PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything
Abstract
:1. Introduction
1.1. Motivation and Contributions
- In order to maintain data confidentiality, integrity, and availability in a communication network, the protocol integrates a future-safe end-to-end lattice geo-encryption technique in a bi-directional multi-hop mobile relay IoE network to deliver a confidential message from the sender(s) to the receiver(s) and vice versa.
- The protocol demonstrates a robust attack model which reports non-cooperative relay nodes to the sender node and mitigates such nodes with the assistance of the direct and overheard network information (NetInfo), which contains the details of the Node-Id, EnergyStatus, PacketForwardCount, PacketDropCount, Timestamp, and Incentive accumulated by the relay node and the relay node’s neighbour (known as neighbour-relay nodes).
- Decisively, the sender node is liable for generating incentives (in the form of currency) for the cooperative or non-cooperative nodes by comparing the direct and overheard NetInfo received from both the relay and neighbour-relay nodes.
- The sender maintains an Incentive Table (InTab) to facilitate further judgement in choosing the nodes and flooding the resulting incentive value to the respective nodes based on both direct and overheard NetInfo. By employing such a strategy, the sender and forwarding nodes can make intelligent decisions to select the next worthy hop.
- The protocol further addresses and defends against non-cooperation network attacks namely, Type-III selfish attacks and blackhole attacks.
1.2. Paper Organization
2. Literature Survey
- Type-I: The selfish nodes send regular control data packets during the route discovery and maintenance stages, but do not participate as relay nodes in forwarding the data packets. Such nodes are regarded as extremely hazardous to the overall routing operations. These nodes first participate in route discovery, then subsequently repudiate the provision of relay services for others. Packet drops and end-to-end delay are greatly escalated in such scenarios. It is feasible that selfish nodes might not adopt non-cooperative feedback for all nodes, and instead aim only at a particular set of nodes. One of the most important reasons for this is social approval or disapproval.
- Type-II: The selfish nodes do not engage in data transmission for other nodes, either during the route discovery or route maintenance stages. These nodes exclusively utilize their energy to power their own data processing and transmission. Routing protocols often do not take such nodes into account. This class of selfish nodes might not receive or transmit any route information. These nodes have the potential to significantly deteriorate data transmission traffic and network connectivity.
- Type-III: These nodes modify their amount of cooperation based on their resource levels. At first, these nodes behave as regular nodes. As time passes, the nodes begin to decline to cooperate with others due to a decrease in their resource levels. It is feasible that nodes in a smart ecosystem will associate their remaining energy levels with their selfishness levels. These nodes are just as hazardous as Type-I selfish nodes. The nodes help in route discovery to establish a network topology, then they subsequently disrupt the data flow by discarding the data packets. Because of these nodes, the routing protocol must restart the route discovery process or choose another alternate path for data transfer.
References | Features | Drawbacks | Experimentation | Attack Model |
---|---|---|---|---|
Barreto et al. [34] | Post-quantum lattice-based butterfly-key expansion in SCMS for V2X. Protecting the confidentiality of the key and certificate, integrity of the pseudonym certificate, and unlinkability of the pseudonym certificate. | Does not address lattice-based geo-encryption. Deficient against selfish node and blackhole attacks. | Software simulation | − |
Mi et al. [35] | NTRU-based privacy-preserving scheme to protect location-based querying in VANETs. Location queries are secured using 1-Out-n Oblivious transfer. | The model lacks protection against non-cooperative nodes and blackhole attack. | Software simulation | Authentication attack |
Agarkar et al. [36] | Security and privacy are preserved using the lightweight R-LWE lattice technique for the prosumer network in smart-grid IoT. | Lacks security against node selfishness and blackhole attack. | Software simulation | 1. MITM attack 2. DoS attack 3. Replay attack |
