Skip to main content
Log in

A novel social deep autoencoder NMF incentive scheme to detect a selfish node in delay tolerant network

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Detection of the selfish node in a delay tolerant network (DTN) can sharply reduce the loss incurred in a network. The algorithm's current pedigree mainly focuses on the rely on nodes, records, and delivery performance. The community structure and social aspects have been overlooked. Analysis of individual and social tie preferences results in an extensive detection time and increases communication overhead. In this article, a heterogeneous DTN topology with high-power stationary nodes and mobile nodes on Manhattan's accurate map is designed. With the increasing complexity of social ties and the diversified nature of topology structure, there need for a method that can effectively capture the essence within the speculated time. In this article, a novel deep autoencoder-based nonnegative matrix factorization (DANMF) is proposed for DTN topology. The topology of social ties projected onto low-dimensional space leads to effective cluster formation. DANMF automatically learns an appropriate nonlinear mapping function by utilizing the features of data. Also, the inherent structure of the deep autoencoder is nonlinear and has strong generalization. The membership matrices extracted from the DANMF are used to design the weighted cumulative social tie that eventually, along with the residual energy, is used to detect the network's selfish node. The testing of the designed model is carried out on the real dataset of MIT reality. The proficiency of the developed algorithm has been well tested and proved at every step. The methods employed for social tie extraction are NMF and DANMF. The methodology is rigorously experimented on various scenarios and has improved around 80% in the worst-case scenario of 40% nodes turning selfish. A comprehensive comparison is made with the other existing state-of-the-art methods which are also incentive-based approaches. The developed method has outperformed and has shown the supremacy of the current methods to capture the latent, hidden structure of the social tie.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Fall K (2003) A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 Con ference on Applications, Technologies, Architectures, and Protocols for Computer Communications (pp. 27–34)

  2. Wang R, Wang Z, Ma W, Deng S, Huang H (2019) Epidemic routing performance in dtn with selfish nodes. IEEE Access 7:65560–65568

    Article  Google Scholar 

  3. Jain S, Verma A (2019) Bubble rap incentive scheme for prevention of node selfishness in delay-tolerant networks. In Smart innovations in communication and computational sciences (pp. 289–303). Springer, Singapore

  4. Chakrabarti C, Roy S, Basu S (2019) Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Network Appl 12(4):705–723

    Article  Google Scholar 

  5. Socievole A, Caputo A, de Rango F, Fazio P (2019) Routing in mobile opportunistic social networks with selfish nodes. Wireless Commun Mobile Comput 2019:1–15

    Article  Google Scholar 

  6. Rehman GU, Ghani A, Muhammad S, Singh M, Singh D (2020) Selfishness in vehicular delay-tolerant networks: a review. Sensors 20(10):3000

    Article  Google Scholar 

  7. Roy A, Acharya T, Bit DS (2020) Social-based reputation-aware data forwarding for improved multicast delivery in the presence of selfish nodes in DTNs. Int J Commun Syst 33(4):e4235

    Article  Google Scholar 

  8. Jagtap P, Kulkarni L (2019) Social energy-based techniques in delay-tolerant network. In Emerging technologies in data mining and information security (pp 531–538). Springer, Singapore

  9. Gantayat PK, Das S (2019) Award-reward protocol based on clustering and trust level for routing in delay tolerant network. J Appl Secur Res 14(3):270–287

    Article  Google Scholar 

  10. Jedari B, Xia F, Chen H, Das SK, Tolba A, Zafer AM (2019) A social-based watchdog system to detect selfish nodes in opportunistic mobile networks. Futur Gener Comput Syst 92:777–788

    Article  Google Scholar 

  11. Wang H, Wang H, Guo F, Feng G, Lv H (2018) ARAG: A routing algorithm based on incentive mechanisms for DTN with nodes’ selfishness. IEEE Access 6:29419–29425

    Article  Google Scholar 

  12. Guo M, Xiao M (2019) MSSN: An attribute-aware transmission algorithm exploiting node similarity for opportunistic social networks. Information 10(10):299

    Article  Google Scholar 

  13. Dang H, Wu H (2010) Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Trans Wireless Commun 9(6):1874–1881

    Article  Google Scholar 

  14. Yang H, Jia Z, Xie G (2018) Delay-bounded and cost-limited RSU deployment in urban vehicular ad hoc networks. Sensors 18(9):2764

    Article  Google Scholar 

  15. Zhang Z, Ma M, Jin Z (2013) CCS-DTN: Efficient routing in social DTNs based on clustering and network coding. In 2013 IEEE Global Communications Conference (GLOBECOM) (pp. 60–64). IEEE

