Hari Krishna Vana, Ramadevi Kolisetty, Balaji Narayanam
{"title":"为基于 AUV 的水下无线网络提供基于 SDN 架构的安全数据传输与合作搜索方案","authors":"Hari Krishna Vana, Ramadevi Kolisetty, Balaji Narayanam","doi":"10.1002/dac.5909","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Underwater wireless sensor networks (UWSNs) based on autonomous underwater vehicles (AUVs) have become the standard technology for underwater search tasks with the advent of new underwater information and communication technologies (ICTs). It is also vulnerable to threats and malicious attacks because of its inherent characteristics, open acoustic channel and hostile underwater environment. The purpose of this research is to develop a secure data transfer (SDF) system based on software-defined networking (SDN) architecture with cooperative searching scheme (CSS) (SDN-SDF-CSS) for AUV-based UWSN. This part employs data, local control and the primary control layer to provide a scalable SDN-based architecture for the AUV-based UWSN. To accomplish the underwater search operation, the data layer is primarily deployed to gather AUVs (G-AUVs) and store AUVs (S-AUVs). In order to schedule the AUV, the clustering process takes place based on priority ranking with respect to the average power of each cluster. Then, the CSS is developed, and it is performed in the data layer. The hierarchical localization framework (HLF) can be used to locate each AUV's location within the data layer, which is a necessary step in deploying the cooperative searching model. Finally, for an efficient data transfer, the communication model is deployed in the data layer. UWSNs are vulnerable to various malicious attacks (such as bad-mouthing attacks, on–off attacks, blackhole attacks and wormhole attacks) because of the high bit error rate and unstable optical/acoustic channels in the underwater environment. To overcome this, an SDF technique is used, which involves isolating the attacker node from the data layer. The suggested SDN-SDF-CSS model is implemented on the MATLAB platform, and its performance is evaluated using various evaluation metrics, both with and without attacks. As a result, the proposed SDN-SDF-CSS model has achieved better performance and proved its superiority in the UWSN environment.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"37 16","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SDN architecture-based secure data transfer with cooperative searching scheme for AUV-based underwater wireless networks\",\"authors\":\"Hari Krishna Vana, Ramadevi Kolisetty, Balaji Narayanam\",\"doi\":\"10.1002/dac.5909\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Underwater wireless sensor networks (UWSNs) based on autonomous underwater vehicles (AUVs) have become the standard technology for underwater search tasks with the advent of new underwater information and communication technologies (ICTs). It is also vulnerable to threats and malicious attacks because of its inherent characteristics, open acoustic channel and hostile underwater environment. The purpose of this research is to develop a secure data transfer (SDF) system based on software-defined networking (SDN) architecture with cooperative searching scheme (CSS) (SDN-SDF-CSS) for AUV-based UWSN. This part employs data, local control and the primary control layer to provide a scalable SDN-based architecture for the AUV-based UWSN. To accomplish the underwater search operation, the data layer is primarily deployed to gather AUVs (G-AUVs) and store AUVs (S-AUVs). In order to schedule the AUV, the clustering process takes place based on priority ranking with respect to the average power of each cluster. Then, the CSS is developed, and it is performed in the data layer. The hierarchical localization framework (HLF) can be used to locate each AUV's location within the data layer, which is a necessary step in deploying the cooperative searching model. Finally, for an efficient data transfer, the communication model is deployed in the data layer. UWSNs are vulnerable to various malicious attacks (such as bad-mouthing attacks, on–off attacks, blackhole attacks and wormhole attacks) because of the high bit error rate and unstable optical/acoustic channels in the underwater environment. To overcome this, an SDF technique is used, which involves isolating the attacker node from the data layer. The suggested SDN-SDF-CSS model is implemented on the MATLAB platform, and its performance is evaluated using various evaluation metrics, both with and without attacks. As a result, the proposed SDN-SDF-CSS model has achieved better performance and proved its superiority in the UWSN environment.</p>\\n </div>\",\"PeriodicalId\":13946,\"journal\":{\"name\":\"International Journal of Communication Systems\",\"volume\":\"37 16\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2024-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Communication Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/dac.5909\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.5909","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
SDN architecture-based secure data transfer with cooperative searching scheme for AUV-based underwater wireless networks
Underwater wireless sensor networks (UWSNs) based on autonomous underwater vehicles (AUVs) have become the standard technology for underwater search tasks with the advent of new underwater information and communication technologies (ICTs). It is also vulnerable to threats and malicious attacks because of its inherent characteristics, open acoustic channel and hostile underwater environment. The purpose of this research is to develop a secure data transfer (SDF) system based on software-defined networking (SDN) architecture with cooperative searching scheme (CSS) (SDN-SDF-CSS) for AUV-based UWSN. This part employs data, local control and the primary control layer to provide a scalable SDN-based architecture for the AUV-based UWSN. To accomplish the underwater search operation, the data layer is primarily deployed to gather AUVs (G-AUVs) and store AUVs (S-AUVs). In order to schedule the AUV, the clustering process takes place based on priority ranking with respect to the average power of each cluster. Then, the CSS is developed, and it is performed in the data layer. The hierarchical localization framework (HLF) can be used to locate each AUV's location within the data layer, which is a necessary step in deploying the cooperative searching model. Finally, for an efficient data transfer, the communication model is deployed in the data layer. UWSNs are vulnerable to various malicious attacks (such as bad-mouthing attacks, on–off attacks, blackhole attacks and wormhole attacks) because of the high bit error rate and unstable optical/acoustic channels in the underwater environment. To overcome this, an SDF technique is used, which involves isolating the attacker node from the data layer. The suggested SDN-SDF-CSS model is implemented on the MATLAB platform, and its performance is evaluated using various evaluation metrics, both with and without attacks. As a result, the proposed SDN-SDF-CSS model has achieved better performance and proved its superiority in the UWSN environment.
期刊介绍:
The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues.
The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered:
-Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.)
-System control, network/service management
-Network and Internet protocols and standards
-Client-server, distributed and Web-based communication systems
-Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity
-Trials of advanced systems and services; their implementation and evaluation
-Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation
-Performance evaluation issues and methods.