An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario

Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high commun...

Full description

Saved in:
Bibliographic Details
Published in:Sensors (Basel, Switzerland) Vol. 24; no. 9; p. 2851
Main Authors: Wang, Beibei, Yue, Xiufang, Hao, Kun, Liu, Yonglei, Li, Zhisheng, Zhao, Xiaofang
Format: Journal Article
Language:English
Published: Switzerland MDPI AG 01.05.2024
Subjects:
ISSN:1424-8220, 1424-8220
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP.
AbstractList Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP.
Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP.Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP.
Audience Academic
Author Zhao, Xiaofang
Liu, Yonglei
Li, Zhisheng
Hao, Kun
Wang, Beibei
Yue, Xiufang
Author_xml – sequence: 1
  givenname: Beibei
  surname: Wang
  fullname: Wang, Beibei
– sequence: 2
  givenname: Xiufang
  surname: Yue
  fullname: Yue, Xiufang
– sequence: 3
  givenname: Kun
  surname: Hao
  fullname: Hao, Kun
– sequence: 4
  givenname: Yonglei
  orcidid: 0000-0002-9617-6144
  surname: Liu
  fullname: Liu, Yonglei
– sequence: 5
  givenname: Zhisheng
  orcidid: 0000-0003-0178-6917
  surname: Li
  fullname: Li, Zhisheng
– sequence: 6
  givenname: Xiaofang
  surname: Zhao
  fullname: Zhao, Xiaofang
BackLink https://www.ncbi.nlm.nih.gov/pubmed/38732958$$D View this record in MEDLINE/PubMed
BookMark eNptkk1vEzEQhi1URNvAgT-AVuICh7T-3F0fQwSlUhFIbc-r2fFs67BZB68XlH-PSUKEKuTDeEbPvJ7xzDk7GcJAjL0W_EIpyy9HqbmVtRHP2JnQUs9rKfnJP_dTdj6OK86lUqp-wU5VXSlpTX3GpsVQ3A-O4i9IFIvbMEWk4iYgJB-G4lv0PwG32YZEuAvd4iOtqfgAI7ki-1eQvbtHCnFb-KGA4svUJz9fpAT4PUsuQ9hQhEMuDRB9eMmed9CP9OpgZ-z-08e75ef5zder6-XiZo7aqDQXQqGyVDkQ6BxCZ0TXWV1yga0wWCkCaSUprVtXGlm71lQWnSQjBZAiNWPXe10XYNVsol9D3DYBfLMLhPjQQEwee2qySlcKUhyl1KVWILXSKFq0nWxdLmfG3u21NjH8mGhMzdqPSH0PA4VpbBQ3ypZW8Tqjb5-gq_yvQ-50R0lRacMzdbGnHiC_74cupAiYj6O1xzzhzuf4orLKlFbsZN8cZKd2Te7Yz99pZuD9HsAYxjFSd0QEb_5sSnPclMxePmHRp92UchW-_0_GbxVGvYw
CitedBy_id crossref_primary_10_1016_j_jksuci_2024_102128
Cites_doi 10.1109/ComComAp53641.2021.9652976
10.1109/TVT.2018.2867021
10.1109/JIOT.2021.3085586
10.1016/j.plrev.2016.08.015
10.1063/5.0201634
10.1016/j.adhoc.2023.103139
10.1109/T-WC.2008.070182
10.1109/JIOT.2023.3324311
10.1007/s11277-020-07431-x
10.1109/TVT.2021.3135438
10.1016/j.eswa.2023.121235
10.1109/ITAIC54216.2022.9836681
10.1109/JSEN.2015.2434890
10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00073
10.1016/j.oceaneng.2016.08.019
10.1109/TELFOR51502.2020.9306557
10.1109/JSEN.2023.3305544
10.1109/TVT.2022.3178379
10.1109/JIOT.2020.2996671
10.1109/JIOT.2022.3208319
10.1109/MNET.001.1900478
10.1109/MNET.001.1900534
10.3390/s18113907
10.1109/TIFS.2017.2698424
10.1109/TIT.2007.904982
10.1109/TVT.2024.3360252
10.1002/int.22666
10.1109/COMST.2020.3048190
10.1109/JIOT.2023.3240179
10.1109/TVT.2023.3237653
10.1109/JIOT.2021.3055857
10.1145/3384943.3409427
10.3390/s16050721
ContentType Journal Article
Copyright COPYRIGHT 2024 MDPI AG
2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2024 MDPI AG
– notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
7X8
DOA
DOI 10.3390/s24092851
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
PML(ProQuest Medical Library)
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
MEDLINE - Academic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList Publicly Available Content Database

MEDLINE - Academic
PubMed

CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_e34f61e30c224643a2434c1bc9f2bd45
A793569108
38732958
10_3390_s24092851
Genre Journal Article
GrantInformation_xml – fundername: Chunhui Cooperation Program of the Ministry of Education
  grantid: HZKY20220590-202200265
– fundername: National Natural Science Foundation of China
  grantid: 61902273
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
ABJCF
ALIPV
ARAPS
HCIFZ
KB.
