You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

30 April 2024

An Adaptive Trust Evaluation Model for Detecting Abnormal Nodes in Underwater Acoustic Sensor Networks

,
,
and
1
School of Cyberspace Security, Hainan University, Haikou 570228, China
2
Key Laboratory of Internet Information Retrieval of Hainan Province, Haikou 570228, China
*
Author to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

Underwater acoustic sensor networks have a wide range of applications in both civil and military fields, but the complex and changing underwater environment makes them vulnerable to multiple security threats. Trust mechanisms are effective ways to enhance network security and reliability. In order to improve the accuracy of trust evaluation and the detection rate of abnormal nodes, this paper proposes an adaptive trust evaluation model based on fuzzy logic. This model adopts a variable weight fuzzy comprehensive evaluation algorithm to dynamically adjust the weights of three direct trust indicators to ensure the accuracy of direct trust evaluation. Then, it uses fuzzy closeness to eliminate unreliable recommendation trust and adjusts the weight of recommendation trust through deviation to improve the accuracy of indirect trust. The simulation results show that the model can effectively improve the accuracy of trust evaluation and the detection rate of abnormal nodes. Especially when the link quality is unstable, the success rate of detecting abnormal nodes in this model is improved by more than 10% compared with the existing trust model.

1. Introduction

In recent years, the application scope of underwater acoustic sensor networks (UASNs) has continuously expanded, ranging from marine scientific research to underwater resource detection and further to military reconnaissance and communication, demonstrating significant potential and value [1]. These networks leverage the characteristics of underwater sound wave propagation, constructing a widely covered and interconnected sensing system. However, with increasing applications, UASNs face various challenges [2], including the complexity of the underwater environment, noise interference, and signal attenuation, significantly impacting network stability and reliability [3]. Therefore, overcoming these challenges and enhancing the performance of underwater acoustic sensor networks is of profound significance for advancing underwater communication and detection technologies.
Currently, conventional security technologies such as identity authentication and security encryption can effectively resist external intruder attacks. However, once attackers successfully infiltrate the system, these technologies often struggle to cope [4]. In recent years, trust mechanisms have shown outstanding performance in detecting internal attacks. Trust, as a social concept, essentially reflects the subjective trust level in specific entity behavior, involving a complex cognitive process. In UASNs, each node evaluates its trustworthiness based on the past behavior of other nodes. By constructing a trust model, we can effectively identify and eliminate abnormal nodes in the network, thereby enhancing the overall security performance of the network [5].
In UASNs, due to the sparse distribution and frequent movement of sensor nodes, most nodes cannot communicate directly [6]. Additionally, malicious nodes in the network may launch attacks against other nodes while releasing benign signals to assessment nodes, disrupting trust evaluations. Therefore, relying solely on direct trust to determine node trustworthiness is insufficient. To avoid over-reliance on the subjective judgment of assessment nodes in trust calculations, the introduction of third-party node recommendation information is considered [7]. However, a core issue lies in the difficulty of ensuring the quality of recommendation information. Due to the instability of link quality, even minor biases in recommended trust may result in severe biases in the assessment of overall node performance [8]. This increases the difficulty and uncertainty of trust evaluation, requiring the exploration of more reliable and effective methods to address these challenges.
Despite significant progress made in enhancing the security of UASNs through trust models proposed in previous research and the adoption of effective filtering strategies to deal with unreliable recommendations, several challenges remain unresolved. Currently, many trust models often employ a simplistic threshold-based approach to filter seemingly unreliable recommendations. However, this method lacks effective means to deter malicious nodes, allowing them to disseminate misleading information within the network. Moreover, these models typically use a simple weighted average method to compute the final recommendation trust value for nodes, which may not accurately reflect the trustworthiness of the nodes. Furthermore, node trust values are not static but dynamically adjust over time and with changes in the network environment. This dynamic variation not only reflects the real-time nature of node behavior but also enhances the flexibility of trust evaluation.
To filter out anomalous nodes in the network and enhance its security and reliability, this paper proposes an adaptive trust evaluation model (ATEM) that dynamically assesses the trustworthiness of nodes. The study’s main contributions are as follows:
(1)
Considering the harsh underwater communication environment, it is necessary to evaluate the link quality between nodes first during trust assessment. Based on this evaluation, it is determined whether trust assessment should be conducted in the current cycle, reducing the impact of link quality on the accuracy of trust evaluation.
(2)
An adaptive fuzzy comprehensive evaluation algorithm based on variable weighting is proposed to comprehensively consider the multidimensional trust indicators of the target node. By dynamically adjusting the weights of each trust indicator, this algorithm highlights deficiencies in certain trust factors of the target node, thereby enhancing the accuracy of the trust evaluation model.
(3)
Fuzzy closeness theory is employed to calculate indirect trust, filtering out recommended nodes with significant deviation from the center. Through this process, nodes with a large deviation are removed, and weights are allocated based on the degree of deviation, thereby improving the reliability of indirect trust.
The remaining sections of this work are structured as follows. Section 2 summarizes relevant work on trust models. Section 3 describes the network concept and operating mechanism of the ATEM trust model. In Section 4, we conducted a simulation to assess the ATEM’s performance. Section 5 presents a summary of the article.

