Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence

Date

2025

Department

Program

Citation of Original Publication

Jiang, Bin, Ronghao Zhou, Fei Luo, Xuerong Cui, Huihui Helen Wang, and Houbing Herbert Song. "Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence". IEEE Transactions on Network Science and Engineering, 2025, 1–13. https://doi.org/10.1109/TNSE.2025.3539320.

Rights

© 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Abstract

Underwater wireless sensor networks have been widely used in the acquisition and processing of oceanic information. The marine environment is complex and changeable, and the existence of obstacles is the main manifestation of the complex underwater environment, which affect the communication between underwater nodes. In addition, wireless sensor networks with obstacles are often more vulnerable to various attacks, making it more fragile. In order to address the aforementioned issues, we firstly propose a underwater wireless sensor deployment strategy with obstacle avoidance as the target (GEHO). After that, we use Tabtransformer algorithm to build trust model and detect attacks according to trust data set, which can enhance the robustness of the entire wireless sensor network. In the final stage, we collect the patterns of malicious attacks on nodes according to the detection results, which is convenient for us to make timely responses and reduce the losses of underwater acoustic sensor networks due to malicious attacks. The simulation results show that the trust model can effectively detect malicious nodes and attack types in the network, and has higher detection accuracy than the existing trust model.