{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:42:02Z","timestamp":1766580122572,"version":"3.41.2"},"reference-count":46,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T00:00:00Z","timestamp":1685404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comms. Net."],"abstract":"<jats:p>In this paper, we present a machine-learning technique to counteract jamming attacks in underwater networks. Indeed, this is relevant in security applications where sensor devices are located in critical regions, for example, in the case of national border surveillance or for identifying any unauthorized intrusion. To this aim, a multi-hop routing protocol that relies on the exploitation of a Q-learning methodology is presented with a focus on increasing reliability in data communication and network lifetime. Performance results assess the effectiveness of the proposed solution as compared to other efficient state-of-the-art approaches.<\/jats:p>","DOI":"10.3389\/frcmn.2023.1179626","type":"journal-article","created":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T10:12:55Z","timestamp":1685527975000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Network intelligence vs. jamming in underwater networks: how learning can cope with misbehavior"],"prefix":"10.3389","volume":"4","author":[{"given":"J. S.","family":"Mertens","sequence":"first","affiliation":[]},{"given":"A.","family":"Panebianco","sequence":"additional","affiliation":[]},{"given":"A.","family":"Surudhi","sequence":"additional","affiliation":[]},{"given":"N.","family":"Prabagarane","sequence":"additional","affiliation":[]},{"given":"L.","family":"Galluccio","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/1444024","article-title":"Analysis of security attacks and taxonomy in underwater wireless sensor networks","volume":"2021","author":"Ahmad","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"B2","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.adhoc.2005.01.004","article-title":"Underwater acoustic sensor networks: Research challenges","volume":"3","author":"Akyildiz","year":"2005","journal-title":"Ad Hoc Netw."},{"key":"B3","doi-asserted-by":"publisher","first-page":"103114","DOI":"10.1016\/j.adhoc.2023.103114","article-title":"Security of underwater and air-water wireless communication: State-of-the-art, challenges and outlook","volume":"142","author":"Aman","year":"2023","journal-title":"Ad Hoc Netw."},{"key":"B4","first-page":"196","article-title":"Efficient channel access model for detecting reactive jamming for underwater wireless sensor network","author":"Bagali","year":"2019"},{"volume-title":"Random data: Analysis and measurement procedures","year":"1986","author":"Bendat","key":"B5"},{"key":"B6","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.3390\/s120201967","article-title":"Secure cooperation of autonomous mobile sensors using an underwater acoustic network","volume":"12","author":"Caiti","year":"2012","journal-title":"Sensors"},{"key":"B7","first-page":"162","article-title":"Security in underwater sensor network","volume":"1","author":"Cong","year":"2010","journal-title":"Int. Conf. Commun. Mob. Comput."},{"key":"B44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2017.06.027","article-title":"Performance modeling and analysis of void-handling methodologies in underwater wireless sensor networks","volume":"126","author":"Coutinho","year":"2017","journal-title":"Comput. Netw."},{"volume-title":"Q-learning: A tutorial and extensions","year":"1997","author":"Cybenko","key":"B8"},{"key":"B9","doi-asserted-by":"publisher","first-page":"2634","DOI":"10.1109\/jsac.2019.2933968","article-title":"Carma: Channel-aware reinforcement learning-based multi-path adaptive routing for underwater wireless sensor networks","volume":"37","author":"Di Valerio","year":"2019","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"B10","doi-asserted-by":"publisher","first-page":"15133","DOI":"10.3390\/s121115133","article-title":"A secure communication suite for underwater acoustic sensor networks","volume":"12","author":"Dini","year":"2012","journal-title":"Sensors"},{"key":"B11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TCCN.2018.2884910","article-title":"Deep learning for launching and mitigating wireless jamming attacks","volume":"5","author":"Erpek","year":"2019","journal-title":"IEEE Trans. Cognitive Commun. Netw."