Skip to main content
Log in

A new selfish thing detection method based on Voronoi diagram for Internet of Things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Internet of Things (IoT), as an emerging technology, describes a smart world that enables objects to interact with each other and with end-users through developed communication platforms such as the Internet. The limited communication range of things allows packets to be transmitted between objects that are not in each other's range through intermediate objects, which highlights the necessity of routing in this technology. Therefore, the Quality of Service parameters of IoT entirely depend on the cooperation of things in the routing process. Several factors such as energy depletion, conquering objects by an enemy, and resource constraints lead to selfish behavior that may cause network collapse. In this paper, a new watchdog-based identification method is presented to diagnosis selfish objects in the Internet of Things, in which the selected watchdogs are responsible for evaluating the activity of other objects. In the proposed method to achieve a uniform distribution of watchdog objects in the network, the IoT objects are partitioned into disjoint cells using the Voronoi diagram, and a watchdog is selected for each cell. In this way, while the supervision overhead is distributed, the watchdog objects can identify the selfish things through examining the remaining energy and cooperation degree of other objects. The conducted simulations in the MATLAB tool have validated the effectiveness of the proposed method in terms of detection rate, false-positive rate, throughput, end-to-end delay, and energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

Not applicable.

Code availability

Not applicable.

References

  1. Azad P, Navimipour NJ, Rahmani AM, Sharifi A (2020) The role of structured and unstructured data managing mechanisms in the Internet of things. Cluster Comput 23:1185–1198. https://doi.org/10.1007/s10586-019-02986-2

    Article  Google Scholar 

  2. Sharma S, Verma VK (2021) Security explorations for routing attacks in low power networks on internet of things. J Supercomput 77:4778–4812. https://doi.org/10.1007/s11227-020-03471-z

    Article  Google Scholar 

  3. de Oliveira Júnior WG, de Oliveira JM, Munoz R, de Albuquerque VHC (2020) A proposal for Internet of Smart Home Things based on BCI system to aid patients with amyotrophic lateral sclerosis. Neural Comput Appl 32:11007–11017. https://doi.org/10.1007/s00521-018-3820-7

    Article  Google Scholar 

  4. Idwan S, Mahmood I, Zubairi JA, Matar I (2020) Optimal management of solid waste in smart cities using Internet of Things. Wirel Pers Commun 110:485–501. https://doi.org/10.1007/s11277-019-06738-8

    Article  Google Scholar 

  5. Choudhary G, Sharma V, You I (2019) Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Comput Electr Eng 74:59–73. https://doi.org/10.1016/J.COMPELECENG.2019.01.007

    Article  Google Scholar 

  6. Zhang Y, Wen J (2017) The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Netw Appl 10:983–994. https://doi.org/10.1007/s12083-016-0456-1

    Article  Google Scholar 

  7. Balaji S, Nathani K, Santhakumar R (2019) IoT technology, applications and challenges: a contemporary survey. Wirel Pers Commun 108:363–388. https://doi.org/10.1007/s11277-019-06407-w

    Article  Google Scholar 

  8. Stoyanova M, Nikoloudakis Y, Panagiotakis S et al (2020) A Survey on the Internet of Things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutorials 22:1191–1221. https://doi.org/10.1109/COMST.2019.2962586

    Article  Google Scholar 

  9. Hail MAM, Amadeo M, Molinaro A, Fischer S (2015) On the performance of caching and forwarding in information-centric networking for the IoT. In: Lecture Notes in Computer Science. Springer Verlag, pp 313–326

  10. Anagnostopoulos T, Zaslavsky A, Kolomvatsos K et al (2017) Challenges and opportunities of waste management in IoT-enabled smart cities: a survey. IEEE Trans Sustain Comput 2:275–289. https://doi.org/10.1109/TSUSC.2017.2691049

    Article  Google Scholar 

  11. Varjovi AE, Babaie S (2020) Green Internet of Things (GIoT): vision, applications and research challenges. Sustain Comput Informatics Syst. https://doi.org/10.1016/J.SUSCOM.2020.100448

    Article  Google Scholar 

  12. Gharamaleki MM, Babaie S (2020) A new distributed fault detection method for wireless sensor networks. IEEE Syst J 14:4883–4890. https://doi.org/10.1109/JSYST.2020.2976827

    Article  Google Scholar 

  13. Jedari B, Xia F, Chen H et al (2019) A social-based watchdog system to detect selfish nodes in opportunistic mobile networks. Futur Gener Comput Syst 92:777–788. https://doi.org/10.1016/j.future.2017.10.049

    Article  Google Scholar 

  14. Hasani H, Babaie S (2019) Selfish node detection in ad hoc networks based on fuzzy logic. Neural Comput Appl 31:6079–6090. https://doi.org/10.1007/s00521-018-3431-3

    Article  Google Scholar 

  15. Gomathy V, Padhy N, Samanta D et al (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01797-3

    Article  Google Scholar 

  16. Liu L, Ma Z, Meng W (2019) Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Futur Gener Comput Syst 101:865–879. https://doi.org/10.1016/j.future.2019.07.021

    Article  Google Scholar 

  17. Rama Abirami K, Sumithra MG (2019) Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection. Cluster Comput 22:13307–13316. https://doi.org/10.1007/s10586-018-1851-6

    Article  Google Scholar 

  18. Zhang C, Ge J, Gong F et al (2020) Security-reliability tradeoff for untrusted and selfish relay-assisted D2D communications in heterogeneous cellular networks for IoT. IEEE Syst J 14:2192–2201. https://doi.org/10.1109/JSYST.2019.2925033

