Abstract
Underwater acoustic sensor networks (UASNs) have been exploited in many applications. However, due to the complex, unattended and, worse still, hostile deployment environment of the networks, they are vulnerable to many malicious attacks. Presently, researches on how to cope with these threats are extremely restricted due to the limited capability of the sensors. In this paper, we propose a compressive sensing (CS) based homomorphism encryption and trust scheme (CHTS). To identify several malicious attacks such as eavesdropping attacks, compromising attacks, Sybil attacks, wormhole attacks and selective forwarding attacks, etc., we utilize SVM to train trust model and send to each node so that it can determine whether its neighbor nodes are malicious or not. Also, homomorphism encryption is adopted to ensure data confidentiality. Finally, the security analysis shows that the proposed scheme can effectively ensure data confidentiality and identify malicious nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Diamant, R., Casari, P., Tomasin, S.: Cooperative authentication in underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 18(2), 954–968 (2019)
Liu, Z., Gao, H., Wang, W., Chang, S., Chen, J.: Color filtering localization for three-dimensional underwater acoustic sensor networks. Sensors 5(3), 6009–6032 (2015)
Biswas, K., Muthukkumarasamy, V., Singh, K.: An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sens. J. 15(5), 2801–2809 (2015). https://doi.org/10.1109/JSEN.2014.2380816
Han, G., He, Y., Jiang, J., Wang, N., Guizani, M., Ansere, J.A.: A synergetic trust model based on SVM in underwater acoustic sensor networks. IEEE Trans. Veh. Technol. 68(11), 11239–11247 (2019). https://doi.org/10.1109/TVT.2019.2939179
Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 308–318. Springer, Berlin (1998)
Shim, K.A., Park, C.M.: A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(8), 2128–2139 (2015)
Shaikh, R.A., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.-J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11), 1698–1712 (2008)
Jiang, J., Han, G., Shu, L., Chan, S., Wang, K.: A trust model based on cloud theory in underwater acoustic sensor networks. IEEE Trans. Ind. Inf. 13(1), 342–350 (2017)
Zhang, P., Wang, S., Guo, K., Wang, J.: A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw. 70, 73–84 (2018). ISSN 1570-8705
Jiang, J., Han, G., Wang, F., Shu, L., Guizani, M.: An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(5), 1228–1237 (2015)
Jayasinghe, U., Lee, G.M., Shi, Q.: Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 4(1), 39–52 (2019)
Yang, G., Dai, L., Wei, Z.: Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors 18, 3907 (2018)
Acknowledgment
This work was supported by the following projects: the National Natural Science Foundation of China (61862020); the key research and development project of Hainan Province (ZDYF2018006); Hainan University-Tianjin University Collaborative Innovation Foundation Project (HDTDU202005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Liang, K., Huang, H., Huang, X., Yang, Q. (2021). CS-Based Homomorphism Encryption and Trust Scheme for Underwater Acoustic Sensor Networks. In: MacIntyre, J., Zhao, J., Ma, X. (eds) The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. SPIOT 2020. Advances in Intelligent Systems and Computing, vol 1283. Springer, Cham. https://doi.org/10.1007/978-3-030-62746-1_58
Download citation
DOI: https://doi.org/10.1007/978-3-030-62746-1_58
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62745-4
Online ISBN: 978-3-030-62746-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)