},{"key":"B12","unstructured":"Evologics acoustic modems2023"},{"key":"B13","doi-asserted-by":"crossref","DOI":"10.1145\/2076569.2076579","article-title":"Jamming-resistant multi-path routing for reliable intruder detection in underwater networks","volume-title":"Proceedings of the 6th international workshop on underwater networks","author":"Goetz","year":"2011"},{"key":"B14","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TMC.2010.28","article-title":"Qelar: A machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks","volume":"9","author":"Hu","year":"2010","journal-title":"IEEE Trans. Mob. Comput."},{"key":"B15","article-title":"On the characteristic function of f and t distributions","volume":"32","author":"Ifram","year":"1970","journal-title":"Indian J. Statistics, Ser. A"},{"key":"B16","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1109\/ECS.2015.7125059","article-title":"An anti-jamming underwater communication transceiver model using uncoordinated direct sequence spread spectrum technique","volume-title":"2015 2nd international conference on electronics and communication systems (ICECS)","author":"Kalita","year":"2015"},{"key":"B17","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SAHCN.2014.6990362","article-title":"Securing underwater acoustic communications through analog network coding","author":"Kulhandjian","year":"2014"},{"key":"B18","first-page":"1838","article-title":"Secure underwater acoustic communication based on a robust key generation scheme","author":"Liu","year":"2008"},{"key":"B45","doi-asserted-by":"publisher","first-page":"9525","DOI":"10.3390\/s22239525","article-title":"Void avoiding opportunistic routing protocols for underwater wireless sensor networks: a survey","volume":"22","author":"Mhemed","year":"2022","journal-title":"Sensors"},{"key":"B19","doi-asserted-by":"publisher","first-page":"124","DOI":"10.3390\/jmse11010124","article-title":"Recent advances, future trends, applications and challenges of internet of underwater things (iout): A comprehensive review","volume":"11","author":"Mohsan","year":"2023","journal-title":"J. Mar. Sci. Eng."},{"volume-title":"Applied statistics and probability for engineers","year":"2003","author":"Montgomery","key":"B20"},{"key":"B21","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/SURV.2009.090404","article-title":"A survey on jamming attacks and countermeasures in wsns","volume":"11","author":"Mpitziopoulos","year":"2009","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"B22","doi-asserted-by":"crossref","DOI":"10.1109\/MILCOM.2008.4753161","article-title":"Markovian approach to model underwater acoustic channel: Techniques comparison","author":"Pignieri","year":"2008"},{"key":"B23","first-page":"737","article-title":"An experimental study of effective jamming in underwater acoustic links","author":"Samir","year":"2014"},{"key":"B24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","article-title":"Deep learning in neural networks: An overview","volume":"61","author":"Schmidhuber","year":"2015","journal-title":"Neural Netw."},{"key":"B25","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","article-title":"Designing secure sensor networks","volume":"11","author":"Shi","year":"2004","journal-title":"IEEE Wirel. Commun."},{"key":"B26","first-page":"243","article-title":"Evasion and causative attacks with adversarial deep learning","author":"Shi","year":"2017"},{"key":"B27","doi-asserted-by":"crossref","DOI":"10.1109\/WiMob50308.2020.9253368","article-title":"A Q-learning approach for the support of reliable transmission in the internet of underwater things","author":"Shivani","year":"2020"},{"key":"B28","doi-asserted-by":"publisher","first-page":"3737","DOI":"10.1109\/TWC.2021.3123454","article-title":"A geometry-based game theoretical model of blind and reactive underwater jamming","volume":"21","author":"Signori","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"B29","doi-asserted-by":"publisher","first-page":"9793","DOI":"10.1109\/JIOT.2020.2982613","article-title":"A game-theoretic and experimental analysis of energy-depleting underwater jamming attacks","volume":"7","author":"Signori","year":"2020","journal-title":"IEEE Internet Things J."