Srivastava et al. [37] | End-to-end lattice-based security for hierarchical DTNs. Inter and intra-cluster security using identity-based key-agreement and update scheme, non-interactive key-agreement scheme. | Location-aware lattice LWE encryption is not addressed. Lacks security against selfish nodes and blackhole attacks. | Software simulation | 1. MITM attack 2. Replay attack 3. Parallel session attack 4. Dictionary attack |
Mundhe et al. [38] | A lattice ring signature-based privacy-preserving authentication (RCPPA) scheme for VANETs. Determines the real identity of the malicious vehicle and ensures anonymity and unforgeability. | Does not address Blackhole attacks. Scheme lacks lattice based geo-encryption. | NS-3 | 1. Impersonation attack 2. Replay attack 3. Modification attack 4. MITM attack |
Chen et al. [39] | Lattice-based pseudonym update and certificate revocation (V-LDAA) for VANETs. Provides anonymity, unlinkability, and unforgeability against quantum attacks. | Insufficient against blackhole attacks. | Software simulation | − |
Lizardo et al. [40] | Sharelock protocol to provide end-to-end security in group IoT communications. NTRU based authenticated encryption. | Location-aware lattice-based encryption is not addressed. Deficient against node selfishness and blackhole attacks. | MICAz sensor | 1. Eavesdropping 2. Key manipulation 3. Replay attacks |
Zhu et al. [41] | NTRUEncrypt based session-key negotiation to the In-Vehicle controller. Analysis of performance parameters in terms of key-generation time, key-negotiation time and memory consumption. | Absence of location-aware lattice encryption. Insecure against misbehaving nodes and blackhole attacks. | Infineon AURIX TriBoard TC397 | − |
Fayaz et al. [47] | Reputation-based framework to detect selfish nodes by computing each node’s Contribution-to-Consumption ratio. | Deficiency of geo-encrypted post-quantum based data security. | NS-2 | Selfish attack |
Chen et al. [48] | A trust-aware and low-energy consumption protocol (TLES) for WSNs. Network topology is constructed by considering neighbour’s trust value, residual energy, location, distance and degree. | Lack of mobility model and location-aware lattice encryption. Insecure against blackhole attacks. | Software simulation | 1. Selfish attack 2. Node compromise detection |
Ponnusamy et al. [49] | Selfish Node Removal using Reputation Model (SNRRM) algorithm for MANETs. Reputation is computed using the node’s current energy level and the communication ratio during the routing operation. | Location-aware lattice encryption is not addressed. Deficient against blackhole attack. | NS-2 | Selfish attack |
Alnumay et al. [50] | A prediction-based trust management model framework to construct a trustworthy route and reliable data delivery in MANET-IoT. Network nodes are categorized as good and bad behaviours. Final trust is calculated using ARMA/GARCH likelihood function. | Need for location-aware lattice-based encryption. | NS-2 | 1. Address spoofing 2. Selfish attack 3. Byzantine, Blackhole, DoS attack 4. Sleep deprivation attack |
Shan et al. [51] | Considered mobility, density, proportion, and combination of selfish nodes intending to evaluate the impact of dynamic node selfishness due to energy consumption in MANETs. | Lack of lattice-based geo-encryption. | Omnet++ | Selfish attack |
Dias et al. [52] | Performance evaluation of a cooperative reputation system for VDTNs. Detect, identify, and mitigate contacts with selfish or misbehaviour nodes using the reputation system. The control information considered are node type, geographical location, route, speed, supported link technologies properties, energy status, and buffer status. The reputation system accepts or discards the node’s contact based on the reputation score. | Neglects post-quantum location-aware security. Does not address blackhole attacks. | VDTNsim Tool | Selfish attack |
Rehman et al. [53] | Incentive and Punishment Scheme (IPS) to allow participation of a node in network operations. The elected node supervises the other node’s behaviour. | Lack of lattice-based data security. Insufficient to handle blackhole attacks. | VDTNSim Tool | Selfish attack |
Kumar et al. [54] | Protocol to perform altruism-based trust-dependent message forwarding (ATDTN) for OppNets. Altruism value is dependent on attributes such as empathy, reputation, kinship, anonymity, activeness, cost, personal enmity, and future prospects. Altruism trust is derived by considering the node participation in message forwarding. | Neglects end-to-end post-quantum based geo-encryption. | ONE simulator | Selfish attack |