  16. Girvan M, Newman ME (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821–7826

    Article  MathSciNet  Google Scholar 

  17. Palla G, Derényi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043):814–818

    Article  Google Scholar 

  18. Buciu I (2008) Nonnegative matrix factorization, a new tool for feature extraction: theory and applications. Int J Comput, Commun Control 3(3):67–74

    Article  Google Scholar 

  19. Lee DD, Seung HS (2000) Algorithms for nonnegative matrix factorization, in Proc. Int. Conf. Neural Inf. Process. Syst., 2000, (pp. 535–541)

  20. Fortunato S (2010) Community detection in graphs. Phys Rep 486(3–5):75–174

    Article  MathSciNet  Google Scholar 

  21. Mankad S, Michailidis G (2013) Structural and functional discovery in dynamic networks with nonnegative matrix factorization. Phys Rev E 88(4):042812

    Article  Google Scholar 

  22. Trigeorgis G, Bousmalis K, Zafeiriou S, Schuller B (2014) A deep semi-nmf model for learning hidden representations. In International Conference on Machine Learning (pp. 1692–1700). PMLR

  23. Gao L, Li M, Bonti A, Zhou W, Yu S (2012) Multidimensional routing protocol in human-associated delay-tolerant networks. IEEE Trans Mob Comput 12(11):2132–2144

    Article  Google Scholar 

  24. Behrisch M, Bieker L, Erdmann J, Krajzewicz D (2011) SUMO–simulation of urban mobility: an overview. In Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation. ThinkMind

  25. Wegener A, Piórkowski M, Raya M, Hellbrück H, Fischer S, Hubaux JP (2008) TraCI: an interface for coupling road traffic and network simulators. In Proceedings of the 11th communications and networking simulation symposium (pp. 155–163)

  26. Arena F, Pau G, Severino A (2020) A review on IEEE 802.11 p for intelligent transportation systems. J Sens Actuat Netw 9(2):22

    Article  Google Scholar 

  27. Spyropoulos T, Psounis K, Raghavendra CS (2005) Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking (pp. 252–259)

  28. Eagle N, Pentland AS (2006) Reality mining: sensing complex social systems. Pers Ubiquit Comput 10(4):255–268

    Article  Google Scholar 

  29. Dunn JC (1974) Well-separated clusters and optimal fuzzy partitions. J Cybern 4(1):95–104

    Article  MathSciNet  Google Scholar 

  30. Kulkarni L, Bakal J, Shrawankar U (2020) Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks. Computing 102(1):201–219

    Article  MathSciNet  Google Scholar 

  31. Chen H, Lou W, Wang Z, Wang Q (2015) A secure credit-based incentive mechanism for message forwarding in noncooperative DTNs. IEEE Trans Veh Technol 65(8):6377–6388

    Article  Google Scholar 

  32. Guo Y, Schildt S, Wolf L (2013) Detecting blackhole and greyhole attacks in vehicular delay tolerant networks. In 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS) (pp. 1–7). IEEE

  33. Razzaghi N, Babaie S (2022) A new selfish thing detection method based on Voronoi diagram for Internet of Things. J Supercomput. https://doi.org/10.1007/s11227-021-04202-8

    Article  Google Scholar 

  34. Nobahary S, Garakani HG, Khademzadeh A, Rahmani AM (2019) Selfish node detection based on hierarchical game theory in IoT. EURASIP J Wirel Commun Netw 2019(1):1–19

    Article  Google Scholar 

  35. Fayaz M, Mehmood G, Khan A, Abbas S, Gwak J (2022) Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics 11(2):185

    Article  Google Scholar 

  36. Akhbari A, Ghaffari A (2021) Selfish node detection based on fuzzy logic and harris hawks optimization algorithm in IoT networks. Security and Communication Networks, 2021

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version.

Corresponding author

Correspondence to Shail Kumar Dinkar.

Ethics declarations

Conflict of interest

The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.

Availability of data and Material

Data is available in the public domain already.

Ethics Approval

The manuscript is ethically approved by the University's ethical committee.

Consent to Participate

Yes.

Consent for Publication

Yes.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, R., Dinkar, S.K. A novel social deep autoencoder NMF incentive scheme to detect a selfish node in delay tolerant network. J Supercomput 78, 15014–15041 (2022). https://doi.org/10.1007/s11227-022-04423-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04423-5

Keywords

Navigation