Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence
Loading...
Links to Files
Author/Creator
Author/Creator ORCID
Date
2025
Type of Work
Department
Program
Citation of Original Publication
Jiang, Bin, Ronghao Zhou, Fei Luo, Xuerong Cui, Huihui Helen Wang, and Houbing Herbert Song. "Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence". IEEE Transactions on Network Science and Engineering, 2025, 1–13. https://doi.org/10.1109/TNSE.2025.3539320.
Rights
© 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Subjects
Accuracy
sensor deployment
Wireless sensor networks
attack types identification
Oceans
Plankton
Tabtransformer
Optimization
Rocks
Underwater acoustics
Wireless communication
hybrid trust model
Training
Data models
Underwater wireless sensor networks
UMBC Security and Optimization for Networked Globe Laboratory (SONG Lab)
sensor deployment
Wireless sensor networks
attack types identification
Oceans
Plankton
Tabtransformer
Optimization
Rocks
Underwater acoustics
Wireless communication
hybrid trust model
Training
Data models
Underwater wireless sensor networks
UMBC Security and Optimization for Networked Globe Laboratory (SONG Lab)
Abstract
Underwater wireless sensor networks have been widely used in the acquisition and processing of oceanic information. The marine environment is complex and changeable, and the existence of obstacles is the main manifestation of the complex underwater environment, which affect the communication between underwater nodes. In addition, wireless sensor networks with obstacles are often more vulnerable to various attacks, making it more fragile. In order to address the aforementioned issues, we firstly propose a underwater wireless sensor deployment strategy with obstacle avoidance as the target (GEHO). After that, we use Tabtransformer algorithm to build trust model and detect attacks according to trust data set, which can enhance the robustness of the entire wireless sensor network. In the final stage, we collect the patterns of malicious attacks on nodes according to the detection results, which is convenient for us to make timely responses and reduce the losses of underwater acoustic sensor networks due to malicious attacks. The simulation results show that the trust model can effectively detect malicious nodes and attack types in the network, and has higher detection accuracy than the existing trust model.