A novel selfish node detection based on reputation and game theory in Internet of Things

被引:0
作者
Gholam Hossein Abdi
Amir Hossein Refahi Sheikhani
Sohrab Kordrostami
Armin Ghane
Shahram Babaie
机构
[1] Lahijan Branch,Department of Applied Mathematics and Computer Science
[2] Islamic Azad University,Department of Computer Engineering
[3] Tabriz Branch,undefined
[4] Islamic Azad University,undefined
来源
Computing | 2024年 / 106卷
关键词
Internet of Things (IoT); Selfish and malicious node; Game theory; Direct and indirect reputation; 68M12;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet of Things (IoT) implies a new model and concept in the world of information and communication technology that the non-cooperation of some nodes in providing services to other nodes may result in the disconnection of some things with each other. Consequently, the proximity of such nodes is considerably reduced the network performance. In this paper, a multiphase method based on game theory and direct and indirect reputation has been designed to stimulate selfish and malicious nodes to cooperate in the Internet of Things, which starts with setting up nodes in the IoT network. In the first phase, nodes are grouped in clusters with cluster heads to collect data. Then, they play a dynamic and multi-person game when they promote their own data packet or others’ data packet in the second phase (multi-person game phase and data packet sending). The result of the game is applied to affect between nodes in the next phase. Nodes can pick their strategy when data packet forwarding in the third phase (direct and indirect reputation update). Nodes will update the neighboring node and the reputation table if they receive a confirmation message from the destination declaring that the data packet has a direct reputation. The results show that the accuracy of selfish node detection has increased by average of 8% and the false positive rate is 7% in comparison to comparative methods.
引用
收藏
页码:81 / 107
页数:26
相关论文
共 50 条
  • [21] Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
    Rani, Rinki
    Kumar, Sushil
    Dohare, Upasana
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8421 - 8432
  • [22] A Novel Label Propagation Method for Community Detection Based on Game Theory
    Ning, Mengqin
    Gong, Jun
    Zhou, Zhipeng
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 924 - 938
  • [23] Game-theoretic physical layer authentication for spoofing detection in internet of things
    Wu, Yue
    Jing, Tao
    Gao, Qinghe
    Wu, Yingzhen
    Huo, Yan
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (05) : 1394 - 1404
  • [24] A Novel Detection and Localization Scheme for Wormhole Attack in Internet of Things
    Tong, Fei
    Chen, Cheng
    Pan, Jianping
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 7141 - 7152
  • [25] An Efficient Reputation Management Model based on Game Theory for Vehicular Networks
    Chouikhi, Samira
    Khoukhi, Lyes
    Ayed, Samiha
    Lemercier, Marc
    PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 413 - 416
  • [26] Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory
    Wang, Shengling
    Shi, Hongwei
    Hu, Qin
    Lin, Bin
    Cheng, Xiuzhen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) : 661 - 668
  • [27] A Bibliometric Analysis and Review of Resource Management in Internet of Water Things: The Use of Game Theory
    Olatinwo, Segun O.
    Joubert, Trudi-H.
    WATER, 2022, 14 (10)
  • [28] Game Theoretic Framework for Reputation-based Distributed Intrusion Detection
    Bradai, Amira
    Afifi, Hossam
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 558 - 563
  • [29] Community detection based on Game Theory
    Moscato, Vincenzo
    Picariello, Antonio
    Sperli, Giancarlo
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 85 : 773 - 782
  • [30] A novel medical internet of things perception system based on visual image encryption and intrusion detection
    Aiying Guo
    Meihua Xu
    Feng Ran
    Haiyong Wang
    Cluster Computing, 2019, 22 : 13405 - 13413