{"title":"Trust management for underwater Internet of Things: A combined hidden Markov and cloud model approach","authors":"Fangyuan Xing , Zhiquan Jiang , Yutian Tan , Fei Tong","doi":"10.1016/j.adhoc.2025.104000","DOIUrl":null,"url":null,"abstract":"<div><div>Underwater wireless optical sensor networks (UWOSN) have emerged as a transformative solution for marine exploration systems, revolutionizing applications ranging from seabed mineral prospecting to real-time oceanic monitoring through their unparalleled bandwidth and ultra-low latency. However, as underwater sensors and devices tend to persistently operate in unattended harsh environments, they are vulnerable to attacks by security threats, including hybrid attacks targeting both network nodes and communication paths. Due to the limitations in node energy and channel characteristics, traditional encryption algorithms and trust management approaches designed for terrestrial wireless sensor networks (WSN) are unsuitable for underwater WSN. To this end, this paper studies trust management for UWOSN considering both network node and link attacks. Aligned with clustered network architectures, a three-layer trust management framework is proposed in this paper. The collection layer harvests node and link trust evidences, the processing layer computes node and link comprehensive trust clouds, and the decision-making layer determines node and link states via hidden Markov model for final trust adjudication. Hidden Markov model and cloud model are combined and employed to eliminate discrepancies between the observed states inferred from the collected trust evidences and the hidden states showing the actual states of UWOSN nodes and links in dynamic environments. Simultaneously, recognizing that uniform threshold standards are unsuitable for trust management of sensor nodes in geographically marginalized positions, the proposed dynamic thresholds are designed to overcome spatial constraints and mitigate elevated false positive rates. Experimental results demonstrate that the proposed combined hidden Markov and cloud model (HMCM) trust management approach outperforms related notable studies in terms of detection rate, false detection rate, and packet delivery rate.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"178 ","pages":"Article 104000"},"PeriodicalIF":4.8000,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870525002483","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Underwater wireless optical sensor networks (UWOSN) have emerged as a transformative solution for marine exploration systems, revolutionizing applications ranging from seabed mineral prospecting to real-time oceanic monitoring through their unparalleled bandwidth and ultra-low latency. However, as underwater sensors and devices tend to persistently operate in unattended harsh environments, they are vulnerable to attacks by security threats, including hybrid attacks targeting both network nodes and communication paths. Due to the limitations in node energy and channel characteristics, traditional encryption algorithms and trust management approaches designed for terrestrial wireless sensor networks (WSN) are unsuitable for underwater WSN. To this end, this paper studies trust management for UWOSN considering both network node and link attacks. Aligned with clustered network architectures, a three-layer trust management framework is proposed in this paper. The collection layer harvests node and link trust evidences, the processing layer computes node and link comprehensive trust clouds, and the decision-making layer determines node and link states via hidden Markov model for final trust adjudication. Hidden Markov model and cloud model are combined and employed to eliminate discrepancies between the observed states inferred from the collected trust evidences and the hidden states showing the actual states of UWOSN nodes and links in dynamic environments. Simultaneously, recognizing that uniform threshold standards are unsuitable for trust management of sensor nodes in geographically marginalized positions, the proposed dynamic thresholds are designed to overcome spatial constraints and mitigate elevated false positive rates. Experimental results demonstrate that the proposed combined hidden Markov and cloud model (HMCM) trust management approach outperforms related notable studies in terms of detection rate, false detection rate, and packet delivery rate.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.