M7S
NPM
PDBOC
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
7X8
ID FETCH-LOGICAL-c453t-113c39e7da1cddcaf51ff94601cb15c73ea292e344bd6528db579cd2e521ae3e3
IEDL.DBID 7X7
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001220042800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Fri Oct 03 12:34:14 EDT 2025
Sun Nov 09 11:13:45 EST 2025
Tue Oct 07 07:46:25 EDT 2025
Tue Nov 04 18:24:18 EST 2025
Wed Feb 19 02:04:55 EST 2025
Tue Nov 18 22:11:59 EST 2025
Sat Nov 29 07:11:56 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 9
Keywords underwater acoustic sensor networks
evolutionary game theory
network coding
passive attacks
source location privacy
virtual coordinate system
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c453t-113c39e7da1cddcaf51ff94601cb15c73ea292e344bd6528db579cd2e521ae3e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0003-0178-6917
0000-0002-9617-6144
OpenAccessLink https://www.proquest.com/docview/3053217450?pq-origsite=%requestingapplication%
PMID 38732958
PQID 3053217450
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_e34f61e30c224643a2434c1bc9f2bd45
proquest_miscellaneous_3053969308
proquest_journals_3053217450
gale_infotracacademiconefile_A793569108
pubmed_primary_38732958
crossref_primary_10_3390_s24092851
crossref_citationtrail_10_3390_s24092851
PublicationCentury 2000
PublicationDate 2024-05-01
PublicationDateYYYYMMDD 2024-05-01
PublicationDate_xml – month: 05
  year: 2024
  text: 2024-05-01
  day: 01
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2024
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Wang (ref_22) 2022; 9
Wang (ref_4) 2023; 11
Uyan (ref_2) 2023; 144
Jian (ref_26) 2008; 7
ref_14
Koh (ref_17) 2017; 12
Adami (ref_34) 2016; 19
Han (ref_3) 2022; 71
ref_33
ref_31
ref_30
Ghoshal (ref_29) 2016; 126
Han (ref_5) 2018; 67
ref_19
Wang (ref_25) 2023; 10
Han (ref_24) 2023; 10
Puducheri (ref_32) 2007; 53
ref_16
Wang (ref_35) 2023; 72
Shokri (ref_10) 2016; 19
Tian (ref_11) 2023; 23
Chen (ref_18) 2021; 37
Wang (ref_6) 2020; 34
Luo (ref_15) 2021; 23
Xing (ref_36) 2021; 8
Sendra (ref_7) 2015; 16
ref_23
ref_20
Zia (ref_8) 2021; 116
Wang (ref_12) 2022; 71
Abdalzaher (ref_9) 2020; 7
ref_27
Yanti (ref_13) 2024; 3082
Han (ref_21) 2020; 34
Lyu (ref_1) 2024; 235
Li (ref_28) 2021; 2021
References_xml – ident: ref_23
  doi: 10.1109/ComComAp53641.2021.9652976
– volume: 67
  start-page: 10671
  year: 2018
  ident: ref_5
  article-title: A Stratification-Based Data Collection Scheme in Underwater Acoustic Sensor Networks
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2018.2867021
– volume: 9
  start-page: 770
  year: 2022
  ident: ref_22
  article-title: A Push-Based Probabilistic Method for Source Location Privacy Protection in Underwater Acoustic Sensor Networks
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3085586
– volume: 19
  start-page: 1
  year: 2016
  ident: ref_34
  article-title: Evolutionary game theory using agent-based methods
  publication-title: Phys. Life Rev.
  doi: 10.1016/j.plrev.2016.08.015
– volume: 3082
  start-page: 050002
  year: 2024
  ident: ref_13
  article-title: Routing technique in location source privacy for wireless sensor network: A review
  publication-title: AIP Conf. Proc.
  doi: 10.1063/5.0201634
– volume: 144
  start-page: 103139
  year: 2023
  ident: ref_2
  article-title: Machine learning approaches for underwater sensor network parameter prediction
  publication-title: Ad. Hoc Netw.
  doi: 10.1016/j.adhoc.2023.103139
– volume: 7
  start-page: 3769
  year: 2008
  ident: ref_26
  article-title: A novel scheme for protecting receiver’s location privacy in wireless sensor networks
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/T-WC.2008.070182
– volume: 11
  start-page: 9854
  year: 2023
  ident: ref_4
  article-title: Dynamic Packet Routing Based on Acoustic Signal Curve Propagation in the AUV-Assisted IoUT
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2023.3324311
– volume: 116
  start-page: 1325
  year: 2021
  ident: ref_8
  article-title: State-of-the-art underwater acoustic communication modems: Classifications, analyses and design challenges
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-020-07431-x
– ident: ref_16
– volume: 71
  start-page: 2058
  year: 2022
  ident: ref_12
  article-title: A Multi-Channel Interference Based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2021.3135438
– volume: 235
  start-page: 121235
  year: 2024
  ident: ref_1
  article-title: A light-weight neural network for marine acoustic signal recognition suitable for fiber-optic hydrophones
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2023.121235
– ident: ref_33
  doi: 10.1109/ITAIC54216.2022.9836681
– volume: 16
  start-page: 4063
  year: 2015
  ident: ref_7
  article-title: Underwater acoustic modems
  publication-title: IEEE Sens. J.
  doi: 10.1109/JSEN.2015.2434890
– ident: ref_19
  doi: 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00073
– volume: 126
  start-page: 22
  year: 2016
  ident: ref_29
  article-title: Underwater explosion induced shock loading of structures: Influence of water depth, salinity and temperature
  publication-title: Ocean Eng.
  doi: 10.1016/j.oceaneng.2016.08.019
– ident: ref_30
  doi: 10.1109/TELFOR51502.2020.9306557
– volume: 23
  start-page: 23676
  year: 2023
  ident: ref_11
  article-title: LSLPR: A Layering and Source-Location-Privacy-Based Routing Protocol for Underwater Acoustic Sensor Networks
  publication-title: IEEE Sens. J.
  doi: 10.1109/JSEN.2023.3305544
– volume: 71
  start-page: 9925
  year: 2022
  ident: ref_3
  article-title: AUV-Aided Data Importance Based Scheme for Protecting Location Privacy in Smart Ocean
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2022.3178379
– volume: 7
  start-page: 11250
  year: 2020
  ident: ref_9
  article-title: A game-theoretic approach for enhancing security and data trustworthiness in IoT applications
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.2996671
– volume: 10
  start-page: 1546
  year: 2023
  ident: ref_24
  article-title: A Collision-Free-Transmission-Based Source Location Privacy Protection Scheme in UASNs Under Time Slot Allocation
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2022.3208319
– volume: 19
  start-page: 1
  year: 2016
  ident: ref_10
  article-title: Privacy games along location traces: A game-theoretic framework for optimizing location privacy
  publication-title: ACM Trans. Priv. Secur. TOPS
– volume: 34
  start-page: 188
  year: 2020
  ident: ref_21
  article-title: SSLP: A Stratification-Based Source Location Privacy Scheme in Underwater Acoustic Sensor Networks
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.001.1900478
– volume: 34
  start-page: 284
  year: 2020
  ident: ref_6
  article-title: Preserving location privacy in UASN through collaboration and semantic encapsulation
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.001.1900534
– ident: ref_14
  doi: 10.3390/s18113907
– volume: 12
  start-page: 2105
  year: 2017
  ident: ref_17
  article-title: Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2017.2698424
– volume: 53
  start-page: 3740
  year: 2007
  ident: ref_32
  article-title: The design and performance of distributed LT codes
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2007.904982
– ident: ref_31
  doi: 10.1109/TVT.2024.3360252
– volume: 37
  start-page: 1204
  year: 2021
  ident: ref_18
  article-title: PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs
  publication-title: Int. J. Intell. Syst.
  doi: 10.1002/int.22666
– volume: 23
  start-page: 137
  year: 2021
  ident: ref_15
  article-title: A survey of routing protocols for underwater wireless sensor networks
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2020.3048190
– volume: 10
  start-page: 10636
  year: 2023
  ident: ref_25
  article-title: AUV-Assisted Stratified Source Location Privacy Protection Scheme based on Network Coding in UASNs
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2023.3240179
– volume: 72
  start-page: 7728
  year: 2023
  ident: ref_35
  article-title: A Multi-Round Game-based Source Location Privacy Protection Scheme with AUV enabled in Underwater Acoustic Sensor Networks
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2023.3237653
– volume: 8
  start-page: 9005
  year: 2021
  ident: ref_36
  article-title: Game-theory-based clustering scheme for energy balancing in underwater acoustic sensor networks
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3055857
– volume: 2021
  start-page: 6670847
  year: 2021
  ident: ref_28
  article-title: An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things
  publication-title: Secur. Commun. Netw.
– ident: ref_20
  doi: 10.1145/3384943.3409427
– ident: ref_27
  doi: 10.3390/s16050721
SSID ssj0023338
Score 2.4242914
Snippet Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring....
SourceID doaj
proquest
gale
pubmed
crossref
SourceType Open Website
Aggregation Database
Index Database
Enrichment Source
StartPage 2851
SubjectTerms Acoustics
Autonomous underwater vehicles
Communication
Cooperation
Data transmission
Energy consumption
Environmental monitoring
evolutionary game theory
Game theory
network coding
Network topologies
passive attacks
Privacy
Privacy, Right of
Sensors
source location privacy
underwater acoustic sensor networks
virtual coordinate system
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYl9NAeSvp2mha1FNqLyVoj2dJxE5r2UEIgLeQm9ISF1g673oT--44kr0kf0EtPRrJsJM1IM58e3xDyFkRUiHtMzZS1Ne9aXksTZO2BtzJaZeXC5GAT3dmZvLxU57dCfaUzYYUeuHTcUQAe2ybAwiXqMw6GceCusU5FZj3P7KWLTu3A1AS1AJFX4RECBPVHG7RbiknR_GJ9Mkn_n1Pxbw5mNjSn--TB5CHSZanZQ3In9I_I_Vu8gY_JdtnTHLDoBj3FNb3IC_D081CW3-j5enVt3A98Zg6GlHWBsvke6DHaLE8x_dFgqtzLp6ueGpov4tbLcTTpnAU9GYarUJQDvw09IurhCfl6-uHLyad6ip9QOy5grJsGHKjQedM4752JoolRcYRgzjbCdRAMUww7mFvfCia9FZ1yngU06SZAgKdkrx_68JzQtBHTeR4j-o8cQZIR3rVtYM6jOySMr8j7Xb9qN5GLpxgX3zSCjCQCPYugIm_moleFUeNvhY6TcOYCiQQ7Z6Bq6Ek19L9UoyLvkmh1GqpYGWemGwfYpER6pZc4N4kW_SVZkcOd9PU0hjcaUtAMBGxiUZHX82scfWlLxfRh2JYyKkWTxF88K1oz1xlkB0wJefA_2vKC3GPoTpWjlodkb1xvw0ty112Pq836VVb-n7xJCBg
  priority: 102
  providerName: Directory of Open Access Journals
Title An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario
URI https://www.ncbi.nlm.nih.gov/pubmed/38732958
https://www.proquest.com/docview/3053217450
https://www.proquest.com/docview/3053969308
https://doaj.org/article/e34f61e30c224643a2434c1bc9f2bd45
Volume 24
WOSCitedRecordID wos001220042800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB7BLgc48F4ILJVBSHCJtvEjsU-oXXUBia0iFqRyihzbQZUgKW26iAu_nbGTZnmJC5dEcRzL0YzH34ztbwCeMlEp9Ht0TFVZxjxLeSy1k7FlPJVVqUo51iHZRDafy8VC5X3AbdNvq9zZxGCobWN8jPyI-RQGCJ_F-MXqS-yzRvnV1T6FxmXY92mzvZ5niwuHi6H_1bEJMXTtjzY4eykqRfLLHBSo-v80yL_BzDDdnNz4347ehOs90CSTTjNuwSVX34ZrP9EP3oHtpCYh79FXBJxrchbi-ORN00XxSL5enmvzDe-BysEXnaGIPzsyxanPEnx-qfGpO95PljXRJJznjSdtq_12DXLcNCvX6Rh-62p0zJu78P5k9u74VdynYYgNF6yNk4QZplxmdWKsNboSSVUpjp6cKRNhMuY0VdQxzkubCiptKTJlLHWIDLRjjh3AXt3U7j4Qv56TWV5VCEM5-lpaWJOmjhqLqEpoG8HznWAK03OU-1QZnwr0VbwMi0GGETwZqq46Yo6_VZp66Q4VPJd2KGjWH4t-aBbY8ypNHBsbT67HmaaccZOURlW0tFxE8MzrRuFHPHbG6P7gAv6S584qJmjiRIqwS0ZwuFOJojcFm-JCHyJ4PLzGQexXZnTtmm1XR_mklNjEvU7thj4z1GuqhHzw78YfwlWKeKvbi3kIe-166x7BFXPeLjfrURgX4SpHsD-dzfO3oxB-wOvp9xmW5a9P8w8_AMP7HLc
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwGP1UChJwYF8CBQwCwSXqxEtiHxCaFkqrDqNKLdLcgmM7aCRIhkymVf8Uv5HP2combj1wipw4lpM8f0tsvwfwnIlcYd6jQ6qyLORJzEOpnQwt47HMM5XJkW7EJpLpVM5m6mANvvd7Yfyyyt4mNobalsb_I99kXsIAw2cxerP4FnrVKD-72ktotLDYd6cnmLItX--9xe_7gtKdd0fbu2GnKhAaLlgdRhEzTLnE6shYa3QuojxXHBMTk0XCJMxpqqhjnGc2FlTaTCTKWOrQ0WnHHMN2L8BFtOOJT_aS2VmCxzDfa9mLGFOjzSV6S0WliH7xeY00wJ8O4LewtnFvO9f_txdzA651gTQZt8i_CWuuuAVXf6JXvA2rcUEaXacTDKgrctjMU5BJ2f6lJAfV_FibUzw2VBX-1CFC-KsjW-jaLcHye42llr6AzAuiSbNfORzXtfbLUch2WS5cO4bwXlfoal7egY_n8tx3Yb0oC3cfiJ-vSizPcwyzOeaSWlgTx44ai1Gj0DaAVz0QUtNxsHspkC8p5mIeM-mAmQCeDVUXLfHI3ypteTQNFTxXeHOirD6nnelJsed5HDk2Mp48kDNNOeMmyozKaWa5COClx2LqLRp2xuhuYwY-kucGS8dowkWMYaUMYKOHYNqZumV6hr8Ang6X0Uj5mSdduHLV1lFedBObuNfCfOgzkwmjSsgH_278CVzePfowSSd70_2HcIVibNmuO92A9bpauUdwyRzX82X1uBmTBD6dN9Z_AH90dRI
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwGP1UpgiVA3shUMAgEFyimXhJ4gNC05aBUctopIJUTsGxHTQSJEMm06p_jV_H52ys4tYDpyiJYznJ87d4eQ_gCROZxLxH-VSmqc-jkPuxsrFvGA_jLJVpPFK12EQ0m8XHx3K-Ad-6vTBuWWVnE2tDbQrtxsiHzEkYYPgsRsOsXRYx35-8XH71nYKUm2nt5DQaiBzYs1NM31Yvpvv4r59SOnn1bu-N3yoM-JoLVvlBwDSTNjIq0MZolYkgyyTHJEWngdARs4pKahnnqQkFjU0qIqkNtej0lGWWYb0XYBNDck4HsDmfvp1_6NM9htlfw2XEmBwNV-g7JY1F8IsHrIUC_nQHvwW5tbObXP2fP9M1uNKG2GTc9InrsGHzG3D5J-LFm7Ae56RWfDrFULskR_UMBjksmvFLMi8XJ0qf4bEmsXCXjhDcXyzZRadvCJ6_VnjWEBuQRU4UqXcy--OqUm6hCtkriqVtehc-a3NVLopb8P5c3nsbBnmR2ztA3ExWZHiWYQDOMctUwugwtFQbjCeFMh4870CR6Jad3YmEfE4wS3P4SXr8ePC4L7psKEn-VmjXIasv4FjE6wtF-SlpjVKCLc_CwLKRdrSCnCnKGddBqmVGU8OFB88cLhNn67AxWrVbNvCVHGtYMkbjLkIMOGMPdjo4Jq0RXCU_sOjBo_42mi83J6VyW6ybMtLJcWIVtxvI921mccSoFPHdf1f-EC4hxJPD6ezgHmxRDDqbBak7MKjKtb0PF_VJtViVD9oOSuDjeYP9O6ulf2E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Underwater+Source+Location+Privacy+Protection+Scheme+Based+on+Game+Theory+in+a+Multi-Attacker+Cooperation+Scenario&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Wang%2C+Beibei&rft.au=Yue%2C+Xiufang&rft.au=Hao%2C+Kun&rft.au=Liu%2C+Yonglei&rft.date=2024-05-01&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=24&rft.issue=9&rft_id=info:doi/10.3390%2Fs24092851&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon