Skip to main content
Top
Published in: Wireless Networks 4/2022

15-03-2022 | Original Paper

Introducing a new algorithm based on collaborative game theory with the power of learning selfish node records to encourage selfish nodes in mobile social networks

Authors: Mojtaba Ghorbanalizadeh, Nahideh Derakhshanfard, Nima JafariNavimipour

Published in: Wireless Networks | Issue 4/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile social networks are a type of delay tolerant network consists of a large number of mobile nodes with social characteristics. The pattern of data transmission and delivery across these networks is due to intermittent, storage, transport and forward connections. Therefore, relay nodes play an important role in these networks. One of the problems with these networks is that there is selfishness in relay nodes. Many algorithms have been proposed to detect and counteract these selfish nodes, but these methods have low detection rates. This paper presents an algorithm for finding selfish nodes and how to persuade them to collaborate based on the game theory. The simulation results show that the proposed method improved the correct detection rate compared to the other methods. First, it applies the Nash equilibrium to identify the selfish nodes and then using the credentials in the relay phase, it forces the selfish nodes to cooperate. The parameters and how the nodes are applied will increase the learning power of the system. The governing rules are applied to the inference system after the learning process. According to the results obtained at the datacenter of the Tabriz University, the improvement has been dramatic, with more than 98% of packets being transferred to the destination in due time and less than 2% of the them has been deleted from the network or their time to live was over. We tried to use the closest nodes to the destination with highest remaining energy to send the data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ning, Z., Xia, F., Ullah, N., Kong, X., & Hu, X. (2017). Vehicular social networks: Enabling smart mobility. IEEE Communications Magazine, 55(5), 16–55.CrossRef Ning, Z., Xia, F., Ullah, N., Kong, X., & Hu, X. (2017). Vehicular social networks: Enabling smart mobility. IEEE Communications Magazine, 55(5), 16–55.CrossRef
2.
go back to reference Lu, Z., Sun, X., Porta, T.L. (2016). Cooperative data offloading in opportunistic mobile networks. In Proc. IEEE INFOCOM, pp. 1–9. Lu, Z., Sun, X., Porta, T.L. (2016). Cooperative data offloading in opportunistic mobile networks. In Proc. IEEE INFOCOM, pp. 1–9.
3.
go back to reference Qiu, T., Ma, J., and Huang, R. (2018). A survey of mobile social networks: Applications, social characteristics, and challenges. IEEE Systems Journal 12(4) Qiu, T., Ma, J., and Huang, R. (2018). A survey of mobile social networks: Applications, social characteristics, and challenges. IEEE Systems Journal 12(4)
4.
go back to reference Samian, N., Zukarnain, Z. A., Seah, W. K., Abdullah, A., & Hanapi, Z. M. (2015). Cooperation stimulation mechanisms for wireless multihop networks: A survey. Journal of Network and Computer Applications, 54, 88–106.CrossRef Samian, N., Zukarnain, Z. A., Seah, W. K., Abdullah, A., & Hanapi, Z. M. (2015). Cooperation stimulation mechanisms for wireless multihop networks: A survey. Journal of Network and Computer Applications, 54, 88–106.CrossRef
5.
go back to reference Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2006). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of international conference on mobile computing and networking 3(1):255–265. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2006). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of international conference on mobile computing and networking 3(1):255–265.
6.
go back to reference Wang, Y., Giruka, V. C., & Singhal, M. (2008). Truthful multipath routing for ad hoc networks with selfish nodes. Journal of Parallel and Distributed Computing, 68(6), 778–789.CrossRef Wang, Y., Giruka, V. C., & Singhal, M. (2008). Truthful multipath routing for ad hoc networks with selfish nodes. Journal of Parallel and Distributed Computing, 68(6), 778–789.CrossRef
7.
