{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:10:18Z","timestamp":1777043418938,"version":"3.51.4"},"reference-count":38,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T00:00:00Z","timestamp":1722038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2341227"],"award-info":[{"award-number":["U2341227"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The transmission environment of underwater wireless sensor networks is open, and important transmission data can be easily intercepted, interfered with, and tampered with by malicious nodes. Malicious nodes can be mixed in the network and are difficult to distinguish, especially in time-varying underwater environments. To address this issue, this article proposes a GAN-based trusted routing algorithm (GTR). GTR defines the trust feature attributes and trust evaluation matrix of underwater network nodes, constructs the trust evaluation model based on a generative adversarial network (GAN), and achieves malicious node detection by establishing a trust feature profile of a trusted node, which improves the detection performance for malicious nodes in underwater networks under unlabeled and imbalanced training data conditions. GTR combines the trust evaluation algorithm with the adaptive routing algorithm based on Q-Learning to provide an optimal trusted data forwarding route for underwater network applications, improving the security, reliability, and efficiency of data forwarding in underwater networks. GTR relies on the trust feature profile of trusted nodes to distinguish malicious nodes and can adaptively select the forwarding route based on the status of trusted candidate next-hop nodes, which enables GTR to better cope with the changing underwater transmission environment and more accurately detect malicious nodes, especially unknown malicious node intrusions, compared to baseline algorithms. Simulation experiments showed that, compared to baseline algorithms, GTR can provide a better malicious node detection performance and data forwarding performance. Under the condition of 15% malicious nodes and 10% unknown malicious nodes mixed in, the detection rate of malicious nodes by the underwater network configured with GTR increased by 5.4%, the error detection rate decreased by 36.4%, the packet delivery rate increased by 11.0%, the energy tax decreased by 11.4%, and the network throughput increased by 20.4%.<\/jats:p>","DOI":"10.3390\/s24154879","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T12:27:43Z","timestamp":1722256063000},"page":"4879","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8135-8527","authenticated-orcid":false,"given":"Bin","family":"Wang","sequence":"first","affiliation":[{"name":"College of Electronic Engineering, Naval University of Engineering, Wuhan 430033, China"}]},{"given":"Kerong","family":"Ben","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, Naval University of Engineering, Wuhan 430033, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"e7815","DOI":"10.1002\/cpe.7815","article-title":"Underwater Acoustic Sensor Networks: Taxonomy on Applications, Architectures, Localization Methods, Deployment Techniques, Routing Techniques, and Threats: A Systematic Review","volume":"35","author":"Gola","year":"2023","journal-title":"Concurr. Comput.-Pract. Exp."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"6403161","DOI":"10.1155\/2020\/6403161","article-title":"A Review of Underwater Localization Techniques, Algorithms, and Challenges","volume":"2020","author":"Su","year":"2020","journal-title":"J. Sens."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"45693","DOI":"10.1109\/ACCESS.2019.2909133","article-title":"Localization and Detection of Targets in Underwater Wireless Sensor Using Distance and Angle Based Algorithms","volume":"7","author":"Ullah","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","first-page":"1121","article-title":"Review of Security for Underwater Wireless Sensor Networks","volume":"45","author":"Su","year":"2023","journal-title":"J. Electron. Inf. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Saeed, K., Khalil, W., Al-Shamayleh, A.S., Ahmed, S., Akhunzada, A., Alharthi, S.Z., and Gani, A. (2023). A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks. Sustainability, 15.","DOI":"10.3390\/su15097198"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2447","DOI":"10.1109\/TMC.2015.2402120","article-title":"An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network","volume":"14","author":"Han","year":"2015","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TMC.2020.3020313","article-title":"A Trust Update Mechanism Based on Reinforcement Learning in Underwater Acoustic Sensor Networks","volume":"21","author":"He","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"11239","DOI":"10.1109\/TVT.2019.2939179","article-title":"A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks","volume":"68","author":"Han","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"26161","DOI":"10.1109\/JSEN.2021.3117056","article-title":"A Redeemable SVM-DS Fusion-Based Trust Management Mechanism for Underwater Acoustic Sensor Networks","volume":"21","author":"Su","year":"2021","journal-title":"IEEE Sens. J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"9031","DOI":"10.1109\/TVT.2020.2999566","article-title":"A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks","volume":"69","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_11","first-page":"427","article-title":"A Trust-Based Malicious Detection Scheme for Underwater Acoustic Sensor Networks","volume":"Volume 13340","author":"Sun","year":"2022","journal-title":"Proceedings of the Artificial Intelligence and Security, ICAIS 2022, PT III"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhang, J., Wang, Q., and Zhang, H. (2023). DOIDS: An Intrusion Detection Scheme Based on DBSCAN for Opportunistic Routing in Underwater Wireless Sensor Networks. Sensors, 23.","DOI":"10.3390\/s23042096"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"7314","DOI":"10.1109\/TWC.2022.3157621","article-title":"LTrust: An Adaptive Trust Model Based on LSTM for Underwater Acoustic Sensor Networks","volume":"21","author":"Du","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3313","DOI":"10.1109\/TKDE.2021.3130191","article-title":"A Review on Generative Adversarial Networks: Algorithms, Theory, and Applications","volume":"35","author":"Gui","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.neucom.2021.12.093","article-title":"GAN-Based Anomaly Detection: A Review","volume":"493","author":"Xia","year":"2022","journal-title":"Neurocomputing"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"8377","DOI":"10.1109\/TIE.2022.3212378","article-title":"Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks","volume":"70","author":"Yang","year":"2023","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/LCOMM.2006.060774","article-title":"Symbol error rate of selection amplify-and-forward relay systems","volume":"10","author":"Zhao","year":"2006","journal-title":"IEEE Commun. Lett."