• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • Help
    • Item Submission
    • Publisher policies
    • User guides
    • FAQs
  • About QSpace
    • Vision & Mission
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks

    Thumbnail
    Date
    2020-08-01
    Author
    Jiang, Jinfang
    Zhu, Xinyu
    Han, Guangjie
    Guizani, Mohsen
    Shu, Lei
    Metadata
    Show full item record
    Abstract
    At present, Underwater Wireless Sensor Networks (UWSNs) have been widely used in enormous applications, and simultaneously face many security threats. The trust management mechanism plays an important role in protecting network security. Many theories, e.g., subjective logic, Bayesian, cloud model, entropy theory, evidence theory, etc., have been adopted to evaluate the node trust of wireless sensor networks. However, due to the unique characteristics of the underwater dynamic environment, the existing trust mechanisms used in traditional networks (such as P2P networks, Ad-hoc networks, etc.) cannot be directly used in UWSNs. Therefore, this paper proposes a new trust evaluation and update mechanism for underwater wireless sensor networks based on the C4.5 decision tree algorithm (TEUC). In the TEUC, trust evidences are first collected including data-based, link-based and node-based trust evidences. Then, the collected trust evidences are used to train the C4.5 decision tree. In addition, the reward and penalty factors are defined to update trust based on the sliding time window. Finally, simulation results demonstrate that the proposed algorithm outperforms the traditional ones in a dynamic network environment in terms of malicious node detection and energy consumption.
    URI
    https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85090137318&origin=inward
    DOI/handle
    http://dx.doi.org/10.1109/TVT.2020.2999566
    http://hdl.handle.net/10576/36763
    Collections
    • Computer Science & Engineering [‎2428‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policiesUser guides FAQs

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video