sensor Networks publication-title: IEEE Sens. J. doi: 10.1109/JSEN.2023.3305544 – volume: 71 start-page: 9925 year: 2022 ident: ref_3 article-title: AUV-Aided Data Importance Based Scheme for Protecting Location Privacy in Smart Ocean publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2022.3178379 – volume: 7 start-page: 11250 year: 2020 ident: ref_9 article-title: A game-theoretic approach for enhancing security and data trustworthiness in IoT applications publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.2996671 – volume: 10 start-page: 1546 year: 2023 ident: ref_24 article-title: A Collision-Free-Transmission-Based Source Location Privacy Protection Scheme in UASNs Under Time Slot Allocation publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3208319 – volume: 19 start-page: 1 year: 2016 ident: ref_10 article-title: Privacy games along location traces: A game-theoretic framework for optimizing location privacy publication-title: ACM Trans. Priv. Secur. TOPS – volume: 34 start-page: 188 year: 2020 ident: ref_21 article-title: SSLP: A Stratification-Based Source Location Privacy Scheme in Underwater Acoustic Sensor Networks publication-title: IEEE Netw. doi: 10.1109/MNET.001.1900478 – volume: 34 start-page: 284 year: 2020 ident: ref_6 article-title: Preserving location privacy in UASN through collaboration and semantic encapsulation publication-title: IEEE Netw. doi: 10.1109/MNET.001.1900534 – ident: ref_14 doi: 10.3390/s18113907 – volume: 12 start-page: 2105 year: 2017 ident: ref_17 article-title: Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2017.2698424 – volume: 53 start-page: 3740 year: 2007 ident: ref_32 article-title: The design and performance of distributed LT codes publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.2007.904982 – ident: ref_31 doi: 10.1109/TVT.2024.3360252 – volume: 37 start-page: 1204 year: 2021 ident: ref_18 article-title: PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs publication-title: Int. J. Intell. Syst. doi: 10.1002/int.22666 – volume: 23 start-page: 137 year: 2021 ident: ref_15 article-title: A survey of routing protocols for underwater wireless sensor networks publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2020.3048190 – volume: 10 start-page: 10636 year: 2023 ident: ref_25 article-title: AUV-Assisted Stratified Source Location Privacy Protection Scheme based on Network Coding in UASNs publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2023.3240179 – volume: 72 start-page: 7728 year: 2023 ident: ref_35 article-title: A Multi-Round Game-based Source Location Privacy Protection Scheme with AUV enabled in Underwater Acoustic Sensor Networks publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2023.3237653 – volume: 8 start-page: 9005 year: 2021 ident: ref_36 article-title: Game-theory-based clustering scheme for energy balancing in underwater acoustic sensor networks publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3055857 – volume: 2021 start-page: 6670847 year: 2021 ident: ref_28 article-title: An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things publication-title: Secur. Commun. Netw. – ident: ref_20 doi: 10.1145/3384943.3409427 – ident: ref_27 doi: 10.3390/s16050721 |
| SSID | ssj0023338 |
| Score | 2.4242914 |
| Snippet | Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring.... |
| SourceID | doaj proquest gale pubmed crossref |
| SourceType | Open Website Aggregation Database Index Database Enrichment Source |
| StartPage | 2851 |