},{"key":"ref_18","first-page":"1216","article-title":"VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks","volume":"Volume 3976","author":"Boavida","year":"2006","journal-title":"Networking 2006: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TMC.2010.28","article-title":"QELAR: A Machine-Learning-Based Adaptive Routing Protocol for Energy-Efficient and Lifetime-Extended Underwater Sensor Networks","volume":"9","author":"Hu","year":"2010","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3936","DOI":"10.1109\/JSEN.2023.3234112","article-title":"Deep Q-Network-Based Intelligent Routing Protocol for Underwater Acoustic Sensor Network","volume":"23","author":"Geng","year":"2023","journal-title":"IEEE Sens. J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"109562","DOI":"10.1016\/j.comnet.2023.109562","article-title":"QTAR: A Q-Learning-Based Topology-Aware Routing Protocol for Underwater Wireless Sensor Networks","volume":"222","author":"Nandyala","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"17771","DOI":"10.1109\/JSEN.2023.3285751","article-title":"Reinforcement Learning-Based Opportunistic Routing Protocol Using Depth Information for Energy-Efficient Underwater Wireless Sensor Networks","volume":"23","author":"Wang","year":"2023","journal-title":"IEEE Sens. J."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"56179","DOI":"10.1109\/ACCESS.2024.3391386","article-title":"SQMCR: Stackelberg Q-Learning-Based Multi-Hop Cooperative Routing Algorithm for Underwater Wireless Sensor Networks","volume":"12","author":"Wang","year":"2024","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/JOE.2017.2716599","article-title":"Toward the Development of Secure Underwater Acoustic Networks","volume":"42","author":"Lal","year":"2017","journal-title":"IEEE J. Ocean. Eng."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2303","DOI":"10.3906\/elk-2001-51","article-title":"A Secure and Energy-Efficient Opportunistic Routing Protocol with Void Avoidance for Underwater Acoustic Sensor Networks","volume":"28","author":"Menon","year":"2020","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Capossele, A., Gjanci, P., Petrioli, C., and Spaccini, D. (2015, January 18\u201321). SecFUN: Security Framework for Underwater Acoustic Sensor Networks. Proceedings of the OCEANS 2015\u2014GENOVA, Genova, Italy.","DOI":"10.1109\/OCEANS-Genova.2015.7271735"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"9980","DOI":"10.1109\/JIOT.2020.2988733","article-title":"Secure and Efficient Data Collection and Storage of IoT in Smart Ocean","volume":"7","author":"Hu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Prakash, K., and Sathya, S. (2023, January 6\u20138). A Deep Learning-Based Multi-Path Routing Protocol for Improving Security Using Encryption in Underwater Wireless Sensor Networks. Proceedings of the 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India.","DOI":"10.1109\/ICESC57686.2023.10193733"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"e3281","DOI":"10.1002\/dac.3281","article-title":"Agent-Based Secure Routing for Underwater Acoustic Sensor Networks","volume":"30","author":"Bharamagoudra","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Capossele, A., Cicco, G.D., and Petrioli, C. (2015, January 22\u201324). R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks. Proceedings of the 10th International Conference on Underwater Networks & Systems, Arlington, VA, USA.","DOI":"10.1145\/2831296.2831339"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Shah, S., Munir, A., Waheed, A., Alabrah, A., Mukred, M., Amin, F., and Salam, A. (2023). Enhancing Security and Efficiency in Underwater Wireless Sensor Networks: A Lightweight Key Management Framework. Symmetry, 15.","DOI":"10.3390\/sym15081484"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"21287","DOI":"10.1109\/JSEN.2022.3202169","article-title":"A Secure Transmission Scheme with Energy-Efficient Cooperative Jamming for Underwater Acoustic Sensor Networks","volume":"22","author":"Su","year":"2022","journal-title":"IEEE Sens. J."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wang, Z., Du, J., Xia, Z., Jiang, C., Fang, Z., and Ren, Y. (2022, January 6\u201320). Secure Routing in Underwater Acoustic Sensor Networks Based on AFSA-ACOA Fusion Algorithm. Proceedings of the IEEE International Conference On Communications (ICC 2022), Seoul, Republic of Korea.","DOI":"10.1109\/ICC45855.2022.9838802"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"107419","DOI":"10.1109\/ACCESS.2020.3000863","article-title":"SEECR: Secure Energy Efficient and Cooperative Routing Protocol for Underwater Wireless Sensor Networks","volume":"8","author":"Saeed","year":"2020","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Yang, J., He, S., Xu, Y., Chen, L., and Ren, J. (2019). A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks. Sensors, 19.","DOI":"10.3390\/s19040970"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1109\/TII.2015.2510226","article-title":"A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks","volume":"13","author":"Jiang","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1684","DOI":"10.1109\/TMC.2020.3028369","article-title":"ITrust: An Anomaly-Resilient Trust Model Based on Isolation Forest for Underwater Acoustic Sensor Networks","volume":"21","author":"Du","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Li, X., Hu, X., Li, W., and Hu, H. (2019, January 20\u201324). A Multi-Agent Reinforcement Learning Routing Protocol for Underwater Optical Sensor Networks. Proceedings of the ICC 2019\u20132019 IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761441"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/15\/4879\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:24:59Z","timestamp":1760109899000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/15\/4879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,27]]},"references-count":38,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["s24154879"],"URL":"https:\/\/doi.org\/10.3390\/s24154879","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,27]]}}}