TBR: Secure Routing Design for UWSN Based on Trust Management Models

IF 8.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Zhixin Liu;Zhen Sun;Jiawei Su;Yazhou Yuan;Xinping Guan
{"title":"TBR: Secure Routing Design for UWSN Based on Trust Management Models","authors":"Zhixin Liu;Zhen Sun;Jiawei Su;Yazhou Yuan;Xinping Guan","doi":"10.1109/JIOT.2025.3583776","DOIUrl":null,"url":null,"abstract":"Considering the harsh and complex environments in underwater wireless sensor networks (UWSNs), where the malicious nodes exist, the secure routing design is investigated in this article. The malicious nodes are a serious threat to the security of sensor networks. This article proposes a secure routing protocol, named trust based routing (TBR), that focus on how to evaluate and find the malicious nodes and then determine the reliable routing. The core idea of TBR is that a new trust management model is designed by considering the various historical behaviors of nodes in the interaction process, which is able to assess the trust value of a node based on past behaviors between nodes and protect against potential attacks in the network. And the extra factors, such as the remained energy of nodes, the distance between nodes and the trustiness are included in the routing criterions. Finally, a strategy for selecting relay nodes is proposed based on these considerations. Simulation results show that the proposed TBR algorithm can effectively defend against attacks from inside the network and is also more efficient and reliable compared to other existing routing protocols.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 17","pages":"36674-36685"},"PeriodicalIF":8.9000,"publicationDate":"2025-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11053972/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Considering the harsh and complex environments in underwater wireless sensor networks (UWSNs), where the malicious nodes exist, the secure routing design is investigated in this article. The malicious nodes are a serious threat to the security of sensor networks. This article proposes a secure routing protocol, named trust based routing (TBR), that focus on how to evaluate and find the malicious nodes and then determine the reliable routing. The core idea of TBR is that a new trust management model is designed by considering the various historical behaviors of nodes in the interaction process, which is able to assess the trust value of a node based on past behaviors between nodes and protect against potential attacks in the network. And the extra factors, such as the remained energy of nodes, the distance between nodes and the trustiness are included in the routing criterions. Finally, a strategy for selecting relay nodes is proposed based on these considerations. Simulation results show that the proposed TBR algorithm can effectively defend against attacks from inside the network and is also more efficient and reliable compared to other existing routing protocols.
基于信任管理模型的无线传感器网络安全路由设计
针对水下无线传感器网络中存在恶意节点的恶劣复杂环境,对安全路由设计进行了研究。恶意节点严重威胁着传感器网络的安全。本文提出了一种基于信任的安全路由协议——基于信任的路由(TBR),主要研究如何评估和发现恶意节点,进而确定可靠的路由。TBR的核心思想是考虑节点在交互过程中的各种历史行为,设计一种新的信任管理模型,能够根据节点之间的历史行为评估节点的信任价值,防范网络中潜在的攻击。在路由准则中考虑了节点剩余能量、节点间距离和可信度等附加因素。最后,在此基础上提出了中继节点的选择策略。仿真结果表明,该算法能够有效防御来自网络内部的攻击,与现有的路由协议相比,具有更高的效率和可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Internet of Things Journal
IEEE Internet of Things Journal Computer Science-Information Systems
CiteScore
17.60
自引率
13.20%
发文量
1982
期刊介绍: The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信