基于模糊逻辑的水声传感器网络智能信任系统

IF 7.5 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Parisa Khoshvaght , Musaed Alhussein , Khursheed Aurangzeb , Mohammad Sadegh Yousefpoor , Jan Lansky , Mehdi Hosseinzadeh
{"title":"基于模糊逻辑的水声传感器网络智能信任系统","authors":"Parisa Khoshvaght ,&nbsp;Musaed Alhussein ,&nbsp;Khursheed Aurangzeb ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Jan Lansky ,&nbsp;Mehdi Hosseinzadeh","doi":"10.1016/j.engappai.2025.111558","DOIUrl":null,"url":null,"abstract":"<div><div>Due to the ongoing progress in ocean exploration, underwater acoustic sensor networks (UASNs) have become a significant focus of research. However, the inherent openness and lack of supervision in these networks expose them to various security threats. Thus, efficient and reliable security systems are very necessary to keep the normal performance of these networks. Nonetheless, in the trust evaluation process, dishonest nodes likely broadcast incorrect recommendations in the network. This decreases the accuracy of the trust value and affects the normal operation of the trust process. To solve this challenge, this paper presents an intelligent fuzzy logic-based trust system (IFTS) in UASNs. The proposed scheme employs a fuzzy trust mechanism to assess direct trust. To design this mechanism, energy evidence, data evidence, and communication evidence are considered as inputs in this fuzzy system, and direct trust is extracted as the fuzzy output. Energy evidence is obtained from the remaining energy and the energy change rate. Data evidence is obtained from the packet loss rate and data consistency, and communication evidence is calculated based on three link-related parameters, namely link reliability, link delay, and link stability. Likewise, recommendation trust depends on the recommendations offered by the recommenders. The trustor node evaluates each recommender and calculates its merit by using the root mean square (RMS) error and the trust value of the trustor relative to the recommender. Furthermore, IFTS computes indirect trust based on the trust chain, i.e., a set of recommender nodes. This trust chain is built using the greedy strategy based on the closest and most reliable recommender nodes. Further, IFTS uses a sliding time window for refreshing trust values. Finally, the simulation and evaluation process of IFTS is carried out in comparison with a recommendation management trust mechanism based on collaborative filtering and variable weight fuzzy algorithm (CFFTM), an adaptive trust model based on long short-term memory (LTrust), and a trust model based on cloud theory (TMC) under three attacks, namely bad/good mouthing attack, collusion attack, and hybrid attack, and its results are compared in terms of two criteria, i.e., diagnosis accuracy rate and false diagnosis rate. Hence, in the bad/good mouthing attack, IFTS improves the indirect trust level of honest nodes, accuracy, and the false diagnosis rate by 2.24%, 1.97%, and 12.68%, respectively. In the collusion attack, IFTS upgrades the indirect trust level of abnormal nodes, accuracy, and the false diagnosis rate by 7.2%, 1.17%, and 0.69%, respectively. In a hybrid attack, IFTS optimizes accuracy and the false diagnosis rate by 2.30% and 29.27%, respectively.</div></div>","PeriodicalId":50523,"journal":{"name":"Engineering Applications of Artificial Intelligence","volume":"159 ","pages":"Article 111558"},"PeriodicalIF":7.5000,"publicationDate":"2025-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An intelligent fuzzy logic based-trust system in underwater acoustic sensor networks\",\"authors\":\"Parisa Khoshvaght ,&nbsp;Musaed Alhussein ,&nbsp;Khursheed Aurangzeb ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Jan Lansky ,&nbsp;Mehdi Hosseinzadeh\",\"doi\":\"10.1016/j.engappai.2025.111558\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Due to the ongoing progress in ocean exploration, underwater acoustic sensor networks (UASNs) have become a significant focus of research. However, the inherent openness and lack of supervision in these networks expose them to various security threats. Thus, efficient and reliable security systems are very necessary to keep the normal performance of these networks. Nonetheless, in the trust evaluation process, dishonest nodes likely broadcast incorrect recommendations in the network. This decreases the accuracy of the trust value and affects the normal operation of the trust process. To solve this challenge, this paper presents an intelligent fuzzy logic-based trust system (IFTS) in UASNs. The proposed scheme employs a fuzzy trust mechanism to assess direct trust. To design this mechanism, energy evidence, data evidence, and communication evidence are considered as inputs in this fuzzy system, and direct trust is extracted as the fuzzy output. Energy evidence is obtained from the remaining energy and the energy change rate. Data evidence is obtained from the packet loss rate and data consistency, and communication evidence is calculated based on three link-related parameters, namely link reliability, link delay, and link stability. Likewise, recommendation trust depends on the recommendations offered by the recommenders. The trustor node evaluates each recommender and calculates its merit by using the root mean square (RMS) error and the trust value of the trustor relative to the recommender. Furthermore, IFTS computes indirect trust based on the trust chain, i.e., a set of recommender nodes. This trust chain is built using the greedy strategy based on the closest and most reliable recommender nodes. Further, IFTS uses a sliding time window for refreshing trust values. Finally, the simulation and evaluation process of IFTS is carried out in comparison with a recommendation management trust mechanism based on collaborative filtering and variable weight fuzzy algorithm (CFFTM), an adaptive trust model based on long short-term memory (LTrust), and a trust model based on cloud theory (TMC) under three attacks, namely bad/good mouthing attack, collusion attack, and hybrid attack, and its results are compared in terms of two criteria, i.e., diagnosis accuracy rate and false diagnosis rate. Hence, in the bad/good mouthing attack, IFTS improves the indirect trust level of honest nodes, accuracy, and the false diagnosis rate by 2.24%, 1.97%, and 12.68%, respectively. In the collusion attack, IFTS upgrades the indirect trust level of abnormal nodes, accuracy, and the false diagnosis rate by 7.2%, 1.17%, and 0.69%, respectively. In a hybrid attack, IFTS optimizes accuracy and the false diagnosis rate by 2.30% and 29.27%, respectively.</div></div>\",\"PeriodicalId\":50523,\"journal\":{\"name\":\"Engineering Applications of Artificial Intelligence\",\"volume\":\"159 \",\"pages\":\"Article 111558\"},\"PeriodicalIF\":7.5000,\"publicationDate\":\"2025-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Engineering Applications of Artificial Intelligence\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S095219762501560X\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Engineering Applications of Artificial Intelligence","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S095219762501560X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

随着海洋探测的不断深入,水声传感器网络(UASNs)已成为一个重要的研究热点。然而,这些网络固有的开放性和缺乏监管使其面临各种安全威胁。因此,高效可靠的安全系统对于保证这些网络的正常运行是非常必要的。然而,在信任评估过程中,不诚实的节点可能会在网络中传播不正确的建议。这会降低信任值的准确性,影响信任过程的正常运行。为了解决这一难题,本文提出了一种基于模糊逻辑的智能无线局域网信任系统(IFTS)。该方案采用模糊信任机制对直接信任进行评估。在设计该机制时,将能源证据、数据证据和通信证据作为模糊系统的输入,提取直接信任作为模糊系统的输出。能量证据来源于剩余能量和能量变化率。数据证据来源于丢包率和数据一致性,通信证据来源于与链路相关的三个参数,即链路可靠性、链路时延和链路稳定性。同样,推荐信任依赖于推荐人提供的推荐。委托方节点利用均方根误差和委托方相对于推荐者的信任值对每个推荐者进行评估并计算其价值。此外,IFTS基于信任链(即一组推荐节点)计算间接信任。该信任链采用基于最近且最可靠的推荐节点的贪婪策略构建。此外,IFTS使用滑动时间窗口刷新信任值。最后,将IFTS与基于协同过滤和变权模糊算法的推荐管理信任机制(CFFTM)、基于长短期记忆的自适应信任模型(LTrust)和基于云理论的信任模型(TMC)在坏/好嘴攻击、共谋攻击和混合攻击三种攻击下进行了仿真和评估过程,并根据两个标准(诊断正确率和误诊率。因此,在bad/good mouth攻击中,IFTS将诚实节点的间接信任水平、准确率和误诊率分别提高了2.24%、1.97%和12.68%。在串通攻击中,IFTS将异常节点的间接信任等级、准确率和误诊率分别提升了7.2%、1.17%和0.69%。在混合攻击中,IFTS将准确率和误诊率分别优化了2.30%和29.27%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An intelligent fuzzy logic based-trust system in underwater acoustic sensor networks
