Design Guidelines on Trust Management for Underwater Wireless Sensor Networks

被引:9
|
作者
Zhu, Rongxin [1 ]
Boukerche, Azzedine [2 ]
Long, Libo [3 ]
Yang, Qiuling [4 ,5 ]
机构
[1] Hainan Univ, Sch Cyberspace Secur, Haikou 570228, Peoples R China
[2] Univ Ottawa, PARADISE Res Lab, EECS, Ottawa, ON K1N 6N5, Canada
[3] Univ Ottawa, EECS, Ottawa, ON K1N 6N5, Canada
[4] Hainan Univ, Sch Comp Sci & Technol, Haikou 570228, Peoples R China
[5] Hainan Univ, Innovat Platform Academicians Hainan Prov, Haikou 570228, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 04期
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
Trust management; Surveys; Wireless sensor networks; Underwater communication; Tutorials; Network security; UWSNs; underwater wireless sensor networks; security; REPUTATION SYSTEMS; ROUTING PROTOCOLS; AD HOC; COMMUNICATION; MECHANISM; MODEL; SECURITY; PRIVACY; AUTHENTICATION; LOCALIZATION;
D O I
10.1109/COMST.2024.3389728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, significant advancements in wireless underwater communication and acoustic sensor technology have spurred the exploration and utilization of the ocean's vast natural resources. underwater wireless sensor networks (UWSNs) are increasingly deployed in unattended and hostile environments, demanding robust security measures. Secure communication environments are essential for a range of UWSN applications, including coastal defense, underwater communication, and marine exploration. Trust models have emerged as effective security mechanisms to assess the reliability of individual nodes in UWSNs during adverse attacks. Unlike Wireless Sensor Networks (WSNs), UWSNs encounter distinct challenges, including constrained resources, harsh underwater conditions, and unreliable acoustic communication, making it crucial to establish a reliable trust-based system. In this paper, we review existing work on UWSN security, discuss security and trust challenges, and explore trust-based applications. Furthermore, we evaluate diverse trust models suited for UWSNs of recent years, categorizing and comparing approaches like weighted sum methods, logic-based techniques, probability and statistics models, and machine learning paradigms. Finally, we discuss contemporary challenges and future directions in UWSN trust management. By offering a systematic overview and classification of trust management approaches, this paper contributes to the understanding and development of effective trust mechanisms for UWSNs, ultimately enhancing their reliability, security, and successful operation in diverse marine applications.
引用
收藏
页码:2547 / 2576
页数:30
相关论文
共 50 条
  • [21] Issues of Trust Management for Mobile Wireless Sensor Networks
    Duan, Junqi
    Qin, Yajuan
    Zhang, Sidong
    Zheng, Tao
    Zhang, Hongke
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [22] Light trust management for routing in wireless sensor networks
    Une gestion économe de la confiance pour le routage dans des réseaux de capteurs sans fil
    Vercouter, L. (laurent.vercouter@insa-rouen.fr), 1600, Lavoisier (26): : 548 - 568
  • [23] A Semantic Trust Management Model for Wireless Sensor Networks
    Gangwani, Pranav
    Perez-Pons, Alexander
    Upadhyay, Himanshu
    IEEE SENSORS JOURNAL, 2025, 25 (02) : 3672 - 3681
  • [24] A Hybrid Trust Management Scheme for Wireless Sensor Networks
    N. Karthik
    V. S. Ananthanarayana
    Wireless Personal Communications, 2017, 97 : 5137 - 5170
  • [25] A Hybrid Trust Management Scheme for Wireless Sensor Networks
    Karthik, N.
    Ananthanarayana, V. S.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (04) : 5137 - 5170
  • [26] Underwater Wireless Sensor Networks
    Davis, Almir
    Chang, Hwa
    2012 OCEANS, 2012,
  • [27] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [28] An Updatable Key Management Scheme for Underwater Wireless Sensor Networks
    Guan, Zhiyun
    Wu, Junhua
    Li, Guangshun
    Wang, Tielin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT IV, 2024, 14490 : 474 - 485
  • [29] Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks
    Gheorghe, Laura
    Rughinis, Razvan
    Tataroiu, Razvan
    2013 ROEDUNET INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH, 12TH EDITION, 2013,
  • [30] Design of Algorithms and Protocols for Underwater Acoustic Wireless Sensor Networks
    Boukerche, Azzedine
    Sun, Peng
    ACM COMPUTING SURVEYS, 2021, 53 (06)