4. Trust Calculation

This section mainly explores trust computation, encompassing four core components: direct trust, indirect trust, comprehensive trust, and trust update. In the calculation of direct trust, we first compute the trust values for three direct trust indicators separately. Subsequently, we adopt a variable weight fuzzy comprehensive evaluation algorithm to dynamically adjust the weights of each indicator, and finally fuse them to obtain the direct trust value. In terms of indirect trust calculation, we eliminate recommendation trusts with large deviations through fuzzy closeness, and then dynamically assign weights to each recommendation trust based on the deviation, ultimately fusing them to derive the indirect trust value. Furthermore, we obtain the comprehensive trust value by integrating direct and indirect trusts. Lastly, we achieve dynamic trust updates by combining trust values from historical and current cycles.

4.1. Direct Trust

4.1.1. Trust Indicators Generation

There are various forms of internal attacks in UASNs, and to defend against different types of attacks, the selection of trust indicators should reflect these attack behaviors. While the more trust indicators selected, the more accurate the calculated trust value will be, the limited energy and computing capabilities of underwater wireless sensors prevent the consideration of all factors. Thus, there exists a balance between the selection of trust factors and the capabilities of the sensors themselves. Considering both attack behaviors and the accuracy of trust values, this paper selects the following three trust indicators.
(1)
Communication Trust
The communication behavior of nodes, especially the success and failure of communication during the time period T , has a direct impact on their communication trust within that period. In UASNs, the instability of communication channels is a significant characteristic, often affected by various factors such as environmental interference. This reliance solely on previous communication conditions to detect node communication behavior introduces considerable uncertainty. To address the impact of this uncertainty on trust assessment, we can employ subjective logic theory to compute the communication trust of nodes, with the following formula:
T c o m = 2 b + u 2
where b = s s + f + 1 , u = 1 s + f + 1 . s and f indicate the number of successful and failed communications, respectively.
(2)
Data Trust
The transmission of data between adjacent regions exhibits spatiotemporal correlation, allowing neighboring nodes to receive similar data information. Consequently, tampered data by malicious nodes will exhibit noticeable disparities from normal data. Assuming the perceived data by adjacent nodes follow a normal distribution, where the mean effectively represents the majority of data points, the mean value serves as a crucial metric for assessing data similarity and reliability. Thus, data trust can be represented as follows:
T d a t a = 2 ( 0.5 μ x d f ( x ) d x )
where x d represents the data from the target node, and μ refers to the mean value of this data set. As the gap between x d and μ increases, the reliability of the data decreases accordingly.
(3)
Energy Trust
In UASNs, due to limited energy, it naturally becomes a key indicator for measuring node reliability and performance. In a normal network environment, node energy consumption remains stable. However, when malicious nodes launch attacks, their node energy consumption tends to exhibit abnormal fluctuations. To appropriately measure the energy trustworthiness of nodes, we compute it using the target’s remaining energy. If the target node’s remaining energy is insufficient, it may be unable to complete its assigned responsibilities, and its energy trustworthiness value will be set to 0. Thus, the approach for calculating energy trust is the following:
T e n g = E r e s E i n i ; E r e s δ 0 ; e l s e
where E i n i and E r e s represent the initial energy and remaining energy of the target node, respectively.