| SubjectTerms | Acoustics Autonomous underwater vehicles Communication Cooperation Data transmission Energy consumption Environmental monitoring evolutionary game theory Game theory network coding Network topologies passive attacks Privacy Privacy, Right of Sensors source location privacy underwater acoustic sensor networks virtual coordinate system |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYl9NAeSvp2mha1FNqLyVoj2dJxE5r2UEIgLeQm9ISF1g673oT--44kr0kf0EtPRrJsJM1IM58e3xDyFkRUiHtMzZS1Ne9aXksTZO2BtzJaZeXC5GAT3dmZvLxU57dCfaUzYYUeuHTcUQAe2ybAwiXqMw6GceCusU5FZj3P7KWLTu3A1AS1AJFX4RECBPVHG7RbiknR_GJ9Mkn_n1Pxbw5mNjSn--TB5CHSZanZQ3In9I_I_Vu8gY_JdtnTHLDoBj3FNb3IC_D081CW3-j5enVt3A98Zg6GlHWBsvke6DHaLE8x_dFgqtzLp6ueGpov4tbLcTTpnAU9GYarUJQDvw09IurhCfl6-uHLyad6ip9QOy5grJsGHKjQedM4752JoolRcYRgzjbCdRAMUww7mFvfCia9FZ1yngU06SZAgKdkrx_68JzQtBHTeR4j-o8cQZIR3rVtYM6jOySMr8j7Xb9qN5GLpxgX3zSCjCQCPYugIm_moleFUeNvhY6TcOYCiQQ7Z6Bq6Ek19L9UoyLvkmh1GqpYGWemGwfYpER6pZc4N4kW_SVZkcOd9PU0hjcaUtAMBGxiUZHX82scfWlLxfRh2JYyKkWTxF88K1oz1xlkB0wJefA_2vKC3GPoTpWjlodkb1xvw0ty112Pq836VVb-n7xJCBg priority: 102 providerName: Directory of Open Access Journals |
| Title | An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/38732958 https://www.proquest.com/docview/3053217450 https://www.proquest.com/docview/3053969308 https://doaj.org/article/e34f61e30c224643a2434c1bc9f2bd45 |
| Volume | 24 |
| WOSCitedRecordID | wos001220042800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB7BLgc48F4ILJVBSHCJtvEjsU-oXXUBia0iFqRyihzbQZUgKW26iAu_nbGTZnmJC5dEcRzL0YzH34ztbwCeMlEp9Ht0TFVZxjxLeSy1k7FlPJVVqUo51iHZRDafy8VC5X3AbdNvq9zZxGCobWN8jPyI-RQGCJ_F-MXqS-yzRvnV1T6FxmXY92mzvZ5niwuHi6H_1bEJMXTtjzY4eykqRfLLHBSo-v80yL_BzDDdnNz4347ehOs90CSTTjNuwSVX34ZrP9EP3oHtpCYh79FXBJxrchbi-ORN00XxSL5enmvzDe-BysEXnaGIPzsyxanPEnx-qfGpO95PljXRJJznjSdtq_12DXLcNCvX6Rh-62p0zJu78P5k9u74VdynYYgNF6yNk4QZplxmdWKsNboSSVUpjp6cKRNhMuY0VdQxzkubCiptKTJlLHWIDLRjjh3AXt3U7j4Qv56TWV5VCEM5-lpaWJOmjhqLqEpoG8HznWAK03OU-1QZnwr0VbwMi0GGETwZqq46Yo6_VZp66Q4VPJd2KGjWH4t-aBbY8ypNHBsbT67HmaaccZOURlW0tFxE8MzrRuFHPHbG6P7gAv6S584qJmjiRIqwS0ZwuFOJojcFm-JCHyJ4PLzGQexXZnTtmm1XR_mklNjEvU7thj4z1GuqhHzw78YfwlWKeKvbi3kIe-166x7BFXPeLjfrURgX4SpHsD-dzfO3oxB-wOvp9xmW5a9P8w8_AMP7HLc |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwGP1UChJwYF8CBQwCwSXqxEtiHxCaFkqrDqNKLdLcgmM7aCRIhkymVf8Uv5HP2combj1wipw4lpM8f0tsvwfwnIlcYd6jQ6qyLORJzEOpnQwt47HMM5XJkW7EJpLpVM5m6mANvvd7Yfyyyt4mNobalsb_I99kXsIAw2cxerP4FnrVKD-72ktotLDYd6cnmLItX--9xe_7gtKdd0fbu2GnKhAaLlgdRhEzTLnE6shYa3QuojxXHBMTk0XCJMxpqqhjnGc2FlTaTCTKWOrQ0WnHHMN2L8BFtOOJT_aS2VmCxzDfa9mLGFOjzSV6S0WliH7xeY00wJ8O4LewtnFvO9f_txdzA651gTQZt8i_CWuuuAVXf6JXvA2rcUEaXacTDKgrctjMU5BJ2f6lJAfV_FibUzw2VBX-1CFC-KsjW-jaLcHye42llr6AzAuiSbNfORzXtfbLUch2WS5cO4bwXlfoal7egY_n8tx3Yb0oC3cfiJ-vSizPcwyzOeaSWlgTx44ai1Gj0DaAVz0QUtNxsHspkC8p5mIeM-mAmQCeDVUXLfHI3ypteTQNFTxXeHOirD6nnelJsed5HDk2Mp48kDNNOeMmyozKaWa5COClx2LqLRp2xuhuYwY-kucGS8dowkWMYaUMYKOHYNqZumV6hr8Ang6X0Uj5mSdduHLV1lFedBObuNfCfOgzkwmjSsgH_278CVzePfowSSd70_2HcIVibNmuO92A9bpauUdwyRzX82X1uBmTBD6dN9Z_AH90dRI |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwGP1UpgiVA3shUMAgEFyimXhJ4gNC05aBUctopIJUTsGxHTQSJEMm06p_jV_H52ys4tYDpyiJYznJ87d4eQ_gCROZxLxH-VSmqc-jkPuxsrFvGA_jLJVpPFK12EQ0m8XHx3K-Ad-6vTBuWWVnE2tDbQrtxsiHzEkYYPgsRsOsXRYx35-8XH71nYKUm2nt5DQaiBzYs1NM31Yvpvv4r59SOnn1bu-N3yoM-JoLVvlBwDSTNjIq0MZolYkgyyTHJEWngdARs4pKahnnqQkFjU0qIqkNtej0lGWWYb0XYBNDck4HsDmfvp1_6NM9htlfw2XEmBwNV-g7JY1F8IsHrIUC_nQHvwW5tbObXP2fP9M1uNKG2GTc9InrsGHzG3D5J-LFm7Ae56RWfDrFULskR_UMBjksmvFLMi8XJ0qf4bEmsXCXjhDcXyzZRadvCJ6_VnjWEBuQRU4UqXcy--OqUm6hCtkriqVtehc-a3NVLopb8P5c3nsbBnmR2ztA3ExWZHiWYQDOMctUwugwtFQbjCeFMh4870CR6Jad3YmEfE4wS3P4SXr8ePC4L7psKEn-VmjXIasv4FjE6wtF-SlpjVKCLc_CwLKRdrSCnCnKGddBqmVGU8OFB88cLhNn67AxWrVbNvCVHGtYMkbjLkIMOGMPdjo4Jq0RXCU_sOjBo_42mi83J6VyW6ybMtLJcWIVtxvI921mccSoFPHdf1f-EC4hxJPD6ezgHmxRDDqbBak7MKjKtb0PF_VJtViVD9oOSuDjeYP9O6ulf2E |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Underwater+Source+Location+Privacy+Protection+Scheme+Based+on+Game+Theory+in+a+Multi-Attacker+Cooperation+Scenario&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Wang%2C+Beibei&rft.au=Yue%2C+Xiufang&rft.au=Hao%2C+Kun&rft.au=Liu%2C+Yonglei&rft.date=2024-05-01&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=24&rft.issue=9&rft_id=info:doi/10.3390%2Fs24092851&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |