4.7 Article

LTrust: An Adaptive Trust Model Based on LSTM for Underwater Acoustic Sensor Networks

Journal

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Volume 21, Issue 9, Pages 7314-7328

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2022.3157621

Keywords

Adaptation models; Reliability; Measurement; Wireless communication; Network topology; Data models; Software; Anomaly detection; long short-term memory network; recommendation filtering; trust evaluation; underwater acoustic sensor networks

Funding

  1. Natural Science Foundation of China [62072072, 62002045]
  2. National Natural Science Foundation of China [U1813217]
  3. China Postdoctoral Science Foundation [2021M690565]
  4. Fundamental Research Funds for the Central Universities [N2117002]
  5. Open Fund of State Key Laboratory of Acoustics [SKLA202102]

Ask authors/readers for more resources

This work proposes an adaptive trust model, called LTrust, based on the LSTM network model for UASNs. LTrust consists of two stages: trust data collection and trust evaluation. In the first stage, network topology characteristics are used to evaluate direct trust evidence, and a filtering method is designed for accurate trust recommendations. In the second stage, an adaptive trust model based on the LSTM model is designed to identify anomalous nodes. Simulation results show that LTrust achieves effective performance compared to other approaches in terms of trust value, accuracy, and error rate.
As an effective security mechanism, trust models have been proposed to estimate the reliability of the individual nodes in Underwater Acoustic Sensor Networks (UASNs) during adverse attacks. However, existing trust models neglect the relative importance of the different nodes within the network topology. Further, few trust models study the effects of defective recommendation trust filtering. In this work, we propose an adaptive trust model based on the Long Short-Term Memory (LSTM) network model for UASNs, which we term LTrust. The LTrust is composed of two stages: trust data collection and trust evaluation. In the first stage, the characteristics of the network topology are leveraged towards evaluating direct trust evidence, by aggregating the communication trust and environment trust metrics; a defective recommendation filtering method is designed for broadcasting accurate trust recommendations among the nodes. In the second stage, an adaptive trust model is designed based on the LSTM model, to identify anomalous nodes by evaluating their trust value. The LTrust model has been tested under both hybrid attack and single-mode attack scenarios. Simulation results demonstrate that the LTrust achieves effective performance, as compared to other approaches proposed in the literature, in terms of trust value, accuracy and error rate.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available