A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks

Underwater acoustic sensor networks (UASNs) have been applied in many civilian and military scenarios, but it is vulnerable to various security threats due to the broadcast transmission characteristics and the environment in which they are located. Trust management mechanism has been proven to be an...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Future generation computer systems Ročník 145; s. 466 - 477
Hlavní autori: Zhang, Mengjie, Feng, Renhai, Zhang, Hehe, Su, Yishan
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier B.V 01.08.2023
Predmet:
ISSN:0167-739X, 1872-7115
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Underwater acoustic sensor networks (UASNs) have been applied in many civilian and military scenarios, but it is vulnerable to various security threats due to the broadcast transmission characteristics and the environment in which they are located. Trust management mechanism has been proven to be an effect way to improve network security. However, in the trust assessment process, some nodes may provide false suggestions, which will lead to trust conflicts and affect the normal operation of the trust mechanism. To screen out unreliable recommendations and dishonest nodes in the network and avoid potential dangers, a recommendation management trust mechanism based on collaborative filtering and variable weight fuzzy algorithm (CFFTM) is proposed in this paper. First, three kinds of evidence of trust: communication-based evidence, data-based evidence, and energy-based evidence are select as indicators. Then the variable weight fuzzy comprehensive evaluation algorithm is applied to calculate the direct trust value of the node. Secondly, in order to quantify the honesty ability of nodes, honesty degree is defined. Then the overall recommendation trust value of the node is obtained using the proposed collaborative filtering algorithm. The simulation results show that the mechanism can well filter out unreliable recommendations and improve the recognition rate and stability of the trust model under typical attack scenarios. •Application of malicious node detection based on filter trust mechanism in underwater acoustic sensor network.•Quantifying the ability of a node to be honest when acting as a third-party node.•Under the different number of malicious nodes and attacks, using the proposed trust model.•Evaluate and validate the effectiveness of the proposed mechanism.
AbstractList Underwater acoustic sensor networks (UASNs) have been applied in many civilian and military scenarios, but it is vulnerable to various security threats due to the broadcast transmission characteristics and the environment in which they are located. Trust management mechanism has been proven to be an effect way to improve network security. However, in the trust assessment process, some nodes may provide false suggestions, which will lead to trust conflicts and affect the normal operation of the trust mechanism. To screen out unreliable recommendations and dishonest nodes in the network and avoid potential dangers, a recommendation management trust mechanism based on collaborative filtering and variable weight fuzzy algorithm (CFFTM) is proposed in this paper. First, three kinds of evidence of trust: communication-based evidence, data-based evidence, and energy-based evidence are select as indicators. Then the variable weight fuzzy comprehensive evaluation algorithm is applied to calculate the direct trust value of the node. Secondly, in order to quantify the honesty ability of nodes, honesty degree is defined. Then the overall recommendation trust value of the node is obtained using the proposed collaborative filtering algorithm. The simulation results show that the mechanism can well filter out unreliable recommendations and improve the recognition rate and stability of the trust model under typical attack scenarios. •Application of malicious node detection based on filter trust mechanism in underwater acoustic sensor network.•Quantifying the ability of a node to be honest when acting as a third-party node.•Under the different number of malicious nodes and attacks, using the proposed trust model.•Evaluate and validate the effectiveness of the proposed mechanism.
