Abstract
With the massive improvement in sensing techniques, government agencies and researchers are interested in exploring underwater resources by deploying underwater sensor nodes. The harsh random environment and open acoustic channel are the main two challenges for the researchers. In addition, the network is vulnerable due to faulty and compromised node. This paper presents a trust management model based on Hidden Markov Model (HMM) for measuring the trustworthiness of the sensor nodes to combat malicious or internal attack. In addition, we have also suggested a lightweight stream cipher scheme named ChaCha20 to prevent external attack. Mathematical analysis shows that ChaCha20 performs better in terms of energy efficiency which is suitable for UWSN. The numerical results reveals that the proposed methods are able to prevent attacks in UWSNs.
| Original language | English |
|---|---|
| Title of host publication | International Conference on Computing Advancements |
| Subtitle of host publication | �Age of Computing and Augmented Life�, ICCA 2020 |
| Publisher | Association for Computing Machinery |
| ISBN (Electronic) | 9781450377782 |
| DOIs | |
| State | Published - 10 Jan 2020 |
| Externally published | Yes |
| Event | 2020 International Conference on Computing Advancements: Age of Computing and Augmented Life, ICCA 2020 - Dhaka, Bangladesh Duration: 10 Jan 2020 → 12 Jan 2020 |
Publication series
| Name | ACM International Conference Proceeding Series |
|---|
Conference
| Conference | 2020 International Conference on Computing Advancements: Age of Computing and Augmented Life, ICCA 2020 |
|---|---|
| Country/Territory | Bangladesh |
| City | Dhaka |
| Period | 10/01/20 → 12/01/20 |
Bibliographical note
Publisher Copyright:© 2020 Association for Computing Machinery.
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
Keywords
- ChaCha20
- HMM
- Security
- Trust management
- UWSN
ASJC Scopus subject areas
- Software
- Human-Computer Interaction
- Computer Vision and Pattern Recognition
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'Hidden Markov model based trust management model for underwater wireless sensor networks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver