Satellite Network Security Routing Technology Based on Deep Learning and Trust Management
Abstract
:1. Introduction
- (1)
- Due to issues such as electromagnetic interference, network congestion, and satellite node malfunctions, it is challenging to ascertain whether transmission failures are caused by malicious attacks in satellite networks. Addressing this challenge, this paper proposes the application of the Dempster–Shafer (D–S) evidence theory to handle uncertainties in satellite network communication data. By quantifying interaction data within the satellite network, direct trust vectors and indirect trust vectors are formed. The D–S evidence theory integrates these vectors to create a comprehensive trust vector, which mitigates the misjudgment of satellite network node behavior caused by nonmalicious factors.
- (2)
- Traditional mathematical models, when used as security trust models, exhibit low detection accuracy and limited flexibility in identifying unknown attacks. Therefore, this paper introduces the variational autoencoder (VAE) from the field of deep learning to discern malicious node behavior. Furthermore, to enhance the VAE’s ability to detect anomalous behavior, an attention mechanism is incorporated into the VAE network. Specifically, after the D–S evidence theory processes communication data, the VAE network receives cleansed communication data as input to its encoder. By adjusting the weights of latent variables provided by the encoder using attention mechanisms, the VAE network can more accurately learn the underlying feature information of the trust vector, thus improving the detection of malicious node behavior and enhancing satellite network routing security.
- (3)
- By incorporating the security scores derived from the VAE model into the pheromones of the ant colony algorithm, the satellite network can dynamically guide ants to circumvent malicious nodes during the routing process. Specifically, when ants choose the next hop, they consider their pheromones along with the security assessment factors of neighboring nodes. Ants are inclined to choose paths with higher products of pheromones and security factors. Thus, improving the ant colony algorithm with the security factor of the VAE model helps the satellite network establish secure routing paths.
2. Related Research
3. Problem Modeling
3.1. Satellite Network Model
3.2. Security Trust Model
3.3. Trust Evidence Data Cleaning
3.4. Intelligent Security Trust Model
3.5. Safe Ant Colony Algorithm
3.6. Satellite Network Security Routing Algorithm
Algorithm 1: Satellite network security routing algorithm |
Input: Set the source node and destination node Output: a satellite network security routing |
1. The satellite network is initialized and the nodes collect communication data 2. Generating a Comprehensive Trust Vector Using D–S Evidence Theory 3. Use to generate and form a dataset for training VAE 4. The satellite node uses the VAE network to collect the security evaluation factor of the theoretical node. 5. While < 6. Set the tabu list to empty 7. For = 1 to do 8. While Ant has not reached 9. If is not null 10. Select the next hop based on the Formula (17) 11. Add to the tabu list 12. End if 13. Terminate this search 14. update pheromones according to Formula (19) 15. End while 16. = + 1 17. End for 18. = + 1 19. End while 20. Generate a secure route |
4. Experimental Simulation and Analysis
4.1. Settings of Ant Colony Algorithm Parameters
4.2. Analysis of Results
4.2.1. Average End-to-End Delay
4.2.2. Packet Loss Rate
4.2.3. Network Throughput
4.3. Analysis of Transmission Delay under Data Pressure
4.4. Model Complexity Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Cao, X.; Li, Y.; Xiong, X.; Wang, J. Dynamic routings in satellite networks: An overview. Sensors 2022, 22, 4552. [Google Scholar] [CrossRef] [PubMed]
- Van Nguyen, T. Design of Capacity-Approaching Protograph-Based LDPC Coding Systems; The University of Texas at Dallas: Richardson, TX, USA, 2012. [Google Scholar]
