A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks

被引:66
作者
Jiang, Jinfang [1 ]
Zhu, Xinyu [1 ]
Han, Guangjie [1 ,2 ]
Guizani, Mohsen [3 ,4 ]
Shu, Lei [5 ,6 ]
机构
[1] Hohai Univ, Dept Informat & Commun Syst, Changzhou 213022, Peoples R China
[2] Chinese Acad Sci, State Key Lab Acoust, Inst Acoust, Beijing 100190, Peoples R China
[3] Qatar Univ, Dept Comp Sci, Doha 2713, Qatar
[4] Qatar Univ, Coll Engn, Doha 2713, Qatar
[5] Nanjing Agr Univ, Coll Engn, Nanjing 210031, Peoples R China
[6] Univ Lincoln, Sch Engn, Lincoln LN6 7TS, England
基金
中国国家自然科学基金;
关键词
Wireless sensor networks; Security; Cloud computing; Entropy; Uncertainty; Heuristic algorithms; Decision trees; UWSNs; trust evaluation; trust update; C4; 5 decision tree; DATA-COLLECTION; MODEL; MANAGEMENT; ALGORITHM; SECURITY;
D O I
10.1109/TVT.2020.2999566
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
At present, Underwater Wireless Sensor Networks (UWSNs) have been widely used in enormous applications, and simultaneously face many security threats. The trust management mechanism plays an important role in protecting network security. Many theories, e.g., subjective logic, Bayesian, cloud model, entropy theory, evidence theory, etc., have been adopted to evaluate the node trust of wireless sensor networks. However, due to the unique characteristics of the underwater dynamic environment, the existing trust mechanisms used in traditional networks (such as P2P networks, Ad-hoc networks, etc.) cannot be directly used in UWSNs. Therefore, this paper proposes a new trust evaluation and update mechanism for underwater wireless sensor networks based on the C4.5 decision tree algorithm (TEUC). In the TEUC, trust evidences are first collected including data-based, link-based and node-based trust evidences. Then, the collected trust evidences are used to train the C4.5 decision tree. In addition, the reward and penalty factors are defined to update trust based on the sliding time window. Finally, simulation results demonstrate that the proposed algorithm outperforms the traditional ones in a dynamic network environment in terms of malicious node detection and energy consumption.
引用
收藏
页码:9031 / 9040
页数:10
相关论文
共 37 条
[1]  
[Anonymous], 2009, I C COMM SOFTW NET, DOI DOI 10.1109/ICCSN.2009.67
[2]  
[Anonymous], 2013, INT CONF INFO SCI
[3]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[4]  
Caruso A., 2008, P 27 C COMP COMM APR, P1
[5]  
Cintra M. E., 2013, MATHWARE SOFT COMPU, V20, P56
[6]  
Crosby GV, 2006, DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, P13
[7]   An entropy-based trust modeling and evaluation for wireless sensor networks [J].
Dai Hongjun ;
Jia Zhiping ;
Dong Xiaona .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, :27-+
[8]   On Deep Learning for Trust-Aware Recommendations in Social Networks [J].
Deng, Shuiguang ;
Huang, Longtao ;
Xu, Guandong ;
Wu, Xindong ;
Wu, Zhaohui .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (05) :1164-1177
[9]   TC-BAC: A trust and centrality degree based access control model in wireless sensor networks [J].
Duan, Junqi ;
Gao, Deyun ;
Foh, Chuan Heng ;
Zhang, Hongke .
AD HOC NETWORKS, 2013, 11 (08) :2675-2692
[10]   A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory [J].
Feng, Renjian ;
Xu, Xiaofeng ;
Zhou, Xiang ;
Wan, Jiangwen .
SENSORS, 2011, 11 (02) :1345-1360