Abstract
1. Introduction
Underwater Wireless Sensor Networks (UWSNs) have a lot of potential application areas such as oceanographic data collection, disaster prevention, pollution monitoring, offshore exploration, and military surveillance [1–3]. The individual underwater sensor nodes are capable of sensing their environments, processing the information data locally, and forwarding data to one or more sink nodes in UWSNs. Since radio does not work underwater due to high attenuation, acoustic signals are widely used in underwater networks. Compared with radio channels, acoustic channels feature high error rates, low available bandwidth, and long propagation delays (acoustic signals propagate 5 orders of magnitude slower than electromagnetic waves). To better utilize network bandwidth in the face of channel interference, many medium access control (MAC) protocols have been proposed [4]. In general, MAC protocols can be roughly divided into two categories: contention-free protocols and contention-based protocols [5]. In contention-free protocols, communication channels are separated into time, frequency, or code domains, such as Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), and Code Division Multiple Access (CDMA) [6–8]. TDMA allows sharing the same frequency channel by dividing the signal into different time slots. In order to maintain reliable transmission schedules, all sensor nodes must remain synchronized, which incur additional control packets and scheduling operations. FDMA divides the frequency band into several subbands, but only a narrow available underwater acoustic bandwidth can be used due to the prevalent fading in underwater environments, which results in a low throughput. CDMA is robust against frequency-selective fading and allows receivers to distinguish among signals simultaneously transmitted by multiple devices, which in turn increases channel utilization and reduces packet retransmissions. However, CDMA is not suitable for UWSNs because it is difficult to assign pseudo random codes to a large number of sensor nodes. Also, the inherent near-far problem in CDMA is not well addressed in UWSNs.
Contention-based protocols include random access methods and collision avoidance methods [9]. In a random access protocol, the sender sends packets without coordination. When a data packet arrives at a receiver, if the receiver is not receiving any other packets and there is no other packet coming in this period, the receiver can receive this packet successfully. Thus, the packet avoidance is totally probabilistic. While, in a collision avoidance protocol, the sender and receiver capture the medium through control packet exchange before data transmission. For example, Carrier Sense Multiple Access (CSMA) protocols with their variances can improve the system energy efficiency using Request-To-Send/Clear-To-Send (RTS/CTS) like handshaking approaches [10–12]. However, the network throughput is still low since a significant part of system time is used for the handshaking and one time-consuming handshaking process usually only reserves the channel for one sender-receiver pair. Although a couple of newly proposed CSMA-based protocols [13, 14] attempt to address this challenge by enabling channel reuse through concurrent transmission sessions, these protocols still neglect the consideration of complex underwater circumstances and cannot fully exploit the acoustic channel reuse properties.
Cluster-based UWSNs have been investigated by researchers to achieve the network scalability and efficiency, which maximize network lifetime and reduce bandwidth consumption by using local collaboration among sensor nodes. However, because of the broadcast nature of acoustic communication, cluster-based UWSNs are vulnerable to many critical security attacks, including Sybil attack, replay attack, and message manipulation attack [15]. Cluster heads, which are elected to manage local clusters, become adversaries' prime targets. If one cluster head is captured or compromised by adversaries, the entire local cluster will be affected by attacks. These compromised sensor nodes cannot trust one another to be running a given network protocol correctly. This lack of trust between sensor nodes is detrimental to the operation of the whole network. In MAC layer, they might potentially disrupt channel access and cause waste of bandwidth and energy resources. In this paper, we propose a secure MAC protocol for cluster-based UWSNs, called SC-MAC, which aims to ensure the security of data transmission against various attacks. We leverage MAC layer information by considering the link quality as well as residual energy of the modem's battery with an objective to maximize the network lifetime. As the states of sensor nodes may not be observed accurately in a harsh underwater environment, we formulate the channel scheduling process as a stochastic partially observed Markov decision process (POMDP) multiarmed bandit problem [16] and derive the optimal channel scheduling rules hereby.
The remainder of the paper is organized as follows. Section 2 presents a brief overview of related work. Section 3 presents the technical details of the proposed scheme. Performance evaluation is described in Section 4. Finally, we conclude the paper in Section 5.
2. Related Work
ST-MAC [17] is a variant TDMA protocol that operates by constructing spatial-temporal conflict graph (ST-CG) to describe the conflict delays among transmission links. Moreover, a Mixed Integer Linear Programming (MILP) model is proposed to solve the optimal solution of coloring problem in ST-CG graph. To solve the spatiotemporal uncertainty, Slotted Spatiotemporal Conflict (S-STC) graph [18] considers both the packet propagation delay and link transmission delay in order to describe the propagation delays of the transmission links. S-STC graph is more accurate than the ST-CG [17] since the link transmission delay is not considered in ST-CG and the conflict delay is only a time value. To solve the link scheduling problem, an approximation algorithm called Interference-Aware Spatiotemporal Link Scheduling with Unified traffic load (ISTLS-U) is proposed with constant approximation ratios to the optimum solutions for both unified and weighted traffic load scenarios. TSR [13] is a joint time and spatial reuse MAC protocol that exploits the long propagation delay in UWSN channels as well as the possible sparsity of UWSN network topologies to improve channel utilization. It formalizes the problem of resource assignments to nodes to maximize the per-link channel utilization while avoiding mutual access interference within the communication range. Moreover, it works best in sparse networks.
CFDMA [19] is a cognitive FDMA protocol that allocates resources based on the knowledge of a quality metric related to user-channel pairs. In order to assign channels to users in an efficient way, two heuristic methods are proposed that allow finding effective solutions for the redistribution of the channels among the users: (1) the user with largest overall capacity transfers its lowest-frequency channel to the user with smallest capacity; (2) the user with lowest overall capacity acquires the channel where it would experience the best performance among those owned by other users. SC-FDMA [20] is a single carrier frequency division multiple access protocol over underwater acoustic channels. SC-FDMA demodulates each data block separately without relying on channel dependency between adjacent blocks and performs a low complexity carrier frequency offset compensation algorithm to combat the Doppler-effect. However, due to the limited bandwidth of underwater acoustic channels and the vulnerability of limited band systems to fading and multi-path, these FDMA based protocols still suffer from low throughput and the bandwidth of the total FDMA channels is smaller than the coherence bandwidth of original transmission channel.
UW-MAC [8] is a transmitter-based CDMA scheme that incorporates a closed-loop distributed algorithm to jointly sets the optimal transmit power and code length to account for the near-far effect. In UW-MAC, each data packet from each node is composed of header and payload, simultaneously accesses the channel using a random access ALOHA-like MAC scheme and adapting its power and code length in a distributed manner as in CDMA schemes (payload). Since no control packets are transmitted before the actual data packet is sent, there is no handshaking occurs during the whole channel access process. POCA-CDMA-MAC [21] is another CDMA-based MAC. By the POCA-CDMA-MAC scheme, each node modulates its packets with a spreading sequence so that the sink can receive packets from multiple neighbors at the same time. Moreover, the nodes in the same path are assigned with the same spreading sequence and they transmit their packets in a round-robin method. In this way, the collision of packets is reduced and the length of the spreading sequence codes is shortened. Compared with TDMA, CDMA is the promising medium access technique without synchronization requirement. However, due to the inherent shortcomings on near-far problem by the CDMA technique, which is a major design challenge to the MAC protocols, the development of CDMA-based MAC protocols is relatively rare.
In contention-based protocols, sensor nodes contend to access the channel. T-Lohi [10] is a low energy consumption MAC protocol that employs a tone-based contention resolution mechanism to detect collisions and count contenders. If only one node sends a tone, the data period begins, and the node can transmit its data. Otherwise, reservation period is extended, and contending nodes back off and try again later. To save energy, T-Lohi keeps the modem's data receiver and the host CPU off as much as possible and activates them only when a tone is detected by the low-power wake-up receiver.
