Processing math: 46%
A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Haiyan Zhao, Jing Yan, Xiaoyuan Luo and Xinping Guan, "Privacy Preserving Solution for the Asynchronous Localization of Underwater Sensor Networks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 6, pp. 1511-1527, Nov. 2020. doi: 10.1109/JAS.2020.1003312
Citation: Haiyan Zhao, Jing Yan, Xiaoyuan Luo and Xinping Guan, "Privacy Preserving Solution for the Asynchronous Localization of Underwater Sensor Networks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 6, pp. 1511-1527, Nov. 2020. doi: 10.1109/JAS.2020.1003312

Privacy Preserving Solution for the Asynchronous Localization of Underwater Sensor Networks

doi: 10.1109/JAS.2020.1003312
Funds:  This work was supported in part by the National Natural Science Foundation of China (61873345, 61973263), the Youth Talent Support Program of Hebei (BJ2018050, BJ2020031), the Teturned Overseas Chinese Scholar Foundation of Hebei (C201829), the Natural Science Foundation of Hebei (F2020203002), and the Postgraduate Innovation Fund Project of Hebei (CXZZSS2019047)
More Information
  • Location estimation of underwater sensor networks (USNs) has become a critical technology, due to its fundamental role in the sensing, communication and control of ocean volume. However, the asynchronous clock, security attack and mobility characteristics of underwater environment make localization much more challenging as compared with terrestrial sensor networks. This paper is concerned with a privacy-preserving asynchronous localization issue for USNs. Particularly, a hybrid network architecture that includes surface buoys, anchor nodes, active sensor nodes and ordinary sensor nodes is constructed. Then, an asynchronous localization protocol is provided, through which two privacy-preserving localization algorithms are designed to estimate the locations of active and ordinary sensor nodes. It is worth mentioning that, the proposed localization algorithms reveal disguised positions to the network, while they do not adopt any homomorphic encryption technique. More importantly, they can eliminate the effect of asynchronous clock, i.e., clock skew and offset. The performance analyses for the privacy-preserving asynchronous localization algorithms are also presented. Finally, simulation and experiment results reveal that the proposed localization approach can avoid the leakage of position information, while the location accuracy can be significantly enhanced as compared with the other works.

     

  • INTERNET of underwater things (IoUTs) is defined as a world-wide network that incorporates underwater physical process, ubiquitous computation, efficient communication and reliable control [1]. In IoUTs, one of the most promising technologies is to utilize underwater sensor networks (USNs) to monitor the sea area. The USNs can support applications in various areas such as marine resource protection, gas and oil spill monitoring, data collection, disaster warning and mine reconnaissance (see [2]–[6] and references therein). For the applications of USNs, the precise localization of sensor nodes has become one of the primary prerequisites. This critical importance arises from its fundamental role in the sensing, communication and control of vast unexplored ocean volume, because these commands are valid only when the location information of sensor nodes is accurate.

    In general, the localization schemes developed for sensor networks that can achieve high-accuracy localization are based on time. The time-based schemes employ various mechanisms such as time of arrival (TOA), time of flight (TOF), or time difference of arrival (TDOA) to measure distances. Since the distance measurement is derived from the time (or time difference), the time-based schemes rely heavily on the clock synchronization assumption of sensor nodes. For terrestrial sensor networks, the clock synchronization assumption can be easily founded through the assistance of global positioning system (GPS). However, the unique characteristics of USNs make underwater localization more [7]. For instance, radio waves are strongly absorbed in water, and GPS technology is not available for USNs. Moreover, the propagation delay of acoustic speed (1500 m/s) is five orders of magnitude higher than in radio frequency terrestrial channels (3×108 m/s). As a result, the time clocks in USNs are usually asynchronous, which make it difficult to acquire the accurate distance measurement. Although the received signal strength (RSS) technology [2] does not require the clock synchronization assumption, RSS signals are usually inaccurate in water. On the other hand, the nodes in water often have passive motions driven by water current, which results in the differences of round-trip propagation delays between any two nodes. Therefore, the localization schemes developed for terrestrial sensor networks [8]–[11] cannot be directly applied to USNs.

    In order to achieve effective localization for IoUTs, some asynchronous localization algorithms have been developed, e.g., [12]–[15]. These algorithms mainly involve the following process. 1) Anchor discovery: several non-collinear anchor nodes are deployed in the network to provide localization reference for sensor nodes; 2) Distance measurement: the distance measurements are derived by multiplying the time (or time difference) with the transmission speed; 3) Location estimation: with the positions of anchor nodes and the measured distances, optimal or suboptimal estimators are designed to calculate the locations of sensor nodes. In such a process, the privacy preservation is not taken into consideration, since the positions of anchor nodes are directly revealed to the networks. However, the USNs are usually deployed in harsh or even insecure environment, and security threats cannot be avoided. Ignoring the effect of privacy preservation can lead to privacy leakage or even failure of the localization [16]. For example, malicious nodes can easily attack the anchor nodes and destroy the whole localization system if they harvest the locations of anchor nodes. Inspired by this, many privacy-preserving localization schemes have been proposed. For instance, the encryption technique was adopted in [17] and [18], through which privacy-preserving schemes were designed for indoor localization. In [19] and [20], the privacy preserving summation (PPS) strategy was employed to hide private location information of anchor nodes. Nevertheless, the localization schemes in [17]–[20] relied on the assumption of synchronous clock, i.e., the transmitter-receiver synchronization was assumed to be ensured. Meanwhile, the mobility characteristic of nodes was not considered in [17]–[20], i.e., the nodes were assumed to be static. As mentioned above, the clocks in USNs are always asynchronous, wherein the nodes often have passive motions. Ignoring the above characteristics can increase ranging errors and reduce localization accuracy. Per knowledge of the authors, how to design a localization algorithm that jointly considers the asynchronous clock, mobility and privacy preservation is not well studied.

    This paper develops a privacy preserving solution for the asynchronous localization of USNs. We first present a hybrid network architecture, which includes four types of nodes, i.e., surface buoys, anchors, active sensors and ordinary sensors. In order to eliminate the effects of asynchronous clock and mobility, an asynchronous localization protocol is developed, through which PPS and privacy-preserving diagonal product (PPDP) based localization algorithms are designed to hide privacy information. Main contributions lie in two aspects:

    1) Asynchronous Localization Protocol With the Consideration of Asynchronous Clock and Mobility: An asynchronous localization protocol is provided to eliminate the effect of asynchronous clock and mobility, through which the relationship between propagation delay and location is constructed. Different from the existing works [17]–[20], the clocks between anchors and sensors are not required to be synchronized. Meanwhile, the proposed localization protocol in this paper can compensate both the influences of clock skew and offset as compared with the works [12], [13], [21].

    2) Asynchronous Localization Algorithm With the Consideration of Privacy Preservation: Without adopting any homomorphic encryption technique, PPS and PPDP based asynchronous localization algorithms are designed for USNs to hide the private location information. Compared to the existing works [14], [15], the position information of anchor nodes in this paper does not require to be revealed. Per knowledge of the authors, this is the first work that employs privacy preservation strategy into the asynchronous localization of USNs.

    Recently, the localization of terrestrial sensor networks has been extensively investigated. For instance, a divide-and-conquer strategy that enabled sparse localization of sensor nodes was developed in [22]. In [23], a viable kernel-based algorithm was presented to solve the localization problem. Also of relevance, some other localization algorithms were proposed for terrestrial sensor networks (see [24] and the references therein). However, these algorithms cannot be directly applied to USNs due to the unique characteristics of underwater environment. In the following, we review literatures on the topic of asynchronous localization of USNs.

    In [21], a silent localization scheme was developed, where the underwater sensor nodes did not actively transmit any message. Based on this, an on-demand asynchronous localization (ODAL) scheme was provided in [12]. It can be seen that the mobility characteristic of USNs in [12], [21] was not considered. To handle this issue, Tsai et al. [25] developed a hybrid mobile localization algorithm for USNs. In [26], a prediction-based localization algorithm called scalable localization with mobility prediction (SLMP) was designed to predict the locations of sensor nodes. More recently, a mobility prediction based asynchronous localization algorithm was given in [13]. Nevertheless, the clock model in [12], [13], [21], [25], [26] ignored the clock skew, and this assumption can increase the synchronization error when the localization window was not small. With this consideration, some joint localization and synchronization algorithms have been proposed. For instance, a multi-phase solution to localization and synchronization was presented in [14], where the clock skew and offset were both considered. Different from [14], a unified framework was presented in [27], where the localization and synchronization tasks can be achieved simultaneously. In [28], an autonomous underwater vehicle (AUV) was employed as the anchor node, through which an AUV-aided asynchronous localization strategy was presented. Reference [29] studied a joint localization and tracking issue for AUV. In order to reduce the linearization errors, a follow-up work [30] was given to present an unscented transform-based asynchronous localization algorithm. Also of relevance, some underwater asynchronous localization algorithms were proposed in [31]–[33]. However, the major focus in the above studies is the design of communication protocol to localize sensor nodes, where the privacy preservation issue is not considered. It is worth mentioning that, the privacy preservation is critical for the success of localization process. With consideration of the mobility, how to incorporate the privacy preservation into the asynchronous localization of USNs is largely unexplored.

    To avoid information leakage, some privacy-preserving localization [17], [18] adopted homomorphic encryption technique to hide the position information of indoor sensor nodes. Other encryption technique-based privacy preservations were developed in [16], [34]–[36]. Although the encryption technique can provide strong privacy preservation performance, its communication and computational overheads are high. Thereby, the encryption technique is not suitable for underwater localization [16], due to the limited bandwidth and energy of USNs. Inspired by this, some researchers attempt to use the signal processing solutions to preserve privacy data, whose main idea is to add noises to the privacy data. For instance, the authors in [19], [20] adopted PPS into TDOA-based localization, through which two privacy-preserving least squares estimators were designed. In [37], a privacy preserving mechanism was presented for the position estimation, and a differential privacy based privacy-preserving indoor localization scheme was designed in [38]. Nevertheless, these studies rely on the synchronous assumption, and they cannot be directly applied to the asynchronous localization. This paper gives a privacy-preserving localization solution for USNs, and more importantly, we consider more complex but realistic underwater environment, i.e., asynchronous clock and mobility characteristics.

    In order to realize privacy-preserving asynchronous localization for USNs, we provide a network architecture that includes four different types of nodes, as depicted in Fig. 1.

    Figure  1.  Network architecture of USNs.

    1) Surface Buoys: Surface buoys are installed with GPS to acquire their accurate time references and positions through electromagnetic communication. The role of surface buoys is to provide self-localization and clock synchronization services for anchor nodes.

    2) Anchor Nodes: Anchor nodes are powerful fixed nodes, and they make direct communication with surface buoys. Similar to the assumption in [26], [39], it is assumed that the time clocks of anchor nodes are synchronized and the locations are pre-known by using some existing technologies, e.g., the localization approach in [40].

    3) Active Sensor Node: Active sensor nodes initiate the whole localization process by broadcasting timestamps to the networks. Due to the effect of water current, active sensor nodes can move passively, whose velocities can be accurately measured by Doppler velocity log (DVL) or fiber optic gyroscope (FOG). Particularly, the locations of active sensor nodes are required to be estimated and protected. It is emphasized that the clocks of active sensor nodes are not well synchronized with the real time.

    4) Ordinary Sensor Nodes: Ordinary sensor nodes are low-complexity nodes, and they cannot initiatively start the whole localization process, i.e., they just passively listen to the networks and then send state noises to anchor nodes. The locations of ordinary sensor nodes are required to be estimated and protected. Similar to active sensor nodes, ordinary sensor nodes can move passively, whose velocities can be accurately measured. Besides, the clocks of ordinary sensor nodes are asynchronous.

    With the above network architecture, the localization process is divided into two subprocesses: a) active sensor localization; b) ordinary sensor localization. Without loss of generality, one active sensor node and one ordinary sensor node are considered here, while the method for single node can be easily extended to the other nodes. Besides, each node can hear message only from its neighboring nodes, i.e., each node cannot hear everybody else due to its limited sensing range. Thus, it is assumed that m anchor nodes are deployed in the sensing range of active and ordinary nodes, where m4. Meanwhile, the IDs of neighboring anchor nodes are pre-known to active and ordinary sensor nodes.

    At the beginning, active sensor node sends out an initiator message to its neighboring nodes. Upon receiving the initiator message, anchor nodes record and reply the initiator message. Meanwhile, ordinary sensor node passively listens to the messages from active sensor node and anchor nodes. Since the exchange process can be quickly completed, it assumed that the positions of active and ordinary sensor nodes are fixed during the timestamp exchange process. The timestamp transmission process can be illustrated by Fig. 2, and some important notations are listed in Table I. Accordingly, the asynchronous localization protocol is detailed as follows.

    Table  I.  Notation Definitions
    Notation Description
    Ta,a Time when active sensor sends initiator message
    ta,i Time when anchor i receives initiator message
    ti,i Time when anchor i sends message
    tj,i Time when anchor i receives message from anchor j
    Ti,a Time when active sensor receives message from anchor i
    Ta,p Time when ordinary sensor receives message from active sensor
    Ti,p Time when ordinary sensor receives message from anchor i
    ϖi,1 Time measurement noise between anchor i and anchor 1
    ϖi,p Time measurement noise between anchor i and ordinary sensor
     | Show Table
    DownLoad: CSV
    Figure  2.  Description of the timestamp transmission process.

