A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks

被引:94
作者
Jiang, Jinfang [1 ]
Han, Guangjie [1 ]
Shu, Lei [2 ]
Chan, Sammy [3 ]
Wang, Kun [4 ]
机构
[1] Hohai Univ, Dept Commun & Informat Syst, Changzhou 213022, Peoples R China
[2] Guangdong Univ Petrochem Technol, Guangdong Prov Key Lab Petrochem Equipment Fault, Maoming 525000, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Dept Comp Sci, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud theory; trust model; underwater acoustic sensor networks (UASNs); WIRELESS; MANAGEMENT; MAC;
D O I
10.1109/TII.2015.2510226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Underwater acoustic sensor networks (UASNs) are susceptible to a large number of security threats, e.g., jamming attacks at the physical layer, collision attacks at the data link layer, and DoS attacks at the network layer. Because of the communication, computation, and storage constraints of underwater sensor nodes, traditional security mechanisms, e.g., encryption algorithms, are not suitable for UASNs. A trust model has been recently suggested as an effective security mechanism for open environments such as terrestrial wireless sensor networks (TWSNs), and considerable research has been done on modeling and managing trust relationships among sensor nodes. However, the trust models proposed for TWSNs cannot be directly used in a UASN due to its unique characteristics such as unreliable acoustic channel, dynamic network structure, and weak link connectivity. In this paper, we propose a novel trust model based on cloud theory (TMC) for UASNs. The objective of TMC is to solve uncertainty and fuzziness of trust based on cloud theory, which ultimately improves trust evaluation accuracy. Moreover, simulation results demonstrate that our algorithm outperforms other related works in terms of detection ratio of malicious nodes, successful packet delivery ratio, and network lifetime.
引用
收藏
页码:342 / 350
页数:9
相关论文
共 19 条
[1]  
[Anonymous], 2008, Phys. Commun, DOI [DOI 10.1016/J.PHYCOM.2008.09.001, 10.1016/j.phycom.2008.09.001]
[2]  
[Anonymous], 2004, INPROCEEDINGS ACM
[3]  
[Anonymous], PARALLEL DISTRIBUTED
[4]   A survey on routing techniques in underwater wireless sensor networks [J].
Ayaz, Muhammad ;
Baig, Imran ;
Abdullah, Azween ;
Faye, Ibrahima .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (06) :1908-1927
[5]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[6]   A Survey on MAC Protocols for Underwater Wireless Sensor Networks [J].
Chen, Keyu ;
Ma, Maode ;
Cheng, En ;
Yuan, Fei ;
Su, Wei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) :1433-1447
[7]   Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers [J].
Climent, Salvador ;
Sanchez, Antonio ;
Vicente Capella, Juan ;
Meratnia, Nirvana ;
Jose Serrano, Juan .
SENSORS, 2014, 14 (01) :795-833
[8]   End-to-End Reliability-Aware Scheduling for Wireless Sensor Networks [J].
Dobslaw, Felix ;
Zhang, Tingting ;
Gidlund, Mikael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (02) :758-767
[9]   A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory [J].
Feng, Renjian ;
Xu, Xiaofeng ;
Zhou, Xiang ;
Wan, Jiangwen .
SENSORS, 2011, 11 (02) :1345-1360
[10]  
Hamilton J., 1994, TIME SERIES ANAL, P43