MACA-MN [22] is an asynchronous random access handshaking-based protocol that improves the channel utilization by enabling multiple packet trains to neighbors during each round of handshake. Besides adopting the widely known three-way handshake (RTS/CTS/DATA), MACA-MN also allows simultaneous transmission of a train of packets to multiple neighbors, which significantly alleviates the detrimental effect of long propagation delay on network throughput. ROPA [23] is a sender-initiated handshaking based protocol where the sender can immediately switch its role to receive the incoming appended data packets after it finishes transmitting its packets to its own receiver. This greatly reduces the relative proportion of time spent on control signaling. Further, BiC-MAC [24] enhances channel utilization of ROPA using a packet bursting idea, in which a sender-receiver node pair can exchange multiple rounds of bidirectional packet transmissions. SF-MAC [25] is a spatially fair multiple access control protocol that avoids collision by postponing the CTS packet equal to period of RTS contention period. In order to realize this purpose, the receiver collects RTSs from all the contenders during the RTS contention period and determines the earliest sender by estimating the earliest sending probability of each of the remaining contender that has sent its RTS packet earliest with the highest probability. DOTS [14] is an opportunistic transmission scheduling protocol that exploits the key insights from TDMA-based scheduling methods to enhance conventional CSMA-like random channel access with RTS/CTS. It utilizes the delay map that is built by passively observing transmissions to opportunistically schedule simultaneous transmissions for both temporal and spatial reuse. However, the building of a delay map needs nodes' hardware support as well as the corresponding time synchronization protocols, such as Time Synchronization for High Latency (TSHL) protocol [26]. Moreover, DOTS' ability of temporal and spatial reuse is limited to the receiver side. There is no support for a sender to open concurrent sessions to the same destination.
3. Proposed Scheme
3.1. Network Topology and Cluster Formation
We consider that an UWSN is composed of a number of sensor nodes uniformly scattered in monitoring fields and represented by
Definition 1.
The function
Given an UWSN, the whole network is composed of three types of nodes: sink nodes, cluster heads, and cluster members. Sink nodes are placed on the water surface and have unlimited energy resources to communicate with each other through radio frequency (RF) links. They communicate with cluster heads and cluster members through acoustic links. All cluster members connect to their cluster head via single hop. The cluster heads of different clusters connect to a sink node through multiple hops.
Figure 1 shows the topology of an UWSN after cluster formation. Each circle denotes a cluster member and each concentric circle denotes a cluster head in the UWSN. Each sensor node is assigned a unique identifier (ID) and the number besides each sensor node denotes its residual energy. Each ellipse denotes the range of a cluster and each cluster has and only has one cluster head.

The topology of an UWSN after cluster formation.
All sensor nodes make autonomous decision about cluster formation without any centralized control. Given an UWSN, all sensor nodes in the network are initially set to be candidates. Then, each candidate either builds a new cluster and becomes a cluster head or joins other cluster and becomes a cluster member. At the end, no candidate remains in the network and every cluster member belongs to a cluster. In an UWSN, whether a candidate can become a cluster head is determined by a certain standard, which is described as the gravity function in this paper. We leverage MAC layer information by considering the link quality as well as residual energy of the modem's battery with an objective to maximize the network lifetime. Here, we use the RTS/CTS packet exchange between the sender and receiver to acquire the current estimation of Signal-to-Noise-Ratio (SNR), which is commonly used to represent the link quality.
Definition 2.
Given a sensor node
Algorithm 1 describes the process of cluster formation in detail.
(1) Sink node (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) (13) (14) (15) (16) (17) (18) (19) (20) (21) (22) (23) (24)
Given a sensor node
In a cluster, the cluster head will consume more energy than other sensor nodes. Therefore, it is important for each existing cluster head to determine the point at which to call for a cluster updating phase. During the process of cluster updating, all cluster members as well as the cluster head can join other cluster or reorganize a new cluster and elect a new cluster head. Figure 2 shows the topology of an UWSN after cluster updating. Once the residual energy of the cluster head

The topology of an UWSN after cluster updating.
Algorithm 2 describes the process of cluster updating in detail.
(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) (13) (14) (15)
Initially,
An attacker may participate in the process of cluster formation and updating using malicious nodes. These malicious nodes can launch different attacks. However, as each sensor node has a unique identifier, all unicast messages exchanged between nodes can be authenticated with unique pairwise keys shared with other nodes and broadcast messages can be authenticated with public key based digital signatures. By such means, the process of cluster formation and updating can be executed securely.
3.2. Authentication Phase
During the authentication phase, all sensor nodes need to be authenticated to each other. Cluster heads are authenticated to sink nodes and cluster members are authenticated to cluster heads. Therefore, sink nodes play an important role during the whole process of authentication. We adopt the following notations throughout the description of the protocol as shown in Notation section.