    1) At time Ta,a, active sensor node sends out an initiator packet to the networks, whose local length is tr. The packet includes tr and the sending order of anchor nodes, i.e., i{1,,m}. Subsequently, active sensor node switches into waiting mode for the replies from the other nodes.

    2) At time ta,i, anchor node i receives the initiator packet, and then it switches into waiting mode. At time tj,i, anchor node i receives message from anchor node j{1,,i1}. After the message from anchor node i1 has been received, anchor node i sends out its message at time ti,i. The length of this message is tr,i, while this message includes ta,i, {tj,i}j for j<i, ti,i, tr,i, and the disguised states of anchor node i. Of note, the disguised states can be acquired by adding noises to the real states, as presented in Section IV.

    3) At time Ti,a, active sensor node receives the reply from anchor node i. After receiving replies from all anchor nodes, active sensor node ends its waiting mode. Accordingly, active sensor node collects the following measurements

    Ta,a,{ta,i,ti,i,Ti,a,tr,i}mi=1,{tj,i}m,i1i=2,j=1,tr. (1)

    4) Ordinary sensor node passively listens to the networks, and it sends out state noises to anchor nodes as required. Accordingly, ordinary sensor node has the following timestamp measurements from anchor nodes

    Ta,a,Ta,p,{ta,i,ti,i,Ti,p,tr,i}mi=1,{tj,i}m,i1i=2,j=1,tr. (2)

    5) With the collected timestamps in (1) and (2), two asynchronous localization algorithms are given to estimate the positions of active and ordinary sensor nodes at timestamps Ta,a and Ta,p, as provided in Section IV.

    Different from the simplified model in [12], [13], [21], a clock model including time skew and offset is considered

    Ta=αat+βa,Tp=αpt+βp (3)

    where Ta and Tp are the local clocks of active and ordinary sensor nodes, respectively. In addition, αa denotes the clock skew between active sensor node and real time t, while αp denotes the clock skew between ordinary sensor node and real time t. Moreover, βa and βp represent the clock offsets of active sensor node and ordinary sensor node, respectively. Referring to [28], one knows αa and αp lie in [1 − 2 × 10−4, 1 + 2 × 10−4].

    Remark 1: It is noted that, the asynchronous localization protocol in this paper is similar to the ones in [12], [13], [30]. Nevertheless, the asynchronous localization protocol in this paper is essentially different from the ones in [12], [13], [30]. Two reasons are associated with this judgement: 1) The clock model in [12], [13] ignores the clock skew (i.e., αa=1), and thus the localization protocol in [12], [13] cannot remove the effect of clock skew. Different from the above simplified clock model, the clock skew and the clock offset are both considered in this paper. 2) By revealing disguised positions to the networks, the localization protocol in this paper can hide the private location information of anchor nodes, however the protocols in [12], [13], [30] cannot solve this issue.

    Due to the mobility characteristic, the above localization protocol should be periodically enforced to update the position information. However, this implementation can result in a waste of communication costs. In order to handle this issue, we develop a mobility compensation strategy, whose aim is to balance the tradeoff between communication cost and localization accuracy. Then, the time axis is divided into multiple measurement windows with length set to Tw (see Fig. 3). The position vectors of active sensor node at timestamps Ta,a and T#a,a are denoted as pa and p#a, respectively. To be specific, the position at timestamps Ta,a and T#a,a is updated through the proposed localization protocol. At timestamp Ta,a (Ta,a, T#a,a], the position can be updated as

    pTa,a={pa,if(Ta,aTa,a)<δαapa+δαanama=0va(Ta,a),otherwise (4)

    where δR+ is the actual sampling interval. Ta,a=Ta,a+maδαa, where ma=0,,na and na=(Ta,aTa,a)/(δαa). Besides, va(Ta,a) represents the velocity vector of active sensor node at timestamp Ta,a, which can be measured by DVL or FOG. Note that the position information at timestamps Ta,a and T#a,a can be estimated with the algorithm in Section IV-A. Thereby, the clock skew αa can be deduced by an exhaustive search with relationship of p#apa=δαan#ama=0va(Ta,a) where n#a=(T#a,aTa,a)/(δαa). Of note, is the floor function.

    Figure  3.  Example for the structure of measurement window.

    Similar to the active sensor node, the position vectors of ordinary sensor node at timestamps Ta,p and T#a,p are expressed as pp and p#p, respectively. The position at timestamps Ta,p and T#a,p is updated by the localization protocol in Section IV-B. At timestamp Ta,p (Ta,p, T#a,p], the position is updated as

    pTa,p={pp,if(Ta,pTa,p)<δαppp+δαpnpmp=0vp(Ta,p),otherwise (5)

    where Ta,p=Ta,p+mpδαp for mp=0,,np and np=(Ta,pTa,p)/(δαp). In addition, vp(Ta,p) denotes the velocity vector of ordinary sensor node at timestamp Ta,p, and αp can be deduced by the relationship of p#ppp=δαpn#pmp=0vp(Ta,p) where n#p=(T#a,pTa,p)/(δαp).

    With the above localization protocol, the following two problems require to be solved for the localization algorithms.

    Problem 1 (Privacy-Preserving Asynchronous Localization for Active Sensor Node): In USNs, the clocks are asynchronous and the position information is required to be protected. Inspired by this, we attempt to design a privacy-preserving asynchronous localization algorithm for active sensor node, where active sensor node initiates the localization process by broadcasting message to the networks. This problem is reduced to the estimation of pa with the collected timestamps in (1).

    Problem 2 (Privacy-Preserving Asynchronous Localization for Ordinary Sensor Node): Different from the active sensor node, the ordinary sensor node cannot initiatively broadcast timestamps to the networks. Thereby, the localization algorithm designed for active sensor node is not suitable for ordinary sensor node. Inspired by this, we aim to design a privacy-preserving asynchronous localization algorithm for ordinary sensor node. This problem can be reduced to the estimation of pp with the collected timestamps in (2).

    We first present a PPS-based asynchronous localization algorithm for active sensor node. Note that the PPS-based localization is not suitable for ordinary sensor node. Then, a PPS and PPDP based asynchronous localization algorithm is designed for ordinary sensor node. Finally, we present the consequence when there exist dishonest nodes.

    In order to remove the effect of asynchronous clock, we define the following time difference, i.e.,

    ΔTi,1=ta,ita,1,i{2,,m}. (6)

    Without loss of generality, we assume that all nodes including anchor nodes, active and ordinary sensor nodes have the same measurement quality. Particularly, the measurement noise of each local measurement is a random variable with zero mean and variance σ2mea, which is decided by the underlying signal processing in the presence of multipath propagation and ambient noise. Thereby, the relationship between time differences and propagation delays is constructed as

    ΔTi,1=(ta,a+trαa+τa,i+ϖa,i)(ta,a+trαa+τa,1+ϖa,1)=τa,iτa,1+ϖi,1 (7)

    where τa,i is the one-way propagation delay between active sensor node and anchor node i, τa,1 is the one-way propagation delay between active sensor node and anchor node 1, ta,a is the real time when the initiator message is sent to the network. Besides, ϖa,i and ϖa,1 represent the measurement noises, which satisfy the distributions of ϖa,iN(0, σ2mea) and ϖa,1N(0, σ2mea), respectively. Based on this, the noise ϖi,1 satisfies the distribution of ϖi,1N(0, 2σ2mea).

    With (7), we have the following distance difference

    Υi,1=da,ida,1+ei,1,i{2,,m} (8)

    where Υi,1=cΔTi,1 is the measured distance difference for anchor node i, da,i=cτa,i is the relative distance between active sensor node and anchor node i, while da,1=cτa,1 is the relative distance between active sensor node and anchor node 1. Moreover, ei,1=cϖi,1 is the noise of distance measurement, satisfying the distribution of ei,1N(0,2c2σ2mea).

    It is denfined that xa=[pTa, da,1]T. Based on (8), we formulate the following least squares (LS) problem, i.e.,

    minxami=2((Υi,1+da,1)2d2a,i)2. (9)

    Denote the position vector of anchor node i{1,,m} as piR3×1. Then, the nonlinear equation (9) can be transformed into the following linear LS problem

    minxa2AxaB2 (10)

    where A=[a1,,am1]T and B = [b1,,bm1]T. Particularly, the j-th element of A is defined as aj= [(pj+1p1)T, Υj+1,1] for j{1,,m1}. Similarly, the jth element of B is given by bj=pTj+1pj+1pT1p1Υ2j+1,1.

    By employing the traditional LS estimator, the direct estimation of xa can be given as ˆxa,direct, i.e.,

    ˆxa,direct=12(ATA)1ATB. (11)

    However, the direct calculation of 12(ATA)1ATB can lead to privacy leakage, since matrices A and B contain the position information of anchor nodes. In order to prevent privacy leakage, a PPS strategy is given to calculate ATA and ATB, through which 12(ATA)1ATB can be indirectly calculated. Particularly, the indirect estimation of xa is expressed as ˆxa,indirect, which can be divided into two parts, i.e., ˜A=ATA and ˜B=ATB. Based on this, ˆxa,indirect can be defined as

    ˆxa,indirect=12˜A1˜B. (12)

    With regard to (12), the main process of PPS-based asynchronous localization algorithm is detailed as follows.

    Step 1: Matrix Construction

    For the convenience of computation, it is defined that ˜A=[A11, A12; A21, A22] and ˜B=[B11+B12; B21+B22]. Referring to the definitions of A and B, the elements of ˜A and ˜B can be described as

    A11=mi=2(pip1)(pip1)T=(m1)p1pT1+mi=2pipTi(mi=2pi)pT1p1(mi=2pTi)
    A12=mi=2(pip1)Υi,1=mi=2piΥi,1p1(mi=2Υi,1)A21=mi=2Υi,1(pip1)T=AT12A22=mi=2Υ2i,1B11=mi=2(pip1)(pTipipT1p1)=(m1)p1pT1p1+mi=2pipTipi(mi=2pi)pT1p1p1(mi=2pTipi)B12=mi=2(pip1)(Υ2i,1)=mi=2piΥ2i,1+p1(mi=2Υ2i,1)B21=mi=2Υi,1(pTipipT1p1)=mi=2pTipiΥi,1pT1p1(mi=2Υi,1)B22=mi=2Υi,1(Υ2i,1)=mi=2Υ3i,1.

    Therefore, the estimation of xa in (12) can be rewritten as

    ˆxa,indirect=12[A11A12A21A22]1[B11+B12B21+B22]. (13)

    Step 2: PPS-Based State Calculation

    As mentioned in Section III-B, anchor nodes send disguised states to the networks. In this section, the real states of anchor node 1 are given as Y1=[(m1)p1pT1(mi=2pi)pT1p1(mi=2pTi), (m1)p1pT1p1(mi=2pi)pT1p1p1(mi=2pTipi)] and Z1=[p1, p1, (0;pT1p1;0)]. The real states of anchor node i{2,,m} are detailed as Xi=[pi, (0;pTipi;0)], Yi=[pipTi,pipTipi] and Zi = [pi, pi, (0;pTipi;0)]. In order to calculate ˜A and ˜B, the summations of these states, i.e., mi=2Xi, mi=1Yi, Z1mi=2 diag (Υi,1,Υ2i,1,Υi,1)+mi=2Zidiag(Υi,1,Υ2i,1,Υi,1), are required to be known. In the following, we give a PPS-based strategy [19], [20] to calculate these summations.

    Anchor node i{1,,m} randomly generates matrices S2,ij and S3,ij, where mj=1S2,ij=0 and mj=1S3,ij=0. Then, anchor node i keeps S2,ii and S3,ii in memory, and sends the rest to the other m1 anchor nodes. Meanwhile, anchor node i receives the matrices from the other m1 anchor nodes. By adding the received matrices to S2,ii and S3,ii, two random matrices δ2i and δ3i can be obtained. According, the disguised state of Yi can be represented as ˜Yi=Yi+δ2i for i{1,,m}. Denote the kth column of δ3i as δ3i,k for k{1,2,3}. Based on this, the disguised state of Zi is represented as ˜Z1=Z1+δ31 or ˜Zi=Zi+Wi, where Wi=[δ3i,1γi,δ3i,2γ2i,δ3i,3γi], γi=Υi,1mi=2Υi,1, and γ2i=Υ2i,1mi=2Υ2i,1 for i{2,,m}. For clear description, the calculation process of mi=1Yi is described in Fig. 4(a).

    Figure  4.  Description of the PPS-based state calculation.

    With the similar strategy, the state Xi can also be disguised. For instance, anchor node i{2,,m} randomly generates matrix S1,ij in the same size as Xi where j{2,,m}, such that mj=2S1,ij=0. Through state summation, the disguised state of Xi can be represented as ˜Xi=Xi+δ1i, where δ1i is a random matrix with i{2,,m}. Specially, the summation process of mi=2Xi can be described by Fig. 4(b).

    Subsequently, anchor node 1 sends disguised states ˜Y1 and ˜Z1 to the networks, while anchor node i{2,,m} sends disguised states ˜Xi, ˜Yi and ˜Zi to the networks. It is clear that, the real states of anchor nodes are not revealed.