4.1.2. Direct Trust Calculation

The purpose of this work is to reliably determine the direct trust value of nodes using a data fusion approach that incorporates several trust variables. Currently, weighted-averages-based trust models frequently rely on subjective experience to calculate weights, resulting in a lack of impartiality and precision. This study presents a variable-weight fuzzy comprehensive assessment method to improve trust evaluation accuracy and fairness. The basic principle behind this approach is that when the value of a trust factor is low, suggesting a possible negative influence on network performance, we raise its weight. This allows the fused direct trust value to better represent the node’s real performance in the network, especially when malicious nodes are present. The potential harm they do will be emphasized, making the final trust value more accurate and dependable. The implementation stages for this technique are as follows:
(1)
Establish trust factor set and direct trust evaluation set
First, the trust factor set T = T c o m , T d a t a , T e n g is established through the three trust factors selected above, and then we define three fuzzy evaluation sets U = u 1 , u 2 , u 3 , where u i ( i = 1 , 2 , 3 ) , which respectively represent “complete distrust”, “slightly trust”, and “highly trust”, reflecting the level of trust between nodes.
(2)
Build membership matrix
We use membership functions to convert the values of each trust indicator into the corresponding membership degrees of the evaluation subsets. In this paper, we employ trapezoidal membership functions to obtain the membership matrix. Each row of the membership matrix E reflects the degree of membership of the corresponding direct trust factor to each evaluation subset, as shown below:
E = e 11 e 12 e 13 e 21 e 22 e 23 e 31 e 32 e 33
where e i j represents the affiliation relationship between the trust dimension factor T i and the fuzzy evaluation subset u i .
(3)
Confirm weights
For a given set of trust indicators T = T 1 , T 2 , T 3 , the corresponding base weights w m i ( i = 1 , 2 , 3 ) can be obtained using the analytic hierarchy process (AHP), representing the weights when all trust indicators are at their optimal levels, satisfying i = 1 3 w m i = 1 . Assuming trust indicator T i is at its worst while all other trust indicators are at their best, the weight w 0 i ( i = 1 , 2 , 3 ) can be calculated using the following equation:
w 0 i = w m i min w m j + max w m j ( 1 j 3 )
We can introduce a non-increasing function γ i ( T i ) [ 0 , 1 ] , where the maximum value of T i within its range can be represented as γ i ( 0 ) = γ 0 i , and the minimum value can be represented as γ i ( 1 ) = γ m i . Therefore, the weight w i ( i = 1 , 2 , 3 ) corresponding to T i can be calculated using the following formula:
w i = γ i j = 1 3 γ j
From the above equation, it can be observed that w i can be used as a variable weight and a non-increasing function about T i . i = 1 3 w i T i is a non-decreasing function of T i .
(4)
Fuzzy Comprehensive Evaluation Result
By utilizing the previously calculated trust weight vector W and the membership matrix E , we can compute the result vector of fuzzy synthesis evaluation according to the following formula:
D = W E
where represents the fuzzy synthesis operator, and in this paper, we employ a weighted averaging operator. Subsequently, we utilize the centroid method to defuzzify the evaluation result vector, obtaining the direct trust value within this cycle.

