Abstract
Detection of the selfish node in a delay tolerant network (DTN) can sharply reduce the loss incurred in a network. The algorithm's current pedigree mainly focuses on the rely on nodes, records, and delivery performance. The community structure and social aspects have been overlooked. Analysis of individual and social tie preferences results in an extensive detection time and increases communication overhead. In this article, a heterogeneous DTN topology with high-power stationary nodes and mobile nodes on Manhattan's accurate map is designed. With the increasing complexity of social ties and the diversified nature of topology structure, there need for a method that can effectively capture the essence within the speculated time. In this article, a novel deep autoencoder-based nonnegative matrix factorization (DANMF) is proposed for DTN topology. The topology of social ties projected onto low-dimensional space leads to effective cluster formation. DANMF automatically learns an appropriate nonlinear mapping function by utilizing the features of data. Also, the inherent structure of the deep autoencoder is nonlinear and has strong generalization. The membership matrices extracted from the DANMF are used to design the weighted cumulative social tie that eventually, along with the residual energy, is used to detect the network's selfish node. The testing of the designed model is carried out on the real dataset of MIT reality. The proficiency of the developed algorithm has been well tested and proved at every step. The methods employed for social tie extraction are NMF and DANMF. The methodology is rigorously experimented on various scenarios and has improved around 80% in the worst-case scenario of 40% nodes turning selfish. A comprehensive comparison is made with the other existing state-of-the-art methods which are also incentive-based approaches. The developed method has outperformed and has shown the supremacy of the current methods to capture the latent, hidden structure of the social tie.












Similar content being viewed by others
References
Fall K (2003) A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 Con ference on Applications, Technologies, Architectures, and Protocols for Computer Communications (pp. 27–34)
Wang R, Wang Z, Ma W, Deng S, Huang H (2019) Epidemic routing performance in dtn with selfish nodes. IEEE Access 7:65560–65568
Jain S, Verma A (2019) Bubble rap incentive scheme for prevention of node selfishness in delay-tolerant networks. In Smart innovations in communication and computational sciences (pp. 289–303). Springer, Singapore
Chakrabarti C, Roy S, Basu S (2019) Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Network Appl 12(4):705–723
Socievole A, Caputo A, de Rango F, Fazio P (2019) Routing in mobile opportunistic social networks with selfish nodes. Wireless Commun Mobile Comput 2019:1–15
Rehman GU, Ghani A, Muhammad S, Singh M, Singh D (2020) Selfishness in vehicular delay-tolerant networks: a review. Sensors 20(10):3000
Roy A, Acharya T, Bit DS (2020) Social-based reputation-aware data forwarding for improved multicast delivery in the presence of selfish nodes in DTNs. Int J Commun Syst 33(4):e4235
Jagtap P, Kulkarni L (2019) Social energy-based techniques in delay-tolerant network. In Emerging technologies in data mining and information security (pp 531–538). Springer, Singapore
Gantayat PK, Das S (2019) Award-reward protocol based on clustering and trust level for routing in delay tolerant network. J Appl Secur Res 14(3):270–287
Jedari B, Xia F, Chen H, Das SK, Tolba A, Zafer AM (2019) A social-based watchdog system to detect selfish nodes in opportunistic mobile networks. Futur Gener Comput Syst 92:777–788
Wang H, Wang H, Guo F, Feng G, Lv H (2018) ARAG: A routing algorithm based on incentive mechanisms for DTN with nodes’ selfishness. IEEE Access 6:29419–29425
Guo M, Xiao M (2019) MSSN: An attribute-aware transmission algorithm exploiting node similarity for opportunistic social networks. Information 10(10):299
