Skip to main content

CS-Based Homomorphism Encryption and Trust Scheme for Underwater Acoustic Sensor Networks

  • Conference paper
  • First Online:
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIOT 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1283))

  • 1465 Accesses

Abstract

Underwater acoustic sensor networks (UASNs) have been exploited in many applications. However, due to the complex, unattended and, worse still, hostile deployment environment of the networks, they are vulnerable to many malicious attacks. Presently, researches on how to cope with these threats are extremely restricted due to the limited capability of the sensors. In this paper, we propose a compressive sensing (CS) based homomorphism encryption and trust scheme (CHTS). To identify several malicious attacks such as eavesdropping attacks, compromising attacks, Sybil attacks, wormhole attacks and selective forwarding attacks, etc., we utilize SVM to train trust model and send to each node so that it can determine whether its neighbor nodes are malicious or not. Also, homomorphism encryption is adopted to ensure data confidentiality. Finally, the security analysis shows that the proposed scheme can effectively ensure data confidentiality and identify malicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Diamant, R., Casari, P., Tomasin, S.: Cooperative authentication in underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 18(2), 954–968 (2019)

    Article  Google Scholar 

  2. Liu, Z., Gao, H., Wang, W., Chang, S., Chen, J.: Color filtering localization for three-dimensional underwater acoustic sensor networks. Sensors 5(3), 6009–6032 (2015)

    Article  Google Scholar 

  3. Biswas, K., Muthukkumarasamy, V., Singh, K.: An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sens. J. 15(5), 2801–2809 (2015). https://doi.org/10.1109/JSEN.2014.2380816

    Article  Google Scholar 

  4. Han, G., He, Y., Jiang, J., Wang, N., Guizani, M., Ansere, J.A.: A synergetic trust model based on SVM in underwater acoustic sensor networks. IEEE Trans. Veh. Technol. 68(11), 11239–11247 (2019). https://doi.org/10.1109/TVT.2019.2939179

    Article  Google Scholar 

  5. Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 308–318. Springer, Berlin (1998)

    Google Scholar 

  6. Shim, K.A., Park, C.M.: A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(8), 2128–2139 (2015)

    Article  Google Scholar 

  7. Shaikh, R.A., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.-J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11), 1698–1712 (2008)

    Article  Google Scholar 

  8. Jiang, J., Han, G., Shu, L., Chan, S., Wang, K.: A trust model based on cloud theory in underwater acoustic sensor networks. IEEE Trans. Ind. Inf. 13(1), 342–350 (2017)

    Article  Google Scholar 

  9. Zhang, P., Wang, S., Guo, K., Wang, J.: A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw. 70, 73–84 (2018). ISSN 1570-8705

    Google Scholar 

  10. Jiang, J., Han, G., Wang, F., Shu, L., Guizani, M.: An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(5), 1228–1237 (2015)

    Article  Google Scholar 

  11. Jayasinghe, U., Lee, G.M., Shi, Q.: Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 4(1), 39–52 (2019)

    Article  Google Scholar 

  12. Yang, G., Dai, L., Wei, Z.: Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors 18, 3907 (2018)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the following projects: the National Natural Science Foundation of China (61862020); the key research and development project of Hainan Province (ZDYF2018006); Hainan University-Tianjin University Collaborative Innovation Foundation Project (HDTDU202005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangdang Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liang, K., Huang, H., Huang, X., Yang, Q. (2021). CS-Based Homomorphism Encryption and Trust Scheme for Underwater Acoustic Sensor Networks. In: MacIntyre, J., Zhao, J., Ma, X. (eds) The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. SPIOT 2020. Advances in Intelligent Systems and Computing, vol 1283. Springer, Cham. https://doi.org/10.1007/978-3-030-62746-1_58

Download citation

Publish with us

Policies and ethics