    Step 3: Calculation of ˜A and ˜B

    It is noted that mi=2˜Xi=mi=2(Xi+δ1i)=mi=2Xi. Applying this property to all the elements, the values of A11 and B11 can be obtained with ˜Xi and ˜Yi. Meanwhile, the values of A12, A21, B12 and B21 can be obtained with ˜Zi. Moreover, the values of A22 and B22 can be directly acquired, because Υ2i,1 and Υ3i,1 are pre-known. Accordingly, the values of ˜A and ˜B are indirectly calculated, where the privacy information of anchor nodes is not leaked.

    Step 4: Position Estimation

    With the results in Step 3, the estimation of xa in (13) can be easily calculated. Accordingly, the clock skew αa can be obtained by an exhaustive search, and hence, we obtain

    Ta,aβaαa+trαa+τa,i=ta,i (14)
    ti,i+tr,i+τa,i=Ti,aβaαa. (15)

    From (14) and (15), we have

    τa,i=(Ti,aTa,a)αa(ti,ita,i+trαa+tr,i)2αa. (16)

    Aa a result, by substituting (16) into (14), the clock offset βa can be calculated as βa=Ta,aαa(ta,itr/αaτa,i).

    In this section, active sensor node and anchor node i{1,,m} provide localization services for ordinary sensor node. In order to remove the effect of clock offset (i.e., βp), we define the following time difference, i.e.,

    ΔTi,a,p=Ti,pTa,p, i{1,,m}. (17)

    Based on (17), the relationship between time difference and propagation delay can be constructed as

    ΔTi,a,p=[αp(ti,i+tr,i+τi,p+ϖi,p)+βp][αp(Ta,aβaαa+trαa+τa,p+ϖa,p)+βp]=αp[(ti,i+tr,iTa,aβaαatrαa)+(τi,pτa,p)+ϖi,a,p] (18)

    where τi,p is the one-way propagation delay between anchor node i and ordinary sensor node, τa,p is the one-way propagation delay between ordinary sensor node and active sensor node. In addition, ϖi,p and ϖa,p represent the measurement noises, satisfying the distributions of ϖi,pN(0, σ2mea) and ϖa,pN(0, σ2mea). Based on this, the noise ϖi,a,p satisfies the distribution of ϖi,a,pN(0, 2σ2mea).

    With (18), we have the following distance difference

    cΔTi,a,p=αp(Mi+di,pda,p+ei,a,p) (19)

    where Mi=c(ti,i+tr,iTa,aβaαatrαa). In addition, di,p=cτi,p is the relative distance between anchor node i and ordinary sensor node, while da,p=cτa,p denotes the relative distance between ordinary sensor node and active sensor node. Besides, ei,a,p=cϖi,a,p is the noise of distance difference measurement, satisfying the distribution of ei,a,pN(0,2c2σ2mea).

    Since the ordinary sensor node cannot initiatively send timestamps, the clock skew (i.e., αp) cannot be removed by using the relationship in (7). In order to remove the effect of clock skew, we define the following equation

    ΔT1,a,pΔTi,a,p=M1+d1,pda,p+e1,a,pMi+di,pda,p+ei,a,p,i{2,,m}. (20)

    Rearranging (20), one can obtain ΔT1,a,pΔTi,a,p(Mi+di,pda,p+ei,a,p)=M1+d1,pda,p+e1,a,p, i.e., Di,1,pMiM1+(1Di,1,p)da,p=d1,pDi,1,pdi,pDi,1,pei,a,p+e1,a,p, where Di,1,p=ΔT1,a,pΔTi,a,p. Based on this, we have

    Qi,1,p+(1Di,1,p)da,p=d1,pDi,1,pdi,p+ei,1,p (21)

    where Qi,1,p=Di,1,pMiM1 and ei,1,p= e1,a,pDi,1,pei,a,p.

    In order to minimize the measurement noise, we define xp=[pTp,da,p,d1,p]T, and therefore the following LS estimation problem is formulated, i.e.,

    minxpmi=2{[Qi,1,p+(1Di,1,p)da,pd1,p]2(Di,1,pdi,p)2}2. (22)

    The nonlinear problem in (22) can be transformed into the following linear LS problem

    minxp2HxpQ2 (23)

    where H = [h1,,hm1]T and Q = [q1,,qm1]T. Specially, the jth element of H is defined as hj=[Dj+1,1,p(pap1)T+D2j+1,1,p(pj+1pa)T, (1Dj+1,1,p)Qj+1,1,p, Qj+1,1,p] for j{1,,m1}. Moreover, the j-th element of Q is qj= Q2j+1,1,p(1Dj+1,1,p)2pTapapT1p1+2(1Dj+1,1,p)pTap1+D2j+1,1,ppTj+1pj+1.

    Remark 2: It is noticed that, at least five reference nodes are required to locate the ordinary sensor node. The reason associated with this design can be summarized as follows: 1) Five unknown parameters are required to be estimated in (23), (i.e., ppR3×1, da,p  and d1,p), and thereby five linear independent equations should be constructed; 2) To this end, ordinary sensor node needs to receive localization services from at least five reference nodes, through which the estimation of pp, da,p  and d1,p can be guaranteed.

    Accordingly, the direct estimation of xp can be acquired by using the traditional LS estimator, which is given as

    ˆxp,direct=12(HTH)1HTQ (24)

    Similar to Section IV-A, the direct calculation of xp can lead to privacy leakage, because matrices H and Q contain the position information of anchor nodes. In order to handle this issue, a PPS and PPDP based strategy is given to indirectly calculate ˆxp,direct. Motivated by this, we denote HTH and HTQ as ˜H and ˜Q, respectively. As a result, the indirect estimation of xp can be expressed as

    ˆxp,indirect=12˜H1˜Q. (25)

    With regard to (25), the main calculation process for ordinary sensor node is detailed as follows.

    Step 1: Matrix Construction

    For the convenience of computation, we define ˜H=[H11, H12, H13; H21, H22, H23; H31, H32, H33]R5×5 and ˜Q=[Q11; Q21; Q31]R5. Referring to the definitions of H  and Q, the elements of ˜H and ˜Q are constructed as

    H11=mi=2[Di,1,p(pap1)+D2i,1,p(pipa)]×[Di,1,p(pap1)T+D2i,1,p(pipa)T]=(pap1)(pap1)Tmi=2D2i,1,p+(pap1)(pTami=2D3i,1,p+mi=2D3i,1,ppTi)+(pami=2D3i,1,p+mi=2D3i,1,ppi)(pap1)T
    +mi=2D4i,1,ppapTa+mi=2D4i,1,ppipTimi=2D4i,1,ppipTapami=2D4i,1,ppTiH12=mi=2[Di,1,p(pap1)+D2i,1,p(pipa)]×(1Di,1,p)Qi,1,p=(pap1)mi=2(1Di,1,p)Di,1,pQi,1,pmi=2(1Di,1,p)D2i,1,pQi,1,ppa+mi=2(1Di,1,p)D2i,1,pQi,1,ppiH13=mi=2[Di,1,p(pap1)+D2i,1,p(pipa)](Qi,1,p)=(pap1)mi=2(Di,1,pQi,1,p)+mi=2D2i,1,p×Qi,1,ppami=2D2i,1,pQi,1,ppiH21=HT12H31=HT13
    H22=mi=2(1Di,1,p)2Q2i,1,pH23=mi=2(1Di,1,p)Q2i,1,pH32=mi=2(1Di,1,p)Q2i,1,pH33=mi=2Q2i,1,pQ11=mi=2[Di,1,p(pap1)+D2i,1,p(pipa)]×(Q2i,1,p(1Di,1,p)2pTapapT1p1+2(1Di,1,p)pTap1+D2i,1,ppTipi)=(pap1)mi=2(Di,1,pQ2i,1,p)+(pami=2D2i,1,pQ2i,1,pmi=2D2i,1,pQ2i,1,ppi)+(pap1)(pTapa+pT1p1)×mi=2(Di,1,p)+2(pap1)pTap1mi=2Di,1,p+(pami=2D2i,1,pmi=2D2i,1,ppi)(pTapa+pT1p1)
    +2(pap1)pTa(pap1)mi=2D2i,1,p+2(pa×mi=2D2i,1,p+mi=2D2i,1,ppi)pTap1+2(pa×mi=2D3i,1,p+mi=2D3i,1,ppi)pTapa+(pap1)×(pTapami=2D3i,1,p+mi=2D3i,1,ppTipi)+2(pa×mi=2D3i,1,pmi=2D3i,1,ppi)pTap1+(papTapa×mi=2D4i,1,p+mi=2D4i,1,ppipTipi)mi=2D4i,1,ppipTapami=2D4i,1,ppapTipi
    Q31=mi=2(Qi,1,p)(Q2i,1,p(1Di,1,p)2pTapapT1p1+2(1Di,1,p)pTap1+D2i,1,ppTipi)=mi=2Q3i,1,p+(pap1)T(pap1)mi=2Qi,1,p2pTa(pap1)mi=2Di,1,pQi,1,p+(pTapami=2D2i,1,pQi,1,pmi=2D2i,1,pQi,1,ppTipi)
    Q21=mi=2[(1Di,1,p)Qi,1,p](Q2i,1,p(1Di,1,p)2pTapapT1p1+2(1Di,1,p)pTap1+D2i,1,ppTipi)=mi=2(1Di,1,p)Q3i,1,p(pap1)T(pap1)×mi=2(1Di,1,p)Qi,1,p+2pTa(pap1)×mi=2(1Di,1,p)Di,1,pQi,1,p+(pTapa×mi=2(1Di,1,p)D2i,1,pQi,1,p+mi=2(1Di,1,p)D2i,1,pQi,1,ppTipi).

    Therefore, the estimation of xp in (25) can be rewritten as

    ˆxp,indirect=12[H11H12H13H21H22H23H31H32H33]1[Q11Q21Q31]. (26)

    Step 2: PPS and PPDP Based State Calculation

    Similar to Section IV-A, the real states of active sensor node are given as ˉXa=[pa, papTa, pa, pa, pa, pa, (0;pTapa;0), papTapa, (0;pTapa;0), (0;pTapa;0)], ˉYa=[pa, (0;pTapa;0)], ˉZa=[pTa; (0,pTapa,0); diag(pa)] and ˉMa=pTa. The real states of anchor node 1 are ˉY1=[p1, (0;pT1p1;0)] and ˉM1=p1. The real states of anchor node i{2,,m} are ˉXi=[pi, pipTi, pi, pi, pi, pi, (0;pTipi;0), pipTipi, (0;pTipi;0), (0;pTipi;0)], ˉZi=[pi, pi, diag(pTipi;pTipi;pTipi)], and ˉM2=pap1.

    In order to protect the privacy of ˉXa and ˉXi, the random matrix W1,ˉiˉj is generated for node ˉi where node ˉi denotes active sensor node and anchor node i, i.e., ˉi{1,2,,m} and ˉj{1, 2,,m}. It is noted that W1,ˉia+mj=2W1,ˉiˉj=0. Then, node ˉi keeps W1,ˉiˉi and sends the rest to the other m1 nodes. By adding the received matrices to W1,ˉiˉi, a random matrix φ1ˉi can be obtained. Denote the kth column of φ1i as φ1i,k for k{1,,12}. Based on this, the disguised state of {\bar{{X}}}_{\bar{\imath}} can be represented as {\tilde{{\bar{{X}}}}_{{\rm{a}}}} = {\bar{{X}}}_{{\rm{a}}}+{{\varphi }}_{1{\rm{a}}} or {\tilde{{\bar{{X}}}}_{i}} = {\bar{{X}}}_{i}+{{K}}_{i} , where

    \begin{split} & {{K}}_{i} = \left[\dfrac{{{\varphi }}_{1i,1}}{\vartheta _{2i}}, \right. \dfrac{{{\varphi }}_{1i,2}}{\vartheta _{3i}},\dfrac{{{\varphi }}_{1i,3}}{\vartheta _{3i}}, \dfrac{{{\varphi }}_{1i,4}}{\vartheta _{3i}}, \dfrac{{{\varphi }}_{1i,5}}{\vartheta _{4i}}, \dfrac{{{\varphi }}_{1i,6}}{\vartheta _{5i}}, \\&\quad\quad \dfrac{{{\varphi }}_{1i,7}}{\vartheta _{6i}}, \dfrac{{{\varphi }}_{1i,8}}{\vartheta _{i}}, \dfrac{{{\varphi }}_{1i,9}}{\vartheta _{2i}}, \dfrac{{{\varphi }}_{1i,10}}{\vartheta _{3i}}, \dfrac{{{\varphi }}_{1i,11}}{\vartheta _{4i}}, \left. \dfrac{{{\varphi }}_{1i,12}}{\vartheta _{5i}}\right]\\& \vartheta _{i} = \frac{D_{i,1,p}^{2}}{\sum\nolimits_{i = 2}^{m}D_{i,1,p}^{2}}\qquad\vartheta _{2i} = \frac{D_{i,1,p}^{3}}{\sum\nolimits_{i = 2}^{m}D_{i,1,p}^{3}} \\& \vartheta _{3i} = \frac{D_{i,1,p}^{4}}{\sum\nolimits_{i = 2}^{m}D_{i,1,p}^{4}}\qquad \vartheta _{4i} =\frac{(1-D_{i,1,p})D_{i,1,p}^{2}Q_{i,1,p}}{\sum\nolimits_{i = 2}^{m}(1-D_{i,1,p})D_{i,1,p}^{2}Q_{i,1,p}}\\& \vartheta _{5i} = \frac{D_{i,1,p}^{2}Q_{i,1,p}}{\sum\nolimits_{i = 2}^{m}D_{i,1,p}^{2}Q_{i,1,p}} \qquad \vartheta _{6i} = \frac{D_{i,1,p}^{2}Q_{i,1,p}^{2}}{\sum\nolimits_{i = 2}^{m}D_{i,1,p}^{2}Q_{i,1,p}^{2}} \end{split}

    for i\in \{2, \ldots,m\}. Subsequently, active sensor node sends disguised state \tilde{{\bar{{X}}}}{_{{\rm{a}}}} , while anchor node i\in \{2,\ldots,m\} sends disguised state {\tilde{{\bar{{X}}}}_{i}} to the networks. Clearly, this process is based on the PPS strategy, while the real states of active sensor and anchor nodes are not revealed.