Author Zhang, Mengjie
Feng, Renhai
Zhang, Hehe
Su, Yishan
Author_xml – sequence: 1
  givenname: Mengjie
  orcidid: 0000-0001-6337-346X
  surname: Zhang
  fullname: Zhang, Mengjie
  email: zhangmengjie@tju.edu.cn
– sequence: 2
  givenname: Renhai
  surname: Feng
  fullname: Feng, Renhai
  email: fengrenhai@tju.edu.cn
– sequence: 3
  givenname: Hehe
  surname: Zhang
  fullname: Zhang, Hehe
  email: zhanghehe@tju.edu.cn
– sequence: 4
  givenname: Yishan
  surname: Su
  fullname: Su, Yishan
  email: yishan.su@tju.edu.cn
BookMark eNqFkN1KAzEQhYNUsFbfwIu8wNb87G66Xggi_kHBGwXvwmwyq6ndRJJU8e1NrVdeKAwMw5zvwDmHZOKDR0JOOJtzxtvT1XzY5E3EuWBCzlmZWu6RKV8oUSnOmwmZFpmqlOyeDshhSivGGFeST4m7oBFNGEf0FrILno7g4RnLnanFAX1COqJ5Ae_SSHtIaGlR5bhJmY7B4po6TzfeYvyAjJGCCeXlDE2FDZF6zB8hvqYjsj_AOuHxz56Rx-urh8vbanl_c3d5sayMZG2uBGDTtFJ0YEw3KFgI07Oms50degY9ohC96AemgA-NQrCNalvZ9ULVDdStkjNytvM1MaQUcdDG5e9oOYJba870tjS90rvS9LY0zcrUssD1L_gtuhHi53_Y-Q7DEuzdYdTJOPQGrSvtZm2D-9vgCzu9jrs
CitedBy_id crossref_primary_10_1109_JIOT_2024_3354820
crossref_primary_10_1109_JIOT_2023_3322280
crossref_primary_10_1109_JSEN_2025_3570812
crossref_primary_10_3390_s25010286
crossref_primary_10_1109_COMST_2024_3389728
crossref_primary_10_1109_ACCESS_2025_3546978
crossref_primary_10_3390_fi16090346
crossref_primary_10_1186_s13677_025_00744_x
crossref_primary_10_1007_s40031_024_01158_0
crossref_primary_10_3390_s24092880
crossref_primary_10_1109_JSEN_2024_3424252
crossref_primary_10_3390_app14083374
crossref_primary_10_1016_j_adhoc_2025_103918
crossref_primary_10_1016_j_engappai_2025_110753
crossref_primary_10_3390_app15063075
crossref_primary_10_1016_j_adhoc_2024_103409
crossref_primary_10_1016_j_engappai_2025_111558
Cites_doi 10.1109/MNET.001.2000006
10.1109/ACCESS.2019.2905550
10.1109/LWC.2021.3070630
10.1109/TMC.2015.2402120
10.1109/JSEN.2015.2428712
10.1109/TMC.2020.3028369
10.1109/TVT.2018.2864141
10.1109/JIOT.2023.3240827
10.1109/WISA.2017.21
10.3724/SP.J.1001.2012.04204
10.1109/ICICSE.2009.70
10.1109/TII.2015.2510226
10.1016/j.future.2019.02.004
10.1109/TMC.2014.2374154
10.1109/INFOCOM.2008.53
10.1109/JSAC.2019.2952035
10.1109/JIOT.2019.2902022
10.1109/TWC.2022.3157621
10.1109/TMC.2019.2907854
10.1109/PACIIA.2008.152
10.1109/ICCSE.2010.5593604
10.1109/ACCESS.2020.3007502
10.1109/ICCCN.2010.5560118
10.1109/ComComAp53641.2021.9653054
10.1109/ICEE.2010.345
10.1109/JIOT.2020.3023556
10.1109/IMCCC.2018.00172
10.1109/JIOT.2019.2950083
10.1109/TPDS.2014.2320505
10.1109/ACCESS.2017.2786944
ContentType Journal Article
Copyright 2023 Elsevier B.V.
Copyright_xml – notice: 2023 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.future.2023.03.043
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7115
EndPage 477
ExternalDocumentID 10_1016_j_future_2023_03_043
S0167739X23001310
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29H
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
UHS
WUQ
XPP
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ADNMO
AEIPS
AFJKZ
AGQPQ
AIIUN
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c306t-2ae556329acc9f7a82cb059d9dfb0abee22b2bf07a1f57ead576639b2745a4673
ISICitedReferencesCount 21
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000981801000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0167-739X
IngestDate Sat Nov 29 07:24:00 EST 2025
Tue Nov 18 22:15:41 EST 2025
Fri Feb 23 02:33:50 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Trust management mechanism
Collaborative filtering
Fuzzy algorithm
Recommendation management
Underwater acoustic sensor networks (UASNs)
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c306t-2ae556329acc9f7a82cb059d9dfb0abee22b2bf07a1f57ead576639b2745a4673
ORCID 0000-0001-6337-346X
PageCount 12
ParticipantIDs crossref_citationtrail_10_1016_j_future_2023_03_043
crossref_primary_10_1016_j_future_2023_03_043
elsevier_sciencedirect_doi_10_1016_j_future_2023_03_043
PublicationCentury 2000
PublicationDate August 2023
2023-08-00
PublicationDateYYYYMMDD 2023-08-01
PublicationDate_xml – month: 08
  year: 2023
  text: August 2023
PublicationDecade 2020
PublicationTitle Future generation computer systems
PublicationYear 2023
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References W. Gao, G. Zhang, W. Chen, Y. Li, A Trust Model Based on Subjective Logic, in: 2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009, pp. 272–276.
A. Caruso, F. Paparella, L.F.M. Vieira, M. Erol, M. Gerla, The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks, in: IEEE INFOCOM 2008 - the 27th Conference on Computer Communications, 2008, pp. 221–225.
M. Yuhan, A Novel Collaborative Filtering Algorithm Based on Trust, in: 2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control, IMCCC, 2018, pp. 803–808.
Zuzeng, Wenyu (b29) 2007
Pang, Teng, Sun, Du, Li, Zhu (b12) 2021; 10
Velusamy, Pugalendhi, Ramasamy (b18) 2020; 38
Han, He, Jiang, Wang, Peng, Fan (b7) 2020; 34
Wu, Huang, Ling, Shu (b15) 2019; 7
Wang, Gao, Xu, Jiang, Yue (b3) 2016; 16
Jiang, Han, Shu, Chan, Wang (b5) 2017; 13
S. Hua, J. Jiang, G. Han, A lightweight Trust Management mechanism based on Conflict Adjudication in Underwater Acoustic Sensor Networks, in: 2021 Computing, Communications and IoT Applications, ComComAp, 2021, pp. 258–262.
Han, Long, Zhu, Guizani, Zhang (b6) 2020; 19
Q. Wu, M. Huang, Y. Mu, A Collaborative Filtering Algorithm Based on User Similarity and Trust, in: 2017 14th Web Information Systems and Applications Conference, WISA, 2017, pp. 263–266.
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino, Provenance-based trustworthiness assessment in sensor networks, in: Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, 2010.
Shao, Luo, Mei, Liu (b27) 2012; 23
You (b32) 2019
Anwar, Zainal, Outay, Yasar, Iqbal (b16) 2019; 96
L. Zhubing, A trust-enhanced collaborative filtering recommender system, in: 2010 5th International Conference on Computer Science & Education, 2010, pp. 384–387.
C.A. Boano, M.A. Zúñiga, T. Voigt, A. Willig, K. Römer, The Triangle Metric: Fast Link Quality Estimation for Mobile Wireless Sensor Networks, in: 2010 Proceedings of 19th International Conference on Computer Communications and Networks, 2010, pp. 1–7.
Yan, Zhao, Pu, Luo, Chen, Guan (b4) 2020; 17
Q. Liu, Y. Liao, B. Tang, L. Yu, A Trust Model Based on Subjective Logic for Multi-Domains in Grids, in: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, pp. 882–886.
Liao (b28) 2016
Du, Han, Lin, Martínez-García (b10) 2022; 21
Han, Jiang, Shu, Guizani (b9) 2015; 14
Du, Han, Lin, Martínez-García (b11) 2022; 21
Adewuyi, Cheng, Shi, Cao, MacDermott, Wang (b20) 2019; 6
Zheng, Li, Shen (b30) 2011
Y. Su, Y. Xu, Z. Pang, Y. Kang, R. Fan, HCAR: A Hybrid Coding-Aware Routing Protocol for Underwater Acoustic Sensor Networks, IEEE Internet Things J.
Gupta, Goyal, Anand, Kadry, Nam, Singh (b1) 2020; 8
Jiang, Han, Wang, Shu, Guizani (b14) 2015; 26
.