- Ma, H.; Fang, Y.; Chen, P.; Li, Y. Reconfigurable Intelligent Surface-aided M-ary FM-DCSK System: A New Design for Noncoherent Chaos-based Communication. IEEE Trans. Veh. Technol. 2022, 72, 4829–4843. [Google Scholar] [CrossRef]
- Shao, S.; Hailes, P.; Wang, T.Y.; Wu, J.-Y.; Maunder, R.G.; Al-Hashimi, B.M.; Hanzo, L. Survey of turbo, LDPC, and polar decoder ASIC implementations. IEEE Commun. Surv. Tutor. 2019, 21, 2309–2333. [Google Scholar] [CrossRef]
- Chen, P.; Shi, L.; Fang, Y.; Lau, F.C.M.; Cheng, J. Rate-diverse multiple access over Gaussian channels. IEEE Trans. Wirel. Commun. 2023, 22, 5399–5413. [Google Scholar] [CrossRef]
- Yan, Y.; Han, G.; Xu, H. A survey on secure routing protocols for satellite network. J. Netw. Comput. Appl. 2019, 145, 102415. [Google Scholar] [CrossRef]
- Hao, X.W.; Ma, J.F.; Ren, F.; Liu, X.Y.; Zhong, Y.T. A kind of authentication routing protocol based on double satellite network in space information network. Comput. Sci. 2011, 38, 79. [Google Scholar]
- Han, G.; He, Y.; Jiang, J.; Wang, N.; Guizani, M.; Ansere, J.A. A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks. IEEE Trans. Veh. Technol. 2019, 68, 11239–11247. [Google Scholar] [CrossRef]
- Chalapathy, R.; Chawla, S. Deep learning for anomaly detection: A survey. arXiv 2019, arXiv:1901.03407. [Google Scholar]
- Sun, R.; Huang, H.Z.; Miao, Q. Improved information fusion approach based on DS evidence theory. J. Mech. Sci. Technol. 2008, 22, 2417–2425. [Google Scholar] [CrossRef]
- Li, R.; Chen, Z.; Li, H. A new distance-based total uncertainty measure in Dempster-Shafer evidence theory. Appl. Intell. 2022, 52, 1209–1237. [Google Scholar] [CrossRef]
- Wu, Y.G.; Yang, J.Y.; Liu, L.J. On the evidence inference theory. Inf. Sci. 1996, 89, 245–260. [Google Scholar] [CrossRef]
- Qiao, J.; Zhang, J.; Wang, Y. An improved multi-sensor D–S rule for conflict reassignment of failure rate of set. Soft Comput. 2020, 24, 15179–15188. [Google Scholar] [CrossRef]
- Jiang, C.; Wang, X.; Wang, J. Security in space information networks. IEEE Commun. Mag. 2015, 53, 82–88. [Google Scholar] [CrossRef]
- Zhe, L.; Jun, L. Research on secure routing of satellite network. J. Commun. 2006, 27, 113–118. [Google Scholar]
- Gao, Y.; Liu, W. BeTrust: A dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks. J. Sens. 2014, 2014, 649392. [Google Scholar] [CrossRef]
- Xu, H.; Zhang, W.; Li, M. Secure Routing Scheme for Satellite Networks Based on Trust Management. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 1569–1584. [Google Scholar]
- Li, H.; Shi, D.; Wang, W. Secure routing for LEO satellite network survivability. Comput. Netw. 2022, 211, 109011. [Google Scholar] [CrossRef]
- Asuquo, P.; Cruickshank, H.; Ogah, C.P.A. A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J. Sel. Areas Commun. 2018, 36, 246–256. [Google Scholar] [CrossRef]
- Cai, R.Y.; Ju, M.Y.; Yang, L.; Pan, C.S. Research on Lightweight Secure Routing Technology based on Satellite Network. In Proceedings of the IEEE 2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT), Shenyang, China, 13–15 November 2020; pp. 42–47. [Google Scholar]
- Li, F.; Guo, Z.; Zhang, C. ATM: An active-detection trust mechanism for VANETs based on blockchain. IEEE Trans. Veh. Technol. 2021, 70, 4011–4021. [Google Scholar] [CrossRef]
- Saad, M.A.; Jaafar, R.; Chellappan, K. Variable-Length Multiobjective Social Class Optimization for Trust-Aware Data Gathering in Wireless Sensor Networks. Sensors 2023, 23, 5526. [Google Scholar] [CrossRef]
- He, Y.; Han, G.; Jiang, J. A Trust Update Mechanism Based on Reinforcement Learning in Underwater Acoustic Sensor Networks. IEEE Trans. Mob. Comput. 2020, 21, 811–821. [Google Scholar] [CrossRef]
- Liu, Y.; Dong, M.; Ota, K. ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2013–2027. [Google Scholar] [CrossRef]
- Cao, S.; Dang, S.; Zhang, Y.; Wang, W.; Cheng, N. A blockchain-based access control and intrusion detection framework for satellite communication systems. Comput. Commun. 2021, 172, 216–225. [Google Scholar] [CrossRef]