Firstly, cluster heads will be authenticated to sink nodes. Suppose
3.3. Channel Scheduling Scheme
After the execution of authentication, all sensor nodes have been authenticated to each other. In cluster-based UWSNs, communication may happen between two sensor nodes that locate within the transmission radius of each other (which is called the
In the
In the
Once the member nodes have requested the cluster head for the need of data packet transmission, the cluster head will schedule the channel in an optimal way based on the received requests from all member nodes as well as their channel conditions and residual energy. Since UWSNs are deployed in harsh and hostile underwater environments, their states may not be observed accurately and perfectly. Therefore, we formulate the channel scheduling process as a stochastic partially observed Markov decision process (POMDP) multiarmed bandit problem.
We consider that the time axis is divided into equal time slots and each cluster member transmits data packets to the corresponding cluster head in its allocated time slots. Let the state of a sensor node
If
After action, the sensor node
Suppose the size of each data packet is
Moreover, link quality-related and energy-related costs are considered in our scheme. Let
In order to design the optimal channel scheduling algorithm, we need to specify a criterion for optimality. For each transmission outcome we need to specify a reward. Since the optimal channel selection maximizes the rewards, they should be defined in a way to capture the desirable performance. Let
A channel scheduling policy is one in the form of
The goal is to represent an optimal scheduling policy in order to maximize the obtained reward, which is formulated as
3.4. Security Analysis
In this section, we discuss how different attacks are prevented by the proposed protocol. We assume that sink nodes cannot be captured by an attacker as they are physically protected.
In Sybil attack, an attacker tries to create multiple fabricated identities. In our protocol, all sensor nodes along the communication path are authenticated using Elliptic Curve Cryptography (ECC) public-key algorithm, which is feasible for low-end underwater sensors [32]. The sender signs the hash of a message with its secret key and broadcasts the signature along with the message. The receivers verify the correctness of the signature by using the sender's public key. As a result, an attacker cannot disguise as a legitimate node and cannot exchange any false information between legitimate nodes.
Replay attack is prevented by using a random nonce, which is updated every time the message is broadcasted. Thus, an attacker cannot pass the authentication phase even if a malicious node makes a copy of the previous message.
In order to perform message manipulation attack, an intruder tries to drop, modify, or even forge the exchanged messages to interrupt the process of communication. In the proposed protocol, all unicast messages exchanged between nodes can be authenticated with unique pair-wise keys shared with other nodes and broadcast messages can be authenticated with public key based digital signatures. Thus, message manipulation attack is not effective with this protocol.
4. Performance Evaluation
4.1. Simulation Settings
We use Aqua-Sim [33] as simulation framework to evaluate our approach. The data packets are also generated by the simulator. Aqua-Sim is an ns-2 based underwater sensor network simulator developed by underwater sensor network lab at University of Connecticut. To simulate acoustic channels, we extend Aqua-Sim with spherical path loss and Thorp attenuation [34].
Simulation parameters and their default values are listed in Table 1.
Simulation parameters and their default values.
We compared the performance of SC-MAC protocol with that of SF-MAC [25] and T-Lohi [10] protocols. We use three metrics to evaluate the performance of different MAC protocols, namely, network throughput, successful delivery ratio and energy consumption. The results are obtained by averaging 100 runs from 500 seconds simulation of each protocol. Network throughput refers to the total amount of data successfully transmitted by the network within a given period of time. Successful delivery ratio is defined as the ratio of successfully received number of data packets to the total amount of generated data packets. Energy consumption is obtained by dividing the overall energy consumption in the network by the successfully transmitted data bytes, which is measured in millijoule per byte.
4.2. Simulation Results
In the first set of simulations, we compare the network throughput with the number of nodes in different MAC protocols. The ratio of malicious nodes is set to 0.10. As shown in Figure 3, the network throughput of the three protocols is proportional to the number of nodes. As the number of nodes increases, the network throughput increases correspondingly and finally reaches the saturation status. SC-MAC achieves higher network throughput than that of SF-MAC and T-Lohi when their number of nodes are the same. This is because SC-MAC takes the link quality into consideration in channel scheduling. In T-Lohi, they do not consider the hidden terminal problem, and therefore the network throughput is lower than that of SC-MAC and SF-MAC. Specifically, SC-MAC improves 23.8% of the network throughput than that of SF-MAC and 34.8% of the network throughput than that of T-Lohi on average.

Network throughput versus number of nodes.