go back to reference He, Q., Wu, D., & Khosla, P. (2004). SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of IEEE wireless communications and neworking conference 1(1):825–830. He, Q., Wu, D., & Khosla, P. (2004). SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of IEEE wireless communications and neworking conference 1(1):825–830.
8.
go back to reference Tarag, F., & Robert, A. (2006). A node misbehaviour detection mechanism for mobile ad hoc networks. In Proceedings of 7th annual post graduate symposium on the convergence of telecommunications, networking and broadcasting 1(1):78–84. Tarag, F., & Robert, A. (2006). A node misbehaviour detection mechanism for mobile ad hoc networks. In Proceedings of 7th annual post graduate symposium on the convergence of telecommunications, networking and broadcasting 1(1):78–84.
9.
go back to reference Binglai Niu, M. I., Vicky Zhao, H., & Hai Jiang, I. (2011). A cooperation stimulation strategy in wireless multicast networks. IEEE Transactions on Signal Processing, 59(5), 50–65.MathSciNetMATH Binglai Niu, M. I., Vicky Zhao, H., & Hai Jiang, I. (2011). A cooperation stimulation strategy in wireless multicast networks. IEEE Transactions on Signal Processing, 59(5), 50–65.MathSciNetMATH
10.
go back to reference Senthilkumar, W. J., & Karthikeyan, A. (2014). distributed framework for detecting selfish nodes in MANET using record- and trust-based detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking, 4(3), 31–39. Senthilkumar, W. J., & Karthikeyan, A. (2014). distributed framework for detecting selfish nodes in MANET using record- and trust-based detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking, 4(3), 31–39.
11.
go back to reference Buchegger, S & Le Boudec, J. -Y. (2003). Coping with false accusations in misbehaviour reputation systems for mobile ad-hoc networks. In Proceedings of IEEE Info COMM 3(5): 49–57. Buchegger, S & Le Boudec, J. -Y. (2003). Coping with false accusations in misbehaviour reputation systems for mobile ad-hoc networks. In Proceedings of IEEE Info COMM 3(5): 49–57.
12.
go back to reference Wang, B., Soltani, S., Shapiro, J. K., & Tan, P.T. (2005). Local detection of selfish routing behaviour in ad hoc networks. In Proceedings of international symposium on parallel architectures, algorithms and networks 2(3):23–34. Wang, B., Soltani, S., Shapiro, J. K., & Tan, P.T. (2005). Local detection of selfish routing behaviour in ad hoc networks. In Proceedings of international symposium on parallel architectures, algorithms and networks 2(3):23–34.
13.
go back to reference Kargl, F., Klenk, A., Schlott, S., & Weber, M. (2004). Advanced detection of selfish or malicious nodes in ad hoc networks. In Proceedings of 1st European workshop on security in ad-hoc and sensor network 1(1):255–63. Kargl, F., Klenk, A., Schlott, S., & Weber, M. (2004). Advanced detection of selfish or malicious nodes in ad hoc networks. In Proceedings of 1st European workshop on security in ad-hoc and sensor network 1(1):255–63.
14.
go back to reference Chen, T., & Varatharajan, V. (2009). Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Transactions on Internet Computing, 3(1), 234–241. Chen, T., & Varatharajan, V. (2009). Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Transactions on Internet Computing, 3(1), 234–241.
15.
go back to reference Khusru, M. A., & Sahoo, G. (2013). Classication of selfish and regular nodes based on reputation values in MANET using adaptive decision boundary. Science Research Journal of Communication Networks, 5(1), 185–191. Khusru, M. A., & Sahoo, G. (2013). Classication of selfish and regular nodes based on reputation values in MANET using adaptive decision boundary. Science Research Journal of Communication Networks, 5(1), 185–191.
16.
go back to reference Xing, F., & Wang, W. (2006). Modelling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes. In Proceedings of IEEE conference on communication 2(5):1879–1884. Xing, F., & Wang, W. (2006). Modelling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes. In Proceedings of IEEE conference on communication 2(5):1879–1884.
17.