4.2. Indirect Trust

The relationship of indirect trust is illustrated in Figure 2, where node i serves as the evaluation node, node j as the target node, and nodes k and l as common neighbors of nodes i and j , respectively. When assessing the indirect trust of a target node, the fuzzy proximity theory is applied to address potential false recommendation information. This method evaluates the proximity of each neighboring node’s direct trust value to the target node and allocates weights reasonably based on the deviation between the recommended trust value and the central value. Consequently, the final indirect trust value is obtained.
Figure 2. The relationship of indirect trust.
The evaluation process begins by screening the recommended trust values of common neighboring nodes, followed by weight allocation according to the deviation of these nodes’ recommended trust values. Ultimately, the indirect trust value can be obtained using the following calculation formula:
I T i j ( t ) = k S f w k × R T i j k ( t )
where S f represents the node set after filtering the common neighbor nodes, w k represents the weight of any node in the neighbor node set, and R T i j k ( t ) denotes the recommended trust value of neighbor node k to target node j at time t . Through this method, we can more accurately quantify the indirect trust level of the target node, thereby providing more accurate data support for overall trust evaluation.
Since trust possesses the property of transitivity in the network, when node k serves as a common neighbor, its recommended trust value R T i j k ( t ) for target node j can be calculated using the following formula:
R T i j k ( t ) = D T i k ( t ) × D T k j ( t )
In the same period T and the same monitoring area, since the external environment of the nodes is the same, the values of the same trust factor collected by different neighbor nodes k for the target node j should be similar and tend to a certain value. If false recommendations exist in the network, their recommendation information will noticeably deviate from that of neighboring nodes. Therefore, based on the above analysis, the concept of closeness in fuzzy mathematics can be employed to calculate the degree of proximity of each common neighboring node to the target node’s direct trust value within the same period T .
In the same period T , we define the proximity ρ k l of common neighboring nodes k and l to the target node j ’s direct trust value as:
ρ k l = min D T k j ( t ) , D T l j ( t ) max D T k j ( t ) , D T l j ( t )
Assuming there are q neighboring nodes between the evaluating node and the target node, the proximity matrix M of common neighboring nodes to the target node can be obtained as follows:
M = 1 ρ 12 ρ 1 q ρ 21 1 ρ 2 q ρ q 1 ρ q 2 1
The sum of each row element in matrix M , represented as l = 1 q ρ k l , signifies the trust proximity of a common neighboring node k with other neighboring nodes. Since it is necessary to remove the proximity of neighboring nodes to themselves, the average trust closeness ρ k ¯ between the common neighbor node k and other surrounding neighbor nodes is defined as follows:
ρ k ¯ = l = 1 , l k q 1 ρ k l q 1
The above expression reflects the trust closeness of neighboring node k to target node j compared to other neighboring nodes. If ρ k ¯ is relatively large, it indicates that neighboring node k is close in trust value to the surrounding neighboring nodes regarding target node j , implying that this neighboring node has higher credibility. Conversely, if ρ k ¯ is relatively small, it indicates that neighboring node k deviates from the trust values of the surrounding neighboring nodes regarding target node j , suggesting that the credibility of this node is low, and it may provide false recommendation trust values to the evaluating node.
To ensure the accuracy of recommended trust, it is possible to filter out potentially malicious recommendations by comparing the deviation between the recommended trust and the central value. We define the deviation degree d k between the average trust closeness of a common neighbor node and other surrounding neighbor nodes and the total trust closeness as follows:
d k = ρ k ¯ ρ 0
where ρ 0 represents the sum of the trust proximities of all common neighboring nodes. Its calculation formula is given below:
ρ 0 = k = 1 q l = 1 , l k q 1 ρ k l
If the value of d k is larger, it reflects that the trust closeness of common neighbor node k to target node j deviates from the central value. Then, the recommended trust of neighbor node k is likely to be a malicious false recommendation, and its recommended trust value should be discarded. Therefore, in order to filter out malicious false recommendation trust, the deviation threshold value θ is defined to filter out the recommendation trust with deviation d k > θ . For neighbor nodes with d k θ , stored in the set S f , the trust value of malicious false recommendations can be filtered.
However, the method of filtering out malicious false recommendation trust values by setting the deviation threshold θ and obtaining the reliable recommendation trust node set S f will not eliminate all malicious recommendation trust. Since the deviation reflects the extent to which the recommended trust value of neighboring nodes deviates from the central value, for a more accurate assessment of the target node’s indirect trust, we can allocate different weights to each node in the neighbor node set S f based on their deviation. The larger the deviation d k , the greater the probability that neighbor node k provides false recommendations. Therefore, in data fusion, its weight should be smaller. We define the total deviation degree D ( t ) of node recommendation trust in the set S f as follows:
D ( t ) = k S f d k ( t )
The numerical relationship r k ( t ) between the total offset degree D ( t ) of node recommendation trust in the set S f and any offset degree d k ( t ) is as follows:
r k ( t ) = D ( t ) d k ( t )
Then, the weight w k of any node k in the neighbor node set S f can be calculated through normalization:
w k = r k ( t ) k S f r k ( t )
The final indirect trust I T i j ( t ) is calculated as follows:
I T i j ( t ) = k S f w k × R T i j k ( t ) = k S f r k ( t ) × D T i k ( t ) × D T k j ( t ) k S f r k ( t )

