A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks

At present, Underwater Wireless Sensor Networks (UWSNs) have been widely used in enormous applications, and simultaneously face many security threats. The trust management mechanism plays an important role in protecting network security. Many theories, e.g., subjective logic, Bayesian, cloud model, entropy theory, evidence theory, etc., have been adopted to evaluate the node trust of wireless sensor networks. However, due to the unique characteristics of the underwater dynamic environment, the existing trust mechanisms used in traditional networks (such as P2P networks, Ad-hoc networks, etc.) cannot be directly used in UWSNs. Therefore, this paper proposes a new trust evaluation and update mechanism for underwater wireless sensor networks based on the C4.5 decision tree algorithm (TEUC). In the TEUC, trust evidences are first collected including data-based, link-based and node-based trust evidences. Then, the collected trust evidences are used to train the C4.5 decision tree. In addition, the reward and penalty factors are defined to update trust based on the sliding time window. Finally, simulation results demonstrate that the proposed algorithm outperforms the traditional ones in a dynamic network environment in terms of malicious node detection and energy consumption.

[1]  Kato Nei,et al.  Physical Layer Security in Large–Scale Probabilistic Caching: Analysis and Optimization , 2019, IEEE Communications Letters.

[2]  Jinglin Li,et al.  A Novel Trust Update Mechanism Based on Sliding Window for Trust Management System , 2016, ICCSA.

[3]  Mohsen Guizani,et al.  An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[4]  Mohsen Guizani,et al.  An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network , 2015, IEEE Transactions on Mobile Computing.

[5]  Nei Kato,et al.  Designing P2P Networks Tolerant to Attacks and Faults Based on Bimodal Degree Distribution , 2012, J. Commun..

[6]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[7]  Guangjie Han,et al.  A Trust Cloud Model for Underwater Wireless Sensor Networks , 2017, IEEE Communications Magazine.

[8]  Audun Jøsang,et al.  Optimal Trust Network Analysis with Subjective Logic , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[9]  Mohsen Guizani,et al.  A High-Availability Data Collection Scheme based on Multi-AUVs for Underwater Sensor Networks , 2020, IEEE Transactions on Mobile Computing.

[10]  Nei Kato,et al.  Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks , 2019, IEEE Communications Letters.

[11]  Qi Shi,et al.  Machine Learning Based Trust Computational Model for IoT Services , 2019, IEEE Transactions on Sustainable Computing.

[12]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[13]  Xiaofei Wang,et al.  Research on secure data collection in wireless multimedia sensor networks , 2012, Comput. Commun..

[14]  Mario Gerla,et al.  The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[15]  Xiaoping Li,et al.  A Trust Management System for Securing Data Plane of Ad-Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.

[16]  Sajal K. Das,et al.  A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Dependable and Secure Computing.

[17]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[18]  Zhenyu Liu,et al.  An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks , 2017, J. Sensors.

[19]  Zhaohui Wu,et al.  On Deep Learning for Trust-Aware Recommendations in Social Networks , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[20]  Guangjie Han,et al.  A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[21]  Zan Li,et al.  Secure Decode-and-Forward Relay SWIPT Systems With Power Splitting Schemes , 2018, IEEE Transactions on Vehicular Technology.

[22]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[23]  Bin Ma,et al.  Cross-Layer Trust Model and Algorithm of Node Selection in Wireless Sensor Networks , 2009, 2009 International Conference on Communication Software and Networks.

[24]  Mohsen Guizani,et al.  Prediction-Based Delay Optimization Data Collection Algorithm for Underwater Acoustic Sensor Networks , 2019, IEEE Transactions on Vehicular Technology.

[25]  Hongke Zhang,et al.  TC-BAC: A trust and centrality degree based access control model in wireless sensor networks , 2013, Ad Hoc Networks.

[26]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[27]  Guangjie Han,et al.  District Partition-Based Data Collection Algorithm With Event Dynamic Competition in Underwater Acoustic Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.

[28]  Wei Liu,et al.  Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks , 2019, IEEE Access.

[29]  Dai Hongjun,et al.  An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks , 2008, ICESS.

[30]  Frank Y. Li,et al.  A Novel Approach to Trust Management in Unattended Wireless Sensor Networks , 2014, IEEE Transactions on Mobile Computing.

[31]  Sushil Jajodia,et al.  Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation , 2009, IEEE Transactions on Vehicular Technology.

[32]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[33]  Sancheng Peng,et al.  A dynamic trust updating model based on multiple constraints in wireless mesh networks , 2013, 2013 IEEE Third International Conference on Information Science and Technology (ICIST).

[34]  MengChu Zhou,et al.  A Domain Partition-Based Trust Model for Unreliable Clouds , 2018, IEEE Transactions on Information Forensics and Security.

[35]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[36]  Xin Yang,et al.  cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.