go back to reference Guang, L., Assi, C., & Benslimane, A. (2008). Enhancing IEEE 802.11 random back-off in selfish environments. IEEE Transactions on Vehicular Technology, 57(3), 1806–1822.CrossRef Guang, L., Assi, C., & Benslimane, A. (2008). Enhancing IEEE 802.11 random back-off in selfish environments. IEEE Transactions on Vehicular Technology, 57(3), 1806–1822.CrossRef
18.
go back to reference Hosseini, H., & Babaie, S. H. (2019). Selfish node detection in ad hoc networks based on fuzzy logic. Neural Computing and Applications, 31, 6079–6090.CrossRef Hosseini, H., & Babaie, S. H. (2019). Selfish node detection in ad hoc networks based on fuzzy logic. Neural Computing and Applications, 31, 6079–6090.CrossRef
20.
go back to reference Ponnusamya, M., Senthilkumarb, A., & Manikandanc, R. (2021). Detection of selfish nodes through reputation model in mobile adhoc network –MANET. Turkish Journal of Computer and Mathematics Education, 12(9), 2404–2410. Ponnusamya, M., Senthilkumarb, A., & Manikandanc, R. (2021). Detection of selfish nodes through reputation model in mobile adhoc network –MANET. Turkish Journal of Computer and Mathematics Education, 12(9), 2404–2410.
21.
go back to reference Khan, B. U. I., Anwar, F., Olanrewaju, R. F., Pampori, B. R., & Mir, R. N. (2020). A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks. IEEE Access, 8, 124097–124109.CrossRef Khan, B. U. I., Anwar, F., Olanrewaju, R. F., Pampori, B. R., & Mir, R. N. (2020). A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks. IEEE Access, 8, 124097–124109.CrossRef
22.
go back to reference Monakhov, Y. M., Monakhov, M. Y., &Telny, A. V. (2019). Method for local positioning of the node violating information security in mobile networks intrusion detection systems. In 2019 Dynamics of Systems, Mechanisms and Machines (Dynamics) 1–7, IEEE. Monakhov, Y. M., Monakhov, M. Y., &Telny, A. V. (2019). Method for local positioning of the node violating information security in mobile networks intrusion detection systems. In 2019 Dynamics of Systems, Mechanisms and Machines (Dynamics) 1–7, IEEE.
23.
go back to reference Thusijsman, F. (1992). Optimality and equilibria in stochastic games, CWI-tract 82, Centre for Mathematics and Computer Science, Amsterdam, (18). Thusijsman, F. (1992). Optimality and equilibria in stochastic games, CWI-tract 82, Centre for Mathematics and Computer Science, Amsterdam, (18).
24.
go back to reference Narendra, K. S. and Thathachar, M. A. L. (1989). Learning automata: An introduction, Prentice Hall, (19). Narendra, K. S. and Thathachar, M. A. L. (1989). Learning automata: An introduction, Prentice Hall, (19).
25.
go back to reference Kumar, S., & Dutta, K. (2018). Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks. Wireless Personal Communications, 20, 1–24. Kumar, S., & Dutta, K. (2018). Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks. Wireless Personal Communications, 20, 1–24.
26.
go back to reference Jedari, B., Xia, F., Chen, H., Das, S.K., Tolba, A., Makhadmeh, Z. A. L. (2017). A social based watchdog system to detect selfish nodes in opportunistic mobile networks. 10.1016 j.future.2017.10.049 0167–739X/© 2017 Elsevier B.V. All rights reserved (21). Jedari, B., Xia, F., Chen, H., Das, S.K., Tolba, A., Makhadmeh, Z. A. L. (2017). A social based watchdog system to detect selfish nodes in opportunistic mobile networks. 10.1016 j.future.2017.10.049 0167–739X/© 2017 Elsevier B.V. All rights reserved (21).
27.
go back to reference Chen, D. et al. (2016). Multi-objective optimization of community detection using discrete teaching–learning-based optimization with decomposition. Information Sciences 22 Chen, D. et al. (2016). Multi-objective optimization of community detection using discrete teaching–learning-based optimization with decomposition. Information Sciences 22
Metadata
Title
Introducing a new algorithm based on collaborative game theory with the power of learning selfish node records to encourage selfish nodes in mobile social networks
Authors
Mojtaba Ghorbanalizadeh
Nahideh Derakhshanfard
Nima JafariNavimipour
Publication date
15-03-2022
Publisher
Springer US
Published in
Wireless Networks / Issue 4/2022
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-022-02897-y

Other articles of this Issue 4/2022

Wireless Networks 4/2022 Go to the issue