• 中国科技核心期刊
  • JST收录期刊
  • Scopus收录期刊
  • DOAJ收录期刊
Turn off MathJax
Article Contents
YAN Jing, YANG Jin, YANG Xian, LUO Xiaoyuan. Underwater Target Tracking Algorithm for Underwater Acoustic Sensor Networks under DoS Attack[J]. Journal of Unmanned Undersea Systems. doi: 10.11993/j.issn.2096-3920.2024-0006
Citation: YAN Jing, YANG Jin, YANG Xian, LUO Xiaoyuan. Underwater Target Tracking Algorithm for Underwater Acoustic Sensor Networks under DoS Attack[J]. Journal of Unmanned Undersea Systems. doi: 10.11993/j.issn.2096-3920.2024-0006

Underwater Target Tracking Algorithm for Underwater Acoustic Sensor Networks under DoS Attack

doi: 10.11993/j.issn.2096-3920.2024-0006
  • Received Date: 2024-01-15
  • Accepted Date: 2024-04-07
  • Rev Recd Date: 2024-03-31
  • Available Online: 2024-10-28
  • Considering the effect of underwater denial of service(DoS) attack and sound line stratification, the problem of target tracking based on underwater acoustic sensor network is studied in this paper. Firstly, consider a sensor networks architecture consisting of underwater sensors, surface buoys, and underwater targets. Then, the underwater target movement model and the underwater denial of service attack model are constructed, and an improved consensus-based Kalman filter underwater target tracking algorithm is proposed. Finally, the CRLB of the algorithm is derived and the effectiveness of the algorithm is proved. Simulation and experiments show that the proposed algorithm can track the target effectively, and the algorithm based on consistent unscented Kalman filtering improves tracking accuracy.

     

  • loading
  • [1]
    GOLA K K, ARYA S. Underwater acoustic sensor networks: Taxonomy on applications, architectures, localization methods, deployment techniques, routing techniques, and threats: A systematic review[J]. Concurrency and Computation: Practice and Experience, 2023, 35(23): 1-37.
    [2]
    ELIYEH M, RAZE J, MOHAMMAD J D, et al. A robust method for underwater wireless sensor joint localization and synchronization[J], Ocean Engineering, 2017, 137: 276-286.
    [3]
    孙海信, 何崇林, 王俊峰. 水下无线传感器网络抗恶意干扰技术应用及研究进展[J]. 水下无人系统学报, 2023, 31(1): 128-142. doi: 10.11993/j.issn.2096-3920.2022-0090

