A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks
Underwater acoustic sensor networks (UASNs) have been applied in many civilian and military scenarios, but it is vulnerable to various security threats due to the broadcast transmission characteristics and the environment in which they are located. Trust management mechanism has been proven to be an...
Uložené v:
| Vydané v: | Future generation computer systems Ročník 145; s. 466 - 477 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier B.V
01.08.2023
|
| Predmet: | |
| ISSN: | 0167-739X, 1872-7115 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Underwater acoustic sensor networks (UASNs) have been applied in many civilian and military scenarios, but it is vulnerable to various security threats due to the broadcast transmission characteristics and the environment in which they are located. Trust management mechanism has been proven to be an effect way to improve network security. However, in the trust assessment process, some nodes may provide false suggestions, which will lead to trust conflicts and affect the normal operation of the trust mechanism. To screen out unreliable recommendations and dishonest nodes in the network and avoid potential dangers, a recommendation management trust mechanism based on collaborative filtering and variable weight fuzzy algorithm (CFFTM) is proposed in this paper. First, three kinds of evidence of trust: communication-based evidence, data-based evidence, and energy-based evidence are select as indicators. Then the variable weight fuzzy comprehensive evaluation algorithm is applied to calculate the direct trust value of the node. Secondly, in order to quantify the honesty ability of nodes, honesty degree is defined. Then the overall recommendation trust value of the node is obtained using the proposed collaborative filtering algorithm. The simulation results show that the mechanism can well filter out unreliable recommendations and improve the recognition rate and stability of the trust model under typical attack scenarios.
•Application of malicious node detection based on filter trust mechanism in underwater acoustic sensor network.•Quantifying the ability of a node to be honest when acting as a third-party node.•Under the different number of malicious nodes and attacks, using the proposed trust model.•Evaluate and validate the effectiveness of the proposed mechanism. |
|---|---|
| AbstractList | Underwater acoustic sensor networks (UASNs) have been applied in many civilian and military scenarios, but it is vulnerable to various security threats due to the broadcast transmission characteristics and the environment in which they are located. Trust management mechanism has been proven to be an effect way to improve network security. However, in the trust assessment process, some nodes may provide false suggestions, which will lead to trust conflicts and affect the normal operation of the trust mechanism. To screen out unreliable recommendations and dishonest nodes in the network and avoid potential dangers, a recommendation management trust mechanism based on collaborative filtering and variable weight fuzzy algorithm (CFFTM) is proposed in this paper. First, three kinds of evidence of trust: communication-based evidence, data-based evidence, and energy-based evidence are select as indicators. Then the variable weight fuzzy comprehensive evaluation algorithm is applied to calculate the direct trust value of the node. Secondly, in order to quantify the honesty ability of nodes, honesty degree is defined. Then the overall recommendation trust value of the node is obtained using the proposed collaborative filtering algorithm. The simulation results show that the mechanism can well filter out unreliable recommendations and improve the recognition rate and stability of the trust model under typical attack scenarios.