    With the similar strategy, the state {\bar{{Y}}}_{{\rm{a}}} and {\bar{{Y}}}_{1} can also be disguised, i.e., {\tilde{{\bar{{Y}}}}_{{\rm{a}}}} = {\bar{{Y}}}_{{\rm{a}}}+{{\varphi }}_{2{\rm{a}}} and {\tilde{{\bar{{Y}}}}_{\rm{1}}} = {\bar{{Y}}}_{\rm{1}}+{{\varphi }}_{21} , where {{\varphi }}_{2{\rm{a}}} and {{\varphi }}_{21} are the random noise generated by active sensor node and anchor node 1, respectively. Then, active sensor node and anchor node 1 send {\tilde{{\bar{{Y}}}}_{{\rm{a}}}} and {\tilde{{\bar{{Y}}}}_{\rm{1}}} to the networks. In order to protect the privacy of {\bar{{Z}}}_{i} for i\in \{2,\ldots,m\} , the ordinary sensor node randomly generates matrix {{\varphi }}_{3i} to anchor node i . Denote the k th column of {{\varphi }}_{3i} as {{\varphi }}_{3i,k} for k\in \{1,2,3,4,5\}. As a result, the disguised state of {\bar{{Z}}}_{i} is given as \tilde{{\bar{{Z}}}}{_{i}} = {\bar{{Z}}}_{i}+{{K}}_{3i} , where {{K}}_{3i} = \left[\frac{{{\varphi }}_{3i,1}}{\vartheta _{3i}}, \right. \frac{{{\varphi }}_{3i,2}}{\vartheta _{3i}}, \frac{{{\varphi }}_{3i,3}}{\vartheta _{3i}}, \frac{{{\varphi }}_{3i,4}}{\vartheta _{3i}}, \left. \frac{{{\varphi }}_{3i,5}}{\vartheta _{3i}}\right] for i\in \{2,\ldots,m\} . Subsequently, anchor node i sends \tilde{{\bar{{Z}}}}{_{i}} to active sensor node. Active sensor node obtains {\tilde{{\bar{{Z}}}}_{i}}{\bar{{Z}}}_{{\rm{a}}} and sends it to the networks. For clear description, calculation process of {\bar{{Z}}}_{i}{\bar{{Z}}}_{{\rm{a}}} is shown in Fig. 5(a).

    Figure  5.  Description of PPS and PPDP based state calculation.

    To protect the privacies of {\bar{{M}}}_{{\rm{a}}} , {\bar{{M}}}_{1} and {\bar{{M}}}_{2}, we construct {{L}}_{{\rm{a}}} = diag \{\log {\bar{{M}}}_{{\rm{a}}}\} , {{L}}_{1} = diag \{\log {\bar{{M}}}_{1}\} and {{L}}_{2} = diag \{\log {\bar{{M}}}_{2}\} for active sensor node, anchor nodes 1 , 2 , respectively. This process is named as PPDP, because the adoption of multiplication. Then, the ordinary sensor node generates two random matrices {{\varsigma }}_{1} and {{\varsigma }}_{2} with the same size as {{L}}_{1} and sends them to active sensor node. The active sensor node calculates {{U}}_{11} = {{L}}_{{\rm{a}}}+{{\varsigma }}_{1} and {{U}}_{12} = {{L}}_{{\rm{a}}}+{{\varsigma }}_{2}, and then sends them to the anchor nodes 1 and 2, respectively. After, anchor node 1 calculates {{U}}_{2} = {{U}}_{11}+{{L}}_{1} and sends it to ordinary sensor node. Meanwhile, anchor node 2 calculates {{U}}_{3} = {{U}}_{12}+{{L}}_{2} and sends it to ordinary sensor node. The ordinary sensor node retrieves the logarithm matrix by subtracting {{\varsigma }}_{1} and {{\varsigma }}_{2} , i.e., {{U}}_{2}-{{\varsigma }}_{1} = {{L}}_{{\rm{a}}}+{{L}}_{1} = diag\{\log {\bar{{M}}}_{{\rm{a}}}{\bar{{M}}}_{1}\} and {{U}}_{3}-{{\varsigma }}_{2} = {{L}}_{{\rm{a}}}+{{L}}_{2} = diag \{\log {\bar{{M}}}_{{\rm{a}}}{\bar{{M}}}_{2}\}. Through the exponential transform, the values of {\bar{{M}}}_{{\rm{a}}}{\bar{{M}}}_{1} and {\bar{{M}}}_{{\rm{a}}}{\bar{{M}}}_{2} can be obtained. This process can be described by Fig. 5(b).

    Step 3: Calculation of {\tilde{{H}}} and {\tilde{{Q}}}

    According to (26), the values of {{H}}_{11} , {{H}}_{12} , {{H}}_{13} , {{H}}_{21} , {{H}}_{31} , H_{32} , {{Q}}_{11} , Q_{21} and Q_{31} can be obtained through {\tilde{{\bar{{X}}}}_{{\rm{a}}}} , {\tilde{{\bar{{X}}}}_{i}} , {\tilde{{\bar{{Y}}}}_{{\rm{a}}}} , {\tilde{{\bar{{Y}}}}_{\rm{1}}} , {\tilde{{\bar{{Z}}}}_{i}}{\bar{{Z}}}_{{\rm{a}}} , {{U}}_{2} and {{U}}_{3} . Meanwhile, the values of H_{22} , H_{23} , H_{32} and H_{33} can be directly acquired, because D_{i,1,{\rm{p}}} and Q_{i,1,{\rm{p}}} are pre-known. Accordingly, the values of {\tilde{{H}}} and {\tilde{{Q}}} are calculated, and more importantly, the privacy can be protected.

    Step 4: Position Estimation

    Based on Step 3, {{x}}_{{\rm{p}}} in (26) can be easily estimated, i.e., the position of ordinary sensor node can be located under asynchronous clock and privacy preservation.

    In the above sections, the proposed privacy preserving algorithms need cooperation among nodes, and require each node to be honest. However, underwater nodes are usually deployed in harsh and open environments, making them extremely vulnerable to security attack. For instance, an attacker can cause nodes to have imprecise locations, which leads to the dishonesty of nodes. To cope with this issue, we present the consequence when there exist dishonest nodes.

    Without loss of generality, it is assumed that all the nodes are honest in the first localization interval, i.e., [T_{\rm{a,a}}, \delta \alpha _{{\rm{a}}}] for the active sensor node and [T_{\rm{a,p}}, \delta \alpha _{{\rm{p}}}] for the ordinary sensor node. As a result, from (4), the position vector of active sensor node at timestamp T_{\rm{a,a}}^{{\#}} can be predicted as

    {{p}}_{T_{\rm{a,a}}^{{\#}}} = {{p}}_{{\rm{a}}}+\delta \alpha _{{\rm{a}}}\sum\limits_{m_{{\rm{a}}} = 0}^{n_{{\rm{a}}}^{\#}}{{v}}_{{\rm{a}}}({\vec{T}}_{\rm{a,a}}). (27)

    By employing the PPS-based localization algorithm in Section IV-A, the position of active sensor node at timestamp T_{\rm{a,a}}^{{\#}} can be estimated as {\tilde{{p}}}_{T_{\rm{a,a}}^{{\#}}}. Thereby, the difference between {{p}}_{T_{\rm{a,a}}^{{\#}}} and {\tilde{{p}}}_{T_{\rm{a,a}}^{{\#}}} can be given as e _{{\rm{a}}}(T_{\rm{a,a}}^{{\#}}) = \left\vert {{p}}_{T_{\rm{a,a}}^{{\#}}}-{\tilde{{p}}}_{T_{\rm{a,a}}^{{\#}}}\right\vert .

    Similarly, from (5), the position vector of ordinary sensor node at timestamp T_{\rm{a,p}}^{{\#}} can be predicted as

    {{p}}_{T_{\rm{a,p}}^{{\#}}} = {{p}}_{{\rm{p}}}+\delta \alpha _{{\rm{p}}}\sum\limits_{m_{{\rm{p}}} = 0}^{n_{{\rm{p}}}^{\#}}{{v}}_{{\rm{p}}}({\vec{T}}_{\rm{a,p}}). (28)

    With the PPS-based localization algorithm in Section IV-B, the position of ordinary sensor node at timestamp T_{\rm{a,p}}^{{\#}} can be estimated as {\tilde{{p}}}_{T_{\rm{a,p}}^{{\#}}}. Accordingly, the difference between {{p}}_{T_{\rm{a,p}}^{{\#}}} and {\tilde{{p}}}_{T_{\rm{a,p}}^{{\#}}} can be given as e _{{\rm{p}}}(T_{\rm{a,p}}^{{\#}}) = \left\vert {{p}}_{T_{\rm{a,p}}^{{\#}}}-{\tilde{{p}}}_{T_{\rm{a,p}}^{{\#}}}\right\vert .

    In the following, let {\vec{\rho}} denote the threshold of e _{{\rm{a}}}(T_{{\rm{a,a}}}^{{\#}}), where {\vec{\rho}} is dependent on the accuracy requirement for the localization system. Particularly, when the condition of e _{{\rm{a}}}(T_{\rm{a,a}}^{{\#}})>{\vec{\rho}} and e_{{\rm{p}}}(T_{\rm{a,p}}^{{\#}})>{\vec{\rho}} holds, the nodes in USNs can be considered to be dishonest, otherwise the nodes are dishonest. In order to show more clearly, Fig. 6 is presented to depict the consequence when there exist dishonest nodes.

    Figure  6.  Depiction of consequence when there exist dishonest nodes.

    We first investigate the equivalences of estimators (12) and (25). Then, the following theorems are given.

    Theorem 1: Consider the linear LS problem for active sensor node, as described in (10). By applying the PPS-based asynchronous localization algorithm, the indirect estimation {\hat{{X}}}_{ {\rm{a,indirect}} } in (12) is equivalent to the one in (11).

    Proof: It is noted that, {{A}}_{11} , {{A}}_{12}, {{A}}_{21}, {{B}}_{11} , {{B}}_{12} and B_{21} can be derived from {\tilde{{X}}}_{i} , {\tilde{{Y}}}_{i} and {\tilde{{Z}}}_{i}. Specially,

    \begin{split} & [{{A}}_{12},{{B}}_{12},(0;B_{21};0)] \\ & \quad ={\tilde{{Z}}}_{1}\sum\limits_{i = 2}^{m}{\rm{{\small diag}}}\{{\small \Upsilon }_{i,1},{\small \Upsilon }_{i,1}^{2},{\small \Upsilon }_{i,1}\} {\small +}\sum\limits_{i = 2}^{m}{\tilde{{Z}}}_{i}{\rm{{\small diag}}}\{ {\small \Upsilon }_{i,1},{\small \Upsilon }_{i,1}^{2},{\small \Upsilon }_{i,1}\} \\ & \quad={{Z}}_{1}\sum\limits_{i = 2}^{m}{\rm{{\small diag}}}\{{\small \Upsilon }_{i,1},{\small \Upsilon }_{i,1}^{2},{\small \Upsilon }_{i,1}\}{\small +}\sum\limits_{i = 2}^{m}{{Z}}_{i}{\rm{{\small diag}}}\{{\small \Upsilon }_{i,1},{\small \Upsilon }_{i,1}^{2},{\small \Upsilon }_{i,1}\} \\ & \quad \quad+{{\delta }}_{31}\sum\limits_{i = 2}^{m}{\rm{\small diag}}\{{\small \Upsilon }_{i,1},{\small \Upsilon }_{i,1}^{2},{\small \Upsilon }_{i,1}\}{\small +}\sum\limits_{i = 2}^{m}{{W}}_{i}{\rm{{\small diag}}}\{{\small \Upsilon }_{i,1},{\small \Upsilon }_{i,1}^{2},{\small \Upsilon }_{i,1}\}. \end{split}

    As {{\delta }}_{31}\sum\nolimits_{i = 2}^{m} diag ({\small \Upsilon }_{i,1} , {\small \Upsilon }_{i,1}^{2} , {\small \Upsilon }_{i,1})+\sum\nolimits_{i = 2}^{m}{{W}}_{i} diag ({\small \Upsilon }_{i,1} , {\small \Upsilon }_{i,1}^{2} , {\small \Upsilon }_{i,1}) = {{0}}, the value of [{{A}}_{12},{{B}}_{12},(0;B_{21};0)] is equivalent to the direct calculation, i.e., {{A}}_{12}, {{B}}_{12}\ and B_{21} can be correctly calculated. Applying this implementation to the other elements, one has [{{A}}_{11},{{B}}_{11}] = \sum\nolimits_{i = 1}^{m}{\tilde{{Y}}}_{i} = \sum\nolimits_{i = 1}^{m}{{Y}}_{i}+\sum\nolimits_{i = 1}^{m}{{\delta }}_{2i} = \sum\nolimits_{i = 1}^{m}{{Y}}_{i} because \sum\nolimits_ {i = 1}^{m}{{\delta }}_{2i} = {{0}}. Then, it is known that {{A}}_{11}\ and {{B}}_{11} can be correctly calculated.

