{"title":"TBR: Secure Routing Design for UWSN Based on Trust Management Models","authors":"Zhixin Liu;Zhen Sun;Jiawei Su;Yazhou Yuan;Xinping Guan","doi":"10.1109/JIOT.2025.3583776","DOIUrl":null,"url":null,"abstract":"Considering the harsh and complex environments in underwater wireless sensor networks (UWSNs), where the malicious nodes exist, the secure routing design is investigated in this article. The malicious nodes are a serious threat to the security of sensor networks. This article proposes a secure routing protocol, named trust based routing (TBR), that focus on how to evaluate and find the malicious nodes and then determine the reliable routing. The core idea of TBR is that a new trust management model is designed by considering the various historical behaviors of nodes in the interaction process, which is able to assess the trust value of a node based on past behaviors between nodes and protect against potential attacks in the network. And the extra factors, such as the remained energy of nodes, the distance between nodes and the trustiness are included in the routing criterions. Finally, a strategy for selecting relay nodes is proposed based on these considerations. Simulation results show that the proposed TBR algorithm can effectively defend against attacks from inside the network and is also more efficient and reliable compared to other existing routing protocols.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 17","pages":"36674-36685"},"PeriodicalIF":8.9000,"publicationDate":"2025-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11053972/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Considering the harsh and complex environments in underwater wireless sensor networks (UWSNs), where the malicious nodes exist, the secure routing design is investigated in this article. The malicious nodes are a serious threat to the security of sensor networks. This article proposes a secure routing protocol, named trust based routing (TBR), that focus on how to evaluate and find the malicious nodes and then determine the reliable routing. The core idea of TBR is that a new trust management model is designed by considering the various historical behaviors of nodes in the interaction process, which is able to assess the trust value of a node based on past behaviors between nodes and protect against potential attacks in the network. And the extra factors, such as the remained energy of nodes, the distance between nodes and the trustiness are included in the routing criterions. Finally, a strategy for selecting relay nodes is proposed based on these considerations. Simulation results show that the proposed TBR algorithm can effectively defend against attacks from inside the network and is also more efficient and reliable compared to other existing routing protocols.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.