•Application of malicious node detection based on filter trust mechanism in underwater acoustic sensor network.•Quantifying the ability of a node to be honest when acting as a third-party node.•Under the different number of malicious nodes and attacks, using the proposed trust model.•Evaluate and validate the effectiveness of the proposed mechanism. |
| Author | Zhang, Mengjie Feng, Renhai Zhang, Hehe Su, Yishan |
| Author_xml | – sequence: 1 givenname: Mengjie orcidid: 0000-0001-6337-346X surname: Zhang fullname: Zhang, Mengjie email: zhangmengjie@tju.edu.cn – sequence: 2 givenname: Renhai surname: Feng fullname: Feng, Renhai email: fengrenhai@tju.edu.cn – sequence: 3 givenname: Hehe surname: Zhang fullname: Zhang, Hehe email: zhanghehe@tju.edu.cn – sequence: 4 givenname: Yishan surname: Su fullname: Su, Yishan email: yishan.su@tju.edu.cn |
| BookMark | eNqFkN1KAzEQhYNUsFbfwIu8wNb87G66Xggi_kHBGwXvwmwyq6ndRJJU8e1NrVdeKAwMw5zvwDmHZOKDR0JOOJtzxtvT1XzY5E3EuWBCzlmZWu6RKV8oUSnOmwmZFpmqlOyeDshhSivGGFeST4m7oBFNGEf0FrILno7g4RnLnanFAX1COqJ5Ae_SSHtIaGlR5bhJmY7B4po6TzfeYvyAjJGCCeXlDE2FDZF6zB8hvqYjsj_AOuHxz56Rx-urh8vbanl_c3d5sayMZG2uBGDTtFJ0YEw3KFgI07Oms50degY9ohC96AemgA-NQrCNalvZ9ULVDdStkjNytvM1MaQUcdDG5e9oOYJba870tjS90rvS9LY0zcrUssD1L_gtuhHi53_Y-Q7DEuzdYdTJOPQGrSvtZm2D-9vgCzu9jrs |
| CitedBy_id | crossref_primary_10_1109_JIOT_2024_3354820 crossref_primary_10_1109_JIOT_2023_3322280 crossref_primary_10_1109_JSEN_2025_3570812 crossref_primary_10_3390_s25010286 crossref_primary_10_1109_COMST_2024_3389728 crossref_primary_10_1109_ACCESS_2025_3546978 crossref_primary_10_3390_fi16090346 crossref_primary_10_1186_s13677_025_00744_x crossref_primary_10_1007_s40031_024_01158_0 crossref_primary_10_3390_s24092880 crossref_primary_10_1109_JSEN_2024_3424252 crossref_primary_10_3390_app14083374 crossref_primary_10_1016_j_adhoc_2025_103918 crossref_primary_10_1016_j_engappai_2025_110753 crossref_primary_10_3390_app15063075 crossref_primary_10_1016_j_adhoc_2024_103409 crossref_primary_10_1016_j_engappai_2025_111558 |
| Cites_doi | 10.1109/MNET.001.2000006 10.1109/ACCESS.2019.2905550 10.1109/LWC.2021.3070630 10.1109/TMC.2015.2402120 10.1109/JSEN.2015.2428712 10.1109/TMC.2020.3028369 10.1109/TVT.2018.2864141 10.1109/JIOT.2023.3240827 10.1109/WISA.2017.21 10.3724/SP.J.1001.2012.04204 10.1109/ICICSE.2009.70 10.1109/TII.2015.2510226 10.1016/j.future.2019.02.004 10.1109/TMC.2014.2374154 10.1109/INFOCOM.2008.53 10.1109/JSAC.2019.2952035 10.1109/JIOT.2019.2902022 10.1109/TWC.2022.3157621 10.1109/TMC.2019.2907854 10.1109/PACIIA.2008.152 10.1109/ICCSE.2010.5593604 10.1109/ACCESS.2020.3007502 10.1109/ICCCN.2010.5560118 10.1109/ComComAp53641.2021.9653054 10.1109/ICEE.2010.345 10.1109/JIOT.2020.3023556 10.1109/IMCCC.2018.00172 10.1109/JIOT.2019.2950083 10.1109/TPDS.2014.2320505 10.1109/ACCESS.2017.2786944 |
| ContentType | Journal Article |
| Copyright | 2023 Elsevier B.V. |
| Copyright_xml | – notice: 2023 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.future.2023.03.043 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-7115 |
| EndPage | 477 |
| ExternalDocumentID | 10_1016_j_future_2023_03_043 S0167739X23001310 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29H 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SES SEW SPC SPCBC SSV SSZ T5K UHS WUQ XPP ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ADNMO AEIPS AFJKZ AGQPQ AIIUN ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-2ae556329acc9f7a82cb059d9dfb0abee22b2bf07a1f57ead576639b2745a4673 |
| ISICitedReferencesCount | 21 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000981801000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-739X |