4.3. Comprehensive Trust

To solve the issue of constantly shifting weights for direct and indirect trust in the computation of comprehensive trust values, a balance weight factor is proposed. The computation of comprehensive trust values is often represented as shown below:
T i j ( t ) = φ D T i j ( t ) + ( 1 φ ) I T i j ( t )
where φ is the balance weight factor, satisfying φ [ 0 , 1 ] , and the value of φ denotes the weight of direct and suggested trust in the entire trust computation process from node i to target node j . Fixed experience values are commonly employed in literature to integrate trust. Due to the dynamic mobility of undersea nodes, which might join or leave the network at any moment, we include a balancing weight factor function, designated as φ , to guarantee that the trust evaluation model appropriately represents the actual situation.
φ = f ( n ) = 1 2 + 1 π arctan 10 × n N t h N
where φ dynamically changes with the variation in interaction count n , thus dynamically adjusting the weights. And N represents the maximum possible interaction count between nodes, and N t h is a specific threshold. When the interaction count n exceeds the threshold N t h , it implies that there is sufficient interaction between the evaluating node and the target node. Therefore, we can rely more on direct trust and appropriately increase the weight of direct trust. Conversely, when the interaction count n is minimal, the target node is relatively unfamiliar compared to the evaluation result. The direct trust value cannot accurately reflect the true reliability of the target node. Hence, the evaluating node can rely more on indirect trust to assess the credibility of the target node.

4.4. Trust Update

Given that malevolent nodes might pose as genuine entities to boost their trustworthiness, node trust levels must be updated on a frequent basis. This method enables a more rapid reflection of the network’s current state, assuring the correctness of trust evaluation and successfully identifying and isolating potential malicious nodes in order to preserve network security and stability. Given the temporal sensitivity of trust, we present a sliding time window approach that uses trust values from several time cycles as historical trust factors to update trust values dynamically. This approach ensures that we fully consider the historical behavior of nodes when evaluating trust, thereby achieving more reliable trust assessment.
T i j ( t ) = μ T i j c ( t ) + ( 1 μ ) T i j ( t 1 )
where T i j c ( t ) represents the comprehensive trust value of the current period, and T i j ( t 1 ) represents the comprehensive trust value of the previous historical period. For trust value, μ represents the adaptive weight factor.