Due to the ongoing progress in ocean exploration, underwater acoustic sensor networks (UASNs) have become a significant focus of research. However, the inherent openness and lack of supervision in these networks expose them to various security threats. Thus, efficient and reliable security systems are very necessary to keep the normal performance of these networks. Nonetheless, in the trust evaluation process, dishonest nodes likely broadcast incorrect recommendations in the network. This decreases the accuracy of the trust value and affects the normal operation of the trust process. To solve this challenge, this paper presents an intelligent fuzzy logic-based trust system (IFTS) in UASNs. The proposed scheme employs a fuzzy trust mechanism to assess direct trust. To design this mechanism, energy evidence, data evidence, and communication evidence are considered as inputs in this fuzzy system, and direct trust is extracted as the fuzzy output. Energy evidence is obtained from the remaining energy and the energy change rate. Data evidence is obtained from the packet loss rate and data consistency, and communication evidence is calculated based on three link-related parameters, namely link reliability, link delay, and link stability. Likewise, recommendation trust depends on the recommendations offered by the recommenders. The trustor node evaluates each recommender and calculates its merit by using the root mean square (RMS) error and the trust value of the trustor relative to the recommender. Furthermore, IFTS computes indirect trust based on the trust chain, i.e., a set of recommender nodes. This trust chain is built using the greedy strategy based on the closest and most reliable recommender nodes. Further, IFTS uses a sliding time window for refreshing trust values. Finally, the simulation and evaluation process of IFTS is carried out in comparison with a recommendation management trust mechanism based on collaborative filtering and variable weight fuzzy algorithm (CFFTM), an adaptive trust model based on long short-term memory (LTrust), and a trust model based on cloud theory (TMC) under three attacks, namely bad/good mouthing attack, collusion attack, and hybrid attack, and its results are compared in terms of two criteria, i.e., diagnosis accuracy rate and false diagnosis rate. Hence, in the bad/good mouthing attack, IFTS improves the indirect trust level of honest nodes, accuracy, and the false diagnosis rate by 2.24%, 1.97%, and 12.68%, respectively. In the collusion attack, IFTS upgrades the indirect trust level of abnormal nodes, accuracy, and the false diagnosis rate by 7.2%, 1.17%, and 0.69%, respectively. In a hybrid attack, IFTS optimizes accuracy and the false diagnosis rate by 2.30% and 29.27%, respectively.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Engineering Applications of Artificial Intelligence
Engineering Applications of Artificial Intelligence 工程技术-工程:电子与电气
CiteScore
9.60
自引率
10.00%
发文量
505
审稿时长
68 days
期刊介绍: Artificial Intelligence (AI) is pivotal in driving the fourth industrial revolution, witnessing remarkable advancements across various machine learning methodologies. AI techniques have become indispensable tools for practicing engineers, enabling them to tackle previously insurmountable challenges. Engineering Applications of Artificial Intelligence serves as a global platform for the swift dissemination of research elucidating the practical application of AI methods across all engineering disciplines. Submitted papers are expected to present novel aspects of AI utilized in real-world engineering applications, validated using publicly available datasets to ensure the replicability of research outcomes. Join us in exploring the transformative potential of AI in engineering.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信