    It is noticed that the values of A_{22} and B_{22} can be computed directly by \Upsilon _{i,1}. Moreover, one has {{A}}_{21} = {{A}}_{12}^{{T}}. Thereby, the values of {{A}}_{11} , {{A}}_{12}, {{A}}_{21}, A_{22}, {{B}}_{11} , {{B}}_{12} , B_{21} and B_{22} are equivalent to the direct calculation. Therefore, we can know {\hat{{X}}}_{\rm{a,indirect}} is equivalent to {\hat{{X}}}_{\rm{a,direct}} . ■

    Theorem 2: Consider the linear LS problem for ordinary sensor node, as shown in (23). By applying PPS and PPDP based asynchronous localization algorithm, estimation {\hat{{X}}}_{ {\rm{p,indirect}} } in (25) is equivalent to the one in (24).

    Proof: Referring to the elements of {{H}}_{11}, we know that the matrix {{p}}_{{\rm{a}}}-{{p}}_{1} can be obtained from {\tilde{{\bar{{Y}}}}_{{\rm{a}}}}+{\tilde{{\bar{{Y}}}}_{\rm{1}}.} Because of {{\varphi }}_{2{\rm{a}}}+{{\varphi }}_{21} = {{0}} , one has {\tilde{{\bar{{Y}}}}_{{\rm{a}}}}+{\tilde{{\bar{{Y}}}}_{\rm{1}} = }{\bar{{Y}}}_{{\rm{a}}}+{{\varphi }}_{2{\rm{a}}}+{\bar{{Y}}}_{1}+{{\varphi }}_{21} = {\bar{{Y}}}_{{\rm{a}}}+{\bar{{Y}}}_{1}, i.e., {{p}}_{{\rm{a}}}-{{p}}_{1} can be correctly calculated.

    Next, we study the other elements of {{H}}_{11}. Clearly, -{{p}}_{{\rm{a}}}\sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{3}+\sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{3}{{p}}_{i} and \sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4}{{p}}_{{\rm{a}}}{{p}}_{{\rm{a}}}^{{T}} +\sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4} {{p}}_{i}{{p}}_{i}^{{T}} can be obtained from {\tilde{{\bar{{X}}}}_{{\rm{a}}}} and {\tilde{{\bar{{X}}}}_{i}} for i\in \{2,\ldots,m\}. According to Step 2 in Section IV-B, we have

    \begin{split} & \left[ \sum\limits_{i = 2}^{m}{\small D}_{i,1,{\rm{p}}}^{3}{{p}}_{i}{\small -}{{p}}_{{\rm{a}}}\sum\limits_{i = 2}^{m}{\small D}_{i,1,{\rm{p}}}^{3},\sum\limits_{i = 2}^{m}{\small D}_{i,1,{\rm{p}}}^{4}({{p}}_{\rm{a}}{{p}}_{{\rm{a}}}^{{T}}{\small +}{{p}}_{i}{{p}}_{i}^{{T}})\right] \\ & \quad = \tilde{{\bar{{X}}}}_{{\rm{a}}}(:,1{\small :}{4)\sum \limits_{i = 2}^{m}}{\rm{diag}}\{D_{i,1,{\rm{p}}}^{3},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4}\} \\ &\quad\quad +\sum\limits_{i = 2}^{m}{\tilde{{\bar{{X}}}}_{i}(:,1{\small :}4)}{\rm{diag}}\{D_{i,1,{\rm{p}}}^{3},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4}\} \\ & \quad = {\bar{{X}}}_{{\rm{a}}}(:,1{\small :}4){\sum\limits_{i = 2}^{m}}{\rm{diag}}\{D_{i,1,{\rm{p}}}^{3},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4}\} \\ &\quad\quad +\sum\limits_{i = 2}^{m}{\bar{{X}}}_{i}(:,1{\small :}4){\rm{diag}}\{D_{i,1,{\rm{p}}}^{3},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4}\} \\ &\quad\quad +{{\varphi }}_{1{\rm{a}}}(:,1{\small :}4){\sum\limits_{i = 2}^{m}}{\rm{diag}}\{D_{i,1,{\rm{p}}}^{3},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4}\} \\ &\quad\quad +\sum\limits_{i = 2}^{m}{{K}}_{i}(:,1{\small :}4){\rm{diag}}\{D_{i,1,{\rm{p}}}^{3},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4},D_{i,1,{\rm{p}}}^{4}\}.\end{split}

    It is noted that, {{\varphi }}_{1{\rm{a}}}(:,1:4){\sum\nolimits_{i = 2}^{m}} diag \{(D_{i,1,{\rm{p}}}^{3}, {D_{i,1,{\rm{p}}}^{4},} {D_{i,1,{\rm{p}}}^{4},} {D_{i,1,{\rm{p}}}^{4})}\}+\sum\nolimits_{i = 2}^{m}{{K}}_{i}(:,1:4) diag {(D_{i,1,{\rm{p}}}^{3}} , {D_{i,1,{\rm{p}}}^{4},} {D_{i,1,{\rm{p}}}^{4},} {D_{i,1,{\rm{p}}}^{4})} = {{0}}{.} Then, -{{p}}_{{\rm{a}}}\sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{3}+\sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{3}{{p}}_{i} and \sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4}{{p}}_{{\rm{a}}}{{p}}_{{\rm{a}}}^{T} +\sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4} {{p}}_{i}{{p}}_{i}^{T} can be correctly calculated. Moreover, the last element of {{H}}_{11} , i.e., \sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4}{{p}}_{i}{{p}}_{{\rm{a}}}^{T}, can be obtained from {\tilde{{\bar{{Z}}}}_{i}}{\bar{{Z}}}_{1} for i\in \{2,\ldots,m\} . Because \sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4}{{K}}_{3i}(:,1){\bar{{Z}}}_{1}(:,1) = {{0}}, one has \sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4}{{p}}_{i}{{p}}_{{\rm{a}}}^{T} = \sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4}{\tilde{{\bar{{Z}}}}_{i}(:,1)}{\bar{{Z}}}_{1}(:,1) = \sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4}{\bar{{Z}}}_{i}(:,1){\bar{{Z}}}_{1}(:,1). Based on this, we know \sum\nolimits_{i = 2}^{m}D_{i,1,{\rm{p}}}^{4}{{p}}_{i}{{p}}_{{\rm{a}}}^{T} can be correctly calculated.

    Based on this, we know {{H}}_{11} can be correctly calculated. Applying this implementation to the other parts, the values of {{H}}_{12} , {{H}}_{13} , {{H}}_{21} , {{H}}_{31} , {{Q}}_{11} , Q_{21} and Q_{31} can be correctly acquired. As H_{22} , H_{23} , H_{32} and H_{33} are pre-known, {\hat{{x}}}_{\rm{p,indirect}} in (25) is equivalent to {\hat{{x}}}_{\rm{p,direct}} in (24). ■

    In the following, we investigate the level of privacy preservation for the proposed localization algorithms. To support our conclusion, the following definition is provided.

    Definition 1 [19]: For node {\cal{A}} , it needs extra information to construct at least N_{{\rm{p}}} independent equations to estimate the private position of node {\cal{B}} . Then, node {\cal{B}} can preserve \{N_{{\rm{p}}}\} -privacy to node {\cal{A}} , where N_{{\rm{p}}} = N_{\rm{scal}}-N_{\rm{eq}} . Of note, N_{\rm{scal}} denotes the number of unknown scalar variables in the private information of node {\cal{B}} , and N_{\rm{eq}} is maximum number of independent equations that node {\cal{A}} can construct.

    Based on Definition 1, we have the following Theorem.

    Theorem 3: With the LS estimator (12), the PPS-based asynchronous localization algorithm for active sensor node can guarantee the following levels of privacy preservation: 1) To anchor node 1, the active sensor node can preserve \{3\} -Privacy while anchor node i\in \{2,\ldots,m\} can preserve \{3m-7\} -privacy; 2) To anchor node i\in\{2,\ldots,m\} , the active sensor node and anchor node j\in \{1,\ldots,m\}/\{i\} can preserve \{3m-2\} -privacy; 3) To active sensor node, if m>{15}/{2}, anchor node i\in \{1,\ldots,m\} can preserve \{3m-(15+m)\} -privacy.

    Proof: For anchor node 1, we have the values of \sum\nolimits_{i = 2}^{m}{{p}}_{i} and \sum\nolimits_{i = 2}^{m}{{p}}_{i}^{{T}}{{p}}_{i} , where the number of independent equations is at most 4 and the number of unknown scalar variables is 3(m-1) . Particularly, anchor node 1 has no information about active sensor node . With regard to this case, active sensor node can preserve \{3\} -privacy to anchor node 1. Since 3(m-1)>4 always holds, anchor node 1 is unable to know the other anchor nodes’ locations. As a result, anchor node i\in \{2,\ldots,m\} can preserve \{3(m-1)-4\} -privacy to anchor node 1, which implies the statement 1) holds.

    For anchor node i\in \{2,\ldots,m\}, it only has the range difference ratios \gamma _{i} and \gamma _{2i} , which can construct at most 2 independent equations. The number of unknown scalar variables to anchor node i\in \{2,\ldots,m\} is 3m. Thereby, the locations of active sensor node and anchor node j\in \{1,\ldots,m\}/\{i\} can be protected since 3m>2 holds. Thus, statement 2) holds.

    For active sensor node, the available information includes: range difference \Upsilon _{i,1} , i\in \{2,\ldots,m\} , {{A}}_{11} , {{A}}_{12} , {{A}}_{21} , {{B}}_{11} , {{B}}_{12} and B_{21} . Clearly, {{A}}_{11} is a symmetric matrix, and then active sensor node can construct at most 6 independent equations. For \Upsilon _{i,1} , {{A}}_{12} , {{B}}_{11} , {{B}}_{12} and B_{21} , the maximum numbers of independent equations that active sensor node can construct are m-1 , 3 , 3 , 3 and 1 , respectively. Accordingly, the total number of independent equations is at most 15+m. The number of the unknown scalars to active sensor node is 3m . Then, the active sensor node cannot know anchor nodes’ locations when the condition of m>{15}/{2} holds . That means anchor node i\in \{1,\ldots,m\} can preserve \{3m-(15+m)\} -privacy, i.e, the statement 3) holds. ■

    In addition, we investigate the level of privacy preservation for the PPS and PPDP based localization algorithm.

    Theorem 4: Consider the LS estimator (25), we have the following levels of privacy preservation: 1) To active sensor node, ordinary sensor node can preserve \{3\} -privacy while anchor node i\in \{1,\ldots,m\} can preserve \{3m\} -privacy; 2) To anchor node 1, ordinary sensor node can preserve \{3\} -privacy while active sensor node and anchor node j\in \{2,\ldots,m\} can preserve \{3m\} -privacy; 3) To anchor node 2, ordinary sensor node, active sensor node and anchor node j\in \{1,\ldots,m\}/\{2\} can preserve \{3(m+1)-9\} -privacy; 4) To anchor node i\in \{3,\ldots,m\} , ordinary sensor node, active sensor node and anchor node j\in \{1,\ldots,m\}/\{i\} can preserve \{3(m+1)-6\} -privacy; 5) To ordinary sensor node, if m>12 , anchor node i can preserve \{3(m+1)-(2m+15)\} -privacy.

    Proof: For active sensor node, the location information of anchor node i\in \{1,\ldots,m\} and ordinary sensor node is not available. Thereby, ordinary sensor node can preserve \{3\} -privacy and anchor node i\in \{1,\ldots,m\} can preserve \{3m\} -privacy. Thus, statement 1) holds. The proof of statement 2) is similar to the one of statement 1), thus it is omitted.

    For anchor node 2, we know the values of {{p}}_{{\rm{a}}}-{{p}}_{1} , \vartheta _{3} , \vartheta _{23} , \vartheta _{33} , \vartheta _{43} , \vartheta _{53} and \vartheta _{63} . Based on this, at most 9 independent equations can be constructed. It is worth mentioning that, the number of unknown scalar variables to anchor node 2 is 3(m+1) . Thereby, the locations of ordinary sensor node, active sensor node and anchor node j\in \{1,\ldots,m\}/\{2\} can be protected since 3(m+1)>9 always holds. Therefore, the statement 3) holds. The proof of statement 4) is similar to the one of statement 3), and hence it is omitted.