Dhurandher et al. [55] | A message trust-based secure multipath routing protocol for opportunistic networks (MT-SMRP). Protocol relays the message to the destination via disjoint paths and applies a soft-encryption technique. | Protocol lacks lattice- based security. | ONE simulator | 1. Blackhole attack 2. Grey-hole attack 3. Message-fabrication attack |
Kandhoul et al. [56] | A trust-based security approach T_CAFE for OppNets. Trust value is computed by utilizing the direct and indirect trusts to categorise nodes as benign or malicious. | Neglects post-quantum encryption to defend against quantum attacks | ONE simulator | 1. Blackhole attack 2. Sybil attack 3. Bad-mounting and Good-mouthing attack 4. Fabrication attack |
Kandhoul et al. [57] | An efficient data-forwarding technique applying GFRSA-based routing protocol for OppIoT. Content security using RSA, energy-aware routing, and detection and isolation of blackhole and packet-fabricating nodes. | The protocol is insufficient to defend against quantum attacks. | ONE simulator | 1. Blackhole attack 2. Packet fabricating attack |
Kim et al. [21] | A score-based route optimization protocol (NSSROP) to select the best relay nodes while choosing paths. Computes reputation using parameters, namely, energies and possible routes for relay selection. If reputation is less than threshold, the nodes are tagged as selfish. | Insufficient to defend against post-quantum attacks. | MATLAB | Selfish attack |
3. Proposed Approach—PINE Protocol
3.1. Node Characteristics
- Sender node : The sender creates a lattice-encrypted message for the receiver. It intelligently decides and forwards the encrypted message to the next available cooperative node. It generates the incentives for all the relay nodes involved in message-passing at the end of the communication cycle. The sender node combines direct and overheard information to calculate the resultant incentive of the network nodes involved in message-passing. Finally, an is maintained to choose the right nodes.
- Forwarding nodes : These nodes pass the encrypted message to the next hop. Each forwarding node intelligently identifies the next hop by considering the incentive value obtained from interpreting the , intending to minimize the communication with maliciously behaving nodes. At the end of the communication cycle, is provided with an incentive based on the network behaviour feedback received at node S, where j = 0 to .
- Receiver node : The receiver node listens to the channel, receives the encryption message, and decrypts it to analyze the information. After successful/unsuccessful decryption, the receiver sends an acknowledgement or negative acknowledgement (ACK/NACK) packet destined to the sender via the same route by which the packet reached the receiver (known as the bi-directional route). It should be noted that the receiver node possesses the same capability as the sender node, as the receiver can become a sender in future communication with other nodes.
- Non-cooperative nodes : These nodes tend to breach network operations to disrupt network stability. These nodes are malicious packet droppers and are involved in circulating direct false with other nodes, namely, nodes S or . These nodes are penalized by node S and may or may not participate in upcoming communication cycles depending on the incentive value.
- Cooperative nodes : Contrary to , cooperative nodes tend to maintain network stability by not involving themselves in malicious activities such as packet-dropping and by involvement in identifying nodes and reporting them to the S node. Cooperative nodes are involved in communicating the overheard true information with the S node if the direct nodes to S misbehave. Cooperative nodes tend to communicate the direct true if in contact with node S.
3.2. Assumptions
- All the nodes in the network are aware of each other’s location through Global Navigation Satellite Systems (GNSS), that is, a node maintains a neighbour table containing the Media Access Control (MAC) address, the Internet Protocol (IP) address, and the location of the neighbours; it transmits this to the neighbour nodes from time to time, promoting location exchange.
- In the network, non-cooperative nodes are only authorized to alter their residual energy, as the current energy level is in the direct control of , whereas other attributes (except for EnergyStatus, i.e., PacketForwardCount, PacketDropCount, Timestamp and Incentive) are not in the control of such nodes, as such information is monitored and stored by peer nodes.
