Abstract
Because mobile devices only have the limited resource in socially aware networking, some network nodes are unwilling to sacrifice their resource to forward messages to others for free, thus forming selfish nodes. However selfish nodes will cause dropping in the message delivery rate and affect the network performance, so this paper has proposed a diversity-based selfish node detection algorithm (DSNDA). Firstly, it mainly applies the node forwarding willingness mechanism to detect whether the node is selfish. If the node has the inadequate resource, that is, it cannot forward any messages for others; then it will be selfish. If the node’s resource is enough and the node has forwarded messages to other nodes, it indicates that the node is not selfish. Otherwise, DSNDA algorithm will use reputation mechanism to check the node further. If the node has broken faith, it indicates that the node is selfish. On the contrary the message confirmation mechanism will be employed to make the final check on the node. If a message does not be received or discarded after the node’s receiving it, which proves that it has selfish behaviour. If not, the node is normal. It can be proved by the simulation experiment and results that the DSNDA algorithm has significantly improved the delivery rate of messages, comparing with other algorithms. At the same time, reducing the network delay, thus verifying the feasibility of DSNDA.














Similar content being viewed by others
References
Dai, W., Qiu, M., Qiu, L., Chen, L., Wu, A. (2017). Who moved my data? privacy protection in smartphones. IEEE Communications Magazine, 55 (1), 20–25.
Xia, F., Liu, L., Li, J., Ma, J., Vasilakos, A.V. (2017). Socially-aware networking: a survey. IEEE Systems Journal, 9 (3), 904–921.
Feng, X., Li, L., Jie, L., Ahmed, A.M., Ma, J. (2015). Beeinfo: Interest-based forwarding using artificial bee colony for socially aware networking. IEEE Transactions on Vehicular Technology, 64 (3), 1188–1200.
Xia, F., Liu, L., Jedari, B., Das, S.K. (2016). Pis: a multi-dimensional routing protocol for socially-aware networking. IEEE Transactions on Mobile Computing, 15 (11), 2825–2836.
Ning, Z., Li, L., Feng, X., Jedari, B., Lee, I., Zhang, W. (2017). Cais: a copy adjustable incentive scheme in community-based socially aware networking. IEEE Transactions on Vehicular Technology, 66 (4), 3406–3419.
Xiong, Z., Wu, Y., Ye, C., Zhang, X., Xu, F. (2019). Color image chaos encryption algorithm combining crc and nine palace map. Multimedia Tools and Applications, 78, 31035–31055.
Xu, F., Xu, Q., Xiong, Z., Xiao, N., Xie, Y., Deng, M., Hao, H. (2019). Intelligent distributed routing scheme based on social similarity for mobile social networks. Future Generation Computer Systems, 96, 472–480.
Xu, F., Xiao, N., Deng, M., Xie, Y., Xu, Q. (2019). Efficient opportunistic routing with social context awareness for distributed mobile social networks. Concurrency and Computation: Practice and Experience (5).
Yueruer, O., Sheng, Z., Moreno, W., Leung, V.C.M. (2016). Context-awareness for mobile sensing: A survey and future directions. Communications Surveys & Tutorials, 18 (1), 68–93.
Qiu, M., Zhong, M., Wang, J., Yang, L.T., Yang, X. (2014). Enabling cloud computing in emergency management systems. IEEE Cloud Computing, 1 (4), 60–67.
Penner, T., Sciarrone, A., Guirguis, M., Bisio, I., Lavagetto, F. (2017). Context-awareness over transient cloud in d2d networks: energy performance analysis and evaluation. European Transactions on Telecommunications, 28 (2), 63–74.
Guo, Y., Zhuge, Q., Hu, J., Yi, J. (2013). Data placement and duplication for embedded multicore systems with scratch pad memory. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 32 (6), 809–817.
Gai, K., Qiu, M., Zhao, H., Sun, X. (2017). Resource management in sustainable cyber-physical systems using heterogeneous cloud computing. IEEE Transactions on Sustainable Computing, 3 (2), 60–72.
