LTrust: An Adaptive Trust Model Based on LSTM for Underwater Acoustic Sensor Networks

被引:27
作者
Du, Jiaxin [1 ]
Han, Guangjie [1 ,2 ]
Lin, Chuan [3 ,4 ]
Martinez-Garcia, Miguel [5 ]
机构
[1] Dalian Univ Technol, Sch Software, Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116024, Peoples R China
[2] Hohai Univ, Dept Internet Things Engn, Changzhou 213022, Peoples R China
[3] Northeastern Univ, Software Coll, Shenyang 110819, Peoples R China
[4] Chinese Acad Sci, Inst Acoust, State Key Lab Acoust, Beijing 100190, Peoples R China
[5] Loughborough Univ, Dept Aeronaut & Automot Engn, Loughborough LE11 3TU, Leics, England
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Adaptation models; Reliability; Measurement; Wireless communication; Network topology; Data models; Software; Anomaly detection; long short-term memory network; recommendation filtering; trust evaluation; underwater acoustic sensor networks;
D O I
10.1109/TWC.2022.3157621
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As an effective security mechanism, trust models have been proposed to estimate the reliability of the individual nodes in Underwater Acoustic Sensor Networks (UASNs) during adverse attacks. However, existing trust models neglect the relative importance of the different nodes within the network topology. Further, few trust models study the effects of defective recommendation trust filtering. In this work, we propose an adaptive trust model based on the Long Short-Term Memory (LSTM) network model for UASNs, which we term LTrust. The LTrust is composed of two stages: trust data collection and trust evaluation. In the first stage, the characteristics of the network topology are leveraged towards evaluating direct trust evidence, by aggregating the communication trust and environment trust metrics; a defective recommendation filtering method is designed for broadcasting accurate trust recommendations among the nodes. In the second stage, an adaptive trust model is designed based on the LSTM model, to identify anomalous nodes by evaluating their trust value. The LTrust model has been tested under both hybrid attack and single-mode attack scenarios. Simulation results demonstrate that the LTrust achieves effective performance, as compared to other approaches proposed in the literature, in terms of trust value, accuracy and error rate.
引用
收藏
页码:7314 / 7328
页数:15
相关论文
共 34 条
[1]   Friends and neighbors on the Web [J].
Adamic, LA ;
Adar, E .
SOCIAL NETWORKS, 2003, 25 (03) :211-230
[2]   CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things [J].
Adewuyi, Anuoluwapo A. ;
Cheng, Hui ;
Shi, Qi ;
Cao, Jiannong ;
MacDermott, Aine ;
Wang, Xingwei .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :5432-5445
[3]   MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles [J].
Ahmad, Farhan ;
Kurugollu, Fatih ;
Adnane, Asma ;
Hussain, Rasheed ;
Hussain, Fatima .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :3310-3322
[4]   Recommendation-Based Trust Model for Vehicle-to-Everything (V2X) [J].
Alnasser, Aljawharah ;
Sun, Hongjian ;
Jiang, Jing .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) :440-450
[5]   The meandering current mobility model and its impact on underwater mobile sensor networks [J].
Caruso, Antonio ;
Paparella, Francesco ;
Vieira, Luiz F. M. ;
Erol, Melike ;
Gerla, Mario .
27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, :221-225
[6]   Tri-state median filter for image denoising [J].
Chen, T ;
Ma, KK ;
Chen, LH .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (12) :1834-1838
[7]   ITrust: An Anomaly-Resilient Trust Model Based on Isolation Forest for Underwater Acoustic Sensor Networks [J].
Du, Jiaxin ;
Han, Guangjie ;
Lin, Chuan ;
Martinez-Garcia, Miguel .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (05) :1684-1696
[8]   A Trust-Based Security System for Data Collection in Smart City [J].
Fang, Weidong ;
Cui, Ningning ;
Chen, Wei ;
Zhang, Wuxiong ;
Chen, Yunliang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) :4131-4140
[9]   SET OF MEASURES OF CENTRALITY BASED ON BETWEENNESS [J].
FREEMAN, LC .
SOCIOMETRY, 1977, 40 (01) :35-41
[10]   SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs [J].
Goyal, Nitin ;
Dave, Mayank ;
Verma, Anil Kumar .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (01) :1-15