| Literature DB >> 29389874 |
Dalhatu Muhammed1, Mohammad Hossein Anisi2, Mahdi Zareei3, Cesar Vargas-Rosales4, Anwar Khan5.
Abstract
Exploring and monitoring the underwater world using underwater sensors is drawing a lot of attention these days. In this field cooperation between acoustic sensor nodes has been a critical problem due to the challenging features such as acoustic channel failure (sound signal), long propagation delay of acoustic signal, limited bandwidth and loss of connectivity. There are several proposed methods to improve cooperation between the nodes by incorporating information/game theory in the node's cooperation. However, there is a need to classify the existing works and demonstrate their performance in addressing the cooperation issue. In this paper, we have conducted a review to investigate various factors affecting cooperation in underwater acoustic sensor networks. We study various cooperation techniques used for underwater acoustic sensor networks from different perspectives, with a concentration on communication reliability, energy consumption, and security and present a taxonomy for underwater cooperation. Moreover, we further review how the game theory can be applied to make the nodes cooperate with each other. We further analyze different cooperative game methods, where their performance on different metrics is compared. Finally, open issues and future research direction in underwater acoustic sensor networks are highlighted.Entities:
Keywords: UASNs; cooperation in UASNs; game theory-based cooperation; taxonomy of UASNs cooperation; underwater acoustic sensor networks
Year: 2018 PMID: 29389874 PMCID: PMC5855316 DOI: 10.3390/s18020425
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Cluster-based architecture of UASNs.
Comparison of WSNs and UASNs.
| Comparison Parameters | WSNs | UASNs |
|---|---|---|
| Communication Method | Radio Frequency (RF) | Acoustic Signal (Sound waves) |
| Energy Consumption | Low | High (due to energy cost of submitting packets) |
| Propagation Delay | Low | High (five orders of magnitude greater than WSNs) |
| Bandwidth | High | Low (depend on distance & Frequency) |
| Connectivity Lost | Low | High (due to high bit error rate) |
Figure 2Cooperative-based architecture of UASNs.
Figure 3A Scenario with 32 nodes with 10 malicious nodes.
Figure 4Cooperative multi-hop UASNs.
Figure 5Taxonomy of cooperation in UASNs.
Summary of cooperative game methods in UASNs.
| Paper | Problem | Method | Contribution | Weakness |
|---|---|---|---|---|
| [ | Problem of one hop cooperative packet forwarding due to noise a packet lost | Evolutionary game theory with dynamic strategy of cooperative | Guarantee the cooperation convergence by driving the ratio of cost-to-benefit threshold | Do not focus on any security issues and hence no mechanism for malicious node detection |
| [ | Dynamic trust cooperative under high malicious ratio | Evolutionary game-based trust cooperative simulation model | Convergence optimal strategy which maximize payoff and trust strategy preferential | Reliability issues in the packet delivery has not been tackled |
| [ | Analysis of cooperative incentives | Integrated system of Game theory | Detection of selfish node and Effective cooperative incentives | The security issues, attack or node that are compromised has not been addressed |
| [ | Regular and Malicious Node Strategy Analysis | Dynamic Bayesian Signaling Game | Formulation of Bayesian game framework to study the strategy of regular and malicious node | The game does not solve multi attack collision of regular or malicious node |
| [ | Security issues such as confidentiality and integrity in underwater | Cryptography method and Secure routing | Practical and efficient to confidentiality and integrity bin UASNs | It does not fully encourage cooperation in UASNs |
| [ | Lack of centralized control and secure routing | Dynamic Bayesian Signaling Game | Formulate a two-player game and analyzed the Nash Equilibrium strategy | These is no any suitable mechanism for long running game to solve various attack issues |
| [ | Preventing malicious attack and Assuring trustworthiness | Evolutionary game theoretic approach | Prevent nodes form attack and guarantee trustworthiness of data | These is no much impasses on cooperation issues |
| [ | Consumption of resources and selfish detection | Bayesian Game Method | Performance improvement in recourse consumption and effective security | These is no motivation to cooperation enforcement |
| [ | Trust evaluation and Trust decision issues in individual strategy adjustment | Trust Strategy based Evolutionary game model | Data retransmission after Packet lost, build a trust strategy and strategy adjustment | No trust value calculation and trust management for security basis |
| [ | Interaction for decision making and malicious behavior of entity | Bayesian Game model with dynamic repeated type | Motivation to answer the request trustfully and promoting node to be honest & cooperative | No adequate solution to the selfish detection and therefore is not secured |
| [ | Unknown malicious Selfish, nodes cooperative & trustworthiness | Bayesian Game theory model of TPP | Trustworthiness of unknown node evaluation and drive the equilibrium strategy of the game | TPP game is not a multi-player game and hence cannot handle multiple payoff game |
| [ | Cooperation between different authorities to reduce energy consumption and maximize lifetime | Evolutionary game theory with reactive & non-reactive strategy | Show Cooperation can emerge underwater without incentives and highlight factors affecting cooperation and the way they affect it | Did not consider propagation in multipath & dynamic nature of underwater topology |
| [ | Authentication problem for security issues | Digital signature scheme | Energy cost evaluation using digital signature scheme (end-to-end) authentication | Lack of cooperation mechanism among the participating node |
| [ | Behavioral evolution interaction recognition | Bayesian network model by Repeated Prisoner’s Dilemma (PD) and evolutionary game theory | Assessing the internal dynamic trust between intention recognizers and their opponents and predict the next move of their opponents based on the past direct interaction | Intention recognition achieved high performance of cooperation in homogeneous network only |
| [ | Illegal accessed of transmission in underwater communication | Iterative key distribution scheme with secure routing method based on the Focused Beam Routing Protocol | Reduce the redundant keys in the key distribution system and adopt the mobility model to capture the movement of sensors node floating on the sea | This scheme did not consider the impaired channel caused by path loss, noise, multi-path and fading in underwater environment |
| [ | Centralized and distributed reputation management in massive number of entities. | Bayesian Reputation Game | They found that trust cooperation is sustained when the game is repeated and the average reputation values of the players increase over time and coverage | The approach does not focus on the security issues among nodes and hence is not reliable |
| [ | Investigating the effectiveness of nodes cooperation incentives | Used game theory to analyse cooperative incentive by Integrated System which combine the Reputation system and Price-based system | They found that the strategies of using threshold to find the trustworthiness node in Reputation system and Price-based system can be manipulated by clever or selfish node. Integrated System achieved high performance in effectiveness of incentive | The limitation of these method is it does not provide solution to the security issues among nodes |
| [ | Motivate to share services and resources and to avoid selfish nodes to hinder the functioning of the entire network | Virtual currency and reputation mechanism method | They exploit the willingness of member to share their resources/services in order to increase collective welfare and to extend the reach of existing infrastructures | Their scheme does not guarantee security of data, since a selfish or clever node can manipulate the threshold value |
Evaluation and comparison of the approaches based on the performance metrics satisfied.