Dai, W., Qiu, L., Wu, A., Qiu, M. (2016). Cloud infrastructure resource allocation for big data applications. IEEE Transactions on Big Data, 4 (3), 313–324.
Mei, K.Q., Zhang, K., Huang, M. (2004). An empirical study of web interface design on small display devices. IEEE/WIC/ACM International Conference on Web Intellgence (WI’04), pp. 29–35.
Li, Y., Su, G., & Wang, Z. (2012). Evaluating the effects of node cooperation on dtn routing. AEU - International Journal of Electronics and Communications, 66 (1), 62–67.
Li, Q., Zhu, S., & Cao, G. (2010). Routing in socially selfish delay tolerant networks. In Infocom: IEEE.
Panagakis, A., Vaios, A., Stavrakakis, I. (2007). On the effects of cooperation in dtns. In International conference on communication systems software & middleware.
Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks. Handbook of Systemic Autoimmune Diseases.
Spyropoulos, T., Psounis, K., Raghavendra, C.S. (2005). Spray and Wait: An efficient routing scheme for intermittently connected mobile networks. In ACM SIGCOMM Workshop on delay-tolerant networking.
Li, Q., Zhu, S., Cao, G. (2010). Routing in socially selfish delay tolerant networks. In Infocom: IEEE.
Li, Y., Su, G., Wang, Z. (2012). Evaluating the effects of node cooperation on dtn routing. AEU - International Journal of Electronics and Communications, 66 (1), 62–67.
Xuebin, M.A., Zheng, T.Y., Mingzhu, L.I. (2019). Analysis and regulation of effects of selfishness on opportunistic network. Acta Electronica Sinica, 47 (4), 837–847.
Junling, L.V., Song, H., Zhili, H. E., Pan, D. (2017). Survey of research on node’s selfish behavior in opportunistic networks. Computer Engineering and Applications, 53 (18), 7–16 + 50.
Jedari, B., Xia, F., Chen, H., Das, S.K., Tolba, A., Al-Makhadmeh, Z. (2017). A social-based watchdog system to detect selfish nodes in opportunistic mobile networks. Future Generation Computer Systems, 777–888.
Liu, K., Jing, D., Varshney, P.K., Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computing, 6 (5), 536–550.
Bigwood, G., & Henderson, T. (2011). Ironman: Using social networks to add incentives and reputation to opportunistic networks. In Proceeding of IEEE third international conference on social computing (socialcom), Boston, MA USA (pp. 65–72).
Buchegger, S., & Boudec, Jyl. (2002). Performance analysis of the confidant protocol. Cheminform, 38 (4), 1014–1021.
Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security, IFIP TC6/TC11 sixth joint working conference on communications and multimedia security, September 26-27, 2002, Portoroz, Slovenia (pp. 107–121).
Liu, Q., & Hou, P. (2015). Incentives node detects policy in the opportunistic network. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), 27 (2), 266–272.
Marti, S., Giuli, T.J., Lai, K., Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. ACM, 255–265.
Zhang, Y., Jianbo, L.I., Ying, L.I. (2019). Opportunistic network data offloading algorithm based on selfishness and centrality. Computer Engineering, 045 (006), 152–159.
Keränen, A., Ott, J., Kärkkäinen, T. (2009). The one simulator for dtn protocol evaluation. In International conference on simulation tools & techniques (pp. 1–10).
Lindgren, A., Doria, A., Schelén, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7 (3), 19–20.
Acknowledgements
This paper was supported by the National Natural Science Foundation of China (No. 61972136), MOE (Ministry of Education in China) Project of Humanities and Social Sciences (No.20YJAZH112), the Natural Science Foundation of Hubei Province (No.2020CFB497), Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation (T201410,T2020 017), Hubei Province Higher Education Teaching Research Project (No.2018432).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xiao, N., Xinyi, R., Xiong, Z. et al. A Diversity-based Selfish Node Detection Algorithm for Socially Aware Networking. J Sign Process Syst 93, 811–825 (2021). https://doi.org/10.1007/s11265-021-01666-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-021-01666-y