- Nodes in the network behave cooperatively at the beginning of the communication sessions, i.e., until network stabilization (refer to Section 3.3.1 and Figure 3), and the network nodes may tend to misbehave after a certain period of time, especially in the operation phase (refer to Section 3.3.2).
- The incentive procedure performed by node S may happen after certain periodic intervals, though not after every round-trip session cycle in order to reduce the network overhead and save the computing resources. Furthermore, the incentive for the cooperative or non-cooperative relays is communicated through the trusted nodes.
3.3. Protocol Design
3.3.1. Initialization Phase
- Before establishing data communication, the S node transmits its IP address , MAC address , and latitude–longitude information to node R and in turn requests R’s IP address , MAC address , and latitude–longitude information. Node R maintains transmitted by S and generates a response for node S. After successfully receiving the response, S maintains transmitted by node R to keep track and proceed with message exchange among the connected nodes.
- During the session time until , node S identifies a set of neighbour nodes in a distance range to proceed with communication. Node S requests and from all nodes with the aim of learning their energy status and concluding whether such nodes can fulfil the service by acting as forwarding nodes. To this end purpose, node S collects the energy status along with the current distance (calculated using ) to greedily nominate the next-hop from the set of , i.e., ∈, considering the high-energy and low-distance nodes, then transmits the lattice LWE encrypted-text [58].
- Further, the selected node nominates the next-hop from the set of or ∈ based on the same rules by which node S selected and nominated , using a greedy nomination by considering the low-distance and high-energy, i.e., the requests for and .
- As it is assumed that all (known as neighbour-relay(s) to ) overhear the information about , any node in the set of overhears the network activities and constructs the profile with respect to relay containing attributes , namely, , , , , and . After reaches node R, the receiver R generates and transmits ACK/NACK via the same bi-directional route towards node S.
- In the next step, node S requests the direct and overheard from the neighbours and distant neighbours to compute the incentives by considering , , and for the respective relay and neighbour-relay nodes utilizing Equation (3) and the updated after a certain time to make decisions for the subsequent communication cycles. Moreover, in the Initialization Phase, all forwarding nodes are considered to be cooperative nodes , as the network tends to behave non-cooperatively after a time and the protocol encounters non-cooperative nodes mostly in the Operational Phase (refer to Section 3.3.2). Here, exponential decay functions are employed to minimize the incentive value by a consistent rate depicting lower energy of the nodes over a time.
- This greedy approach is performed to stabilize and socialize with peer nodes. During the initial part of this communication, is gathered for selecting nodes based on historical information. Thus, this phase is implemented in order to build the historical information for future decisions. Future decisions are determined based on and incentives generated by node S. Here, Network Stabilization (refer to Figure 3) denotes that each and every node has been involved in any part of the communication cycle or visited at least once in order to avoid null entries in the table. Wireless networks are often prone to node bias, and hence it is crucial to address this case in order to promoting fairness among the nodes.
- When the network stabilizes, i.e., if no null entries are found, node S can make a clear judgement as to how to identify the next-hop nodes in subsequent communication cycles by considering the direct energy status, incentive, and overheard (refer to Section 3.3.2) rather than relying on the energy status and distance range. Finally, if there are more packets to send in the upcoming communication cycles, then a new session starts again to transmit a new to node R.This selection and nomination procedure continues until the encrypted text reaches node R, which is elaborated in Algorithm 1.
