Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence

dc.contributor.authorJiang, Bin
dc.contributor.authorZhou, Ronghao
dc.contributor.authorLuo, Fei
dc.contributor.authorCui, Xuerong
dc.contributor.authorWang, Huihui Helen
dc.contributor.authorSong, Houbing
dc.date.accessioned2025-03-11T14:43:04Z
dc.date.available2025-03-11T14:43:04Z
dc.date.issued2025
dc.description.abstractUnderwater wireless sensor networks have been widely used in the acquisition and processing of oceanic information. The marine environment is complex and changeable, and the existence of obstacles is the main manifestation of the complex underwater environment, which affect the communication between underwater nodes. In addition, wireless sensor networks with obstacles are often more vulnerable to various attacks, making it more fragile. In order to address the aforementioned issues, we firstly propose a underwater wireless sensor deployment strategy with obstacle avoidance as the target (GEHO). After that, we use Tabtransformer algorithm to build trust model and detect attacks according to trust data set, which can enhance the robustness of the entire wireless sensor network. In the final stage, we collect the patterns of malicious attacks on nodes according to the detection results, which is convenient for us to make timely responses and reduce the losses of underwater acoustic sensor networks due to malicious attacks. The simulation results show that the trust model can effectively detect malicious nodes and attack types in the network, and has higher detection accuracy than the existing trust model.
dc.description.sponsorshipThis work was supported in part by Taishan Scholar Project under Grant tsqnz20230602, Natural Science Foundation of Shandong Province under Grant ZR2024MF115 and ZR2023LZH010, National Natural Science Foundation of China under Grant 52171341 and Youth Innovation University Team Project in Shandong under Grant 2022KJ062.
dc.description.urihttps://ieeexplore.ieee.org/abstract/document/10876799
dc.format.extent13 pages
dc.genrejournal articles
dc.genrepostprints
dc.identifierdoi:10.13016/m2kp7z-4zs6
dc.identifier.citationJiang, Bin, Ronghao Zhou, Fei Luo, Xuerong Cui, Huihui Helen Wang, and Houbing Herbert Song. "Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence". IEEE Transactions on Network Science and Engineering, 2025, 1–13. https://doi.org/10.1109/TNSE.2025.3539320.
dc.identifier.urihttps://doi.org/10.1109/TNSE.2025.3539320
dc.identifier.urihttp://hdl.handle.net/11603/37799
dc.language.isoen_US
dc.publisherIEEE
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department
dc.relation.ispartofUMBC Faculty Collection
dc.rights© 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.subjectAccuracy
dc.subjectsensor deployment
dc.subjectWireless sensor networks
dc.subjectattack types identification
dc.subjectOceans
dc.subjectPlankton
dc.subjectTabtransformer
dc.subjectOptimization
dc.subjectRocks
dc.subjectUnderwater acoustics
dc.subjectWireless communication
dc.subjecthybrid trust model
dc.subjectTraining
dc.subjectData models
dc.subjectUnderwater wireless sensor networks
dc.subjectUMBC Security and Optimization for Networked Globe Laboratory (SONG Lab)
dc.titleAttack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0003-2631-9223

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Attack_Detection.pdf
Size:
3.37 MB
Format:
Adobe Portable Document Format