- Pan, Y.H.; Wang, T.; Wu, Y.; Wang, W.H. Route Security Mechanism Based on Trust for Low Earth Orbit Satellite Network. Comput. Eng. 2011, 37, 149–151. [Google Scholar] [CrossRef]
- Yang, L.; Yang, S.X.; Li, Y.; Lu, Y.; Guo, T. Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Electron. 2022, 70, 8377–8387. [Google Scholar] [CrossRef]
- Niu, Z.; Yu, K.; Wu, X. LSTM-based VAE-GAN for time-series anomaly detection. Sensors 2020, 20, 3738. [Google Scholar] [CrossRef]
- Wang, T.; Qiao, M.; Lin, Z. Generative neural networks for anomaly detection in crowded scenes. IEEE Trans. Inf. Forensics Secur. 2018, 14, 1390–1399. [Google Scholar] [CrossRef]
- Zeng, Z.; Jin, G.; Xu, C. Satellite telemetry data anomaly detection using causal network and feature-attention-based lstm. IEEE Trans. Instrum. Meas. 2022, 71, 1–21. [Google Scholar] [CrossRef]
- Wang, Y.; Gong, J.; Zhang, J. A deep learning anomaly detection framework for satellite telemetry with fake anomalies. Int. J. Aerosp. Eng. 2022, 2022, 1676933. [Google Scholar] [CrossRef]
- Deng, X.; Zeng, S.; Chang, L.; Wang, Y.; Wu, X.; Liang, J.; Ou, J.; Fan, C. An ant colony optimization-based routing algorithm for load balancing in Leo satellite networks. Wirel. Commun. Mob. Comput. 2022, 2022, 3032997. [Google Scholar] [CrossRef]
- Cheng, J. Dynamic Path Optimization Based on Improved Ant Colony Algorithm. J. Adv. Transp. 2023, 2023, 7651100. [Google Scholar] [CrossRef]
- Dong, Y.; Zhao, S.; dan Ran, H.; Li, Y.; Zhu, Z. Routing and wavelength assignment in a satellite optical network based on ant colony optimization with the small window strategy. J. Opt. Commun. Netw. 2015, 7, 995–1000. [Google Scholar] [CrossRef]
- Werner, M. A dynamic routing concept for ATM-based satellite personal communication networks. IEEE J. Sel. Areas Commun. 1997, 15, 1636–1648. [Google Scholar] [CrossRef]
Literature | Internet of Things | Satellite Network | Traditional Trust Model | Intelligent Trust Model | Energy Factor | Resource Consumption |
---|---|---|---|---|---|---|
[14] | √ | √ | ||||
[15] | √ | √ | ||||
[16] | √ | √ | ||||
[17] | √ | √ | ||||
[18] | √ | √ | √ | √ | ||
[19] | √ | √ | ||||
[20] | √ | √ | ||||
[21] | √ | √ | √ | |||
[22] | √ | √ | √ | √ | ||
[23] | √ | √ | √ | |||
[24] | √ | √ | √ | |||
[25] | √ | √ | √ | |||
[26] | √ | |||||
[27] | √ | √ | √ |
Parameter Name | Parameter Value |
---|---|
Orbital altitude (km) | 780 |
Number of orbital planes | 6 |
Number of satellites in orbit | 11 |
Orbital inclination (°) | 86.4 |
Orbital plane spacing (°) | 31.6 |
Interstellar link latitude threshold (°) | 60 |
Number of interplanetary links per satellite | 4 |
Parameter Name | Parameter Value |
---|---|
Total number of satellite nodes | 66 |
Number of malicious satellite nodes | 16 |
Data packet length | 100 B |
Ant colony population size | 100 |
Number of ant colony iterations | 500 |
Trust vector length passed to VAE network | 10 |
Direct trust vector adjustment parameter | 0.5 |
Fixed threshold | 0.8 |
Trust evaluation model execution cycle(s) | 2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, Z.; Rong, J.; Jiang, Y.; Zhang, L. Satellite Network Security Routing Technology Based on Deep Learning and Trust Management. Sensors 2023, 23, 8474. https://doi.org/10.3390/s23208474
Liu Z, Rong J, Jiang Y, Zhang L. Satellite Network Security Routing Technology Based on Deep Learning and Trust Management. Sensors. 2023; 23(20):8474. https://doi.org/10.3390/s23208474
Chicago/Turabian StyleLiu, Zhiguo, Junlin Rong, Yingru Jiang, and Luxi Zhang. 2023. "Satellite Network Security Routing Technology Based on Deep Learning and Trust Management" Sensors 23, no. 20: 8474. https://doi.org/10.3390/s23208474
APA StyleLiu, Z., Rong, J., Jiang, Y., & Zhang, L. (2023). Satellite Network Security Routing Technology Based on Deep Learning and Trust Management. Sensors, 23(20), 8474. https://doi.org/10.3390/s23208474