Algorithm 1 Initialization Phase | |
1: | S wishes to send an message to R |
2: | Instantiate S and R to perform the communication process |
3: | Transmit ← , , to R |
4: | Store R ← |
5: | In response, transmit ← , , to S |
6: | Store S ← |
7: | S performs context-awareness to recognise neighbour nodes using |
8: | While ( ≠ Timeout() ≠ True) do |
9: | If ∈ |
10: | Transmit to R |
11: | If ) |
12: | = + 1 |
13: | Else |
14: | Set = End() |
15: | End If |
16: | Else |
17: | S requests EnergyStatus from all the nodes from the set |
18: | Set |
19: | S nominates considering high-energy and low-distance nodes, ∈ |
20: | S transmits to nominated , ← S |
21: | End If |
22: | While ∉ do |
23: | ← |
24: | Select and nominate ← considering high-energy and low-distance, |
∈ | |
25: | Transmit , ← |
26: | While ≠ do |
27: | All Overhearing nodes stores network activities in |
28: | End While |
29: | |
30: | End While |
31: | R decrypts and transmits ACK/NACK via the same bi-directional route to S |
32: | S requests for direct and overheard after receiving ACK/NACK |
33: | S computes for the relay nodes using in Step 32 |
← | |
34: | If |
35: | S ← Update |
36: | End If |
37: | If |
38: | If |
39: | Call Operation Phase: Algorithm 2 |
40: | Else |
41: | Set = End() |
42: | End If |
43: | Else |
44: | = + 1 |
45: | End If |
46: | End While |
3.3.2. Operational Phase
- To proceed with network operation in a stabilized network for communication cycles, initially, during the session time until node S analyzes the information stored in and requests from the next worthy hop node such that ∈ based on the incentive. However, before blindly relying on InTab, node S should be aware that the selected hop node from may or may not be cooperative, i.e., may transmit the direct true or false to S when aiming to increase its chances of selection and becoming . Therefore, to verify the cooperativeness of , S requests the overheard , i.e., , from the neighbour-relay nodes in order to compare (specifically the ) with the direct and entries in InTab. If any information mismatch is found, is rejected and penalized for responding with direct false information, and S selects, nominates, and verifies the other next available neighbour from .
- Furthermore, if the direct requested by node S is aligned with the overheard (specifically the ) and InTab, such a node is tagged as cooperative and S successfully transmits to .
- The selected and nominated performs context-awareness to discover the set of neighbour nodes ; , similar to node S, follows the same procedure for the selection and nomination of . After network stabilization, all the nodes are aware of the incentive value flooded by S; therefore, requests the direct from such that ∈ based on high incentive in order to service operations. transmits the direct ; in the meantime, to identify any non-cooperative activity of , requests for overheard (specifically the ) to compare the received direct and overheard information.
- If any discrepancy is found, selects and nominates the next ∈ as based on the fresh direct and overheard information received. All of the overhears the network activity of packet forwarding or intentional packet-dropping by and updates the . It is worth noting that while it may appear that is a cooperative node, it might exhibit a non-cooperative behaviour while performing node selection and nomination and forwarding the packet to , not in terms of forging but rather in terms of inability to forward the packet or intentional dropping of the packet. Taking this a step further, if successfully transmits to , then the neighbour nodes of increment , or if drops the packet while sending to , every node in the set increments . Therefore, in the next communication session, packet-dropping nodes have the lowest selection chances based on the final incentive calculated by node S. After a certain time, if ACK/NACK is not received from node R, node S assumes that the packet is lost and requests from the neighbours and distant-neighbours to inspect the issue of intentional packet dropping by a node or a dead node. If a node intentionally dropped the packet, S refrains from considering the packet-dropping node and tries to retransmit the packet. Certainly, if an overheard of a node reflects an abundant amount of residual energy and is a node is involved in packet dropping as well, this will raise a red flag.
- If and are both cooperative then, similar to the approach discussed above, ∈ has to be selected and nominated as a successor to . For this reason, requests direct information from and overheard from neighbour-relay nodes. If appears to be non-cooperative after comparing the direct and overheard information, then re-discovers a new path or a new node to promote guaranteed delivery of to node R. Such false activities are recorded or overheard by the neighbour-relay nodes, including the last recorded . It should be emphasized that the timestamp in the proposed protocol denotes the last updated activity, and is meant to provide resistance against replay attacks. Moreover, is revised after a certain threshold time to reduce network overhead. The whole process is discussed in Algorithm 2. Finally, this procedure continues until the selection and nomination of occurs.
