2022
DOI: 10.1109/tmc.2020.3020313
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Update Mechanism Based on Reinforcement Learning in Underwater Acoustic Sensor Networks

Abstract: Underwater acoustic sensor networks (UASNs) have been widely applied in marine scenarios, such as offshore exploration, auxiliary navigation and marine military. Due to the limitations in communication, computation, and storage of underwater sensor nodes, traditional security mechanisms are not applicable to UASNs. Recently, various trust models have been investigated as effective tools towards improving the security of UASNs. However, the existing trust models lack flexible trust update rules, particularly wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(23 citation statements)
references
References 33 publications
0
23
0
Order By: Relevance
“…He et al [38] developed a trust-up mechanism for underwater acoustic sensor networks (UASNs). An environmental model designed considering the impact of the underwater environment, such as mobility of water flow and the instability nature of acoustic communication, was considered for trust update.…”
Section: Existing State-of-the-art Trust Computation Modelsmentioning
confidence: 99%
“…He et al [38] developed a trust-up mechanism for underwater acoustic sensor networks (UASNs). An environmental model designed considering the impact of the underwater environment, such as mobility of water flow and the instability nature of acoustic communication, was considered for trust update.…”
Section: Existing State-of-the-art Trust Computation Modelsmentioning
confidence: 99%
“…Multi-class supervised learning algorithms such as SVM and random forest [65,56,111] are used to find the optimal decision boundary between trusted and untrusted clusters. Moreover, reinforcement learning [95,52,58,107,168] can be used to find the optimal trust evaluation policy and improve trust evaluation models by continuously interacting with the surrounding environment by trial and error [165].…”
Section: Experience-driven Trust Evaluationmentioning
confidence: 99%
“…Similar concept is also observed in fuzzy logic-based secure data transmission, 10 Kalman filter, 11 decision tree 12 and reinforcement learning. 13 It has been noticed that every trust or reputation calculation method needs a threshold value to decide the node's dependency for reliable transmission. This threshold value is human experience and knowledge dependent.…”
Section: F I G U R E 1 Nodes' Frequency In the Path Under (A) Benign Case (B) Carousel Attack (C) Stretch Attackmentioning
confidence: 99%
“…The advanced reinforcement learning algorithms are proved to be a promising scheme for route selection in the WSN. 7,[13][14][15] Different reward functions have been specified for various action spaces in RL. The advantage of RL schemes is that each node does not need to train the network separately; instead, each node can use the trained RL policy by the main base station or any backbone cloud service to decide the next hope ID.…”
Section: F I G U R E 1 Nodes' Frequency In the Path Under (A) Benign Case (B) Carousel Attack (C) Stretch Attackmentioning
confidence: 99%