Abstract
Mobile social networks are a type of delay tolerant network consists of a large number of mobile nodes with social characteristics. The pattern of data transmission and delivery across these networks is due to intermittent, storage, transport and forward connections. Therefore, relay nodes play an important role in these networks. One of the problems with these networks is that there is selfishness in relay nodes. Many algorithms have been proposed to detect and counteract these selfish nodes, but these methods have low detection rates. This paper presents an algorithm for finding selfish nodes and how to persuade them to collaborate based on the game theory. The simulation results show that the proposed method improved the correct detection rate compared to the other methods. First, it applies the Nash equilibrium to identify the selfish nodes and then using the credentials in the relay phase, it forces the selfish nodes to cooperate. The parameters and how the nodes are applied will increase the learning power of the system. The governing rules are applied to the inference system after the learning process. According to the results obtained at the datacenter of the Tabriz University, the improvement has been dramatic, with more than 98% of packets being transferred to the destination in due time and less than 2% of the them has been deleted from the network or their time to live was over. We tried to use the closest nodes to the destination with highest remaining energy to send the data.















Similar content being viewed by others
References
Ning, Z., Xia, F., Ullah, N., Kong, X., & Hu, X. (2017). Vehicular social networks: Enabling smart mobility. IEEE Communications Magazine, 55(5), 16–55.
Lu, Z., Sun, X., Porta, T.L. (2016). Cooperative data offloading in opportunistic mobile networks. In Proc. IEEE INFOCOM, pp. 1–9.
Qiu, T., Ma, J., and Huang, R. (2018). A survey of mobile social networks: Applications, social characteristics, and challenges. IEEE Systems Journal 12(4)
Samian, N., Zukarnain, Z. A., Seah, W. K., Abdullah, A., & Hanapi, Z. M. (2015). Cooperation stimulation mechanisms for wireless multihop networks: A survey. Journal of Network and Computer Applications, 54, 88–106.
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2006). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of international conference on mobile computing and networking 3(1):255–265.
Wang, Y., Giruka, V. C., & Singhal, M. (2008). Truthful multipath routing for ad hoc networks with selfish nodes. Journal of Parallel and Distributed Computing, 68(6), 778–789.
He, Q., Wu, D., & Khosla, P. (2004). SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of IEEE wireless communications and neworking conference 1(1):825–830.
Tarag, F., & Robert, A. (2006). A node misbehaviour detection mechanism for mobile ad hoc networks. In Proceedings of 7th annual post graduate symposium on the convergence of telecommunications, networking and broadcasting 1(1):78–84.
Binglai Niu, M. I., Vicky Zhao, H., & Hai Jiang, I. (2011). A cooperation stimulation strategy in wireless multicast networks. IEEE Transactions on Signal Processing, 59(5), 50–65.
Senthilkumar, W. J., & Karthikeyan, A. (2014). distributed framework for detecting selfish nodes in MANET using record- and trust-based detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking, 4(3), 31–39.
Buchegger, S & Le Boudec, J. -Y. (2003). Coping with false accusations in misbehaviour reputation systems for mobile ad-hoc networks. In Proceedings of IEEE Info COMM 3(5): 49–57.
Wang, B., Soltani, S., Shapiro, J. K., & Tan, P.T. (2005). Local detection of selfish routing behaviour in ad hoc networks. In Proceedings of international symposium on parallel architectures, algorithms and networks 2(3):23–34.
Kargl, F., Klenk, A., Schlott, S., & Weber, M. (2004). Advanced detection of selfish or malicious nodes in ad hoc networks. In Proceedings of 1st European workshop on security in ad-hoc and sensor network 1(1):255–63.
Chen, T., & Varatharajan, V. (2009). Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Transactions on Internet Computing, 3(1), 234–241.
Khusru, M. A., & Sahoo, G. (2013). Classication of selfish and regular nodes based on reputation values in MANET using adaptive decision boundary. Science Research Journal of Communication Networks, 5(1), 185–191.
Xing, F., & Wang, W. (2006). Modelling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes. In Proceedings of IEEE conference on communication 2(5):1879–1884.
Guang, L., Assi, C., & Benslimane, A. (2008). Enhancing IEEE 802.11 random back-off in selfish environments. IEEE Transactions on Vehicular Technology, 57(3), 1806–1822.
Hosseini, H., & Babaie, S. H. (2019). Selfish node detection in ad hoc networks based on fuzzy logic. Neural Computing and Applications, 31, 6079–6090.
Kumar, S., & Dutta, K. (2018). Trust based intrusion detection technique to DetectSelfish nodes in mobile ad hoc networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-018-5804-4
Ponnusamya, M., Senthilkumarb, A., & Manikandanc, R. (2021). Detection of selfish nodes through reputation model in mobile adhoc network –MANET. Turkish Journal of Computer and Mathematics Education, 12(9), 2404–2410.
Khan, B. U. I., Anwar, F., Olanrewaju, R. F., Pampori, B. R., & Mir, R. N. (2020). A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks. IEEE Access, 8, 124097–124109.
Monakhov, Y. M., Monakhov, M. Y., &Telny, A. V. (2019). Method for local positioning of the node violating information security in mobile networks intrusion detection systems. In 2019 Dynamics of Systems, Mechanisms and Machines (Dynamics) 1–7, IEEE.
Thusijsman, F. (1992). Optimality and equilibria in stochastic games, CWI-tract 82, Centre for Mathematics and Computer Science, Amsterdam, (18).
Narendra, K. S. and Thathachar, M. A. L. (1989). Learning automata: An introduction, Prentice Hall, (19).
Kumar, S., & Dutta, K. (2018). Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks. Wireless Personal Communications, 20, 1–24.
Jedari, B., Xia, F., Chen, H., Das, S.K., Tolba, A., Makhadmeh, Z. A. L. (2017). A social based watchdog system to detect selfish nodes in opportunistic mobile networks. 10.1016 j.future.2017.10.049 0167–739X/© 2017 Elsevier B.V. All rights reserved (21).
Chen, D. et al. (2016). Multi-objective optimization of community detection using discrete teaching–learning-based optimization with decomposition. Information Sciences 22
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ghorbanalizadeh, M., Derakhshanfard, N. & JafariNavimipour, N. Introducing a new algorithm based on collaborative game theory with the power of learning selfish node records to encourage selfish nodes in mobile social networks. Wireless Netw 28, 1657–1669 (2022). https://doi.org/10.1007/s11276-022-02897-y
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-02897-y