Dang H, Wu H (2010) Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Trans Wireless Commun 9(6):1874–1881
Yang H, Jia Z, Xie G (2018) Delay-bounded and cost-limited RSU deployment in urban vehicular ad hoc networks. Sensors 18(9):2764
Zhang Z, Ma M, Jin Z (2013) CCS-DTN: Efficient routing in social DTNs based on clustering and network coding. In 2013 IEEE Global Communications Conference (GLOBECOM) (pp. 60–64). IEEE
Girvan M, Newman ME (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821–7826
Palla G, Derényi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043):814–818
Buciu I (2008) Nonnegative matrix factorization, a new tool for feature extraction: theory and applications. Int J Comput, Commun Control 3(3):67–74
Lee DD, Seung HS (2000) Algorithms for nonnegative matrix factorization, in Proc. Int. Conf. Neural Inf. Process. Syst., 2000, (pp. 535–541)
Fortunato S (2010) Community detection in graphs. Phys Rep 486(3–5):75–174
Mankad S, Michailidis G (2013) Structural and functional discovery in dynamic networks with nonnegative matrix factorization. Phys Rev E 88(4):042812
Trigeorgis G, Bousmalis K, Zafeiriou S, Schuller B (2014) A deep semi-nmf model for learning hidden representations. In International Conference on Machine Learning (pp. 1692–1700). PMLR
Gao L, Li M, Bonti A, Zhou W, Yu S (2012) Multidimensional routing protocol in human-associated delay-tolerant networks. IEEE Trans Mob Comput 12(11):2132–2144
Behrisch M, Bieker L, Erdmann J, Krajzewicz D (2011) SUMO–simulation of urban mobility: an overview. In Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation. ThinkMind
Wegener A, Piórkowski M, Raya M, Hellbrück H, Fischer S, Hubaux JP (2008) TraCI: an interface for coupling road traffic and network simulators. In Proceedings of the 11th communications and networking simulation symposium (pp. 155–163)
Arena F, Pau G, Severino A (2020) A review on IEEE 802.11 p for intelligent transportation systems. J Sens Actuat Netw 9(2):22
Spyropoulos T, Psounis K, Raghavendra CS (2005) Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking (pp. 252–259)
Eagle N, Pentland AS (2006) Reality mining: sensing complex social systems. Pers Ubiquit Comput 10(4):255–268
Dunn JC (1974) Well-separated clusters and optimal fuzzy partitions. J Cybern 4(1):95–104
Kulkarni L, Bakal J, Shrawankar U (2020) Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks. Computing 102(1):201–219
Chen H, Lou W, Wang Z, Wang Q (2015) A secure credit-based incentive mechanism for message forwarding in noncooperative DTNs. IEEE Trans Veh Technol 65(8):6377–6388
Guo Y, Schildt S, Wolf L (2013) Detecting blackhole and greyhole attacks in vehicular delay tolerant networks. In 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS) (pp. 1–7). IEEE
Razzaghi N, Babaie S (2022) A new selfish thing detection method based on Voronoi diagram for Internet of Things. J Supercomput. https://doi.org/10.1007/s11227-021-04202-8
Nobahary S, Garakani HG, Khademzadeh A, Rahmani AM (2019) Selfish node detection based on hierarchical game theory in IoT. EURASIP J Wirel Commun Netw 2019(1):1–19
Fayaz M, Mehmood G, Khan A, Abbas S, Gwak J (2022) Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics 11(2):185
Akhbari A, Ghaffari A (2021) Selfish node detection based on fuzzy logic and harris hawks optimization algorithm in IoT networks. Security and Communication Networks, 2021
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version.
Corresponding author
Ethics declarations
Conflict of interest
The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.
Availability of data and Material
Data is available in the public domain already.
Ethics Approval
The manuscript is ethically approved by the University's ethical committee.
Consent to Participate
Yes.
Consent for Publication
Yes.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sharma, R., Dinkar, S.K. A novel social deep autoencoder NMF incentive scheme to detect a selfish node in delay tolerant network. J Supercomput 78, 15014–15041 (2022). https://doi.org/10.1007/s11227-022-04423-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04423-5