Hybrid Trust Model for Identifying Malicious Attacks in Underwater Acoustic Sensor Network

被引:2
|
作者
Jiang, Bin [1 ]
Zhou, Ronghao [1 ]
Luo, Fei [2 ]
Cui, Xuerong [1 ]
Liu, Yongxin [3 ]
Song, Houbing [4 ]
机构
[1] China Univ Petr East China, Coll Oceanog & Space Informat, Qingdao 266580, Peoples R China
[2] Great Bay Univ, Sch Comp & Informat Technol, Dongguan 523000, Peoples R China
[3] Embry Riddle Aeronaut Univ, Dept Math, Daytona Beach, FL 32114 USA
[4] Univ Maryland Baltimore Cty UMBC, Dept Informat Syst, Baltimore, MD 21250 USA
基金
中国国家自然科学基金;
关键词
Sensors; Data models; Underwater acoustics; Accuracy; Indexes; Cloud computing; Simulation; Attack types identification; hybrid trust model; random forest (RF); underwater acoustic sensor networks (UASNs); MECHANISM; SCHEME; SVM;
D O I
10.1109/JSEN.2024.3424252
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, underwater acoustic sensor networks (UASNs) have been widely used in ocean information collection, which mainly uses various underwater sensors to collect information. However, UASNs are vulnerable to malicious attacks and network security is vulnerable to threats. The trust model has been proved to be able to effectively detect malicious nodes. However, the existing trust model considers the trust source too single, and it is difficult to comprehensively judge the behavior of nodes, which is prone to misjudgment, and does not identify the types of malicious attacks suffered by nodes after detection. To achieve a more accurate trust evaluation of underwater sensor nodes, we propose a hybrid trust model that can identify malicious attacks on the network. First, trust datasets are established by collecting two types of trust evidence of sensor nodes to ensure the diversity of data sources of the trust model. Then we use random forest (RF) algorithm to build trust model and detect nodes according to trust dataset. According to the detection accuracy, out-of-bag (OOB) error rate, and running time, we choose the most suitable parameters for the trust model. In the final stage, we collect the patterns of malicious attacks on nodes according to the detection results, which is convenient for us to make timely responses and reduce the losses of UASNs due to malicious attacks. The simulation results show that the trust model can effectively detect malicious nodes and attack types in the network and has higher detection accuracy than the existing trust model.
引用
收藏
页码:26743 / 26754
页数:12
相关论文
共 50 条
  • [1] A Trust-Based Malicious Detection Scheme for Underwater Acoustic Sensor Networks
    Liang, Kun
    Sun, Shijie
    Huang, Xiangdang
    Yang, Qiuling
    Neal, N. Xiong
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 427 - 440
  • [2] An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network
    Han, Guangjie
    Jiang, Jinfang
    Shu, Lei
    Guizani, Mohsen
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (12) : 2447 - 2459
  • [3] Fault-Tolerant Trust Model for Hybrid Attack Mode in Underwater Acoustic Sensor Networks
    Han, Guangjie
    He, Yu
    Jiang, Jinfang
    Wang, Hao
    Peng, Yan
    Fan, Kaiguo
    IEEE NETWORK, 2020, 34 (05): : 330 - 336
  • [4] Channel Estimation model for Underwater Acoustic Sensor Network
    Chavhan, Jyotsna W.
    Sarate, G. G.
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), 2015, : 978 - 981
  • [5] A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks
    Han, Guangjie
    He, Yu
    Jiang, Jinfang
    Wang, Ning
    Guizani, Mohsen
    Ansere, James Adu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (11) : 11239 - 11247
  • [6] A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Shu, Lei
    Chan, Sammy
    Wang, Kun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) : 342 - 350
  • [7] Enhanced Beta Trust Model for Identifying Insider Attacks in Wireless Sensor Networks
    Geetha, V
    Chandrasekaran, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (08): : 14 - 20
  • [8] Malicious Attack Detection in Underwater Wireless Sensor Network
    Ahmed, Muhammad R.
    Tehsien, Syeda Manjia
    Aseeri, Mohammed
    Kaiser, M. Shamim
    2015 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND PHOTONICS (ICTP), 2015,
  • [9] ENERGY EFFICIENT HYBRID ROUTING PROTOCOL FOR UNDERWATER ACOUSTIC SENSOR NETWORK
    PriyankaHanda
    Sohi, Balwinder Singh
    Kumar, Naresh
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2573 - 2578
  • [10] Design of optical-acoustic hybrid underwater wireless sensor network
    Wang, Jingjing
    Shi, Wei
    Xu, Lingwei
    Zhou, Liya
    Niu, Qiuna
    Liu, Ju
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 92 : 59 - 67