5. Simulation Results and Performance Analysis

In this section, we established a simulation environment using MATLAB R2020b to conduct experimental simulations on ATEM and performed comparative analysis on its performance. In the experimental setup, 100 nodes were randomly deployed within a 1000 m × 1000 m × 1000 m area, following the MCM model for mobility [19]. The communication range of each node was set to 400 m. First, our main goal was to investigate how the trust model’s performance is affected by the variable-weight fuzzy comprehensive evaluation technique. Experimental verification indicated the algorithm’s great usefulness in improving trust evaluation accuracy and dynamic flexibility. We then validated the usefulness and accuracy of the suggestion filtering method using fuzzy set progress theory. The experimental findings show that this technique may successfully filter out false suggestion information, increasing the overall reliability of trust evaluation. Finally, we evaluated the proposed ATEM against two existing trust models, ARTMM and LTrust. The comparative experimental findings support the benefits of ATEM in trust evaluation for UASNs. The specific simulation parameters are shown in Table 1.
Table 1. Simulation parameters.

5.1. Performance of ATEM

5.1.1. Variable Weight and Constant Weight

We compared the variable-weight fuzzy comprehensive evaluation technique to the constant-weight fuzzy comprehensive evaluation methodology to see how effective it was in increasing the trust model’s performance. In this simulated experiment, rogue nodes were randomly placed over the network to conduct data-tampering attacks. We then investigated and contrasted the effects of the two approaches on nodes’ direct trust ratings in the same environment.
Due to the data tampering attacks launched by malicious nodes, their data trust values tend to be relatively low. Therefore, in the variable-weight fuzzy synthesis evaluation algorithm, data trust indicators are assigned higher weights to highlight their impact on trust evaluation results. However, in the constant-weight algorithm, the weight of each trust indicator is set to a fixed value based on experience. This may lead to a situation where the final direct trust value remains high when other trust indicator values are high, failing to intuitively reflect the impact of defective trust indicators on trust evaluation results. As shown in Figure 3, when using the variable-weight algorithm, the trust of anomalous nodes rapidly decreases, demonstrating the algorithm’s rapid response to abnormal behavior. However, in the constant-weight algorithm, the presence of other trust indicators weakens the impact of defective trust indicators on trust evaluation results, resulting in a slow decline in trust values. Nevertheless, both algorithms perform well in reflecting the trust values of normal nodes. This result validates the effectiveness of the variable-weight algorithm in improving the performance of the trust model.
Figure 3. Variable weight and constant weight.

5.1.2. Recommendation Filtering Mechanism

Bad-mouth attacks are a common method employed against trust recommendations. Malicious nodes modify the trust values of target nodes, disturbing the indirect trust assessment between normal and malicious nodes, jeopardizing network security. In this simulated experiment, we presume that hostile nodes simply supply bogus trust values and do not carry out other forms of attacks. We gradually increase the proportion of malicious nodes from 5% to 45% to observe their impact on the network trust mechanism. To comprehensively evaluate the effectiveness of the proposed anomaly node detection model, we compare the recommended trust values under three different scenarios. Firstly, we set an expected value, indicating the recommended trust value that target nodes should receive when there are no unreliable recommendation nodes in the network. Secondly, we apply the proposed recommendation filtering mechanism and calculate the filtered recommended trust values. Finally, we also consider a simple and direct method, averaging all recommended trust values without employing any filtering mechanism.
Figure 4 indicates that when the proportion of malicious nodes grows, the indirect trust ratings of regular nodes fall considerably under bad-mouth assaults. It is worth mentioning, however, that the proposed suggestion filtering strategy has only a little impact on indirect trust ratings. This is because, without a filtering mechanism, each node’s proposal value is treated equally, and all recommendation information in the network is accepted unconditionally. As the proportion of malicious nodes rises, so does the amount of incorrect information in the suggestion sequence. This has a significant impact on indirect trust scores. In contrast, the proposed filtering strategy is crucial for determining the appropriate trust levels. Using fuzzy closeness theory, this system successfully finds and filters out untrustworthy suggestion information, assuring the correctness and dependability of indirect trust ratings. This result clearly demonstrates the effectiveness of the proposed anomalous node detection strategy in countering bad-mouth assaults.
Figure 4. Recommendation filtering mechanism.

