Entropy optimization of degree distributions against security threats in UASNs

Linfeng Liu,Zhipeng Zhang,Jiagao Wu,Jia Xu
DOI: https://doi.org/10.1016/j.comnet.2021.108747
IF: 5.493
2022-03-01
Computer Networks
Abstract:Underwater Acoustic Sensor Networks (UASNs) are deployed for various underwater applications, such as underwater creature tracking and tactical surveillance. Particularly, an UASN deployed in military applications could be invaded by some underwater spy-robots which act as eavesdroppers or hackers. An UASN is confronted with two typical security threats: the eavesdroppers move around the anchored nodes and eavesdrop on the communication channels silently, and the data messages disseminated from the anchored nodes are probably stolen by these eavesdroppers; the hackers disguise themselves and propagate the viruses to infect the anchored nodes in a cascading manner. To reduce the theft probability of data messages and the number of cascading failures (the number of infected nodes) while maintaining the required topology connectivity, an analysis framework is first formulated to investigate the relations between the entropies of degree distributions and the resistances of security threats, and then the entropies of degree distributions are optimized to resist the security threats through appropriately coordinating the communication ranges of anchored nodes. We propose a Topology Control Strategy based on Entropy Optimization (TCSEO). In TCSEO, each anchored node independently sets the initial communication range according to a binomial distribution, and then the communications ranges of anchored nodes are checked and adjusted to maintain the required topology connectivity. Simulation results demonstrate the preferable performance of TCSEO, i.e. TCSEO can reduce the theft probability of data messages and the number of infected nodes effectively, while the required topology connectivity is maintained as much as possible.
computer science, information systems,telecommunications,engineering, electrical & electronic, hardware & architecture
What problem does this paper attempt to address?