Algorithm 2 Operational Phase | |
1: | While ≠ do |
2: | S requests for direct and overheard |
3: | S computes for the relay nodes using in Step 2 |
4: | If (Incentive ≥ ) |
5: | If (ForwardCount ≱ DropCount) |
6: | ← |
7: | Else |
8: | ← |
9: | End If |
10: | Else |
11: | Such nodes are tagged as |
12: | End If |
13: | S chooses ∈ by analysing |
14: | S requests direct from and overheard from neighbours of to |
15: | Set as or by considering Step 14 |
16: | If |
17: | Set |
18: | |
19: | While ∉ do |
20: | selects high-incentive node from |
21: | ← to |
22: | Set as or by considering Step 21 |
23: | If |
24: | If Malicious packet dropper) |
25: | ← |
26: | Transmit , ← |
27: | Else |
28: | Set |
29: | End If |
30: | Else |
31: | Choose new , such that ∈ till |
32: | End If |
33: | While ≠ do |
34: | All Overhearing nodes stores network activities in |
35: | End While |
36: | |
37: | End While |
38: | R decrypts and transmits ACK/NACK via the same bi-directional route to S |
39: | Else |
40: | Choose new , such that ∈ till |
41: | End If |
42: | If |
43: | S ← Update |
44: | End If |
45: | If |
46: | |
47: | Else |
48: | Set = End() |
49: | End If |
50: | End While |
3.3.3. Attack Detection Phase
Selfish Node Detection—Energy Spoofing
- Following initial network stabilization, node S may proceed with the next communication cycle by requesting from . It has been shown that during the network stabilization process, node S collects from the neighbours and distant neighbours to construct InTab.
- Node S identifies all the active neighbours and selects and nominates one of the neighbour nodes ∈ based on the incentive. This selected and nominated is assumed to be free from malicious activities by node S, which may or may not be true even after fixing as .
- To address the energy-spoofing selfish attack shown in Figure 4 while responding to node S, the activities of are overheard by the neighbour-relays and is generated. It should be noted that the overheard information is listened to by all nodes in the set of neighbour nodes to .
- Node S compares the with the direct and . If the comparison is found to be , i.e., no traces of energy spoofing, then is finally selected and nominated to be a forwarding node . However, if this comparison turns out to be , then node S raises a red flag for and continues searching for a worthy by considering the fresh direct and overheard information of the next worthy node based on the incentive from ; this process continues until a single honest node belonging to is found.
- If is found from the set , then further selects and nominates by requesting and comparing the direct and overheard , where high-incentive ∈. If the comparison is , a new node from the set is selected and fresh direct and overheard information is requested for comparison. If the comparison turns out to be , then the same process is continued until .
Blackhole Attack Detection
- As shown in the previous sections, after the selection and nomination of from the set of , node S transmits to and this process continues until the message reaches node R when considering the energy spoofing scenario.
- After node S calculates the incentive for relay nodes as shown in Algorithm 2 using Equations (3) and (4), node S forwards the calculated incentive to the relay nodes and these relay nodes further forward the incentive to the neighbour-relay nodes until it reaches all the nodes, with the goal of recognizing the reputation of each node.
- However, there may be a chance that the forwarding nodes execute an attack not in terms of energy but rather through a malicious packet drop. Apart from the attack discussed in the previous section, such nodes are hazardous to the network as well. Suppose is maliciously dropped by while forwarding the packet to the newly selected and nominated . Employing the same concept, the set of nodes in , including , recognizes the malicious packet-drop, as the neighbour nodes can overhear the session. Hence, all neighbour nodes including increments the with respect to . If no malicious packet drop is recognized at , , including , increments when reaches .
- In the meantime, node S waits for to identify the current status of the network. After the session times out due to packet drop or packet loss, S requests from its neighbours and distant neighbours to identify the reason for the fault.