},{"article-title":"Jamming the underwater: A game-theoretic analysis of energy-depleting jamming attacks","year":"2021","author":"Signori","key":"B30"},{"key":"B31","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s11804-022-00277-8","article-title":"A cooperative jamming scheme based on node authentication for underwater acoustic sensor networks","volume":"21","author":"Su","year":"2022","journal-title":"J. Mar. Sci. Appl."},{"key":"B32","unstructured":"Teledyne benthos acoustic modems2023"},{"key":"B33","doi-asserted-by":"crossref","first-page":"2406","DOI":"10.1109\/MILCOM.2010.5680327","article-title":"On modeling JANUS packet errors over a shallow water acoustic channel using Markov and hidden Markov models","volume-title":"2010-MILCOM 2010 military communications conference","author":"Tomasi","year":"2010"},{"key":"B34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOCOM.2015.7417412","article-title":"Jamming in underwater sensor networks as a bayesian zero-sum game with position uncertainty","volume":"6","author":"Vadori","year":"2015","journal-title":"IEEE Glob. Commun. Conf. (GLOBECOM)"},{"key":"B46","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0140-3664(99)00157-7","article-title":"General weighted fairness and its support in explicit rate switch algorithms","volume":"23","author":"Vandalore","year":"2000","journal-title":"Comput. Commun."},{"key":"B35","doi-asserted-by":"publisher","first-page":"155014771772630","DOI":"10.1177\/1550147717726309","article-title":"Jamming-resilient algorithm for underwater cognitive acoustic networks","volume":"13","author":"Wang","year":"2017","journal-title":"Int. J. Distributed Sens. Netw."},{"key":"B36","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1109\/LCOMM.2018.2792015","article-title":"Anti-jamming underwater transmission with mobility and learning","volume":"22","author":"Xiao","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"B37","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/JOE.2019.2910938","article-title":"Reinforcement-learning-based relay mobility and power allocation for underwater sensor networks against jamming","volume":"45","author":"Xiao","year":"2020","journal-title":"IEEE J. Ocean. Eng."},{"key":"B38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOCOM.2015.7417192","article-title":"Jamming games in underwater sensor networks with reinforcement learning","volume":"6","author":"Xiao","year":"2014","journal-title":"IEEE Glob. Commun. Conf. (GLOBECOM)"},{"key":"B39","doi-asserted-by":"crossref","DOI":"10.1145\/2831296.2831320","article-title":"An experimental study of jamming attacks in underwater acoustic communication","author":"Xiao","year":"2015"},{"key":"B40","doi-asserted-by":"publisher","first-page":"252","DOI":"10.3390\/jmse8040252","article-title":"A layout strategy for distributed barrage jamming against underwater acoustic sensor networks","volume":"8","author":"Xiong","year":"2020","journal-title":"J. Mar. Sci. Eng."},{"volume-title":"Active jamming for eavesdropping prevention in underwater wireless networks","year":"2020","author":"Ye","key":"B41"},{"key":"B42","doi-asserted-by":"publisher","first-page":"2756","DOI":"10.1109\/TVT.2021.3058282","article-title":"Reinforcement learning-based opportunistic routing protocol for underwater acoustic sensor networks","volume":"70","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"B43","doi-asserted-by":"publisher","first-page":"2635","DOI":"10.1002\/sec.507","article-title":"Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks","volume":"8","author":"Zuba","year":"2015","journal-title":"Secur. Commun. Netw."}],"container-title":["Frontiers in Communications and Networks"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frcmn.2023.1179626\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T10:13:05Z","timestamp":1685527985000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frcmn.2023.1179626\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,30]]},"references-count":46,"alternative-id":["10.3389\/frcmn.2023.1179626"],"URL":"https:\/\/doi.org\/10.3389\/frcmn.2023.1179626","relation":{},"ISSN":["2673-530X"],"issn-type":[{"type":"electronic","value":"2673-530X"}],"subject":[],"published":{"date-parts":[[2023,5,30]]},"article-number":"1179626"}}