Sun, Boukerche (b2) 2018; 67
H. Cai, Z. Li, J. Tian, Study on the Recommendation Trust Model Based on Encouragement and Punishment, in: 2010 International Conference on E-Business and E-Government, 2010, pp. 1355–1358.
Alnasser, Sun, Jiang (b19) 2020; 7
Sun, Li (b17) 2018; 6
Su, Guo, Jin, Fu (b22) 2020; 8
Shabut, Dahal, Bista, Awan (b8) 2015; 14
Adewuyi (10.1016/j.future.2023.03.043_b20) 2019; 6
Wu (10.1016/j.future.2023.03.043_b15) 2019; 7
Yan (10.1016/j.future.2023.03.043_b4) 2020; 17
Jiang (10.1016/j.future.2023.03.043_b5) 2017; 13
10.1016/j.future.2023.03.043_b36
Han (10.1016/j.future.2023.03.043_b9) 2015; 14
Du (10.1016/j.future.2023.03.043_b10) 2022; 21
Sun (10.1016/j.future.2023.03.043_b17) 2018; 6
10.1016/j.future.2023.03.043_b34
10.1016/j.future.2023.03.043_b13
10.1016/j.future.2023.03.043_b35
Wang (10.1016/j.future.2023.03.043_b3) 2016; 16
Zuzeng (10.1016/j.future.2023.03.043_b29) 2007
10.1016/j.future.2023.03.043_b33
10.1016/j.future.2023.03.043_b31
Zheng (10.1016/j.future.2023.03.043_b30) 2011
Gupta (10.1016/j.future.2023.03.043_b1) 2020; 8
Han (10.1016/j.future.2023.03.043_b7) 2020; 34
You (10.1016/j.future.2023.03.043_b32) 2019
Velusamy (10.1016/j.future.2023.03.043_b18) 2020; 38
Su (10.1016/j.future.2023.03.043_b22) 2020; 8
Anwar (10.1016/j.future.2023.03.043_b16) 2019; 96
Sun (10.1016/j.future.2023.03.043_b2) 2018; 67
Alnasser (10.1016/j.future.2023.03.043_b19) 2020; 7
Du (10.1016/j.future.2023.03.043_b11) 2022; 21
Liao (10.1016/j.future.2023.03.043_b28) 2016
10.1016/j.future.2023.03.043_b25
Pang (10.1016/j.future.2023.03.043_b12) 2021; 10
10.1016/j.future.2023.03.043_b26
10.1016/j.future.2023.03.043_b23
10.1016/j.future.2023.03.043_b24
10.1016/j.future.2023.03.043_b21
Jiang (10.1016/j.future.2023.03.043_b14) 2015; 26
Han (10.1016/j.future.2023.03.043_b6) 2020; 19
Shabut (10.1016/j.future.2023.03.043_b8) 2015; 14
Shao (10.1016/j.future.2023.03.043_b27) 2012; 23
References_xml – volume: 17
  start-page: 1361
  year: 2020
  end-page: 1375
  ident: b4
  article-title: Energy-efficient target tracking with UASNs: A consensus-based Bayesian approach
  publication-title: IEEE Trans. Autom. Sci. Eng.
– reference: L. Zhubing, A trust-enhanced collaborative filtering recommender system, in: 2010 5th International Conference on Computer Science & Education, 2010, pp. 384–387.
– volume: 16
  start-page: 4051
  year: 2016
  end-page: 4062
  ident: b3
  article-title: An energy-efficient reliable data transmission scheme for complex environmental monitoring in underwater acoustic sensor networks
  publication-title: IEEE Sens. J.
– volume: 13
  start-page: 342
  year: 2017
  end-page: 350
  ident: b5
  article-title: A trust model based on cloud theory in underwater acoustic sensor networks
  publication-title: IEEE Trans. Ind. Inform.
– reference: Y. Su, Y. Xu, Z. Pang, Y. Kang, R. Fan, HCAR: A Hybrid Coding-Aware Routing Protocol for Underwater Acoustic Sensor Networks, IEEE Internet Things J.
