A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks

被引:78
作者
Han, Guangjie [1 ]
He, Yu [1 ]
Jiang, Jinfang [1 ,2 ]
Wang, Ning [3 ]
Guizani, Mohsen [4 ]
Ansere, James Adu [1 ]
机构
[1] Hohai Univ, Coll Internet Things Engn, Changzhou 213022, Peoples R China
[2] Chinese Acad Sci, State Key Lab Acoust, Inst Acoust, Beijing 100190, Peoples R China
[3] DMU, Sch Marine Elect Engn, Dalian 116026, Peoples R China
[4] Qatar Univ, Dept Comp Sci & Engn, Doha 2713, Qatar
基金
中国国家自然科学基金;
关键词
Underwater acoustic sensor networks (UASNs); trust model; support vector machine (SVM); MANAGEMENT;
D O I
10.1109/TVT.2019.2939179
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Underwater acoustic sensor networks (UASNs) have been widely applied in underwater scenarios where numerous anchoring or floating sensor nodes collaborate in performing some specific assignments, such as information collection or data transmission. In recent years, the trust model has been known as an important tool in responding to attackers inside the network. Although there are a number of trust models recently been suggested as effective methods for terrestrial networks, it is infeasible to directly apply these trust models in UASNs due to the complex underwater environment and the unreliable underwater acoustic communication. For the purpose of achieving accurate and robust trust evaluation for UASNs, a synergetic trust model based on SVM (STMS) is proposed in this paper. The network is divided into a certain number of interconnected clusters in which cluster heads and cluster members (CMs) are synergetic to perform functions. The STMS is mainly comprised of three parts. In the first part, three kinds of trust evidences, which are refined elaborately to reflect most of the attack results, are generated by CMs. In the second part, the support vector machine (SVM) technology is adopted in training a trust prediction model for evaluating accurate trust value. Furthermore, the mechanism of double cluster heads is presented to improve network security and lifetime in the third part. Simulation results demonstrate that STMS performs better than other related works in the sparse deployment environment, which is reflected in the aspect of detect accuracy of malicious nodes, success rate of communication and network lifetime.
引用
收藏
页码:11239 / 11247
页数:9
相关论文
共 50 条
  • [41] A Trust-Based Reliable Confident Information Coverage Model of Wireless Sensor Networks for Intelligent Transportation
    Xia, Yunzhi
    Deng, Xianjun
    Yi, Lingzhi
    Liu, Shenghao
    Yang, Laurence T.
    Zhu, Chenlu
    Tang, Xiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (07) : 9542 - 9554
  • [42] A hybrid trust model based on communication and social trust for vehicular social networks
    Fan, Na
    Shen, Shuai
    Wu, Chase Q.
    Yao, Junfeng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (05):
  • [43] Research on Trust Calculation of Wireless Sensor Networks Based on Time Segmentation
    Su, Yaoxin
    Gao, Xiufeng
    Qiao, Wenxin
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [44] Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey
    Fang, Weidong
    Zhang, Wuxiong
    Chen, Wei
    Pan, Tao
    Ni, Yepeng
    Yang, Yinxuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [45] Trust based secure routing mechanisms for wireless sensor networks: A survey
    Prabhu, S.
    Anita, Mary E. A.
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1003 - 1009
  • [46] SVM based Data Redundancy Elimination for Data Aggregation in Wireless Sensor Networks
    Patil, Prakashgoud
    Kulkarni, Umakant
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1309 - 1316
  • [47] Localization algorithm based on SVM-Data Fusion in wireless sensor networks
    Wang, Wei
    Huang, Tinglei
    Liu, Hui
    Pang, Fei
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 447 - +
  • [48] Multivalued trust routing based on topology level for wireless sensor networks
    Chen, Zhongwei
    Zhang, Ruihua
    Ju, Lei
    Wang, Wei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1516 - 1521
  • [49] A User Authentication Protocol Combined With Trust Model and ECC for Wireless Sensor Networks
    Liu, Tao
    Huang, Gan
    Xu, Zheng
    2016 IEEE 15TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI*CC), 2016, : 451 - 458
  • [50] Double-Scale Adaptive Transmission in Time-Varying Channel for Underwater Acoustic Sensor Networks
    Cen, Yi
    Liu, Mingliu
    Li, Deshi
    Meng, Kaitao
    Xu, Huihui
    SENSORS, 2021, 21 (06)