An Energy-Balanced Trust Cloud Migration Scheme for Underwater Acoustic Sensor Networks

As a candidate trust management scheme, trust models based on the cloud theory are always taken into account when detecting malicious attacks in Underwater Acoustic Sensor Networks (UASNs). To evaluate the trust values of nodes accurately, the evidence of trust ought to be collected frequently. As a result, continual trust update results in excessive energy consumption or premature death of some sensor nodes that are close to the trust cloud node. To address the above issues, in this paper, we propose an Energy-balanced Trust Cloud Migration scheme (ETCM) for UASNs, which consists of Destination Node Determination (DND), trust cloud migration and trust cloud update. Particularly, DND is performed hierarchically to obtain the destination node for trust cloud migration by selecting the candidate destination clusters, determining the destination cluster and the destination node, respectively. First, the candidate destination clusters are selected based on the distribution for the overall residual energy in UASNs using the simulated annealing algorithm. Then, an indicator of Cluster Ability (CA) is proposed to seek the destination cluster. Particularly, to calculate CA, the improved standardized Euclidean distance formula is employed to evaluate the connectivity between clusters and their neighboring clusters. Finally, on the basis of the defined node density reachability and the residual energy, the Node Ability (NA) is presented to indicate the capacity of nodes for trust cloud storage, calculation and update. The destination node in the destination cluster can be determined as the new trust cloud node using the NA. Simulation results demonstrate that the proposed ETCM scheme can balance energy consumption, increase node survival ratio and prolong lifetime effectively.

[1]  Abdul Hanan Abdullah,et al.  A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing , 2017, IEEE Access.

[2]  Ning Sun,et al.  Secure communication for underwater acoustic sensor networks , 2015, IEEE Communications Magazine.

[3]  Tong Zhang,et al.  Trust evaluation method for clustered wireless sensor networks based on cloud model , 2016, Wirel. Networks.

[4]  Zaibin Jiao,et al.  A D-S evidence theory-based relay protection system hidden failures detection method in smart grid , 2018, 2017 IEEE Power & Energy Society General Meeting.

[5]  Jiajia Liu,et al.  Task Offloading in UAV-Aided Edge Computing: Bit Allocation and Trajectory Optimization , 2019, IEEE Communications Letters.

[6]  Peng Jiang,et al.  Node Deployment Algorithm for Underwater Sensor Networks Based on Connected Dominating Set , 2016, Sensors.

[7]  Hao Wang,et al.  On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks † , 2016, Sensors.

[8]  Jianfeng Ma,et al.  Cooperative Jammer Placement for Physical Layer Security Enhancement , 2016, IEEE Network.

[9]  Mohsen Guizani,et al.  An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network , 2015, IEEE Transactions on Mobile Computing.

[10]  Raouf Boutaba,et al.  Joint Routing and Energy Management in UnderWater Acoustic Sensor Networks , 2017, IEEE Transactions on Network and Service Management.

[11]  Michael Zuba,et al.  Launching denial-of-service jamming attacks in underwater sensor networks , 2011, WUWNet '11.

[12]  Hai Zhao,et al.  DTE-SDN: A Dynamic Traffic Engineering Engine for Delay-Sensitive Transfer , 2018, IEEE Internet of Things Journal.

[13]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[14]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[15]  Nei Kato,et al.  TSP Security in Intelligent and Connected Vehicles: Challenges and Solutions , 2019, IEEE Wireless Communications.

[16]  Jiajia Liu,et al.  Stochastic Geometric Analysis of Multiple Unmanned Aerial Vehicle-Assisted Communications Over Internet of Things , 2019, IEEE Internet of Things Journal.

[17]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[18]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[19]  Huifang Wang,et al.  Research on Multiobjective Group Decision-Making in Condition-Based Maintenance for Transmission and Transformation Equipment Based on D-S Evidence Theory , 2015, IEEE Transactions on Smart Grid.

[20]  Nirvana Meratnia,et al.  Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers , 2014, Sensors.

[21]  Ji Guo,et al.  A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[22]  Limin Sun,et al.  Security and privacy in localization for underwater sensor networks , 2015, IEEE Communications Magazine.

[23]  Dong Yue,et al.  An Energy-Efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Acoustic Sensor Networks , 2016, IEEE Sensors Journal.

[24]  Guangjie Han,et al.  A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[25]  Guangjie Han,et al.  A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks , 2016, Sensors.

[26]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[27]  Mauro Conti,et al.  Secure underwater acoustic networks: Current and future research directions , 2016, 2016 IEEE Third Underwater Communications and Networking Conference (UComms).

[28]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[29]  A. K. Mohapatra,et al.  Combined Routing and Node Replacement in Energy-Efficient Underwater Sensor Networks for Seismic Monitoring , 2013, IEEE Journal of Oceanic Engineering.

[30]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[31]  Guangjie Han,et al.  A Trust Cloud Model for Underwater Wireless Sensor Networks , 2017, IEEE Communications Magazine.

[32]  Mari Carmen Domingo,et al.  Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.