    For ordinary sensor node, the available information includes: D_{i,1,{\rm{p}}} , Q_{i,1,{\rm{p}}} , i\in \{2,\ldots,m\} , {{H}}_{11} , {{H}}_{12} , {{H}}_{13} , {{H}}_{21} , {{H}}_{31} , {{Q}}_{11} , Q_{21} and Q_{31} . Clearly, {{H}}_{11} is a symmetric matrix. Thus, the ordinary sensor node can construct at most 6 independent equations. For D_{i,1,{\rm{p}}} , Q_{i,1,{\rm{p}}} , {{H}}_{12} , {{H}}_{13} , {{Q}}_{11} , Q_{21} and Q_{31} , the maximum numbers of linear equations that ordinary sensor node can construct are given as m-1 , m-1 , 3 , 3 , 3 , 1 and 1 , respectively. Accordingly, the total number of independent equations is at most 2m+15. Since the number of the unknown scalars to ordinary sensor node is 3(m+1) , the ordinary sensor node cannot know the location of anchor nodes when the condition m>12 holds. That means anchor node i\in \{1,\ldots,m\} can preserve \{3(m+1)-(2m+15)\} -privacy, i.e, the statement 5) holds. ■

    Corollary 1: Let us define \epsilon = (d_{ {{\rm{a}}} ,i}-d_{ {\rm{a}} ,j}-d_{j,i})/ c -t_{ {\rm{r,}} j} , \epsilon _{1} = (d_{ {\rm{a,p}} }-d_{ {\rm{a}} ,j}-d_{j, {{\rm{p}}} })/c -t_{ {\rm{r,}} j} , \epsilon _{2} = (d_{j {\rm{,p}} }-d_{j,i}-d_{i {\rm{,p}} })/ c -t_{ {\rm{r}} ,i} , and \epsilon _{3} = (d_{ {\rm{a}} ,j}-d_{j,i}-d_{ {\rm{a,}} i})/c-t_{ {\rm{r}} ,i} . For i\in \{1,\ldots m\} and j\in \{1,\ldots, i-1\}, packet collision can be avoided if t_{j,j}-t_{ {\rm{a}} ,j}>\max \{\epsilon,\epsilon _{1}\} and t_{i,i}-t_{j,i}>\max \{\epsilon _{2},\epsilon _{2}\} are both satisfied.

    Proof: To start with, the time difference when anchor node i receives packet from active sensor node and anchor node j is denoted as \Delta _{j,i}, the time difference when ordinary sensor node receives packet from active sensor node and anchor node j is denoted as \Delta _{j,{\rm{p}}}, the time difference when ordinary sensor node receives packet from anchor node j and anchor node i is denoted as \Delta _{i,{\rm{p}}}, while the time difference when active sensor node receives packet from anchor node j and anchor node i is denoted as \Delta _{i,{\rm{a}}} . According to these definitions and noting Fig. 2, the following relationship can be obtained, i.e.,

    \begin{split} & \Delta _{j,i} = t_{j,i}-t_{{\rm{a}},i},\;\;\;\;\;\;\Delta _{j,{\rm{p}}} = T_{j, {\rm{p}}}-T_{\rm{a,p}} \\ &\Delta _{i,{\rm{p}}} = T_{i,{\rm{p}}}-T_{j{\rm{,p}}},\;\Delta _{i, {\rm{a}}} = T_{i,{\rm{a}}}-T_{j{\rm{,a}}}. \end{split} (29)

    From Fig. 2, one can infer that the conditions of preventing packet collision are \Delta _{j,i}>0 , \Delta _{j,{\rm{p}}}>0 , \Delta _{i,{\rm{p}}}>0 , and \Delta _{i,{\rm{a}}}>0 . To this end, we rearrange (29) as

    \begin{split} &\Delta _{j,i} = \tau _{{\rm{a}},j}+(t_{j,j}-t_{{\rm{a}},j})+t_{{\rm{r,}}j}+\tau _{j,i}-\tau _{{\rm{a,}}i}>0 \\ &\Delta _{j,{\rm{p}}} = \tau _{{\rm{a}},j}+(t_{j,j}-t_{{\rm{a}},j})+t_{{\rm{r,}}j}+\tau _{j,{\rm{p}}}-\tau _{\rm{a,p}}>0 \\ &\Delta _{i,{\rm{p}}} = \tau _{j,i}+(t_{i,i}-t_{j,i})+t_{{\rm{r,}}i}+\tau _{i,{\rm{p}}}-\tau _{j,{\rm{p}}}>0 \\ &\Delta _{i,{\rm{a}}} = \tau _{j,i}+(t_{i,i}-t_{j,i})+t_{{\rm{r,}}i}+\tau _{{\rm{a}},i}-\tau _{{\rm{a}},j}>0 \end{split} (30)

    which yields

    \begin{split} & t_{j,j}-t_{{\rm{a}},j} >\dfrac{(d_{{\rm{a}},i}-d_{{\rm{a}},j}-d_{j,i})}{c}-t_{{\rm{r,}}j} \\ & t_{j,j}-t_{{\rm{a}},j} >\dfrac{(d_{\rm{a,p}}-d_{{\rm{a}},j}-d_{j,{\rm{p}}})}{c}-t_{{\rm{r}},j} \\ & t_{i,i}-t_{j,i} >\dfrac{(d_{j{\rm{,p}}}-d_{j,i}-d_{i{\rm{,p}}})}{c}-t_{{\rm{r}},i}\\ &t_{i,i}-t_{j,i} >\dfrac{(d_{{\rm{a}},j}-d_{j,i}-d_{{\rm{a,}}i})}{c}-t_{{\rm{r}},i}. \end{split} (31)

    Clearly, if t_{j,j}-t_{{\rm{a}},j}>\max \{\epsilon ,\epsilon _{1}\} and t_{i,i}-t_{j,i}>\max \{\epsilon _{2},\epsilon _{2}\} are both satisfied, the inequality (31) holds. ■

    In this section, we analyse the communication overhead of the proposed localization algorithms. Referring to [18], one knows the communication overhead is evaluated by the transmission of elements. Meanwhile, it is easy to see that the communication overhead of PPS-based localization algorithm for active sensor node is dominated by the state calculation in Step 2. Similarly, the communication overhead of PPS and PPDP based localization algorithm for ordinary sensor node is also dominated by the state calculation in Step 2. Accordingly, the transmission of elements of localization algorithm for active sensor node can be calculated as

    \begin{split} &\begin{array}{c} \Psi _{{\rm{a}}} = \underbrace{ \ 6(m-1)(m-2)+6(m-1)\ } \\ {{{\rm{\rm{\; elements \;of \;calculating}}}\sum\limits_{i = 2}^{m}{{X}}_{i}}}\end{array} \\ & \quad\quad\begin{array}{c}+ \underbrace{{ \ \ \ }12m(m-1)+12m \ \ \ \ } \\ {{{\rm{\rm{\; elements \;of \;calculating}}}\sum\limits_{i = 1}^{m}{{Y}}_{i}}}\end{array} \\ & \quad\quad\begin{array}{c}+ \underbrace{ \ 2(m-1)+9m(m-1)+9m \ } \\ {{{\rm{\rm{\; elements \;of \;calculating}}}\ {{Z}}_{i}}}\end{array} \\ &\quad= 27m^{2}-10m+4. \end{split} (32)

    Similarly, the transmission of elements of localization algorithm for ordinary sensor node can be calculated as

    \begin{split} & \begin{array}{c}\Psi _{{\rm{p}}} = \underbrace{ \ 36m(m-1)+6(m-1)+36m \ } \\ {{{\rm{\;elements \;of \;calculating}} \;{\bar{{X}}}_{{\rm{a}}}\;{ \rm{\small\;and} }\;{\bar{{X}}}_{i}}}\end{array} \\ & \quad \begin{array}{c}+ \underbrace{{ \ \ \ \ \ \ \ }6\times 2+6\times 2{ \ \ \ \ \ \ \ \ }} \\ {{{\rm{\;elements \;of \;calculating }}\;{\bar{{Y}}}_{{\rm{a}}}\;{\rm {and}} \;{\bar{{Y}}}_{1}}}\end{array} \\ & \quad\quad \begin{array}{c}+ \underbrace{{ \ \ \ }15(m-1)+15(m-1)+9 \ } \\ {{{\rm{\;elements \;of \;calculating}}\;{\tilde{{\bar{{Z}}}}_{i}}{\bar{{Z}}}_{{\rm{a}}}}}\end{array} \\ & \quad\;\; \begin{array}{c}+ \underbrace{{ \ \ \ \ \ \ \ \ }3\times 3\times 3{ \ \ \ \ \ \ \ \ \ \ \ \ }} \\ {{{\rm{\rm{\small\; elements \;of\; calculating}}}{{\ }}{\bar{{M}}}_{{\rm{a}}}{\bar{{M}}}_{1}}}\end{array} \\ & \quad\;\; \begin{array}{c}+ \underbrace{{ \ \ \ \ \ \ \ \ }3\times 3\times 3{ \ \ \ \ \ \ \ \ \ \ \ \ }} \\ {{{\rm{\;elements\; of \;calculating}}{{\ }}{\bar{{M}}}_{{\rm{a}}}{\bar{{M}}}_{2}}}\end{array} \\ &\quad = 36m^{2}+36m+51. \end{split} (33)

    In this section, the simulations are implemented on MATLAB 2017b. Initially, ten active sensor nodes and ten ordinary sensor nodes are randomly deployed in an area of 600\;{\rm m} \times 600\;{\rm m}\times 600\;{\rm m} , as depicted in Fig. 7. It is designed that anchor nodes can efficiently communicate with active and ordinary sensor nodes, i.e., data packets during the communication process can be successfully received and decoded. In addition, some parameters used for the simulation are given as: \sigma _{\rm{mea}} = 0.001 , m = 8 , \ {\vec{\rho}} = 20 m, and c = 1500 m/s.

    Figure  7.  Deployment of anchor and sensor nodes, where the circle (i.e., \bigcirc ), rectangle (i.e., \square ) and star (i.e., \bigstar ) denote the active sensor node, ordinary sensor and anchor node, respectively.

    1) Equivalence Between Our Method and Traditional Method

    It is noted that, the privacy preservation is employed into the asynchronous localization of USNs, through which PPS and PPDP based localization algorithms are designed to hide privacy information. To verify the effectiveness of the proposed localization algorithms, the actual and localized positions of active sensor node (labelled as “1”) are shown in Fig. 8(a). In this figure, the traditional LS method refers to the estimation in (11), where the privacy preservation of anchor nodes is not considered. For clear description, the localization error of active sensor node is defined as err _{1} = \left\Vert {{p}}_{{\rm{a}}}-{\hat{{p}}}_{{\rm{a}}}\right\Vert . Correspondingly, the localization errors are shown in Fig. 8(b). From Figs. 8(a) and 8(b), we can see the localization accuracies obtained by PPS-based asynchronous localization algorithm and traditional LS algorithm are completely the same. This result verifies the effectiveness of Theorem 1.

    Figure  8.  Equivalence evaluation of positions and location errors for sensor nodes.

    Similarly, the actual and localized positions of ordinary sensor node (labelled as “2”) are also shown in Fig. 8(a). Define the localization error of ordinary sensor node as err _{2} = \left\Vert {{p}}_{{\rm{p}}}-{\hat{{p}}}_{{\rm{p}}}\right\Vert , then localization errors with the two methods are presented in Fig. 8(c). Clearly, localization accuracies obtained by PPS and PPDP-based asynchronous localization algorithm are coincided with the ones by traditional LS estimation (24). This result verifies the effectiveness of Theorem 2.

    2) Comparison With Synchronous Localization Algorithm

    In [19], the authors adopted PPS into TDOA-based localization, where the target sends localization request to anchor nodes. However, the TDOA-based localization method in [19] can achieve localization task only in the case of synchronized clock, i.e., \alpha _{{\rm{a}}} = 1 (\alpha _{{\rm{p}}} = 1) and \beta _{{\rm{a}}} = 0 (\beta _{{\rm{p}}} = 0) . To verify this judgement, we consider the following two scenarios for ordinary sensor node: 1) \alpha _{{\rm{p}}} = 1 and \beta _{{\rm{p}}} = 0 ; 2) \alpha _{{\rm{p}}}\neq 1 and \beta _{{\rm{p}}}\neq 0. Based on this, the actual and localized positions of ordinary sensor node in Scenario 1 are shown in Fig. 9(a), and the localization errors are presented in Fig. 9(b). Clearly, the localization task can be achieved for ordinary node under two methods, since the location errors are both confined into a desired bound. Under the same assumption, the clock skew is set as \alpha _{{\rm{p}}} = 1.02 while the clock offset is set as \beta _{{\rm{p}}} = 0.5 s for Scenario 2. Correspondingly, the actual and localized positions of ordinary sensor node are shown in Fig. 9(c), while the localization errors are shown in Fig. 9(d). Clearly, the asynchronous clocks seriously affect the localization accuracy and the localization task is not achieved by the method in [19]. Through this comparison, one obtains the consideration of asynchronous clocks is necessary in the case of sensor nodes achieving location task passively.

    Figure  9.  Comparison with synchronous localization algorithm, e.g., [19].

