Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence
| dc.contributor.author | Jiang, Bin | |
| dc.contributor.author | Zhou, Ronghao | |
| dc.contributor.author | Luo, Fei | |
| dc.contributor.author | Cui, Xuerong | |
| dc.contributor.author | Wang, Huihui Helen | |
| dc.contributor.author | Song, Houbing | |
| dc.date.accessioned | 2025-03-11T14:43:04Z | |
| dc.date.available | 2025-03-11T14:43:04Z | |
| dc.date.issued | 2025 | |
| dc.description.abstract | Underwater wireless sensor networks have been widely used in the acquisition and processing of oceanic information. The marine environment is complex and changeable, and the existence of obstacles is the main manifestation of the complex underwater environment, which affect the communication between underwater nodes. In addition, wireless sensor networks with obstacles are often more vulnerable to various attacks, making it more fragile. In order to address the aforementioned issues, we firstly propose a underwater wireless sensor deployment strategy with obstacle avoidance as the target (GEHO). After that, we use Tabtransformer algorithm to build trust model and detect attacks according to trust data set, which can enhance the robustness of the entire wireless sensor network. In the final stage, we collect the patterns of malicious attacks on nodes according to the detection results, which is convenient for us to make timely responses and reduce the losses of underwater acoustic sensor networks due to malicious attacks. The simulation results show that the trust model can effectively detect malicious nodes and attack types in the network, and has higher detection accuracy than the existing trust model. | |
| dc.description.sponsorship | This work was supported in part by Taishan Scholar Project under Grant tsqnz20230602, Natural Science Foundation of Shandong Province under Grant ZR2024MF115 and ZR2023LZH010, National Natural Science Foundation of China under Grant 52171341 and Youth Innovation University Team Project in Shandong under Grant 2022KJ062. | |
| dc.description.uri | https://ieeexplore.ieee.org/abstract/document/10876799 | |
| dc.format.extent | 13 pages | |
| dc.genre | journal articles | |
| dc.genre | postprints | |
| dc.identifier | doi:10.13016/m2kp7z-4zs6 | |
| dc.identifier.citation | Jiang, Bin, Ronghao Zhou, Fei Luo, Xuerong Cui, Huihui Helen Wang, and Houbing Herbert Song. "Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence". IEEE Transactions on Network Science and Engineering, 2025, 1–13. https://doi.org/10.1109/TNSE.2025.3539320. | |
| dc.identifier.uri | https://doi.org/10.1109/TNSE.2025.3539320 | |
| dc.identifier.uri | http://hdl.handle.net/11603/37799 | |
| dc.language.iso | en_US | |
| dc.publisher | IEEE | |
| dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
| dc.relation.ispartof | UMBC Information Systems Department | |
| dc.relation.ispartof | UMBC Faculty Collection | |
| dc.rights | © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
| dc.subject | Accuracy | |
| dc.subject | sensor deployment | |
| dc.subject | Wireless sensor networks | |
| dc.subject | attack types identification | |
| dc.subject | Oceans | |
| dc.subject | Plankton | |
| dc.subject | Tabtransformer | |
| dc.subject | Optimization | |
| dc.subject | Rocks | |
| dc.subject | Underwater acoustics | |
| dc.subject | Wireless communication | |
| dc.subject | hybrid trust model | |
| dc.subject | Training | |
| dc.subject | Data models | |
| dc.subject | Underwater wireless sensor networks | |
| dc.subject | UMBC Security and Optimization for Networked Globe Laboratory (SONG Lab) | |
| dc.title | Attack Detection and Optimal Deployment for Underwater Constrained Wireless Sensor Networks via Hybrid Trust Evidence | |
| dc.type | Text | |
| dcterms.creator | https://orcid.org/0000-0003-2631-9223 |
Files
Original bundle
1 - 1 of 1