    SUN H X, HE CL, WANG J F, et al. Anti-malicious interference technology for underwater wireless sensor networks: Applications and recent advances[J]. Journal of Unmanned Undersea Systems, 2023, 31(1): 128-142. doi: 10.11993/j.issn.2096-3920.2022-0090
    [4]
    WEN L, YU S, ZHAO Y, et al. Event-based secure consensus of multiple AUVs under DoS attacks[J]. Nonlinear Dynamics, 2022, 107(3): 2407-2419. doi: 10.1007/s11071-021-07113-8
    [5]
    AMJAD A, MOHAMMAD A K, ABDULLCH A, et al. Securing low-power blockchain-enabled IoT devices against energy depletion attack[J]. ACM Transactions on Internet Technology, 2023, 23(3): 1-17.
    [6]
    GOPE P, LEE J, QUEK T Q S. Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks[J]. IEEE Sensors journal, 2016, 17(2): 498-503.
    [7]
    JISA D, CIZA T. Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic[J]. Computers & Security, 2019, 82: 284-295.
    [8]
    OLAKANMI O O, DADA A. Wireless sensor networks (WSNs): Security and privacy issues and solutions[J]. Wireless mesh networks-security, architectures and protocols, 2020, 13: 1-16.
    [9]
    BOUBICHE D E, ATHMANI S, BOUBICHE S, et al. Cybersecurity issues in wireless sensor networks: Current challenges and solutions[J]. Wireless Personal Communications, 2021, 117: 177-213. doi: 10.1007/s11277-020-07213-5
    [10]
    GEBREYESUS G G. Localization and detection of multiple attacks in wireless sensor networks using artificial neural network[EB/OL]. (2023-01-10)[2023-12-23]. https://onlinelibrary.wiley.com/doi/full/10.1155/2023/2744706.
    [11]
    CREMERS C, RASMUSSEN K B, SCHMIDT B, et al. Distance hijacking attacks on distance bounding protocols[C]//2012 IEEE symposium on security and privacy. California, America: IEEE, 2012: 113-127.
    [12]
    DJURAEV S, CHOI J G, SOHN K S, et al. Channel hopping scheme to mitigate jamming attacks in wireless LANs[J]. EURASIP Journal on Wireless Communications and Networking, 2017, 2017(1): 1-12. doi: 10.1186/s13638-016-0795-x
    [13]
    TAN Z, JAMDAGNI A, HE X, et al. A system for denial-of-service attack detection based on multivariate correlation analysis[J]. IEEE transactions on parallel and distributed systems, 2013, 25(2): 447-456.
    [14]
    YAN J, MENG Y, LUO X, et al. To hide private position information in localization for internet of underwater things[J]. IEEE Internet of Things Journal, 2021, 8(18): 14338-54. doi: 10.1109/JIOT.2021.3068298
    [15]
    OLFATI S, SHAMMA J. Consensus filters for sensor networks and distributed sensor fusion[C]//IEEE Conference on Decision & Control. Seville, Spain: IEEE, 2005: 6698-703.
    [16]
    闫敬, 陈天明, 关新平, 等. 自主水下航行器协同控制研究现状与发展趋势[J]. 水下无人系统学报, 2023, 31(1): 108-120. doi: 10.11993/j.issn.2096-3920.2022-0096

    YAN J, CHEN T M, GUAN X P, et al. Autonomous undersea vehicle cooperative control: Current research status and development trends[J]. Journal of Unmanned Undersea Systems, 2023, 31(1): 108-120. doi: 10.11993/j.issn.2096-3920.2022-0096
    [17]
    DAI P, YU W, WANG H, et al. Distributed reinforcement learning for cyber-physical system with multiple remote state estimation under DoS attacker[J]. IEEE Transactions on Network Science and Engineering, 2020, 7(4): 3212-22. doi: 10.1109/TNSE.2020.3018871
    [18]
    JULIER S J, UHLMANN J K. New extension of the Kalman filter to nonlinear systems[J]. Signal Processing, Sensor Fusion, and Target Recognition VI, 1997, 3068: 182-193. doi: 10.1117/12.280797
    [19]
    YAN J, ZHAO H, LUO X, et al. Asynchronous localization of underwater target using consensus-based unscented Kalman filtering[J]. IEEE Journal of Oceanic Engineering, 2019, 45(4): 1466-1481.
    [20]
    LEFEBVRE T, BRUYNINCKX H, DE SCHULLER J. Comment on“a new method for the nonlinear transformation of means and covariances in filters and estimators”[with authors’ reply][J]. IEEE transactions on automatic control, 2002, 47(8): 1406-1409. doi: 10.1109/TAC.2002.800742
    [21]
    YU Y, LIANG Y. Multisensor-multitarget tracking based on belief propagation against false data injection attacks and denial of service attacks[J]. Digital Signal Processing, 2022, 126: 1-12.
    [22]
    LIU B, TANGY X, THARMARASA R, et al. Underwater target tracking in uncertain multipath ocean environments[J]. IEEE Transactions on Aerospace and Electronic Systems, 2020, 56(6): 4899-915. doi: 10.1109/TAES.2020.3003703
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(12)  / Tables(2)

    Article Metrics

    Article Views(25) PDF Downloads(0) Cited by()
    Proportional views
    Related
    Service
    Subscribe

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return