LTrust: An Adaptive Trust Model Based on LSTM for Underwater Acoustic Sensor Networks

被引:27
作者
Du, Jiaxin [1 ]
Han, Guangjie [1 ,2 ]
Lin, Chuan [3 ,4 ]
Martinez-Garcia, Miguel [5 ]
机构
[1] Dalian Univ Technol, Sch Software, Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116024, Peoples R China
[2] Hohai Univ, Dept Internet Things Engn, Changzhou 213022, Peoples R China
[3] Northeastern Univ, Software Coll, Shenyang 110819, Peoples R China
[4] Chinese Acad Sci, Inst Acoust, State Key Lab Acoust, Beijing 100190, Peoples R China
[5] Loughborough Univ, Dept Aeronaut & Automot Engn, Loughborough LE11 3TU, Leics, England
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Adaptation models; Reliability; Measurement; Wireless communication; Network topology; Data models; Software; Anomaly detection; long short-term memory network; recommendation filtering; trust evaluation; underwater acoustic sensor networks;
D O I
10.1109/TWC.2022.3157621
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As an effective security mechanism, trust models have been proposed to estimate the reliability of the individual nodes in Underwater Acoustic Sensor Networks (UASNs) during adverse attacks. However, existing trust models neglect the relative importance of the different nodes within the network topology. Further, few trust models study the effects of defective recommendation trust filtering. In this work, we propose an adaptive trust model based on the Long Short-Term Memory (LSTM) network model for UASNs, which we term LTrust. The LTrust is composed of two stages: trust data collection and trust evaluation. In the first stage, the characteristics of the network topology are leveraged towards evaluating direct trust evidence, by aggregating the communication trust and environment trust metrics; a defective recommendation filtering method is designed for broadcasting accurate trust recommendations among the nodes. In the second stage, an adaptive trust model is designed based on the LSTM model, to identify anomalous nodes by evaluating their trust value. The LTrust model has been tested under both hybrid attack and single-mode attack scenarios. Simulation results demonstrate that the LTrust achieves effective performance, as compared to other approaches proposed in the literature, in terms of trust value, accuracy and error rate.
引用
收藏
页码:7314 / 7328
页数:15
相关论文
共 34 条
[31]   Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation [J].
Wang, Yuhang ;
Tian, Zhihong ;
Sun, Yanbin ;
Du, Xiaojiang ;
Guizani, Nadra .
IEEE NETWORK, 2020, 34 (04) :284-290
[32]   Energy-Efficient Target Tracking With UASNs: A Consensus-Based Bayesian Approach [J].
Yan, Jing ;
Zhao, Haiyan ;
Pu, Bin ;
Luo, Xiaoyuan ;
Chen, Cailian ;
Guan, Xinping .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2020, 17 (03) :1361-1375
[33]   Blockchain-Based Hierarchical Trust Networking for JointCloud [J].
Yang, Hui ;
Yuan, Jiaqi ;
Yao, Haipeng ;
Yao, Qiuyan ;
Yu, Ao ;
Zhang, Jie .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03) :1667-1677
[34]   Blockchain-Based Decentralized Trust Management in Vehicular Networks [J].
Yang, Zhe ;
Yang, Kan ;
Lei, Lei ;
Zheng, Kan ;
Leung, Victor C. M. .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1495-1505