    3) Comparison With Asynchronous Localization Algorithm

    To remove the influence of asynchronous clocks, an asynchronous localization algorithm based on iterative least squares estimators was presented in [13], where the clock skew was ignored, i.e., \alpha _{{\rm{a}}} = 1 and \alpha _{{\rm{p}}} = 1 . In addition, the location privacy of anchor nodes is not considered in [13]. In the following, we ignore the clock skew, through which the asynchronous localization algorithm in [13] and the proposed algorithm are both conducted to locate sensor nodes under the same assumption. Then, the positions and localization errors of sensor nodes are presented in Fig. 10(a) and Fig. 10(b), respectively. It is obvious that the localization task can be achieved without clock skew under two methods. In the following, we consider a general case, i.e., \alpha _{{\rm{a}}}\neq 1 and \alpha _{{\rm{p}}}\neq 1. Specially, the clock skews are set as \alpha _{{\rm{a}}} = 1.03 and \alpha _{{\rm{p}}} = 1.02, while the clock offsets are set as \beta _{{\rm{a}}} = 0.1 s and \beta _{{\rm{p}}} = 0.5 s. Based on this, the localized positions of active sensor node are shown in Fig. 10(c), and the localization errors are given in Fig. 10(d). Meanwhile, the localized positions of ordinary sensor node are shown in Fig. 10(e), whose localization errors are given in Fig. 10(f). From Figs. 10(c)-(f), one knows the clock skew reduces the localization accuracy. Alternatively, the proposed algorithm can eliminate the effect of clock offset and clock skew. Thereby, the position task can be achieved. Through the above comparisons, we obtain that the consideration of clock skew is necessary, and the proposed asynchronous localization algorithm in this paper can effectively eliminate the impact of the clock skew.

    Figure  10.  Comparison with asynchronous localization algorithm, e.g., [13]

    4) Performance for the Mobility Compensation Strategy

    As provided in Section III-B, a mobility compensation strategy is developed to balance the tradeoff between communication cost and localization accuracy. To verify the effectiveness, the measurement window T_{\rm{w}} and sampling interval \delta are set as 4 s and 1 s, respectively. Of note, the clock skew \alpha _{{\rm{a}}} (or \alpha _{{\rm{p}}} ) is estimated by the located positions at timestamps T_{\rm{a,a}} (or T_{\rm{a,p}} ) and T_{\rm{a,a}}^{{\#}} (or T_{\rm{a,p}}^{{\#}} ) . Thus, the clock skew \alpha _{{\rm{a}}} (or \alpha _{{\rm{p}}} ) in the first measurement window cannot be estimated, due to the lack of position information (i.e., {{p}}_{{\rm{a}}}^{{\#}} or {{p}}_{{\rm{p}}}^{{\#}} ). In view of this, the clock skew \alpha _{{\rm{a}}} (or \alpha _{{\rm{p}}} ) in the first measurement window is set as 1 . Accordingly, the localization errors of an active sensor node and an ordinary sensor node in three measurement windows are shown in Fig. 11(a) and Fig. 11(b), respectively. Correspondingly, the estimated clock skews \alpha _{{\rm{a}}} and \alpha _{{\rm{p}}} are represented in Fig. 11(c). It is clear that, the estimated position in the first measurement window is not very accurate. After the first measurement window, the clock skews \alpha _{{\rm{a}}} and \alpha _{\rm{p}} are both corrected, whose accuracy is improved.

    Figure  11.  Performance for the mobility compensation strategy in three measurement windows. Of note, “1” denotes estimated errors by the algorithm in Section IV, “2” denotes estimated errors by mobility compensation strategy.

    5) Consequence When There Exist Dishonest Nodes

    In the above results, the nodes are assumed to be honest. As mentioned in Section IV-C, if the condition of e_{{\rm{a}}}(T_{\rm{a,a}}^{{\#}})>{\vec{\rho}} and e _{{\rm{p}}}(T_{\rm{a,p}}^{{\#}})>{\vec{\rho}} holds, the nodes in USNs can be considered to be dishonest, otherwise the nodes are dishonest. To show the consequence when there exist dishonest nodes, dishonest data are added to the position and timestamps information of anchor node 4. To be specific, {{p}}_{4} is tampered with {{p}}_{4}+10{{\xi }}_{1} , the time t_{{\rm{a}},4} is tampered with t_{{\rm{a}},4}+0.5\xi _{2} , and the time T_{4,{\rm{p}}} is tampered with T_{4,{\rm{p}}}+0.5\xi _{3} , where {{\xi }}_{1} , \xi _{2} and \xi _{3} denote zero-mean Gaussian noises with a variance 1 . Correspondingly, the predicted trajectories and estimated positions of active sensor node are shown in Fig. 12(a), while the predicted trajectories and estimated positions of ordinary sensor node are shown in Fig. 12(b). Clearly, the estimated positions of active sensor node and ordinary sensor node are outside the cylinder when there exist dishonest nodes, i.e., the distance differences exceed the threshold {\vec{\rho}} .

    Figure  12.  Consequence when there exist dishonest nodes.

    Experiment results are presented in this section, and we only check the effectiveness of the PPS-based asynchronous localization algorithm for active sensor node due to limited experiment conditions in our lab. To be specific, the experiment is carried out in a tank of 6\;{\rm m} \times 4\;{\rm m} \times 1\;{\rm m} , and the hardware in the experiment is mainly comprised of the following three parts: 1) Base stations: Base stations act as surface buoys, whose role is to provide self-localization and clock synchronization services for anchor nodes. 2) Anchor nodes: When anchor nodes are on the surface of the water, they employ ultra-wideband technology [41] to acquire their positions via the cooperation with base stations. After acquiring their position information, anchor nodes sink to the bottom of the tank, and then provide localization service for the active sensor node. 3) Active sensor node: An AUV is employed to perform the role of active sensor node. It is worth mentioning that the aforementioned communication links are all wireless. Meanwhile, the experimental configuration is shown in Fig. 13(a), and the experiment setup is depicted in Fig. 13(b).

    Figure  13.  Experiment description of the PPS-based asynchronous localization algorithm for active sensor node.

    In order to estimate the position of active sensor node, underwater acoustic modems are required to provide communication capability for the sensor-to-anchor wireless links. Then, an acoustic modem that consists of STM32 processor, transmitter and receiver is designed in our lab, as shown in Fig. 14(a). To verify the effectiveness of our modem, the received analog signals are presented on the top of Fig. 14(b). These analog signals can be converted to digital signals, as shown on the bottom of Fig. 14(b). Clearly, the transmitted preamble and the guard interval in Fig. 14 can be identified, which indirectly verify the effectiveness of the designed acoustic modem.

    Figure  14.  Construction of acoustic modem module.

    With the embedded communication system, the position of active sensor node can be estimated. To this end, the position vectors of anchor nodes are set as {{p}}_{1} = [-0.6,0.6,-0.5]^{T} , {{p}}_{2} = [0.9,0.6,-0.5]^{T} , {{p}}_{3} = [0.9,-0.9,-0.5]^{T} and {{p}}_{4} = [-0.6, -0.9, -0.5]^{T}. In addition, we assume that eleven different points are required to be localized, i.e., the active senor node is deployed at eleven different points. By using the localization protocol, some timestamp measurements (see Table II) are conducted to estimate the position information of active sensor node. Accordingly, the actual and localized positions of active sensor node are shown in Fig. 15(a), while the localization errors are presented in Fig. 15(b). In addition, the clock of active sensor node can be inferred as \alpha _{{\rm{a}}} = 1.0008 and \beta _{{\rm{a}}} = 152.0373 μs. Clearly, the PPS-based asynchronous localization algorithm in this paper can achieve localization task, since all the localization errors are close to zero. These results reflect that the asynchronous localization algorithm designed in Section IV-A is effective and meaningful.

    Table  II.  Relative Timestamps Measurements (μs)
    T_{\rm{a,a}} t_{\rm{a,1}} t_{\rm{a,2}} t_{\rm{a,3}} t_{\rm{a,4}}
    Point 1 64 762 65 584 65 892 65 582 65 042
    Point 2 65 637 66 530 66 637 66 270 66 084
    Point 3 62 384 63 104 63 233 63 104 62 949
    Point 4 72 563 73 129 73 283 73 412 73 284
    Point 5 84 369 84 816 85 002 85 369 85 263
    Point 6 57 296 57 929 57 743 58 190 58 296
    Point 7 66 437 67 257 66 717 67 257 67 567
    Point 8 82 653 83 547 83 100 83 286 83 653
    Point 9 54 698 55 698 55 331 55 145 55 592
    Point 10 72 734 73 864 73 554 73 014 73 558
    Point 11 63 647 64 927 64 447 63 847 64 667
     | Show Table
    DownLoad: CSV
    Figure  15.  Experiment results of the PPS-based asynchronous localization algorithm for active sensor node.

    With consideration of privacy preservation, this paper studies an asynchronous localization issue for USNs. In order to eliminate the effect of asynchronous clocks (i.e., clock offset and skew), an asynchronous localization protocol including mobility compensation strategy is presented. Based on this, the PPS and PPDP based localization algorithms are designed to hide privacy information, where the performance analyses are also presented. Finally, simulation and experiment results show that the localization algorithm in this paper can achieve localization task, while the effect of clock can be eliminated.