– start-page: 103
  year: 2007
  end-page: 110
  ident: b29
  article-title: Fuzzy Mathematics and its Application
– volume: 34
  start-page: 330
  year: 2020
  end-page: 336
  ident: b7
  article-title: Fault-tolerant trust model for hybrid attack mode in underwater acoustic sensor networks
  publication-title: IEEE Netw.
– volume: 8
  start-page: 122959
  year: 2020
  end-page: 122974
  ident: b1
  article-title: Underwater networked wireless sensor data collection for computational intelligence techniques: Issues, challenges, and approaches
  publication-title: IEEE Access
– volume: 26
  start-page: 1228
  year: 2015
  end-page: 1237
  ident: b14
  article-title: An efficient distributed trust model for wireless sensor networks
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– year: 2019
  ident: b32
  article-title: Research on Collaborative Filtering Recommendation Algorithm Based on Trust Mechanism
– volume: 14
  start-page: 2447
  year: 2015
  end-page: 2459
  ident: b9
  article-title: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network
  publication-title: IEEE Trans. Mob. Comput.
– volume: 6
  start-page: 4725
  year: 2018
  end-page: 4741
  ident: b17
  article-title: A comprehensive trust-aware routing protocol with multi-attributes for WSNs
  publication-title: IEEE Access
– volume: 6
  start-page: 5432
  year: 2019
  end-page: 5445
  ident: b20
  article-title: CTRUST: A dynamic trust model for collaborative applications in the internet of things
  publication-title: IEEE Internet Things J.
– volume: 7
  start-page: 43679
  year: 2019
  end-page: 43690
  ident: b15
  article-title: BLTM: Beta and LQI based trust model for wireless sensor networks
  publication-title: IEEE Access
– start-page: 144
  year: 2011
  end-page: 147
  ident: b30
  article-title: Application of fuzzy comprehensive evaluation based on variable weight in risk assessment for contract project
  publication-title: Proceedings of 2011 IEEE International Conference on Service Operations
– year: 2016
  ident: b28
  article-title: Research on Trust Mechanism in Wireless Sensor Networks
– reference: Q. Wu, M. Huang, Y. Mu, A Collaborative Filtering Algorithm Based on User Similarity and Trust, in: 2017 14th Web Information Systems and Applications Conference, WISA, 2017, pp. 263–266.
– volume: 21
  start-page: 1684
  year: 2022
  end-page: 1696
  ident: b10
  article-title: ITrust: An anomaly-resilient trust model based on isolation forest for underwater acoustic sensor networks
  publication-title: IEEE Trans. Mob. Comput.
– reference: A. Caruso, F. Paparella, L.F.M. Vieira, M. Erol, M. Gerla, The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks, in: IEEE INFOCOM 2008 - the 27th Conference on Computer Communications, 2008, pp. 221–225.
– reference: Q. Liu, Y. Liao, B. Tang, L. Yu, A Trust Model Based on Subjective Logic for Multi-Domains in Grids, in: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, pp. 882–886.
– volume: 23
  start-page: 3130
  year: 2012
  end-page: 3148
  ident: b27
  article-title: Normal distribution based dynamical recommendation trust model
  publication-title: J. Softw.
– volume: 8
  start-page: 3653
  year: 2020
  end-page: 3664
  ident: b22
  article-title: A mobile-beacon-based iterative localization mechanism in large-scale underwater acoustic sensor networks
  publication-title: IEEE Internet Things J.
– reference: Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino, Provenance-based trustworthiness assessment in sensor networks, in: Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, 2010.
– reference: C.A. Boano, M.A. Zúñiga, T. Voigt, A. Willig, K. Römer, The Triangle Metric: Fast Link Quality Estimation for Mobile Wireless Sensor Networks, in: 2010 Proceedings of 19th International Conference on Computer Communications and Networks, 2010, pp. 1–7.
– reference: W. Gao, G. Zhang, W. Chen, Y. Li, A Trust Model Based on Subjective Logic, in: 2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009, pp. 272–276.
