{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T02:26:14Z","timestamp":1769048774833,"version":"3.49.0"},"reference-count":36,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T00:00:00Z","timestamp":1714435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Chunhui Cooperation Program of the Ministry of Education","award":["HZKY20220590-202200265"],"award-info":[{"award-number":["HZKY20220590-202200265"]}]},{"name":"Chunhui Cooperation Program of the Ministry of Education","award":["61902273"],"award-info":[{"award-number":["61902273"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["HZKY20220590-202200265"],"award-info":[{"award-number":["HZKY20220590-202200265"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902273"],"award-info":[{"award-number":["61902273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation strategies and also has the problem of high communication overhead. This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT). First, a transformation method of a virtual coordinate system is proposed to conceal the real position of nodes to a certain extent. Second, through using the relay node selection strategy, the diversity of transmission paths is increased, passive attacks by adversaries are resisted, and the privacy of source nodes is protected. Additionally, a secure data transmission technique utilizing fountain codes is employed to resist active attacks by adversaries, ensuring data integrity and enhancing data transmission stability. Finally, Nash equilibrium could be achieved after the multi-round evolutionary game theory of source node and multiple attackers adopting their respective strategies. Simulation experiments and performance evaluation verify the effectiveness and reliability of SLP-MACGT regarding aspects of the packet forwarding success rate, security time, delay and energy consumption: the packet delivery rate average increases by 30%, security time is extended by at least 85%, and the delay is reduced by at least 90% compared with SSLP, PP-LSPP, and MRGSLP.<\/jats:p>","DOI":"10.3390\/s24092851","type":"journal-article","created":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T04:01:52Z","timestamp":1714449712000},"page":"2851","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario"],"prefix":"10.3390","volume":"24","author":[{"given":"Beibei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Control and Mechanical Engineering, Tianjin Chengjian University, Tianjin 300384, China"}]},{"given":"Xiufang","family":"Yue","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin 300384, China"}]},{"given":"Kun","family":"Hao","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin 300384, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9617-6144","authenticated-orcid":false,"given":"Yonglei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin 300384, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0178-6917","authenticated-orcid":false,"given":"Zhisheng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin 300384, China"}]},{"given":"Xiaofang","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin 300384, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,4,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"121235","DOI":"10.1016\/j.eswa.2023.121235","article-title":"A light-weight neural network for marine acoustic signal recognition suitable for fiber-optic hydrophones","volume":"235","author":"Lyu","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"103139","DOI":"10.1016\/j.adhoc.2023.103139","article-title":"Machine learning approaches for underwater sensor network parameter prediction","volume":"144","author":"Uyan","year":"2023","journal-title":"Ad. Hoc Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"9925","DOI":"10.1109\/TVT.2022.3178379","article-title":"AUV-Aided Data Importance Based Scheme for Protecting Location Privacy in Smart Ocean","volume":"71","author":"Han","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"9854","DOI":"10.1109\/JIOT.2023.3324311","article-title":"Dynamic Packet Routing Based on Acoustic Signal Curve Propagation in the AUV-Assisted IoUT","volume":"11","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"10671","DOI":"10.1109\/TVT.2018.2867021","article-title":"A Stratification-Based Data Collection Scheme in Underwater Acoustic Sensor Networks","volume":"67","author":"Han","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/MNET.001.1900534","article-title":"Preserving location privacy in UASN through collaboration and semantic encapsulation","volume":"34","author":"Wang","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"4063","DOI":"10.1109\/JSEN.2015.2434890","article-title":"Underwater acoustic modems","volume":"16","author":"Sendra","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1007\/s11277-020-07431-x","article-title":"State-of-the-art underwater acoustic communication modems: Classifications, analyses and design challenges","volume":"116","author":"Zia","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"11250","DOI":"10.1109\/JIOT.2020.2996671","article-title":"A game-theoretic approach for enhancing security and data trustworthiness in IoT applications","volume":"7","author":"Abdalzaher","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_10","first-page":"1","article-title":"Privacy games along location traces: A game-theoretic framework for optimizing location privacy","volume":"19","author":"Shokri","year":"2016","journal-title":"ACM Trans. Priv. Secur. TOPS"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"23676","DOI":"10.1109\/JSEN.2023.3305544","article-title":"LSLPR: A Layering and Source-Location-Privacy-Based Routing Protocol for Underwater Acoustic Sensor Networks","volume":"23","author":"Tian","year":"2023","journal-title":"IEEE Sens. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2058","DOI":"10.1109\/TVT.2021.3135438","article-title":"A Multi-Channel Interference Based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks","volume":"71","author":"Wang","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"050002","DOI":"10.1063\/5.0201634","article-title":"Routing technique in location source privacy for wireless sensor network: A review","volume":"3082","author":"Yanti","year":"2024","journal-title":"AIP Conf. Proc."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yang, G., Dai, L., and Wei, Z. (2018). Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors, 18.","DOI":"10.3390\/s18113907"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/COMST.2020.3048190","article-title":"A survey of routing protocols for underwater wireless sensor networks","volume":"23","author":"Luo","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_16","unstructured":"Ozturk, C., Zhang, Y., Trappe, W., and Ott, M. (2004, January 12). Source-location privacy for networks of energy-constrained sensors. Proceedings of the Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, Vienna, Austria."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2105","DOI":"10.1109\/TIFS.2017.2698424","article-title":"Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks","volume":"12","author":"Koh","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1002\/int.22666","article-title":"PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs","volume":"37","author":"Chen","year":"2021","journal-title":"Int. J. Intell. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sun, J., Chen, Y., Lv, X., and Qian, X. (2022, January 22\u201325). A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node. Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Espoo, Finland.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00073"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wu, X., Ji, G., Dou, W., Yu, S., and Qi, L. (2020, January 6). Game Theory for Mobile Location Privacy. Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Taipei, Taiwan.","DOI":"10.1145\/3384943.3409427"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1109\/MNET.001.1900478","article-title":"SSLP: A Stratification-Based Source Location Privacy Scheme in Underwater Acoustic Sensor Networks","volume":"34","author":"Han","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1109\/JIOT.2021.3085586","article-title":"A Push-Based Probabilistic Method for Source Location Privacy Protection in Underwater Acoustic Sensor Networks","volume":"9","author":"Wang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Liu, Y., Han, G., Wang, H., and Jiang, J. (2021, January 26\u201328). FPTSA-SLP: A Fake Packet Time Slot Assignment-based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks. Proceedings of the 2021 Computing, Communications and IoT Applications (ComComAp), Shenzhen, China.","DOI":"10.1109\/ComComAp53641.2021.9652976"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1546","DOI":"10.1109\/JIOT.2022.3208319","article-title":"A Collision-Free-Transmission-Based Source Location Privacy Protection Scheme in UASNs Under Time Slot Allocation","volume":"10","author":"Han","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"10636","DOI":"10.1109\/JIOT.2023.3240179","article-title":"AUV-Assisted Stratified Source Location Privacy Protection Scheme based on Network Coding in UASNs","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3769","DOI":"10.1109\/T-WC.2008.070182","article-title":"A novel scheme for protecting receiver\u2019s location privacy in wireless sensor networks","volume":"7","author":"Jian","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Wang, Q., Dai, H.N., Li, X., Wang, H., and Xiao, H. (2016). On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks. Sensors, 16.","DOI":"10.3390\/s16050721"},{"key":"ref_28","first-page":"6670847","article-title":"An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things","volume":"2021","author":"Li","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.oceaneng.2016.08.019","article-title":"Underwater explosion induced shock loading of structures: Influence of water depth, salinity and temperature","volume":"126","author":"Ghoshal","year":"2016","journal-title":"Ocean Eng."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ozmen, A., Yildiz, H.U., and Tavli, B. (2020, January 24\u201325). Impact of minimizing the eavesdropping risks on lifetime of underwater acoustic sensor networks. Proceedings of the 2020 28th Telecommunications Forum (TELFOR), Belgrade, Serbia.","DOI":"10.1109\/TELFOR51502.2020.9306557"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Zhao, H., Gong, Z., Yan, J., Li, C., and Guan, X. (2024). Unsynchronized Underwater Localization with Isogradient Sound Speed Profile and Anchor Location Uncertainties. IEEE Trans. Veh. Technol., 1\u201314.","DOI":"10.1109\/TVT.2024.3360252"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3740","DOI":"10.1109\/TIT.2007.904982","article-title":"The design and performance of distributed LT codes","volume":"53","author":"Puducheri","year":"2007","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Bian, Y., Lin, H., and Song, Y. (2022, January 17\u201319). Game model of attack and defense for underwater wireless sensor networks. Proceedings of the 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China.","DOI":"10.1109\/ITAIC54216.2022.9836681"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.plrev.2016.08.015","article-title":"Evolutionary game theory using agent-based methods","volume":"19","author":"Adami","year":"2016","journal-title":"Phys. Life Rev."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"7728","DOI":"10.1109\/TVT.2023.3237653","article-title":"A Multi-Round Game-based Source Location Privacy Protection Scheme with AUV enabled in Underwater Acoustic Sensor Networks","volume":"72","author":"Wang","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"9005","DOI":"10.1109\/JIOT.2021.3055857","article-title":"Game-theory-based clustering scheme for energy balancing in underwater acoustic sensor networks","volume":"8","author":"Xing","year":"2021","journal-title":"IEEE Internet Things J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/9\/2851\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:36:47Z","timestamp":1760107007000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/9\/2851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,30]]},"references-count":36,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["s24092851"],"URL":"https:\/\/doi.org\/10.3390\/s24092851","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,30]]}}}