    Article  Google Scholar 

  19. Zhao R, Wang Y, Xiao G et al (2021) A selfish herd optimization algorithm based on the simplex method for clustering analysis. J Supercomput. https://doi.org/10.1007/s11227-020-03597-0

    Article  Google Scholar 

  20. Raju S, Chandrasekaran M (2019) An improved neighbor cooperation using adjacent node cooperation in peer to peer networks. Cluster Comput 22:12263–12274. https://doi.org/10.1007/s10586-017-1607-8

    Article  Google Scholar 

  21. Nobahary S, Babaie S (2018) A credit-based method to selfish node detection in mobile ad-hoc network. Appl Comput Syst 23:118–127. https://doi.org/10.2478/acss-2018-0015

    Article  Google Scholar 

  22. Ullah N, Kong X, Lin L et al (2020) Real-time dissemination of emergency warning messages in 5G enabled selfish vehicular social networks. Comput Networks 182:107482. https://doi.org/10.1016/J.COMNET.2020.107482

    Article  Google Scholar 

  23. Ponnusamy M et al (2021) Detection of selfish nodes through reputation model in mobile adhoc network—MANET. Turk J Comput Math Educ 12:2404–2410. https://doi.org/10.17762/TURCOMAT.V12I9.3720

    Article  Google Scholar 

  24. Esmailifar S, Saghafi F (2015) Moving target localization by cooperation of multiple flying vehicles. IEEE Trans Aerosp Electron Syst 51:739–746. https://doi.org/10.1109/TAES.2014.130168

    Article  Google Scholar 

  25. Ying T, Feng W, Su W, Jiang W (2017) On the degrees of freedom of MIMO X networks with non-cooperation transmitters. IEEE Trans Wirel Commun 16:2490–2504. https://doi.org/10.1109/TWC.2017.2665544

    Article  Google Scholar 

  26. Shang F, Niu X, He D et al (2020) Resource allocation and admission control algorithm based on non-cooperation game in wireless mesh networks. Comput Commun 152:63–71. https://doi.org/10.1016/J.COMCOM.2020.01.009

    Article  Google Scholar 

  27. Sharma A, Goyal N, Guleria K (2021) Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes. J Supercomput 77:6036–6055. https://doi.org/10.1007/s11227-020-03507-4

    Article  Google Scholar 

  28. Socievole A, Caputo A, De Rango F, Fazio P (2019) Routing in mobile opportunistic social networks with selfish nodes. Wirel Commun Mob Comput 2019:1–15. https://doi.org/10.1155/2019/6359806

    Article  Google Scholar 

  29. Razaque A, Abdulghafour M, Khan MJ (2017) Detection of selfish attack over wireless body area networks. In: 2017 IEEE Conference on Open Systems. IEEE, pp 48–52

  30. Hilal AE, MacKenzie AB (2019) A distributed coalition game model for cooperation in MANETs. Ad Hoc Netw 85:46–59. https://doi.org/10.1016/J.ADHOC.2018.10.019

    Article  Google Scholar 

  31. Sharma A, Goyal N, Guleria K (2020) Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes. J Supercomput. https://doi.org/10.1007/s11227-020-03507-4

    Article  Google Scholar 

  32. Jain S, Verma A (2019) Bubble rap incentive scheme for prevention of node selfishness in delay-tolerant networks. In: Advances in Intelligent Systems and Computing. Springer, Singapore, pp 289–303

  33. Wang H, Wang H, Guo F et al (2018) ARAG: a routing algorithm based on incentive mechanisms for DTN with nodes’ selfishness. IEEE Access 6:29419–29425. https://doi.org/10.1109/ACCESS.2018.2834912

    Article  Google Scholar 

  34. Jesudoss A, Raja SVK, Sulaiman A (2015) Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw 24:250–263. https://doi.org/10.1016/j.adhoc.2014.08.018

    Article  Google Scholar 

  35. Sun Y, Guo Y, Ge Y et al (2013) Improving the transmission efficiency by considering non-cooperation in ad hoc networks. Comput J 56:1034–1042. https://doi.org/10.1093/comjnl/bxt042

    Article  Google Scholar 

  36. Zhang W, Zhu S, Tang J, Xiong N (2018) A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74:1779–1801. https://doi.org/10.1007/s11227-017-2150-3

    Article  Google Scholar 

  37. Nobahary S, Garakani HG, Khademzadeh A, Rahmani AM (2019) Selfish node detection based on hierarchical game theory in IoT. Eurasip J Wirel Commun Netw. https://doi.org/10.1186/s13638-019-1564-4

    Article  Google Scholar 

  38. Li J, Gao X, Yang Q et al (2018) Neural-network aided dynamic control for delivering media streams in selfish wireless networks with unknown node-selfishness. IEEE Access 6:31759–31771. https://doi.org/10.1109/ACCESS.2018.2833210

    Article  Google Scholar 

Download references

Funding

Funding information is not applicable/no funding was received.

Author information

Authors and Affiliations

Authors

Contributions

SB helped in conceptualization, methodology, validation, writing—review & editing, supervision. NR was involved in searching, writing—original draft, simulation.

Corresponding author

Correspondence to Shahram Babaie.

Ethics declarations

Conflict of interest

All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version. This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue. The following authors have affiliations with organizations with direct or indirect financial interest in the subject matter discussed in the manuscript:

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Razzaghi, N., Babaie, S. A new selfish thing detection method based on Voronoi diagram for Internet of Things. J Supercomput 78, 8389–8408 (2022). https://doi.org/10.1007/s11227-021-04202-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04202-8

Keywords

Navigation