– volume: 21
  start-page: 7314
  year: 2022
  end-page: 7328
  ident: b11
  article-title: LTrust: An adaptive trust model based on LSTM for underwater acoustic sensor networks
  publication-title: IEEE Trans. Wireless Commun.
– volume: 7
  start-page: 440
  year: 2020
  end-page: 450
  ident: b19
  article-title: Recommendation-based trust model for vehicle-to-everything (V2X)
  publication-title: IEEE Internet Things J.
– volume: 14
  start-page: 2101
  year: 2015
  end-page: 2115
  ident: b8
  article-title: Recommendation based trust model with an effective defence scheme for MANETs
  publication-title: IEEE Trans. Mob. Comput.
– reference: H. Cai, Z. Li, J. Tian, Study on the Recommendation Trust Model Based on Encouragement and Punishment, in: 2010 International Conference on E-Business and E-Government, 2010, pp. 1355–1358.
– reference: M. Yuhan, A Novel Collaborative Filtering Algorithm Based on Trust, in: 2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control, IMCCC, 2018, pp. 803–808.
– volume: 96
  start-page: 605
  year: 2019
  end-page: 616
  ident: b16
  article-title: BTEM: Belief based trust evaluation mechanism for wireless sensor networks
  publication-title: Future Gener. Comput. Syst.
– reference: .
– volume: 10
  start-page: 1613
  year: 2021
  end-page: 1617
  ident: b12
  article-title: A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network
  publication-title: IEEE Wirel. Commun. Lett.
– volume: 38
  start-page: 193
  year: 2020
  end-page: 204
  ident: b18
  article-title: A cross-layer trust evaluation protocol for secured routing in communication network of smart grid
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 67
  start-page: 9959
  year: 2018
  end-page: 9971
  ident: b2
  article-title: Modeling and analysis of coverage degree and target detection for autonomous underwater vehicle-based system
  publication-title: IEEE Trans. Veh. Technol.
– volume: 19
  start-page: 1010
  year: 2020
  end-page: 1022
  ident: b6
  article-title: A high-availability data collection scheme based on multi-AUVs for underwater sensor networks
  publication-title: IEEE Trans. Mob. Comput.
– reference: S. Hua, J. Jiang, G. Han, A lightweight Trust Management mechanism based on Conflict Adjudication in Underwater Acoustic Sensor Networks, in: 2021 Computing, Communications and IoT Applications, ComComAp, 2021, pp. 258–262.
– volume: 17
  start-page: 1361
  issue: 3
  year: 2020
  ident: 10.1016/j.future.2023.03.043_b4
  article-title: Energy-efficient target tracking with UASNs: A consensus-based Bayesian approach
  publication-title: IEEE Trans. Autom. Sci. Eng.
– volume: 34
  start-page: 330
  issue: 5
  year: 2020
  ident: 10.1016/j.future.2023.03.043_b7
  article-title: Fault-tolerant trust model for hybrid attack mode in underwater acoustic sensor networks
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.001.2000006
– volume: 7
  start-page: 43679
  year: 2019
  ident: 10.1016/j.future.2023.03.043_b15
  article-title: BLTM: Beta and LQI based trust model for wireless sensor networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2905550
– volume: 10
  start-page: 1613
  issue: 8
  year: 2021
  ident: 10.1016/j.future.2023.03.043_b12
  article-title: A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network
  publication-title: IEEE Wirel. Commun. Lett.
  doi: 10.1109/LWC.2021.3070630
– volume: 14
  start-page: 2447
  issue: 12
  year: 2015
  ident: 10.1016/j.future.2023.03.043_b9
  article-title: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2015.2402120
– volume: 16
  start-page: 4051
  issue: 11
  year: 2016
  ident: 10.1016/j.future.2023.03.043_b3
  article-title: An energy-efficient reliable data transmission scheme for complex environmental monitoring in underwater acoustic sensor networks
  publication-title: IEEE Sens. J.
  doi: 10.1109/JSEN.2015.2428712
– volume: 21
  start-page: 1684
  issue: 5
  year: 2022
  ident: 10.1016/j.future.2023.03.043_b10
  article-title: ITrust: An anomaly-resilient trust model based on isolation forest for underwater acoustic sensor networks
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2020.3028369
– volume: 67
  start-page: 9959
  issue: 10
  year: 2018
  ident: 10.1016/j.future.2023.03.043_b2
  article-title: Modeling and analysis of coverage degree and target detection for autonomous underwater vehicle-based system
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2018.2864141
– ident: 10.1016/j.future.2023.03.043_b21
  doi: 10.1109/JIOT.2023.3240827
– ident: 10.1016/j.future.2023.03.043_b34
  doi: 10.1109/WISA.2017.21
– volume: 23
  start-page: 3130
  issue: 12
  year: 2012
  ident: 10.1016/j.future.2023.03.043_b27
  article-title: Normal distribution based dynamical recommendation trust model
  publication-title: J. Softw.
  doi: 10.3724/SP.J.1001.2012.04204
– ident: 10.1016/j.future.2023.03.043_b24
  doi: 10.1109/ICICSE.2009.70
– volume: 13
  start-page: 342
  issue: 1
  year: 2017
  ident: 10.1016/j.future.2023.03.043_b5
  article-title: A trust model based on cloud theory in underwater acoustic sensor networks
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2015.2510226
– volume: 96
  start-page: 605
  year: 2019
  ident: 10.1016/j.future.2023.03.043_b16
  article-title: BTEM: Belief based trust evaluation mechanism for wireless sensor networks
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.02.004
– volume: 14
  start-page: 2101
  issue: 10
  year: 2015
  ident: 10.1016/j.future.2023.03.043_b8
  article-title: Recommendation based trust model with an effective defence scheme for MANETs
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2014.2374154
– year: 2019
  ident: 10.1016/j.future.2023.03.043_b32
– ident: 10.1016/j.future.2023.03.043_b23
  doi: 10.1109/INFOCOM.2008.53
– year: 2016
  ident: 10.1016/j.future.2023.03.043_b28
– volume: 38
  start-page: 193
  issue: 1
  year: 2020
  ident: 10.1016/j.future.2023.03.043_b18
  article-title: A cross-layer trust evaluation protocol for secured routing in communication network of smart grid
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2019.2952035
– volume: 6
  start-page: 5432
  issue: 3
  year: 2019
  ident: 10.1016/j.future.2023.03.043_b20
  article-title: CTRUST: A dynamic trust model for collaborative applications in the internet of things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2902022
– volume: 21
  start-page: 7314
  issue: 9
  year: 2022
  ident: 10.1016/j.future.2023.03.043_b11
  article-title: LTrust: An adaptive trust model based on LSTM for underwater acoustic sensor networks
  publication-title: IEEE Trans. Wireless Commun.
  doi: 10.1109/TWC.2022.3157621
– volume: 19
  start-page: 1010
  issue: 5
  year: 2020
  ident: 10.1016/j.future.2023.03.043_b6
  article-title: A high-availability data collection scheme based on multi-AUVs for underwater sensor networks
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2019.2907854
– ident: 10.1016/j.future.2023.03.043_b25
  doi: 10.1109/PACIIA.2008.152
– ident: 10.1016/j.future.2023.03.043_b36
  doi: 10.1109/ICCSE.2010.5593604
– volume: 8
  start-page: 122959
  year: 2020
  ident: 10.1016/j.future.2023.03.043_b1
  article-title: Underwater networked wireless sensor data collection for computational intelligence techniques: Issues, challenges, and approaches
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3007502
– start-page: 144
  year: 2011
  ident: 10.1016/j.future.2023.03.043_b30
  article-title: Application of fuzzy comprehensive evaluation based on variable weight in risk assessment for contract project
– ident: 10.1016/j.future.2023.03.043_b31
  doi: 10.1109/ICCCN.2010.5560118
– ident: 10.1016/j.future.2023.03.043_b13
  doi: 10.1109/ComComAp53641.2021.9653054
– ident: 10.1016/j.future.2023.03.043_b33
  doi: 10.1109/ICEE.2010.345
– volume: 8
  start-page: 3653
  issue: 5
  year: 2020
  ident: 10.1016/j.future.2023.03.043_b22
  article-title: A mobile-beacon-based iterative localization mechanism in large-scale underwater acoustic sensor networks
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3023556
– start-page: 103
  year: 2007
  ident: 10.1016/j.future.2023.03.043_b29
– ident: 10.1016/j.future.2023.03.043_b35
  doi: 10.1109/IMCCC.2018.00172
– volume: 7
  start-page: 440
  issue: 1
  year: 2020
  ident: 10.1016/j.future.2023.03.043_b19
  article-title: Recommendation-based trust model for vehicle-to-everything (V2X)
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2950083
– volume: 26
  start-page: 1228
  issue: 5
  year: 2015
  ident: 10.1016/j.future.2023.03.043_b14
  article-title: An efficient distributed trust model for wireless sensor networks
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2014.2320505
– volume: 6
  start-page: 4725
  year: 2018
  ident: 10.1016/j.future.2023.03.043_b17
  article-title: A comprehensive trust-aware routing protocol with multi-attributes for WSNs
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2786944
– ident: 10.1016/j.future.2023.03.043_b26
SSID ssj0001731
Score 2.4783869
Snippet Underwater acoustic sensor networks (UASNs) have been applied in many civilian and military scenarios, but it is vulnerable to various security threats due to...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 466
SubjectTerms Collaborative filtering
Fuzzy algorithm
Recommendation management
Trust management mechanism
Underwater acoustic sensor networks (UASNs)
Title A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks
URI https://dx.doi.org/10.1016/j.future.2023.03.043
Volume 145
WOSCitedRecordID wos000981801000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-7115
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001731
  issn: 0167-739X
  databaseCode: AIEXJ
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1ba9swFBZZu4e9rLvSrt3Qw96Ci2PJlvUYSku3hzJoB3kzkiyvDo1bkq7rz9lP3TmSrHjL2A0GwQQjJULn87nI55yPkLd1oZXNtUmQwirhjJeJkpg5pRST1hrRSOXIJsTZWTmbyQ-j0de-FubuSnRdeX8vb_6rqOEeCBtLZ_9C3PFH4QZ8B6HDFcQO1z8S_HSMQe5iYQNdUkhQdS_9a9tA2GrHC4sFv8iPgVasdm8MsPjCE-PgGQjWli2_KGyhCDrTUX6NVzD3ejnufOb4aujXnrjWJMjHbAOkTKCLCL2io-seT6gxn3beRlzBHn7y8u4uVbsx-tRexqHnn53hQN7obnhqkbGYMxeO0jbKafzpJmhtwRy3Lhgnr5FLASHAxNd8RpXN84HS5UUxsN_c08JsmAZ_SjE_9L1aDnFRrr2t7xL1Q9Ptc1wKrgQiNOxIlD4g25nIJejN7em749n7aO0nInBehqX35Zkuh3Dzv37u_gxcmosn5HGIRejUY-gpGdnuGdnpeT5oUPvPSTul30OKriFFA6RohBR1kKIwykGKOkjRtqNrSNEeUtRDivaQekE-nhxfHJ0mgaIjMRBr3iYZPOh5wTKpjJGNUGVmNDjstawbnSptbZbpTDepUJMmF6C1ILwFn1hngucKbDR7Sba6687uEmpsaQvGFRcKvEojFdNag7-fpo0oayb2COt3rjKhfz3SqFxVfaLivPL7XeF-Vyl8ONsjSZx14_u3_Ga86IVSBR_U-5YV4OiXM1_988x98mj9iByQLZCOfU0emrvbdrV8EwD3DR4dtIU
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+recommendation+management+defense+mechanism+based+on+trust+model+in+underwater+acoustic+sensor+networks&rft.jtitle=Future+generation+computer+systems&rft.au=Zhang%2C+Mengjie&rft.au=Feng%2C+Renhai&rft.au=Zhang%2C+Hehe&rft.au=Su%2C+Yishan&rft.date=2023-08-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=145&rft.spage=466&rft.epage=477&rft_id=info:doi/10.1016%2Fj.future.2023.03.043&rft.externalDocID=S0167739X23001310
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon