{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T00:16:32Z","timestamp":1776212192063,"version":"3.50.1"},"reference-count":41,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T00:00:00Z","timestamp":1463529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006469","name":"Macao Science and Technology Development Fund","doi-asserted-by":"publisher","award":["096\/2013\/A3"],"award-info":[{"award-number":["096\/2013\/A3"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSFC-Guangdong Joint Fund","award":["U1401251"],"award-info":[{"award-number":["U1401251"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities. This paper proposes an analytical model to investigate the eavesdropping attacks in underwater acoustic sensor networks. Our analytical framework considers the impacts of various underwater acoustic channel conditions (such as the acoustic signal frequency, spreading factor and wind speed) and different hydrophones (isotropic hydrophones and array hydrophones) in terms of network nodes and eavesdroppers. We also conduct extensive simulations to evaluate the effectiveness and the accuracy of our proposed model. Empirical results show that our proposed model is quite accurate. In addition, our results also imply that the eavesdropping probability heavily depends on both the underwater acoustic channel conditions and the features of hydrophones.<\/jats:p>","DOI":"10.3390\/s16050721","type":"journal-article","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T10:10:24Z","timestamp":1463566224000},"page":"721","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks"],"prefix":"10.3390","volume":"16","author":[{"given":"Qiu","family":"Wang","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macau"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6165-4196","authenticated-orcid":false,"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macau"}]},{"given":"Xuran","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macau"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9301-5989","authenticated-orcid":false,"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Big Data Lab, Faculty of Engineering and Natural Sciences, Norwegian University of Science &amp; Technology in Aalesund, 6009 Aalesund, Norway"}]},{"given":"Hong","family":"Xiao","sequence":"additional","affiliation":[{"name":"Faculty of Computer, Guangdong University of Technology, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2016,5,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MCOM.2015.7180508","article-title":"Secure communication for underwater acoustic sensor networks","volume":"53","author":"Han","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1109\/JOE.1984.1145629","article-title":"Acoustic Telemetry-An Overview","volume":"9","author":"Baggeroer","year":"1984","journal-title":"IEEE J. Ocean. Eng."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1098\/rsta.2011.0214","article-title":"Underwater sensor networks: Applications, advances and challenges","volume":"370","author":"Heidemann","year":"2012","journal-title":"Philos. Trans. R. Soc. A"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/JOE.2010.2055271","article-title":"Analysis of a Linear Multihop Underwater Acoustic Network","volume":"35","author":"Zhang","year":"2010","journal-title":"IEEE J. Ocean. Eng."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Lucani, D., Medard, M., and Stojanovic, M. (2008, January 26\u201329). Capacity scaling laws for underwater networks. Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA.","DOI":"10.1109\/ACSSC.2008.5074809"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1007\/s11277-012-0904-z","article-title":"On the Effects of Frequency Scaling over Capacity Scaling in Underwater Networks\u2014Part I: Extended Network Model","volume":"71","author":"Shin","year":"2013","journal-title":"Wirel. Pers. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1007\/s11277-012-0982-y","article-title":"On the Effects of Frequency Scaling over Capacity Scaling in Underwater Networks\u2014Part II: Dense Network Model","volume":"71","author":"Shin","year":"2013","journal-title":"Wirel. Pers. Commun."},{"key":"ref_8","unstructured":"Watanabe, S., Kamiya, Y., Umebayashi, K., and Suzuki, Y. (2008, January 15\u201318). A New Efficient and Robust MAC Protocol against Multipath Fading for Ad Hoc Networks. Proceedings of the 19th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC\u201908), Cannes, France."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/JOE.2014.2313996","article-title":"New Reservation Multiaccess Protocols for Underwater Wireless Ad Hoc Sensor Networks","volume":"40","author":"Mandal","year":"2015","journal-title":"IEEE J. Ocean. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Ahmed, S., Javaid, N., Khan, F.A., Durrani, M.Y., Ali, A., Shaukat, A., Sandhu, M.M., Khan, Z.A., and Qasim, U. (2015). Co-UWSN: Cooperative Energy-Efficient Protocol for Underwater WSNs. Int. J. Distrib. Sens. Netw., 2015.","DOI":"10.1155\/2015\/891410"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2934","DOI":"10.1109\/TWC.2010.070910.100145","article-title":"Distributed Routing Algorithms for Underwater Acoustic Sensor Networks","volume":"9","author":"Pompili","year":"2010","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rahman, R.H., Benson, C., and Frater, M. (2012, January 21\u201324). Routing Protocols for Underwater Ad Hoc Networks. Proceedings of the 2012 IEEE Oceans, Yeosu, Korea.","DOI":"10.1109\/OCEANS-Yeosu.2012.6263636"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Javaid, N., Jafri, M.R., Ahmed, S., Jamil, M., Khan, Z.A., Qasim, U., and Al-Saleh, S.S. (2015). Delay-Sensitive Routing Schemes for Underwater Acoustic Sensor Networks. Int. J. Distrib. Sens. Netw.","DOI":"10.1155\/2015\/532676"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TETC.2014.2310457","article-title":"Challenges and Opportunities of Underwater Cognitive Acoustic Networks","volume":"2","author":"Luo","year":"2014","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Capossele, A., Gjanci, P., Petrioli, C., and Spaccini, D. (2015, January 18\u201321). SecFUN: Security Framework for Underwater acoustic sensor Networks. Proceedings of the 2015 MTS\/IEEE OCEANS, Genova, Italy.","DOI":"10.1109\/OCEANS-Genova.2015.7271735"},{"key":"ref_16","unstructured":"Lu, X., and Yonghua, Z. (2012, January 21\u201323). Modeling the Wormhole Attack in Underwater Sensor Network. Proceedings of the 12th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2635","DOI":"10.1002\/sec.507","article-title":"Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks","volume":"8","author":"Zuba","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Anjum, F., and Mouchtaris, P. (2007). Security for Wireless Ad Hoc Networks, Wiley-Interscience. [1st ed.].","DOI":"10.1002\/0470118474"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1007\/BFb0052260","article-title":"Cryptanalysis of the cellular message encryption algorithm","volume":"Volume 1294","author":"Wagner","year":"1997","journal-title":"Advances in Cryptology\u2014CRYPTO \u201997"},{"key":"ref_20","unstructured":"(1999). Specifications: High Speed Physical Layer in the 5 GHz Band, IEEE Standards Association."},{"key":"ref_21","unstructured":"(2004). Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE Standards Association."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","article-title":"Security for the Internet of Things: A Survey of Existing Protocols and Open Research issues","volume":"17","author":"Granjal","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","article-title":"Wireless sensor network survey","volume":"52","author":"Yick","year":"2008","journal-title":"Comput. Netw."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Kao, J.C., and Marculescu, R. (2006, January 28). Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks. Proceedings of the IEEE 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, Reston, VA, USA.","DOI":"10.1109\/SAHCN.2006.288535"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2008.6","article-title":"Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses","volume":"7","author":"Raymond","year":"2008","journal-title":"IEEE Pervasive Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lu, X., Wicker, F., Lio, P., and Towsley, D. (2008, January 16\u201319). Security Estimation Model with Directional Antennas. Proceedings of the 2008 IEEE Military Communications Conference, San Diego, CA, USA.","DOI":"10.1109\/MILCOM.2008.4753607"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Dai, H.N., Li, D., and Wong, R.C.W. (2011, January 4\u20137). Exploring Security Improvement of Wireless Networks with Directional Antennas. Proceedings of the IEEE 36th Conference on Local Computer Networks (LCN), Bonn, Germany.","DOI":"10.1109\/LCN.2011.6115185"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Wang, Q., Dai, H.N., and Zhao, Q. (2013, January 16\u201318). Eavesdropping Security in Wireless Ad Hoc Networks with Directional Antennas. Proceedings of the IEEE 2013 22nd Wireless and Optical Communication Conference, Chongqing, China.","DOI":"10.1109\/WOCC.2013.6676462"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Dai, H.N., Wang, Q., Li, D., and Wong, R.C.W. (2013). On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas. Int. J. Distrib. Sens. Netw., 2013.","DOI":"10.1155\/2013\/760834"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.jocs.2014.10.006","article-title":"On Modeling Eavesdropping Attacks in Wireless Networks","volume":"11","author":"Li","year":"2015","journal-title":"J. Comput. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S.D., Polishchuk, V., Ramasubramanian, S., and Segal, M. (2012, January 11\u201314). Optimization Schemes for Protective Jamming. Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hilton Head, SC, USA.","DOI":"10.1145\/2248371.2248383"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2631","DOI":"10.1007\/s11276-015-0935-y","article-title":"A Jamming Approach to Enhance Enterprise Wi-Fi Secrecy Through Spatial Access Control","volume":"21","author":"Kim","year":"2015","journal-title":"Wirel. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"4733","DOI":"10.1109\/TIT.2013.2256952","article-title":"MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom","volume":"59","author":"He","year":"2013","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TCOMM.2014.2377239","article-title":"Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems","volume":"63","author":"Zou","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Li, X., Dai, H.N., and Zhao, Q. (2014, January 19\u201321). An Analytical Model on Eavesdropping Attacks in Wireless Networks. Proceedings of the IEEE International Conference on Communication Systems (ICCS), Macau.","DOI":"10.1109\/ICCS.2014.7024861"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1109\/JSAC.2012.120615","article-title":"Throughput Analysis for Shallow Water Communication Utilizing Directional Antennas","volume":"30","author":"Emokpae","year":"2012","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Coates, R. (1990). Underwater Acoustic Systems, Palgrave Macmillan.","DOI":"10.1007\/978-1-349-20508-0"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Stojanovic, M. (2006, January 29). On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel. Proceedings of the First ACM International Workshop on Underwater Networks (WUWNet), Los Angeles, CA, USA.","DOI":"10.1145\/1161039.1161049"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Hodges, R.P. (2010). Underwater Acoustics: Analysis, Design and Performance of Sonars, Wiley. [1st ed.].","DOI":"10.1002\/9780470665244"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1093\/comjnl\/47.4.432","article-title":"On the Connectivity of Ad Hoc Networks","volume":"47","author":"Bettstetter","year":"2004","journal-title":"Comput. J."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2309","DOI":"10.3390\/s120202309","article-title":"Design and Implementation of an Omni-Directional Underwater Acoustic Micro-Modem Based on a Low-Power Micro-Controller Unit","volume":"12","author":"Won","year":"2012","journal-title":"Sensors"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/5\/721\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:24:06Z","timestamp":1760210646000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/5\/721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,18]]},"references-count":41,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2016,5]]}},"alternative-id":["s16050721"],"URL":"https:\/\/doi.org\/10.3390\/s16050721","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,18]]}}}