Hybrid Trust Model for Identifying Malicious Attacks in Underwater Acoustic Sensor Network

被引:2
|
作者
Jiang, Bin [1 ]
Zhou, Ronghao [1 ]
Luo, Fei [2 ]
Cui, Xuerong [1 ]
Liu, Yongxin [3 ]
Song, Houbing [4 ]
机构
[1] China Univ Petr East China, Coll Oceanog & Space Informat, Qingdao 266580, Peoples R China
[2] Great Bay Univ, Sch Comp & Informat Technol, Dongguan 523000, Peoples R China
[3] Embry Riddle Aeronaut Univ, Dept Math, Daytona Beach, FL 32114 USA
[4] Univ Maryland Baltimore Cty UMBC, Dept Informat Syst, Baltimore, MD 21250 USA
基金
中国国家自然科学基金;
关键词
Sensors; Data models; Underwater acoustics; Accuracy; Indexes; Cloud computing; Simulation; Attack types identification; hybrid trust model; random forest (RF); underwater acoustic sensor networks (UASNs); MECHANISM; SCHEME; SVM;
D O I
10.1109/JSEN.2024.3424252
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, underwater acoustic sensor networks (UASNs) have been widely used in ocean information collection, which mainly uses various underwater sensors to collect information. However, UASNs are vulnerable to malicious attacks and network security is vulnerable to threats. The trust model has been proved to be able to effectively detect malicious nodes. However, the existing trust model considers the trust source too single, and it is difficult to comprehensively judge the behavior of nodes, which is prone to misjudgment, and does not identify the types of malicious attacks suffered by nodes after detection. To achieve a more accurate trust evaluation of underwater sensor nodes, we propose a hybrid trust model that can identify malicious attacks on the network. First, trust datasets are established by collecting two types of trust evidence of sensor nodes to ensure the diversity of data sources of the trust model. Then we use random forest (RF) algorithm to build trust model and detect nodes according to trust dataset. According to the detection accuracy, out-of-bag (OOB) error rate, and running time, we choose the most suitable parameters for the trust model. In the final stage, we collect the patterns of malicious attacks on nodes according to the detection results, which is convenient for us to make timely responses and reduce the losses of UASNs due to malicious attacks. The simulation results show that the trust model can effectively detect malicious nodes and attack types in the network and has higher detection accuracy than the existing trust model.
引用
收藏
页码:26743 / 26754
页数:12
相关论文
共 50 条
  • [31] Positioning in UWB S-V Model for Underwater Acoustic Sensor Network
    Mahapatra, Sagarika
    Das, Bikramaditya
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 718 - 722
  • [32] Trust Model to Minimize the Influence of Malicious Attacks in Sharding Based Blockchain Networks
    Halgamuge, Malka N.
    Hettikankanamge, Samurdika C.
    Mohammad, Azeem
    2020 IEEE THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE 2020), 2020, : 162 - 167
  • [33] Mathematical model on malicious attacks in a mobile wireless network with clustering
    Haldar, Kaushik
    Mishra, Bimal Kumar
    CHAOS SOLITONS & FRACTALS, 2015, 78 : 76 - 85
  • [34] A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network
    Pang, Baohe
    Teng, Zhijun
    Sun, Huiyang
    Du, Chunqiu
    Li, Meng
    Zhu, Weihua
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (08) : 1613 - 1617
  • [35] Classification of DoS Attacks in Smart Underwater Wireless Sensor Network
    Ahmad, Bilal
    Jian, Wang
    Enam, Rabia Noor
    Abbas, Ali
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (02) : 1055 - 1069
  • [36] Classification of DoS Attacks in Smart Underwater Wireless Sensor Network
    Bilal Ahmad
    Wang Jian
    Rabia Noor Enam
    Ali Abbas
    Wireless Personal Communications, 2021, 116 : 1055 - 1069
  • [37] The Underlying Design in Underwater Acoustic Wireless Sensor Network
    Guan, Jing
    Huang, Jianguo
    Lu, Jun
    Wang, Jing
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [38] Packet Scheduling for Underwater Acoustic Sensor Network Localization
    Ramezani, Hamid
    Fazel, Fatemeh
    Stojanovic, Milica
    Leus, Geert
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 108 - 113
  • [39] UNDERWATER ACOUSTIC SENSOR NETWORK FOR EARLY WARNING GENERATION
    Kumar, Prashant
    Kumar, Preetam
    Priyadarshini, Poonam
    Srija
    2012 OCEANS, 2012,
  • [40] Acoustic Frequency Optimization for Underwater Wireless Sensor Network
    Felemban, Emad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 642 - 648