5.2. Comparison to Other Works

In this simulated experiment, we compared it to two other trust models: ARTMM and LTrust. We identified the destination node as normal and ran simulations in which the connection quality varied between poor and excellent.
Figure 5 indicates that low connection quality has a major influence on both the ARTMM and LTrust trust models. The proposed ATEM trust model, on the other hand, eliminates the effect of previous poor link quality on subsequent trust value evaluations by refusing to update trust values during times of low link quality. As a result, in complex underwater environments, ATEM can provide more accurate and consistent node trust values.
Figure 5. Dynamic variations in link quality.
To provide a more complete picture of ATEM’s performance, we ran a detection success rate test with a high malicious node rate of 30%. Under the influence of poor link quality, typical node trust values may fall below 0.5, and trust values from previous cycles may have an impact on the current cycle’s trust values. As the cumulative effect of low connection quality builds up, trust ratings continue to fall, potentially leading to more normal nodes being misclassified as malicious. However, as seen in Figure 6, the ATEM trust model successfully mitigates the fall in trust values of normal nodes by pausing trust value updates during periods of low connection quality. This reduces the possible influence on future trust value evaluations, considerably minimizing the chance of misidentifying normal nodes as malicious ones. As a result, in the ATEM trust model, there is a big disparity between the trust ratings of most normal nodes and malicious nodes, which leads to a significant increase in the success rate of harmful node identification. This finding indicates the ATEM trust model’s improved performance and stability in complicated network contexts.
Figure 6. The proportion of malicious detections that are successful.

6. Conclusions

This paper addresses two major challenges in UASNs: dynamic adjustment of trust indicator weights and filtering of recommended nodes. It proposes an adaptive trust evaluation model for detecting anomalous nodes in underwater acoustic sensor networks. The model aims to accurately calculate node trust values and effectively identify abnormal nodes in the network. In constructing the model, we comprehensively consider three categories of trust indicators and utilize a variable-weight fuzzy comprehensive evaluation algorithm for data fusion. By dynamically adjusting the weights of trust indicators, the model highlights the impact of defective trust indicators on trust evaluation, thereby improving the accuracy of direct trust evaluation. Subsequently, in the recommendation filtering strategy, the model based on fuzzy closeness theory effectively filters out recommended nodes with significant deviation and optimizes the calculation of indirect trust values based on deviation, reducing the influence of malicious recommended nodes on trust evaluation. Simulation results demonstrate that the model accurately identifies abnormal nodes, significantly enhancing the detection rate of the trust model.
In future research, we plan to further optimize the trust evaluation model, improve the link quality assessment method to more accurately reflect the actual link status, and consider the impact of environmental noise on underwater acoustic communication to further enhance network security and reliability.