| IngestDate | Sat Nov 29 07:24:00 EST 2025 Tue Nov 18 22:15:41 EST 2025 Fri Feb 23 02:33:50 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Trust management mechanism Collaborative filtering Fuzzy algorithm Recommendation management Underwater acoustic sensor networks (UASNs) |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-2ae556329acc9f7a82cb059d9dfb0abee22b2bf07a1f57ead576639b2745a4673 |
| ORCID | 0000-0001-6337-346X |
| PageCount | 12 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_future_2023_03_043 crossref_primary_10_1016_j_future_2023_03_043 elsevier_sciencedirect_doi_10_1016_j_future_2023_03_043 |
| PublicationCentury | 2000 |
| PublicationDate | August 2023 2023-08-00 |
| PublicationDateYYYYMMDD | 2023-08-01 |
| PublicationDate_xml | – month: 08 year: 2023 text: August 2023 |
| PublicationDecade | 2020 |
| PublicationTitle | Future generation computer systems |
| PublicationYear | 2023 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | W. Gao, G. Zhang, W. Chen, Y. Li, A Trust Model Based on Subjective Logic, in: 2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009, pp. 272–276. A. Caruso, F. Paparella, L.F.M. Vieira, M. Erol, M. Gerla, The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks, in: IEEE INFOCOM 2008 - the 27th Conference on Computer Communications, 2008, pp. 221–225. M. Yuhan, A Novel Collaborative Filtering Algorithm Based on Trust, in: 2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control, IMCCC, 2018, pp. 803–808. Zuzeng, Wenyu (b29) 2007 Pang, Teng, Sun, Du, Li, Zhu (b12) 2021; 10 Velusamy, Pugalendhi, Ramasamy (b18) 2020; 38 Han, He, Jiang, Wang, Peng, Fan (b7) 2020; 34 Wu, Huang, Ling, Shu (b15) 2019; 7 Wang, Gao, Xu, Jiang, Yue (b3) 2016; 16 Jiang, Han, Shu, Chan, Wang (b5) 2017; 13 S. Hua, J. Jiang, G. Han, A lightweight Trust Management mechanism based on Conflict Adjudication in Underwater Acoustic Sensor Networks, in: 2021 Computing, Communications and IoT Applications, ComComAp, 2021, pp. 258–262. Han, Long, Zhu, Guizani, Zhang (b6) 2020; 19 Q. Wu, M. Huang, Y. Mu, A Collaborative Filtering Algorithm Based on User Similarity and Trust, in: 2017 14th Web Information Systems and Applications Conference, WISA, 2017, pp. 263–266. Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino, Provenance-based trustworthiness assessment in sensor networks, in: Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, 2010. Shao, Luo, Mei, Liu (b27) 2012; 23 You (b32) 2019 Anwar, Zainal, Outay, Yasar, Iqbal (b16) 2019; 96 L. Zhubing, A trust-enhanced collaborative filtering recommender system, in: 2010 5th International Conference on Computer Science & Education, 2010, pp. 384–387. C.A. Boano, M.A. Zúñiga, T. Voigt, A. Willig, K. Römer, The Triangle Metric: Fast Link Quality Estimation for Mobile Wireless Sensor Networks, in: 2010 Proceedings of 19th International Conference on Computer Communications and Networks, 2010, pp. 1–7. Yan, Zhao, Pu, Luo, Chen, Guan (b4) 2020; 17 Q. Liu, Y. Liao, B. Tang, L. Yu, A Trust Model Based on Subjective Logic for Multi-Domains in Grids, in: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, pp. 882–886. Liao (b28) 2016 Du, Han, Lin, Martínez-García (b10) 2022; 21 Han, Jiang, Shu, Guizani (b9) 2015; 14 Du, Han, Lin, Martínez-García (b11) 2022; 21 Adewuyi, Cheng, Shi, Cao, MacDermott, Wang (b20) 2019; 6 Zheng, Li, Shen (b30) 2011 Y. Su, Y. Xu, Z. Pang, Y. Kang, R. Fan, HCAR: A Hybrid Coding-Aware Routing Protocol for Underwater Acoustic Sensor