  • [1]
    J. Yan, Y. D. Gong, C. L. Chen, X. Y. Luo, and X. P. Guan, “AUV-aided localization for internet of underwater things: A reinforcement learningbased method,” IEEE Internet Things J., 2020, DOI: 10.1109/JIOT.2020.2993012.
    [2]
    J. Yan, H. Y. Zhao, X. Y. Luo, C. L. Chen, and X. P. Guan, “RSSI-based heading control for robust long-range aerial communication in UAV networks,” IEEE Internet Things J., vol. 6, no. 2, pp. 1675–1689, Apr. 2019. doi: 10.1109/JIOT.2018.2875428
    [3]
    S. M. Jiang, “On reliable data transfer in underwater acoustic networks: A survey from networking perspective,” IEEE Commun. Surv. and Tutorials, vol. 20, no. 2, pp. 1036–1055, May 2018.
    [4]
    J. Yan, D. B. Guo, X. Y. Luo, and X. P. Guan, “AUV-aided localization for underwater acoustic sensor networks with current field estimation,” IEEE Trans. Veh. Technol., 2020, DOI: 10.1109/TVT.2020.2996513.
    [5]
    D. Zhang, M. Q. Liu, S. L. Zhang, and Q. F. Zhang, “Non-myopic energy allocation for target tracking in energy harvesting UWSNs,” IEEE Sens. J., vol. 19, no. 10, pp. 3772–3783, May 2019. doi: 10.1109/JSEN.2018.2890078
    [6]
    Z. Y. Gao, and G. Guo, “Fixed-time sliding mode formation control of AUVs based on a disturbance observer,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 2, pp. 539–545, Mar. 2020. doi: 10.1109/JAS.2020.1003057
    [7]
    S. Wang, L. Chen, D. B. Gu, and H. S. Hu, “Cooperative localization of AUVs using moving horizon estimation,” IEEE/CAA J. Autom. Sinica, vol. 1, no. 1, pp. 68–76, Jan. 2014. doi: 10.1109/JAS.2014.7004622
    [8]
    J. Wang, X. Zhang, Q. H. Gao, H. Yue, and H. Y. Wang, “Device-free wireless localization and activity recognition: A deep learning approach,” IEEE Trans. Veh. Technol., vol. 66, no. 7, pp. 6258–6267, Jul. 2017. doi: 10.1109/TVT.2016.2635161
    [9]
    G. J. Han, X. Yang, L. Liu, W. B. Zhang, and M. Guizani, “A disaster management-oriented path planning for mobile anchor node-based localization in wireless sensor networks,” IEEE Trans. Emerg. Top. Comput., vol. 8, no. 1, pp. 115–125, Jan. 2020. doi: 10.1109/TETC.2017.2687319
    [10]
    J. Wang, L. M. Zhang, Q. H. Gao, M. Pan, and H. Y. Wang, “Device-free wireless sensing in complex scenarios using spatial structural information,” IEEE Trans. Wireless Commun., vol. 17, no. 4, pp. 2432–2442, Apr. 2018. doi: 10.1109/TWC.2018.2796086
    [11]
    B. W. Chen, S. Rho, M. Imran, M. Guizani, and W. K. Fan, “Cognitive sensors based on ridge phase-smoothing localization and multiregional histograms of oriented gradients,” IEEE Trans. Emerg. Top. Comput., vol. 7, no. 1, pp. 123–134, Mar. 2019. doi: 10.1109/TETC.2016.2585040
    [12]
    P. Carroll, K. Mahmood, S. L. Zhou, H. Zhou, X. K. Xu, and J. W. Cui, “Ondemand asynchronous localization for underwater sensor networks,” IEEE Trans. Signal Process., vol. 62, no. 13, pp. 3337–3348, Jul. 2014. doi: 10.1109/TSP.2014.2326996
    [13]
    J. Yan, X. N. Zhang, X. Y. Luo, Y. Y. Wang, C. L. Chen, and X. P. Guan, “Asynchronous localization with mobility prediction for underwater acoustic sensor networks,” IEEE Trans. Veh. Technol., vol. 67, no. 3, pp. 2543–2556, Mar. 2018. doi: 10.1109/TVT.2017.2764265
    [14]
    J. Liu, Z. H. Wang, J. H. Cui, S. L. Zhou, and B. Yang, “A joint time synchronization and localization design for mobile underwater sensor networks,” IEEE Trans. Mob. Comput., vol. 15, no. 3, pp. 530–543, Mar. 2016. doi: 10.1109/TMC.2015.2410777
    [15]
    E. Mortazavi, R. Javidan, M. Dehghani, and V. Kavoosi, “A robust method for underwater wireless sensor joint localization and synchronization,” Ocean Eng., vol. 137, no. 2, pp. 276–286, Jun. 2017.
    [16]
    H. Li, Y. H. He, X. Z. Cheng, H. S. Zhu, and L. M. Sun, “Security and privacy in localization for underwater sensor networks,” IEEE Commun. Mag., vol. 53, no. 11, pp. 56–62, Nov. 2015. doi: 10.1109/MCOM.2015.7321972
    [17]
    A. Konstantinidis, G. Chatzimilioudis, D. Zeinalipour-Yazti, P. Mpeis, N. Pelekis, and Y. Theodoridis, “Privacy-preserving indoor localization on smartphones,” IEEE Trans. Knowl. Data Eng., vol. 27, no. 11, pp. 3042–3055, Nov. 2015. doi: 10.1109/TKDE.2015.2441724
    [18]
    T. Shu, Y. Y. Chen, and J. Yang, “Protecting multi-lateral privacy in pervasive environments,” IEEE/ACM Trans. Netw., vol. 23, no. 5, pp. 1688–1701, Oct. 2015. doi: 10.1109/TNET.2015.2478881
    [19]
    X. F. Shi and J. F. Wu, “To hide private position information in localization using time difference of arrival,” IEEE Trans. Signal Process., vol. 66, no. 18, pp. 4946–4956, Sep. 2018. doi: 10.1109/TSP.2018.2858187
    [20]
    G. H. Wang, J. P. He, X. F. Shi, J. P. Pan, and S. B. Shen, “Analyzing and evaluating efficient privacy-preserving localization for pervasive computing,” IEEE Internet Things J., vol. 5, no. 4, pp. 2993–3007, Aug. 2018. doi: 10.1109/JIOT.2017.2772291
    [21]
    X. Z. Cheng, H. N. Shu, Q. L. Liang, and D. H. C. Du, “Silent positioning in underwater acoustic sensor networks,” IEEE Trans. Veh. Technol., vol. 57, no. 3, pp. 1756–1766, May 2008. doi: 10.1109/TVT.2007.912142
    [22]
    X. Liu, J. J. Yin, S. G. Zhang, B. Ding, S. Guo, and K. Wang, “Range-based localization for sparse 3-D sensor networks,” IEEE Internet Things J., vol. 6, no. 1, pp. 753–764, Feb. 2019. doi: 10.1109/JIOT.2018.2856267
    [23]
    J. M. Chen, C. Q. Wang, Y. X. Sun, and X. M. Shen, “Semi-supervised laplacian regularized least squares algorithm for localization in wireless sensor networks,” Comput. Netw., vol. 55, no. 10, pp. 2481–2491, Apr. 2011. doi: 10.1016/j.comnet.2011.04.010
    [24]
    F. Zafari, A. Gkelias, and K. K. Leung, “A survey of indoor localization systems and technologies,” IEEE Commun. Surv. and Tutorials, vol. 21, no. 3, pp. 2568–2599, Apr. 2019.
    [25]
    P. H. Tsai, R. G. Tsai, and S. S. Wang, “Hybrid localization approach for underwater sensor networks,” J. Sensors, vol. 2017, no. 2017, pp. 1–13, Nov. 2017.
    [26]
    Z. Zhou, Z. Peng, J. H. Cui, Z. J. Shi, and A. Bagtzoglou, “Scalable localization with mobility prediction for underwater sensor networks,” IEEE Trans. Mob. Comput., vol. 10, no. 3, pp. 335–348, Mar. 2011. doi: 10.1109/TMC.2010.158
    [27]
    B. B. Zhang, H. Y. Wang, L. M. Zheng, J. F. Wu, and Z. W. Zhuang, “Joint synchronization and localization for underwater sensor networks considering stratification effect,” IEEE Access, vol. 5, no. 1, pp. 26932–26943, Nov. 2017.
    [28]
    Z. J. Gong, C. Li, and F. Jiang, “AUV-aided joint localization and time synchronization for underwater acoustic sensor networks,” IEEE Signal Process. Lett., vol. 25, no. 4, pp. 477–481, Apr. 2018. doi: 10.1109/LSP.2018.2799699
    [29]
    J. Yan, H. J. Ban, X. Y. Luo, H, Y. Zhao, and X. P. Guan, “Joint localization and tracking design for AUV with asynchronous clocks and state disturbances,” IEEE Trans. Veh. Technol., vol. 68, no. 5, pp. 4707–4720, Mar. 2019. doi: 10.1109/TVT.2019.2903212
    [30]
    J. Yan, H. Y. Zhao, Y. Y. Wang, X. Y. Luo, and X. P. Guan, “Asynchronous localization for UASNs: An unscented transform-based method,” IEEE Signal Process. Lett., vol. 26, no. 4, pp. 602–606, Apr. 2019. doi: 10.1109/LSP.2019.2902273
    [31]
    T. Alexandri, E. Miller, E. Spanier, and R. Diamant, “Tracking the slipper lobster using acoustic tagging: Testbed description,” IEEE J. Oceanic Eng., vol. 45, no. 2, pp. 577–585, Apr. 2020. doi: 10.1109/JOE.2018.2880862
    [32]
    D. Haddad, W. Martins, M. Costa, L. Biscainho, L. Nunes, and B. Lee, “Robust acoustic self-localization of mobile devices,” IEEE Trans. Mob. Comput., vol. 15, no. 4, pp. 982–995, Apr. 2016. doi: 10.1109/TMC.2015.2439278
    [33]
    R. Diamant and L. Lampe, “Underwater localization with timesynchronization and propagation speed uncertainties,” IEEE Trans. Mob. Comput., vol. 12, no. 7, pp. 1257–1269, Jul. 2013. doi: 10.1109/TMC.2012.100
    [34]
    A. Jolfaei, X. W. Wu, and V. Muthukkumarasamy, “On the security of permutation-only image encryption schemes,” IEEE Trans. Inf. Forensics Secur., vol. 11, no. 2, pp. 235–246, Feb. 2016. doi: 10.1109/TIFS.2015.2489178
    [35]
    P. Ostovari, J. Wu, A. Khreishah, and N. B. Shroff, “Scalable video streaming with helper nodes using random linear network coding,” IEEE/ACM Trans. Netw., vol. 24, no. 3, pp. 1574–1587, Jun. 2016. doi: 10.1109/TNET.2015.2427161
    [36]
    M. Aiash, R. Colson, and M. Kallash, “Introducing a hybrid infrastructure and information-centric approach for secure cloud computing,” in Proc. IEEE Int. Conf. Advanced Information Networking and Applications, Gwangiu, South Korea, Feb. 2015, 154−159.
    [37]
    S. W. Wang, L. S. Huang, Y. W. Nie, P. Z. Wang, H. L. Xu, and W. Yang, “PrivSet: Set-valued data analyses with locale differential privacy,” in Proc. IEEE INFOCOM, Honolulu, USA, Apr. 2018, 1088−1096.
    [38]
    Y. F. Wang, M. J. Huang, Q. Jin, and J. H. Ma, “DP3: A differential privacybased privacy-preserving indoor localization mechanism,” IEEE Commun. Lett., vol. 22, no. 12, pp. 2547–2550, Dec. 2018. doi: 10.1109/LCOMM.2018.2876449
    [39]
    J. Liu, Z. H. Wang, Z. Peng, J. H. Cui, and L. Fiondella, “Suave: Swarm underwater autonomous vehicle localization,” in Proc. IEEE INFOCOM, Toronto, Canada, Apr. 2014, 64−72.
    [40]
    C. Bechaz and H. Thomas, “GIB system: The underwater GPS solution,” in Proc. 5th ECUA, Villeurbanne, May 2000, 613−618.
    [41]
    G. Aiello and G. Rogerson, “Ultra-wideband wireless systems,” IEEE Microwave Mag., vol. 4, no. 2, pp. 36–47, Jun. 2003. doi: 10.1109/MMW.2003.1201597
  • Related Articles

    [1]Mengli Wei, Wenwu Yu, Duxin Chen, Mingyu Kang, Guang Cheng. Privacy Distributed Constrained Optimization Over Time-Varying Unbalanced Networks and Its Application in Federated Learning[J]. IEEE/CAA Journal of Automatica Sinica, 2025, 12(2): 335-346. doi: 10.1109/JAS.2024.124869
    [2]Zhongyuan Zhao, Zhiqiang Yang, Luyao Jiang, Ju Yang, Quanbo Ge. Privacy Preserving Distributed Bandit Residual Feedback Online Optimization Over Time-Varying Unbalanced Graphs[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(11): 2284-2297. doi: 10.1109/JAS.2024.124656
    [3]Minfeng Qi, Ziyuan Wang, Qing-Long Han, Jun Zhang, Shiping Chen, Yang Xiang. Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(8): 1757-1776. doi: 10.1109/JAS.2022.106058
    [4]Zheng Wu, Yiyun Zhao, Fanbiao Li, Tao Yang, Yang Shi, Weihua Gui. Asynchronous Learning-Based Output Feedback Sliding Mode Control for Semi-Markov Jump Systems: A Descriptor Approach[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(6): 1358-1369. doi: 10.1109/JAS.2024.124416
    [5]Xuerao Wang, Qingling Wang, Yanxu Su, Yuncheng Ouyang, Changyin Sun. Adaptive Sensor-Fault Tolerant Control of Unmanned Underwater Vehicles With Input Saturation[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(4): 907-918. doi: 10.1109/JAS.2023.123837
    [6]Wei Chen, Guo-Ping Liu. Privacy-Preserving Consensus-Based Distributed Economic Dispatch of Smart Grids via State Decomposition[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(5): 1250-1261. doi: 10.1109/JAS.2023.124122
    [7]Meiqin Tang, Jiawen Sheng, Shaoyan Sun. A Coverage Optimization Algorithm for Underwater Acoustic Sensor Networks based on Dijkstra Method[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(8): 1769-1771. doi: 10.1109/JAS.2023.123279
    [8]Feiye Zhang, Qingyu Yang, Dou An. Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(10): 1984-1999. doi: 10.1109/JAS.2023.123321
    [9]Zijun Gong, Cheng Li, Ruoyu Su. Fundamental Limits of Doppler Shift-Based, ToA-Based, and TDoA-Based Underwater Localization[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(7): 1637-1639. doi: 10.1109/JAS.2023.123282
    [10]Wenchao Huang, Zhijun Pan, Zhezhuang Xu. Underwater Cable Localization Method Based on Beetle Swarm Optimization Algorithm[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(9): 1893-1895. doi: 10.1109/JAS.2022.106073
    [11]Ya Wang, Xinming Chen, Lei Shi, Yuhua Cheng, Houjun Wang. A Trust Assessment-Based Distributed Localization Algorithm for Sensor Networks Under Deception Attacks[J]. IEEE/CAA Journal of Automatica Sinica, 2022, 9(10): 1879-1882. doi: 10.1109/JAS.2022.105881
    [12]Yifan Xia, Hui Yu, Fei-Yue Wang. Accurate and Robust Eye Center Localization via Fully Convolutional Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2019, 6(5): 1127-1138. doi: 10.1109/JAS.2019.1911684
    [13]Zhen Hong, Rui Wang, Xile Li. A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(1): 68-77.
    [14]Zhaolei Wang, Qing Wang, Chaoyang Dong. Asynchronous H Control for Unmanned Aerial Vehicles: Switched Polytopic System Approach[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(2): 207-216.
    [15]Changqing Xia, Wei Liu, Qingxu Deng. Cost Minimization of Wireless Sensor Networks with Unlimited-lifetime Energy for Monitoring Oil Pipelines[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 290-295.
    [16]Zhixin Liu, Yazhou Yuan, Xinping Guan, Xinbin Li. An Approach of Distributed Joint Optimization for Cluster-based Wireless Sensor Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 267-273.
    [17]Xiaoyuan Luo, Liu Feng, Jing Yan, Xinping Guan. Dynamic Coverage with Wireless Sensor and Actor Networks in Underwater Environment[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 274-281.
    [18]Haiyang Yu, Yisha Liu, Wei Wang. Distributed Sparse Signal Estimation in Sensor Networks Using H-Consensus Filtering[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(2): 149-154.
    [19]Yi Dong, Jie Huang. Leader-following Rendezvous with Connectivity Preservation of Single-integrator Multi-agent Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(1): 19-23.
    [20]Sen Wang, Ling Chen, Dongbing Gu, Huosheng Hu. Cooperative Localization of AUVs Using Moving Horizon Estimation[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(1): 68-76.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(15)  / Tables(2)

    Article Metrics

    Article views (1363) PDF downloads(79) Cited by()

    Highlights

    • Asynchronous clock, mobility and privacy preservation are together considered.
    • Asynchronous localization protocol can effectively eliminate asynchronous clock.
    • Asynchronous localization algorithm can effectively hide privacy information.
    • Location accuracy can be guaranteed as compared with the others works.

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return