Author Contributions

C.L., F.A., W.J. and J.Y. The following are the contributions made by the authors: conceptualization, C.L. and W.J.; methodology, C.L. and J.Y.; software, F.A.; validation, C.L., F.A. and W.J.; formal analysis, C.L.; investigation, C.L.; resources, C.L.; data curation, C.L. and F.A.; writing—original draft preparation, C.L.; writing—review and editing, C.L., F.A. and J.Y.; visualization, C.L.; supervision, C.L., F.A., W.J. and J.Y.; project administration, C.L. and J.Y.; funding acquisition, J.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (No. 62162020), the Hainan Province Science and Technology Special Fund (ZDKJ2021052), and the Haikou Science and Technology Special Fund (No. 2022-040).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Tuna, G.; Gungor, V.C. A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks. Int. J. Commun. Syst. 2017, 30, e3350. [Google Scholar] [CrossRef]
  2. Gupta, O.; Goyal, N.; Anand, D.; Kadry, S.; Nam, Y.; Singh, A. Underwater networked wireless sensor data collection for computational intelligence techniques: Issues, challenges, and approaches. IEEE Access 2020, 8, 122959–122974. [Google Scholar] [CrossRef] [PubMed]
  3. Sendra, S.; Lloret, J.; Jimenez, J.M.; Parra, L. Underwater acoustic modems. IEEE Sens. J. 2015, 16, 4063–4071. [Google Scholar] [CrossRef]
  4. Han, G.; He, Y.; Jiang, J.; Wang, H.; Peng, Y.; Fan, K. Fault-tolerant trust model for hybrid attack mode in underwater acoustic sensor networks. IEEE Netw. 2020, 34, 330–336. [Google Scholar] [CrossRef]
  5. Du, J.; Han, G.; Lin, C.; Martínez-García, M. ITrust: An anomaly-resilient trust model based on isolation forest for underwater acoustic sensor networks. IEEE Trans. Mob. Comput. 2020, 21, 1684–1696. [Google Scholar] [CrossRef]
  6. Du, J.; Han, G.; Lin, C.; Martínez-García, M. LTrust: An adaptive trust model based on LSTM for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 2022, 21, 7314–7328. [Google Scholar] [CrossRef]
  7. Pang, B.; Teng, Z.; Sun, H.; Du, C.; Li, M.; Zhu, W. A malicious node detection strategy based on fuzzy trust model and the abc algorithm in wireless sensor network. IEEE Wirel. Commun. Lett. 2021, 10, 1613–1617. [Google Scholar] [CrossRef]
  8. Zhang, M.; Feng, R.; Zhang, H.; Su, Y. A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks. Future Gener. Comput. Syst. 2023, 145, 466–477. [Google Scholar] [CrossRef]
  9. Su, Y.; Mal, S.; Jin, Z.; Fu, X.; Li, Y.; Liu, X. A trust model for underwater acoustic sensor networks based on fast link quality assessment. In Proceedings of the Global Oceans 2020: Singapore–US Gulf Coast, Biloxi, MS, USA, 5–30 October 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
  10. Han, G.; Jiang, J.; Shu, L.; Guizani, M. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput. 2015, 14, 2447–2459. [Google Scholar] [CrossRef]
  11. Su, Y.; Ma, S.; Zhang, H.; Jin, Z.; Fu, X. A redeemable SVM-DS fusion-based trust management mechanism for underwater acoustic sensor networks. IEEE Sens. J. 2021, 21, 26161–26174. [Google Scholar] [CrossRef]
  12. Jiang, J.; Han, G.; Wang, F.; Shu, L.; Guizani, M. An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2014, 26, 1228–1237. [Google Scholar] [CrossRef]
  13. Wu, X.; Huang, J.; Ling, J.; Shu, L. BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access 2019, 7, 43679–43690. [Google Scholar] [CrossRef]
  14. Ye, Z.; Wen, T.; Liu, Z.; Song, X.; Fu, C. An efficient dynamic trust evaluation model for wireless sensor networks. J. Sens. 2017, 2017, 7864671. [Google Scholar] [CrossRef]
  15. Anwar, R.W.; Zainal, A.; Outay, F.; Yasar, A.; Iqbal, S. BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Gener. Comput. Syst. 2019, 96, 605–616. [Google Scholar] [CrossRef]
  16. Sun, B.; Li, D. A comprehensive trust-aware routing protocol with multi-attributes for WSNs. IEEE Access 2017, 6, 4725–4741. [Google Scholar] [CrossRef]
  17. Alnasser, A.; Sun, H.; Jiang, J. Recommendation-based trust model for vehicle-to-everything (V2X). IEEE Internet Things J. 2019, 7, 440–450. [Google Scholar] [CrossRef]
  18. Adewuyi, A.A.; Cheng, H.; Shi, Q.; Cao, J.; MacDermott, Á.; Wang, X. CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J. 2019, 6, 5432–5445. [Google Scholar] [CrossRef]
  19. Caruso, A.; Paparella, F.; Vieira, L.F.M.; Erol, M.; Gerla, M. The meandering current mobility model and its impact on underwater mobile sensor networks. In Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 221–225. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.