Networks, IEEE Internet Things J. Gupta, Goyal, Anand, Kadry, Nam, Singh (b1) 2020; 8 Jiang, Han, Wang, Shu, Guizani (b14) 2015; 26 . Sun, Boukerche (b2) 2018; 67 H. Cai, Z. Li, J. Tian, Study on the Recommendation Trust Model Based on Encouragement and Punishment, in: 2010 International Conference on E-Business and E-Government, 2010, pp. 1355–1358. Alnasser, Sun, Jiang (b19) 2020; 7 Sun, Li (b17) 2018; 6 Su, Guo, Jin, Fu (b22) 2020; 8 Shabut, Dahal, Bista, Awan (b8) 2015; 14 Adewuyi (10.1016/j.future.2023.03.043_b20) 2019; 6 Wu (10.1016/j.future.2023.03.043_b15) 2019; 7 Yan (10.1016/j.future.2023.03.043_b4) 2020; 17 Jiang (10.1016/j.future.2023.03.043_b5) 2017; 13 10.1016/j.future.2023.03.043_b36 Han (10.1016/j.future.2023.03.043_b9) 2015; 14 Du (10.1016/j.future.2023.03.043_b10) 2022; 21 Sun (10.1016/j.future.2023.03.043_b17) 2018; 6 10.1016/j.future.2023.03.043_b34 10.1016/j.future.2023.03.043_b13 10.1016/j.future.2023.03.043_b35 Wang (10.1016/j.future.2023.03.043_b3) 2016; 16 Zuzeng (10.1016/j.future.2023.03.043_b29) 2007 10.1016/j.future.2023.03.043_b33 10.1016/j.future.2023.03.043_b31 Zheng (10.1016/j.future.2023.03.043_b30) 2011 Gupta (10.1016/j.future.2023.03.043_b1) 2020; 8 Han (10.1016/j.future.2023.03.043_b7) 2020; 34 You (10.1016/j.future.2023.03.043_b32) 2019 Velusamy (10.1016/j.future.2023.03.043_b18) 2020; 38 Su (10.1016/j.future.2023.03.043_b22) 2020; 8 Anwar (10.1016/j.future.2023.03.043_b16) 2019; 96 Sun (10.1016/j.future.2023.03.043_b2) 2018; 67 Alnasser (10.1016/j.future.2023.03.043_b19) 2020; 7 Du (10.1016/j.future.2023.03.043_b11) 2022; 21 Liao (10.1016/j.future.2023.03.043_b28) 2016 10.1016/j.future.2023.03.043_b25 Pang (10.1016/j.future.2023.03.043_b12) 2021; 10 10.1016/j.future.2023.03.043_b26 10.1016/j.future.2023.03.043_b23 10.1016/j.future.2023.03.043_b24 10.1016/j.future.2023.03.043_b21 Jiang (10.1016/j.future.2023.03.043_b14) 2015; 26 Han (10.1016/j.future.2023.03.043_b6) 2020; 19 Shabut (10.1016/j.future.2023.03.043_b8) 2015; 14 Shao (10.1016/j.future.2023.03.043_b27) 2012; 23 |
| References_xml | – volume: 17 start-page: 1361 year: 2020 end-page: 1375 ident: b4 article-title: Energy-efficient target tracking with UASNs: A consensus-based Bayesian approach publication-title: IEEE Trans. Autom. Sci. Eng. – reference: L. Zhubing, A trust-enhanced collaborative filtering recommender system, in: 2010 5th International Conference on Computer Science & Education, 2010, pp. 384–387. – volume: 16 start-page: 4051 year: 2016 end-page: 4062 ident: b3 article-title: An energy-efficient reliable data transmission scheme for complex environmental monitoring in underwater acoustic sensor networks publication-title: IEEE Sens. J. – volume: 13 start-page: 342 year: 2017 end-page: 350 ident: b5 article-title: A trust model based on cloud theory in underwater acoustic sensor networks publication-title: IEEE Trans. Ind. Inform. – reference: Y. Su, Y. Xu, Z. Pang, Y. Kang, R. Fan, HCAR: A Hybrid Coding-Aware Routing Protocol for Underwater Acoustic Sensor Networks, IEEE Internet Things J. – start-page: 103 year: 2007 end-page: 110 ident: b29 article-title: Fuzzy Mathematics and its Application – volume: 34 start-page: 330 year: 2020 end-page: 336 ident: b7 article-title: Fault-tolerant trust model for hybrid attack mode in underwater acoustic sensor networks publication-title: IEEE Netw. – volume: 8 start-page: 122959 year: 2020 end-page: 122974 ident: b1 article-title: Underwater networked wireless sensor data collection for computational intelligence techniques: Issues, challenges, and approaches publication-title: IEEE Access – volume: 26 start-page: 1228 year: 2015 end-page: 1237 ident: b14 article-title: An efficient distributed trust model for wireless sensor networks publication-title: IEEE Trans. Parallel Distrib. Syst. – year: 2019 ident: b32 article-title: Research on Collaborative Filtering Recommendation Algorithm Based on Trust Mechanism – volume: 14 start-page: 2447 year: 2015 end-page: 2459 ident: b9 article-title: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network publication-title: IEEE Trans. Mob. Comput. – volume: 6 start-page: 4725 year: 2018 end-page: 4741 ident: b17 article-title: A comprehensive trust-aware routing protocol with multi-attributes for WSNs publication-title: IEEE Access – volume: 6 start-page: 5432 year: 2019 end-page: 5445 ident: b20 article-title: CTRUST: A dynamic trust model for collaborative applications in the internet of things publication-title: IEEE Internet Things J. – volume: 7 start-page: 43679 year: 2019 end-page: 43690 ident: b15 article-title: BLTM: Beta and LQI based trust model for wireless sensor networks publication-title: IEEE Access – start-page: 144 year: 2011 end-page: 147 ident: b30 article-title: Application of fuzzy comprehensive evaluation based on variable weight in risk assessment for contract project publication-title: Proceedings of 2011 IEEE International Conference on Service Operations – year: 2016 ident: b28 article-title: Research on Trust Mechanism in Wireless Sensor Networks – reference: Q. Wu, M. Huang, Y. Mu, A Collaborative Filtering Algorithm Based on User Similarity and Trust, in: 2017 14th Web Information Systems and Applications Conference, WISA, 2017, pp. 263–266. – volume: 21 start-page: 1684 year: 2022 end-page: 1696 ident: b10 article-title: ITrust: An anomaly-resilient trust model based on isolation forest for underwater acoustic sensor networks publication-title: IEEE Trans. Mob. Comput. – reference: A. Caruso, F. Paparella, L.F.M. Vieira, M. Erol, M. Gerla, The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks, in: IEEE INFOCOM 2008 - the 27th Conference on Computer Communications, 2008, pp. 221–225. – reference: Q. Liu, Y. Liao, B. Tang, L. Yu, A Trust Model Based on Subjective Logic for Multi-Domains in Grids, in: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, pp. 882–886. – volume: 23 start-page: 3130 year: 2012 end-page: 3148 ident: b27 article-title: Normal distribution based dynamical recommendation trust model publication-title: J. Softw. – volume: 8 start-page: 3653 year: 2020 end-page: 3664 ident: b22 article-title: A mobile-beacon-based iterative localization mechanism in large-scale underwater acoustic sensor networks publication-title: IEEE Internet Things J. – reference: Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino, Provenance-based trustworthiness assessment in sensor networks, in: Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, 2010. – reference: C.A. Boano, M.A. Zúñiga, T. Voigt, A. Willig, K. Römer, The Triangle Metric: Fast Link Quality Estimation for Mobile Wireless Sensor Networks, in: 2010 Proceedings of 19th International Conference on Computer Communications and Networks, 2010, pp. 1–7. – reference: W. Gao, G. Zhang, W. Chen, Y. Li, A Trust Model Based on Subjective Logic, in: 2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009, pp. 272–276. – volume: 21 start-page: 7314 year: 2022 end-page: 7328 ident: b11 article-title: LTrust: An adaptive trust model based on LSTM for underwater acoustic sensor networks publication-title: IEEE Trans. Wireless Commun. – volume: 7 