| Paper | Energy | Delay | Routing Overhead | Packet Drop | Selfish Detection | Coverage | Security | Reliability |
|---|---|---|---|---|---|---|---|---|
| No | No | No | No | Yes | Yes | No | No | |
| Yes | No | Yes | No | No | Yes | No | Yes | |
| No | No | Yes | Yes | Yes | Yes | Yes | No | |
| No | No | No | Yes | Yes | No | Yes | No | |
| Yes | No | Yes | No | No | No | Yes | No | |
| Yes | No | Yes | Yes | Yes | No | Yes | No | |
| Yes | Yes | Yes | Yes | No | No | No | No | |
| No | Yes | No | No | No | Yes | No | No | |
| No | No | No | Yes | Yes | No | Yes | No | |
| Yes | Yes | No | No | No | Yes | No | No | |
| Yes | Yes | Yes | No | No | Yes | Yes | Yes | |
| No | Yes | No | Yes | Yes | Yes | Yes | No | |
| Yes | Yes | No | Yes | No | Yes | No | No | |
| Yes | No | Yes | Yes | Yes | Yes | No | No | |
| No | No | Yes | Yes | Yes | Yes | No | No | |
| No | Yes | Yes | No | No | Yes | No | No | |
| No | Yes | No | Yes | No | Yes | No | Yes | |
| No | Yes | No | Yes | Yes | Yes | No | No |
Mathematical comparison of repeated game approach.
| Reference | [ | [ | [ | [ |
|---|---|---|---|---|
| Set of finite agents | ||||
| Set of neighbor agents | ||||
| Agent set of action | ||||
| Payoff | ||||
| Utility function | ||||
| History/Set of history | ||||
| Set of action profile | ||||
| Payoff vector |
Mathematical Comparison of Dynamic Bayesian games.
| Reference | [ | [ | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| No of prayers/No of actions | 2/2 | 2/2 | ||||||||
| Type of action | same | different | ||||||||
| SPC & RPC | ||||||||||
| Strategy Profile of PBE of S & R | ||||||||||
| Belief of their type Θ & message m | ||||||||||
| Best Response of S & R | ||||||||||
| Payoff Matrix and Nash | Senders message | Nodes type | Receivers action | S message | Nodes type | Receivers action | ||||
| Normal | malicious | cooperate | Decline | regular | malicious | cooperate | Decline | |||
| PS | PS | 1, P | −1, P − 1 | PS | PS | 1, P | −1, P − 1 | |||
| PS | SM | P, P | P, 0 | PS | SM | P, P | P, 0 | |||
| SM | PS | 1 − P, 0 | P − 1, P − 1 | SM | PS | 1 − P, 0 | P − 1, P − 1 | |||
| SM | SM | 0, 0 | −1, P-1 | SM | SM | 0, 0 | −1, P − 1 | |||
| (PS PS,C) & (SM SM,D) | (PS PS,C) & (SM SM,D) | |||||||||
Mathematical Comparison of Dynamic Bayesian games continuation.
| Reference | No. of Players | Type of Action | Payoff Formulation | Player Belief | Nash |
|---|---|---|---|---|---|
| [ | 2 | Same | |||
| [ | 2 | Different | |||
| [ | 2 | Same | … | ||
| [ | 2 | Same | |||
| [ | 2 | Same | |||
| [ | 2 | Different | |||
| [ | 2 | Different | … | ||
| [ | 2 | Same |
Mathematical Comparison of Evolutionary Games.
| Author(s) & Year | [ | [ | [ | [ | |
|---|---|---|---|---|---|
| Population behavior | |||||
| Individual pure strategy | |||||
| Population mixed strategy | |||||
| Individual payoff | |||||
| Population payoff | |||||
| Payoff Metrix | |||||
| Trust evaluation | … | … | |||
Mathematical Comparison of Bargaining Games.
| Papers | [ | [ |
|---|---|---|
| … | ||
Mathematical Comparison of Coalition Games.
| Reference | [ | [ | [ | [ |
|---|---|---|---|---|
| Players | ||||
| Coalition | ||||
| Transferable utility | ||||
| In characteristics form | ||||
| In partition form | ||||
| In graph form | ||||
| Payoff vector |