2019
DOI: 10.1186/s13638-019-1564-4
|View full text |Cite
|
Sign up to set email alerts
|

Selfish node detection based on hierarchical game theory in IoT

Abstract: Cooperation between nodes is an effective technology for network throughput in the Internet of Things. The nodes that do not cooperate with other nodes in the network are called selfish and malicious nodes. Selfish nodes use the facilities of other nodes of the network for raising their interests. But malicious nodes tend to damage the facilities of the network and abuse it. According to reviews of the previous studies, in this paper, a mechanism is proposed for detecting the selfish and malicious nodes based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(36 citation statements)
references
References 27 publications
0
36
0
Order By: Relevance
“…It simulated in core i7 processors, 370 M processors, 2.40 GHz of speed with a memory of 8 GB, Window 8.1 basic (64bit), and MATLAB 2018 software. The simulation results of the proposed method compared with the Game theorybased [21], PPS [25], and Trust management [26] protocols in evaluation metrics like throughput, average end-to-end delay, detection accuracy, false positive/negative rate, and energy consumption. The simulation performed 100 runs, and the simulation results have shown and indicated in different charts.…”
Section: -2 Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…It simulated in core i7 processors, 370 M processors, 2.40 GHz of speed with a memory of 8 GB, Window 8.1 basic (64bit), and MATLAB 2018 software. The simulation results of the proposed method compared with the Game theorybased [21], PPS [25], and Trust management [26] protocols in evaluation metrics like throughput, average end-to-end delay, detection accuracy, false positive/negative rate, and energy consumption. The simulation performed 100 runs, and the simulation results have shown and indicated in different charts.…”
Section: -2 Simulation Resultsmentioning
confidence: 99%
“…The fact that the proposed scheme has a slighter slope compared to the methods Game theory-based [21], PPS [25], and Trust management [26] protocols have shown in Table 3. The proposed method uses GA, and LA processes in each cluster to detect the selfish nodes.…”
Section: Fig 6 Comparison Of Detection Accuracy (Da) In Iotmentioning
confidence: 96%
See 2 more Smart Citations
“…Here, the , , , values are calculated using Equations (6)(7)(8)(9). The 1 , 2 , 3 , 4 are chaotic values that can be calculated using Equation (5).…”
Section: Chimp Optimization Algorithmmentioning
confidence: 99%