Design Guidelines on Trust Management for Underwater Wireless Sensor Networks

被引:9
|
作者
Zhu, Rongxin [1 ]
Boukerche, Azzedine [2 ]
Long, Libo [3 ]
Yang, Qiuling [4 ,5 ]
机构
[1] Hainan Univ, Sch Cyberspace Secur, Haikou 570228, Peoples R China
[2] Univ Ottawa, PARADISE Res Lab, EECS, Ottawa, ON K1N 6N5, Canada
[3] Univ Ottawa, EECS, Ottawa, ON K1N 6N5, Canada
[4] Hainan Univ, Sch Comp Sci & Technol, Haikou 570228, Peoples R China
[5] Hainan Univ, Innovat Platform Academicians Hainan Prov, Haikou 570228, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 04期
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
Trust management; Surveys; Wireless sensor networks; Underwater communication; Tutorials; Network security; UWSNs; underwater wireless sensor networks; security; REPUTATION SYSTEMS; ROUTING PROTOCOLS; AD HOC; COMMUNICATION; MECHANISM; MODEL; SECURITY; PRIVACY; AUTHENTICATION; LOCALIZATION;
D O I
10.1109/COMST.2024.3389728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, significant advancements in wireless underwater communication and acoustic sensor technology have spurred the exploration and utilization of the ocean's vast natural resources. underwater wireless sensor networks (UWSNs) are increasingly deployed in unattended and hostile environments, demanding robust security measures. Secure communication environments are essential for a range of UWSN applications, including coastal defense, underwater communication, and marine exploration. Trust models have emerged as effective security mechanisms to assess the reliability of individual nodes in UWSNs during adverse attacks. Unlike Wireless Sensor Networks (WSNs), UWSNs encounter distinct challenges, including constrained resources, harsh underwater conditions, and unreliable acoustic communication, making it crucial to establish a reliable trust-based system. In this paper, we review existing work on UWSN security, discuss security and trust challenges, and explore trust-based applications. Furthermore, we evaluate diverse trust models suited for UWSNs of recent years, categorizing and comparing approaches like weighted sum methods, logic-based techniques, probability and statistics models, and machine learning paradigms. Finally, we discuss contemporary challenges and future directions in UWSN trust management. By offering a systematic overview and classification of trust management approaches, this paper contributes to the understanding and development of effective trust mechanisms for UWSNs, ultimately enhancing their reliability, security, and successful operation in diverse marine applications.
引用
收藏
页码:2547 / 2576
页数:30
相关论文
共 50 条
  • [41] A Secure Routing Algorithm for Underwater Wireless Sensor Networks
    Ahmadi, M.
    Jameii, S. M.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2018, 31 (10): : 1659 - 1665
  • [42] On Underwater Wireless Sensor Networks Routing Protocols: A Review
    Khan, Hashim
    Hassan, Syed Ali
    Jung, Haejoon
    IEEE SENSORS JOURNAL, 2020, 20 (18) : 10371 - 10386
  • [43] A Survey on MAC Protocols for Underwater Wireless Sensor Networks
    Chen, Keyu
    Ma, Maode
    Cheng, En
    Yuan, Fei
    Su, Wei
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03): : 1433 - 1447
  • [44] A Survey of Sybil Attack Countermeasures in Underwater Sensor and Acoustic Networks
    Zukarnain, Zuriati Ahmad
    Amodu, Oluwatosin Ahmed
    Wenting, Cui
    Bukar, Umar Ali
    IEEE ACCESS, 2023, 11 : 64518 - 64543
  • [45] Trust Based Authentication Mechanism in Wireless Sensor Networks
    Li, Ru-ping
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (01) : 58 - 63
  • [46] Comparative Evaluation of Trust Mechanisms for Wireless Sensor Networks
    Vasilache, Razvan-Andrei
    Gavrila, Ioan-Claudiu
    Grigorescu, Alin-Ciprian
    Gheorghe, Laura
    2013 ROEDUNET INTERNATIONAL CONFERENCE (ROEDUNET): NETWORKING IN EDUCATION, 11TH EDITION, 2013,
  • [47] A novel stereoscopic security architecture with Trust Management for wireless sensor networks
    Ma, Bin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 797 - 800
  • [48] Distributed Event-triggered Trust Management for Wireless Sensor Networks
    Liu, Sibo
    Pang, Liaojun
    Pei, Qingqi
    Ma, Hua
    Peng, Qingquan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 291 - 294
  • [49] A fuzzy fully distributed trust management system in wireless sensor networks
    Jadidoleslamy, Hossein
    Aref, Mohammad Reza
    Bahramgiri, Hossein
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2016, 70 (01) : 40 - 49
  • [50] A Trust Management Architecture for Hierarchical Wireless Sensor Networks
    Zhang, Junqi
    Shankaran, Rajan
    Orgun, Mehmet A.
    Varadharajan, Vijay
    Sattar, Abdul
    IEEE LOCAL COMPUTER NETWORK CONFERENCE, 2010, : 264 - 267