Routing Protocol for Underwater Wireless Sensor Networks Based on a Trust Model and Void-Avoided Algorithm

Underwater wireless sensor networks have a wide range of application prospects in important fields such as ocean exploration and underwater environment monitoring. However, the influence of complex underwater environments makes underwater wireless sensor networks subject to many limitations, such as...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 24; no. 23; p. 7614
Main Authors Ye, Jun, Jiang, Weili
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 28.11.2024
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Underwater wireless sensor networks have a wide range of application prospects in important fields such as ocean exploration and underwater environment monitoring. However, the influence of complex underwater environments makes underwater wireless sensor networks subject to many limitations, such as resource limitation, channel openness, malicious attacks, and other problems. To address the above issues, we propose a routing scheme for underwater wireless networks based on a trust model and Void-Avoided algorithm. The proposed scheme establishes a trust model, evaluates the behavior of underwater nodes through direct trust, indirect trust, and environmental trust, and finds malicious nodes while taking into account evaluation of the channel, which provides support for the next data transmission event. The proposed scheme prioritizes the total cabling distance and introduces a two-hop availability checking model for data transmission, checking the nodes for voids and avoiding the void areas, to find the transmission path with the lowest energy consumption and lowest latency as much as possible. In this study, simulation experiments were conducted on the proposed scheme, and the results showed that the target scheme can effectively detect malicious nodes through anomalous behaviors and outperforms existing work in terms of malicious node detection rate, energy consumption, and end-to-end latency, and network performance.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:1424-8220
1424-8220
DOI:10.3390/s24237614