Visible to the public An Anti-Attack Trust Mechanism Based on Collaborative Spectrum Sensing for Underwater Acoustic Sensor Networks

TitleAn Anti-Attack Trust Mechanism Based on Collaborative Spectrum Sensing for Underwater Acoustic Sensor Networks
Publication TypeConference Paper
Year of Publication2020
AuthorsSu, Yishan, Zhang, Ting, Jin, Zhigang, Guo, Lei
Conference NameGlobal Oceans 2020: Singapore – U.S. Gulf Coast
Date PublishedOct. 2020
PublisherIEEE
ISBN Number978-1-7281-5446-6
KeywordsCUA, Cyber physical system, faces, Metrics, pubcrawl, resilience, Resiliency, Resists, Safety, Scalability, security, Sensors, simulation, trust mechanism, UAC, Underwater acoustics, underwater communication, Underwater Networks, XOR operation
AbstractThe main method for long-distance underwater communication is underwater acoustic communication(UAC). The bandwidth of UAC channel is narrow and the frequency band resources are scarce. Therefore, it is important to improve the frequency band utilization of UAC system. Cognitive underwater acoustic (CUA) technology is an important method. CUA network can share spectrum resources with the primary network. Spectrum sensing (SS) technology is the premise of realizing CUA. Therefore, improving the accuracy of spectral sensing is the main purpose of this paper. However, the realization of underwater SS technology still faces many difficulties. First, underwater energy supplies are scarce, making it difficult to apply complex algorithms. Second, and more seriously, CUA network can sometimes be attacked and exploited by hostile forces, which will not only lead to data leakage, but also greatly affect the accuracy of SS. In order to improve the utilization of underwater spectrum and avoid attack, an underwater spectrum sensing model based on the two-threshold energy detection method and K of M fusion decision method is established. Then, the trust mechanism based on beta function and XOR operation are proposed to combat individual attack and multi-user joint attack (MUJA) respectively. Finally, simulation result shows the effectiveness of these methods.
URLhttps://ieeexplore.ieee.org/document/9389150
DOI10.1109/IEEECONF38699.2020.9389150
Citation Keysu_anti-attack_2020