start-page: 440 year: 2020 end-page: 450 ident: b19 article-title: Recommendation-based trust model for vehicle-to-everything (V2X) publication-title: IEEE Internet Things J. – volume: 14 start-page: 2101 year: 2015 end-page: 2115 ident: b8 article-title: Recommendation based trust model with an effective defence scheme for MANETs publication-title: IEEE Trans. Mob. Comput. – reference: H. Cai, Z. Li, J. Tian, Study on the Recommendation Trust Model Based on Encouragement and Punishment, in: 2010 International Conference on E-Business and E-Government, 2010, pp. 1355–1358. – reference: M. Yuhan, A Novel Collaborative Filtering Algorithm Based on Trust, in: 2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control, IMCCC, 2018, pp. 803–808. – volume: 96 start-page: 605 year: 2019 end-page: 616 ident: b16 article-title: BTEM: Belief based trust evaluation mechanism for wireless sensor networks publication-title: Future Gener. Comput. Syst. – reference: . – volume: 10 start-page: 1613 year: 2021 end-page: 1617 ident: b12 article-title: A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network publication-title: IEEE Wirel. Commun. Lett. – volume: 38 start-page: 193 year: 2020 end-page: 204 ident: b18 article-title: A cross-layer trust evaluation protocol for secured routing in communication network of smart grid publication-title: IEEE J. Sel. Areas Commun. – volume: 67 start-page: 9959 year: 2018 end-page: 9971 ident: b2 article-title: Modeling and analysis of coverage degree and target detection for autonomous underwater vehicle-based system publication-title: IEEE Trans. Veh. Technol. – volume: 19 start-page: 1010 year: 2020 end-page: 1022 ident: b6 article-title: A high-availability data collection scheme based on multi-AUVs for underwater sensor networks publication-title: IEEE Trans. Mob. Comput. – reference: S. Hua, J. Jiang, G. Han, A lightweight Trust Management mechanism based on Conflict Adjudication in Underwater Acoustic Sensor Networks, in: 2021 Computing, Communications and IoT Applications, ComComAp, 2021, pp. 258–262. – volume: 17 start-page: 1361 issue: 3 year: 2020 ident: 10.1016/j.future.2023.03.043_b4 article-title: Energy-efficient target tracking with UASNs: A consensus-based Bayesian approach publication-title: IEEE Trans. Autom. Sci. Eng. – volume: 34 start-page: 330 issue: 5 year: 2020 ident: 10.1016/j.future.2023.03.043_b7 article-title: Fault-tolerant trust model for hybrid attack mode in underwater acoustic sensor networks publication-title: IEEE Netw. doi: 10.1109/MNET.001.2000006 – volume: 7 start-page: 43679 year: 2019 ident: 10.1016/j.future.2023.03.043_b15 article-title: BLTM: Beta and LQI based trust model for wireless sensor networks publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2905550 – volume: 10 start-page: 1613 issue: 8 year: 2021 ident: 10.1016/j.future.2023.03.043_b12 article-title: A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network publication-title: IEEE Wirel. Commun. Lett. doi: 10.1109/LWC.2021.3070630 – volume: 14 start-page: 2447 issue: 12 year: 2015 ident: 10.1016/j.future.2023.03.043_b9 article-title: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network publication-title: IEEE Trans. Mob. Comput. doi: 10.1109/TMC.2015.2402120 – volume: 16 start-page: 4051 issue: 11 year: 2016 ident: 10.1016/j.future.2023.03.043_b3 article-title: An energy-efficient reliable data transmission scheme for complex environmental monitoring in underwater acoustic sensor networks publication-title: IEEE Sens. J. doi: 10.1109/JSEN.2015.2428712 – volume: 21 start-page: 1684 issue: 5 year: 2022 ident: 10.1016/j.future.2023.03.043_b10 article-title: ITrust: An anomaly-resilient trust model based on isolation forest for underwater acoustic sensor networks publication-title: IEEE Trans. Mob. Comput. doi: 10.1109/TMC.2020.3028369 – volume: 67 start-page: 9959 issue: 10 year: 2018 ident: 10.1016/j.future.2023.03.043_b2 article-title: Modeling and analysis of coverage degree and target detection for autonomous underwater vehicle-based system publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2018.2864141 – ident: 10.1016/j.future.2023.03.043_b21 doi: 10.1109/JIOT.2023.3240827 – ident: 10.1016/j.future.2023.03.043_b34 doi: 10.1109/WISA.2017.21 – volume: 23 start-page: 3130 issue: 12 year: 2012 ident: 10.1016/j.future.2023.03.043_b27 article-title: Normal distribution based dynamical recommendation trust model publication-title: J. Softw. doi: 10.3724/SP.J.1001.2012.04204 – ident: 10.1016/j.future.2023.03.043_b24 doi: 10.1109/ICICSE.2009.70 – volume: 13 start-page: 342 issue: 1 year: 2017 ident: 10.1016/j.future.2023.03.043_b5 article-title: A trust model based on cloud theory in underwater acoustic sensor networks publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2015.2510226 – volume: 96 start-page: 605 year: 2019 ident: 10.1016/j.future.2023.03.043_b16 article-title: BTEM: Belief based trust evaluation mechanism for wireless sensor networks publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.02.004 – volume: 14 start-page: 2101 issue: 10 year: 2015 ident: 10.1016/j.future.2023.03.043_b8 article-title: Recommendation based trust model with an effective defence scheme for MANETs publication-title: IEEE Trans. Mob. Comput. doi: 10.1109/TMC.2014.2374154 – year: 2019 ident: 10.1016/j.future.2023.03.043_b32 – ident: 10.1016/j.future.2023.03.043_b23 doi: 10.1109/INFOCOM.2008.53 – year: 2016 ident: 10.1016/j.future.2023.03.043_b28 – volume: 38 start-page: 193 issue: 1 year: 2020 ident: 10.1016/j.future.2023.03.043_b18 article-title: A cross-layer trust evaluation protocol for secured routing in communication network of smart grid publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2019.2952035 – volume: 6 start-page: 5432 issue: 3 year: 2019 ident: 10.1016/j.future.2023.03.043_b20 article-title: CTRUST: A dynamic trust model for collaborative applications in the internet of things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2902022 – volume: 21 start-page: 7314 issue: 9 year: 2022 ident: 10.1016/j.future.2023.03.043_b11 article-title: LTrust: An adaptive trust model based on LSTM for underwater acoustic sensor networks publication-title: IEEE Trans. Wireless Commun. doi: 10.1109/TWC.2022.3157621 – volume: 19 start-page: 1010 issue: 5 year: 2020 ident: 10.1016/j.future.2023.03.043_b6 article-title: A high-availability data collection scheme based on multi-AUVs for underwater sensor networks publication-title: IEEE Trans. Mob. Comput. doi: 10.1109/TMC.2019.2907854 – ident: 10.1016/j.future.2023.03.043_b25 doi: 10.1109/PACIIA.2008.152 – ident: 10.1016/j.future.2023.03.043_b36 doi: 10.1109/ICCSE.2010.5593604 – volume: 8 start-page: 122959 year: 2020 ident: 10.1016/j.future.2023.03.043_b1 article-title: Underwater networked wireless sensor data collection for computational intelligence techniques: Issues, challenges, and approaches publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3007502 – start-page: 144 year: 2011 ident: 10.1016/j.future.2023.03.043_b30 article-title: Application of fuzzy comprehensive evaluation based on variable weight in risk assessment for contract project – ident: 10.1016/j.future.2023.03.043_b31 doi: 10.1109/ICCCN.2010.5560118 – ident: 10.1016/j.future.2023.03.043_b13 doi: 10.1109/ComComAp53641.2021.9653054 – ident: 10.1016/j.future.2023.03.043_b33 doi: 10.1109/ICEE.2010.345 – volume: 8 start-page: 3653 issue: 5 year: 2020 ident: 10.1016/j.future.2023.03.043_b22 article-title: A mobile-beacon-based iterative localization mechanism in large-scale underwater acoustic sensor networks publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3023556 – start-page: 103 year: 2007 ident: 10.1016/j.future.2023.03.043_b29 – ident: 10.1016/j.future.2023.03.043_b35 doi: 10.1109/IMCCC.2018.00172 – volume: 7 start-page: 440 issue: 1 year: 2020 ident: 10.1016/j.future.2023.03.043_b19 article-title: Recommendation-based trust model for vehicle-to-everything (V2X) publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2950083 – volume: 26 start-page: 1228 issue: 5 year: 2015 ident: 10.1016/j.future.2023.03.043_b14 article-title: An efficient distributed trust model for wireless sensor networks publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2014.2320505 – volume: 6 start-page: 4725 year: 2018 ident: 10.1016/j.future.2023.03.043_b17 article-title: A comprehensive trust-aware routing protocol with multi-attributes for WSNs publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2786944 – ident: 10.1016/j.future.2023.03.043_b26 |
| SSID | ssj0001731 |
| Score | 2.4783869 |
| Snippet | Underwater acoustic sensor networks (UASNs) have been applied in many civilian and military scenarios, but it is vulnerable to various security threats due to... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 466 |
| SubjectTerms | Collaborative filtering Fuzzy algorithm Recommendation management Trust management mechanism Underwater acoustic sensor networks (UASNs) |
| Title | A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks |
| URI | https://dx.doi.org/10.1016/j.future.2023.03.043 |
| Volume | 145 |
| WOSCitedRecordID | wos000981801000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7115 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001731 issn: 0167-739X databaseCode: AIEXJ dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1ba9swFBZZu4e9rLvSrt3Qw96Ci2PJlvUYSku3hzJoB3kzkiyvDo1bkq7rz9lP3TmSrHjL2A0GwQQjJULn87nI55yPkLd1oZXNtUmQwirhjJeJkpg5pRST1hrRSOXIJsTZWTmbyQ-j0de-FubuSnRdeX8vb_6rqOEeCBtLZ_9C3PFH4QZ8B6HDFcQO1z8S_HSMQe5iYQNdUkhQdS_9a9tA2GrHC4sFv8iPgVasdm8MsPjCE-PgGQjWli2_KGyhCDrTUX6NVzD3ejnufOb4aujXnrjWJMjHbAOkTKCLCL2io-seT6gxn3beRlzBHn7y8u4uVbsx-tRexqHnn53hQN7obnhqkbGYMxeO0jbKafzpJmhtwRy3Lhgnr5FLASHAxNd8RpXN84HS5UUxsN_c08JsmAZ_SjE_9L1aDnFRrr2t7xL1Q9Ptc1wKrgQiNOxIlD4g25nIJejN7em749n7aO0nInBehqX35Zkuh3Dzv37u_gxcmosn5HGIRejUY-gpGdnuGdnpeT5oUPvPSTul30OKriFFA6RohBR1kKIwykGKOkjRtqNrSNEeUtRDivaQekE-nhxfHJ0mgaIjMRBr3iYZPOh5wTKpjJGNUGVmNDjstawbnSptbZbpTDepUJMmF6C1ILwFn1hngucKbDR7Sba6687uEmpsaQvGFRcKvEojFdNag7-fpo0oayb2COt3rjKhfz3SqFxVfaLivPL7XeF-Vyl8ONsjSZx14_u3_Ga86IVSBR_U-5YV4OiXM1_988x98mj9iByQLZCOfU0emrvbdrV8EwD3DR4dtIU |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+recommendation+management+defense+mechanism+based+on+trust+model+in+underwater+acoustic+sensor+networks&rft.jtitle=Future+generation+computer+systems&rft.au=Zhang%2C+Mengjie&rft.au=Feng%2C+Renhai&rft.au=Zhang%2C+Hehe&rft.au=Su%2C+Yishan&rft.date=2023-08-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=145&rft.spage=466&rft.epage=477&rft_id=info:doi/10.1016%2Fj.future.2023.03.043&rft.externalDocID=S0167739X23001310 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon |