Open Access Open Access  Restricted Access Subscription or Fee Access

Security against Jamming in Opportunistic Localization for Underwater Sensor Networks

Dr. P. Vijayalakshmi, S.B. Saritha

Abstract


In Underwater Sensor Networks, localization and the security of the node is the important process. Due to the lack of reference anchor node in the distributed localization [1],[4],[5], the opportunistic localization[3]in which the sensor nodes localized by exploiting the available opportunities and to interact with reference nodes to get localized with the minimum localization delay. For the secure transmission of the data between the source and the receiver, the RSA algorithm is used here. If there is attack in the path, the source node chooses the alternative path. In the route discovery process, the routing update condition calculates the node weight of each path and sorts the path weight in descending order and chooses the path which has the largest weight for data communication. The shortest path among all the weighted is chosen using the greedy algorithm. The simulation result shows that the network performance is increased and the packet drop, packet delay is reduced compared to the network with jamming environment.


Keywords


Ns-AOMD; Greedy Algorithm; Path Weight; Packet Delay; Energy;

Full Text:

PDF

References


. Erol M., Gerla M., and Vieira L. F. M. (2007), “Localization with DiveNRise (DNR) beacons for underwater acoustic sensor networks,” in Proc. ACM 2nd Int. Workshop Underwater Netw., pp. 97–100.

. Gaurav Gulhane, Nikita V.Mahajan, “Securing Multipath Routing Protocol using Authentication approach for Wireless Sensor Network” DOI 10.1109/CSNT.2014.153 IEEE.

. Sudip Misra, Tamoghna Ojha, and AyanMondal (2015)”Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks” IEEE transactions on mobile computing, vol. 14, no. 5,

. Cheng X., Du D. H.-C., Liang Q., and Shu H.(2008), “Silent positioningin underwater acoustic sensor networks,” IEEE Trans. Veh. Technol.vol. 57, no. 3, pp. 1756–1766.

. Akan O. B. and Isik M.T.(2009), “A three dimensional localization algorithm for underwater acoustic sensor networks,” IEEE Trans. Wireless Commun., vol. 8, no. 9, pp. 4457–4463.

. H. D. Sherali, A. L. Soyster, and F. H. Murphy, (1983), “Stackelberg-NashCournotequilibria: Characterizations and computations,” Oper. Res., vol. 31, no. 2, pp. 253–276.

. Meng M.-H., and Ren H. (2009),“Game-theoretic modeling of joint topology control and power scheduling for wireless heterogeneous sensor networks,” IEEE/ACM Trans. Autom. Sci. Eng., vol. 6, no. 4, pp. 610–625.

. Cheng W., Cheng X., Liu F., Lu X., Lu Z., and Thaeler A. (2009), “Time synchronization free localization in large scale underwater acoustic sensor networks,” in Proc. 29th IEEE Int. Conf. Distrib. Comput. Syst. Workshops, pp. 80–87.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.