Title | ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Arifeen, Md Murshedul, Islam, Al Amin, Rahman, Md Mustafizur, Taher, Kazi Abu, Islam, Md.Maynul, Kaiser, M Shamim |
Conference Name | 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE) |
Keywords | adaptive neuro fuzzy inference system, ANFIS, authentication, complex security, data mining, data privacy, FIS learning rules, forwarding node, information and communication technology, Intrusion detection, location privacy, malicious node, marine communication, Markov Decision Process, Markov processes, MATLAB, MDP, Metrics, privacy, pubcrawl, Resiliency, resource constraint behaviour, Routing, Scalability, sensor node, telecommunication security, trust behaviour, Trust management, trust management model, trusted node, Underwater Networks, Underwater Wireless Sensor Networks, UWSN, Wireless sensor networks |
Abstract | Trust management is a promising alternative solution to different complex security algorithms for Underwater Wireless Sensor Networks (UWSN) applications due to its several resource constraint behaviour. In this work, we have proposed a trust management model to improve location privacy of the UWSN. Adaptive Neuro Fuzzy Inference System (ANFIS) has been exploited to evaluate trustworthiness of a sensor node. Also Markov Decision Process (MDP) has been considered. At each state of the MDP, a sensor node evaluates trust behaviour of forwarding node utilizing the FIS learning rules and selects a trusted node. Simulation has been conducted in MATLAB and simulation results show that the detection accuracy of trustworthiness is 91.2% which is greater than Knowledge Discovery and Data Mining (KDD) 99 intrusion detection based dataset. So, in our model 91.2% trustworthiness is necessary to be a trusted node otherwise it will be treated as a malicious or compromised node. Our proposed model can successfully eliminate the possibility of occurring any compromised or malicious node in the network. |
DOI | 10.1109/ECACE.2019.8679165 |
Citation Key | arifeen_anfis_2019 |