Next, we study how the ratio of malicious nodes affects the performance. This time, the number of nodes is set to 50 and the ratio of malicious nodes increases from 0.02 to 0.20. As shown in Figure 4, the network throughput of the three protocols decreases linearly with the ratio of malicious nodes. SC-MAC performs better than other MAC protocols in the same circumstances. Moreover, the curve of SC-MAC exhibits a slower decline compared with that of SF-MAC and T-Lohi, which proves the effectiveness of the proposed protocol. On the other side, although SC-MAC can protect the system from the intrusion of malicious nodes, these malicious nodes would never participate in the work of data transmission, which in turn decreases the network throughput to some extent. On average, SC-MAC increases 27.8% of the network throughput than that of SF-MAC and 40.6% of the network throughput than that of T-Lohi.

Network throughput versus ratio of malicious nodes.
In the second set of simulations, we compare the successful delivery ratio with the number of nodes in different MAC protocols. The ratio of malicious nodes is set to 0.10. As shown in Figure 5, the successful delivery ratio of the three protocols is inversely proportional to the number of nodes. SC-MAC achieves higher successful delivery ratio than that of SF-MAC and T-Lohi when their number of nodes are the same. The reason is that, in T-Lohi scheme, the senders may always contend with each other and the order of RTS changes in each contention period. In SC-MAC, each cluster head starts the cluster updating process when its residual energy drops below the average residual energy of the cluster, which in turn reduces the competitive intension. SF-MAC protocol avoids data collision by postponing the CTS packets. When the number of nodes keeps in a low level, this mechanism works well; but when the number of nodes reaches a high level, the postponed CTS packets still have potentially high risk of collision. Specifically, the successful delivery ratio of SC-MAC is 12.5% higher than that of SF-MAC and 27.4% higher than that of T-Lohi on average.

Successful delivery ratio versus number of nodes.
Then, we investigate the effect of varying ratio of malicious nodes to the successful delivery ratio while the number of nodes is kept fixed to 50. As shown in Figure 6, the successful delivery ratio of the three protocols decreases linearly with the ratio of malicious nodes. This is because with the increase of malicious nodes, they not only refuse of make contribution to the data transmission, but also interfere in matters of other safe sensor nodes. SC-MAC performs better than other two protocols with the protection of its additionally secure measures. On average, the successful delivery ratio of SC-MAC is 15.3% higher than that of SF-MAC and 32.6% higher than that of T-Lohi.

Successful delivery ratio versus ratio of malicious nodes.
In the third set of simulations, we compare the energy consumption with the number of nodes in different MAC protocols. The ratio of malicious nodes is set to 0.10. As shown in Figure 7, the energy consumption of the three protocols is inversely proportional to the number of nodes. The reason is that with the increase of the node density, the distance between different nodes decreases and less energy is wasted on long distance communications. SF-MAC consumes the highest energy among the three protocols in that it does not adopt any energy conservation measures. T-Lohi conserves energy by employing a wake-up tone receiver that allows very low-power listening for wake-up tones. Specifically, SC-MAC decreases 50.3% of the energy consumption than that of SF-MAC and 23.2% of the energy consumption than that of T-Lohi on average.

Energy consumption versus number of nodes.
Further, we investigate the effect of varying ratio of malicious nodes while the number of nodes is kept fixed to 50. As shown in Figure 8, the energy consumption of the three protocols is proportional to the ratio of malicious nodes. This is because with the increase of the malicious nodes, more energy will be wasted on unsuccessful data transmission and idle listening activities. Compared with other two protocols, SC-MAC achieves much high energy efficiency under the same conditions. On average, SC-MAC decreases 54.5% of the energy consumption than that of SF-MAC and 29.8% of the energy consumption than that of T-Lohi.

Energy consumption versus number of nodes.
5. Conclusion
This paper proposed a secure MAC protocol for cluster-based UWSNs, called SC-MAC, which aims to ensure the security of data transmission under harsh and hostile underwater environments against different attacks, including Sybil attack, replay attack, and message manipulation attack. In SC-MAC, the clusters are formed and updated dynamically and securely. We leverage MAC layer information by considering the link quality as well as residual energy of the modem's battery with an objective to maximize the network lifetime. After the successful mutual authentication between different sensor nodes, we formulated the channel scheduling process as a stochastic partially observed Markov decision process multiarmed bandit problem and derived the optimal channel scheduling rules. Simulation results show that SC-MAC can perform better than existing state-of-the-art MAC protocols in terms of network throughput, successful delivery ratio, and energy consumption in various circumstances.