- Node S aggregates and stores in to identify the cause of session time-out. Node S intelligently identifies and concludes that (in this case) maliciously dropped the packet at a particular timestamp even though it had sufficient energy to forward the packet. These insights are identified using the stored in containing the attributes EnergyStatus, PacketForwardCount, PacketDropCount, Timestamp, and Incentive. Moreover, the timestamp in the protocol ensures that replay attacks are avoided during session execution [36,37,38]. Furthermore, such packet-dropping nodes are penalized and tagged as non-cooperative . Node S then re-sends the packet to the next-best hop by analyzing the , hence promoting the lowest selection chances of the nodes to maintain network stability.
- It is worth mentioning that nodes can sometimes tend to drop packets for many unaddressed reasons, one of which can be a blackhole attack. If a node selfishly drops a packet, the node incurs an incentive deduction; however, this does not means that the node cannot participate in the route discovery or maintenance phases in the upcoming sessions, whereas the protocol allows non-cooperative nodes to behave as cooperative nodes in the network by providing incentives. If a node repeatedly drops packets and the calculated incentive is less than the set threshold incentive, the protocol takes the necessary action by completely ignoring such nodes in subsequent sessions.
4. Evaluation and Analysis
- This protocol employs three different scripts written in Python language, namely, sender, forwarding node, and receiver scripts. The sender and receiver scripts are used for executing sender and receiver nodes, whereas the forwarding node script focuses on simulating the relay nodes. Furthermore, our analysis here was conducted by keeping multiple forwarding node scripts to simulate and achieve the results.
- The protocol was successfully simulated for up to 50 nodes (excluding nodes S and R) considering an energy value of 10,000–20,000 Joules (J) for each node. This protocol has the potential to work for >20,000 J by substantially varying the respective device power and time capability, as it is known that Energy = Power (W) ∗ Time (t). Practically, on average the protocol considers a device’s energy capacity of up to 20,000 J, as it provides an experimental simulation to consider even a basic device with computing power. Furthermore, the protocol considers a node to be dead if < 100 J, and thus communication may not be possible with such nodes.
- The evaluation and analysis of the model was conducted in the below-mentioned simulation environment (refer to Table 2).
Computer Model | Dell Inspiron 3576 |
Operating System | Microsoft Windows 10 Pro |
Processor | Intel(R) Core(TM) i5-7200U CPU @ 2.50 GHz, 2.712 GHz, 2 Core(s), 4 Logical Processor(s) |
Random Access Memory (RAM) | 16 Giga-Bytes |
Read Only Memory (ROM) | 1 Tera-Bytes |
Solid-State Drive (SSD) | 120 Giga-Bytes |
Python Environment IDE | Scientific Python Development Environment (SPYDER)—Anaconda Platform |
MAC Layer | 802.11 |
Number of Nodes (Excluding and ) | 10–50 Nodes |
Transmission Range | 200 Metres |
4.1. Comparison of Execution Time, Memory Consumption, and Average Residual Energy with Message Size
- For this analysis, the protocol evaluated the results by varying the Message Size (in Characters) to find the effect on the Execution Time (in Seconds) per device Memory Consumption (in Megabytes) and Average Residual Energy (in Joules).
- The proposed protocol evaluated the results by keeping the session size or communication cycles to a constant value of 100 in order to obtain realistic observations, considering a number of forwarding nodes up to 30.
- The results were computed by considering up to 30 forwarding nodes to justify the energy consumption with respect to the number of nodes, as it is understood that as the number of nodes in the network increases the energy consumption increases as well, resulting in additional dead nodes. The results here are thus shown for up to 30 forwarding nodes considering 10,000 J for each node.
- In Table 3 and Figure 6, it can be observed that as the message size increases the protocol execution time increases with it when considering the number of forwarding nodes to be 30. These results show that the protocol takes ≈180 s or 3 min to transmit 10,000 characters of information when considering almost 100 communication cycles.
- In Table 4 and Figure 7, it can be seen that the protocol consumes more memory for 10 forwarding nodes compared to a higher number of forwarding nodes, namely, 20 and 30, due to the higher memory consumption involved in network stabilization; throughout the process, constant communication is required to perceive the status of the neighbour nodes until can be constructed for efficient node selection and nomination in further communication cycles, as outlined in Section 3.3.1. After stabilization, the results show that the memory consumption at each node is directly proportional to message size. Hence, it can be concluded that our proposed PINE protocol provides better results for greater message sizes when considering the trade-off. This result leads to the conclusion that ≈144.19 MB of memory is consumed by each node for transmission of up to 10,000 characters of message when considering 30 forwarding nodes.
- In Table 5 and Figure 8, the results reveal that as the message size increases the average residual energy needed to execute the protocol decreases when considering up to 30 forwarding nodes. It can be observed that the average residual energy is inversely proportional to the message size, as ≈210.91 J of average residual energy is left among all the forwarding nodes when the message size is 10,000 characters.
4.2. Comparison of Execution Time, Memory Consumption, and Average Residual Energy with Number of Nodes
- In this analysis, the results were evaluated by varying the number of forwarding nodes to find the effect on the execution time (in Seconds) per device memory consumption (in Megabytes) and average residual energy (in Joules).
- This proposed protocol evaluated the results by keeping the message size to a constant value of 1000 characters in order to obtain realistic observations by considering a number of sessions or communication cycles up to 300.
- The results here were computed by considering the energy per node value as 20,000 J considering 50 forwarding nodes, excluding nodes R and S, unlike in Section 4.1, where the energy per node value was considered as 10,000 J for at most 30 forwarding nodes.
- In Table 6 and Figure 9, it can be observed that the number of forwarding nodes is directly proportional to the total execution time of the protocol for varying session size up to 300 when keeping a constant message size of 1000 characters. These results indicate a maximum execution time of ≈638.23 s or 10 min while communicating with 50 forwarding nodes in the IoE network.
4.3. Comparison of Selfish Node and Blackhole Detection with Number of Nodes
- This section presents interesting results obtained by comparing the effect of the number of forwarding nodes with the percentage of selfish nodes and blackhole nodes detected in the IoE network. These results were evaluated by keeping a constant message size of 1000 characters for a session size of up to 300 sessions.
- Furthermore, these results consider non-cooperative nodes, namely, selfish or blackhole nodes, to avoid providing network control to non-cooperative nodes, as this can disrupt the network stability, contrary to Section 4.1 and Section 4.2, where all the nodes were assumed to be cooperative throughout the analysis.
- It should be noted that in this analysis, the energy per node is considered as 20,000 J, as in Section 4.2. Furthermore, the main focus in this section is to identify selfish and blackhole nodes, rather than on execution time, memory consumption, or residual energy, as it was in Section 4.1 and Section 4.2. Hence, this analysis stresses the protocol’s capability. Certainly, the protocol can adapt to higher energy per node; however, for analysis, the energy value is considered to be a constant value, aiming to obtain the results in a more realistic way. Moreover, during the operation, if the protocol identifies any dead node, i.e., < 100 J, the protocol’s accuracy is reduced due to low observed energy.
- In Table 9 and Figure 12, the accuracy of the protocol is reduced as the session size increases due to the involvement of energy-spoofing non-cooperative nodes in the network. The reliability of the protocol stands at an overall accuracy of 100%, 92.5%, and 80% when considering a session size of 100, 200, and 300, respectively.
- In Table 10 and Figure 13, the overall accuracy of the protocol degrades as the session size increases due to the inclusion of blackhole nodes in the network. Moreover, the ratio of dead nodes compared to energy-spoofing nodes increases due to high energy-deriving operations such as new node or path discovery after . The overall reliability of the protocol achieves 100%, 80%, and 70% when considering a session size of 100, 200, and 300, respectively.
5. Conclusions
- The protocol does not focus on optimal or minimum cost route selection; rather, the protocol focuses on selecting an optimal set of routes based on the energy status and incentives of the nodes in the stabilized network. Hence, the PINE protocol is effective for longer communication sessions with multiple receivers in which it is desirable to increase security. For example, the model primarily identifies the next hop based on energy status and distance from the source node, whereas an additional method can be incorporated involving well-defined or verified/tested minimum cost routing-based sensor network protocols for the discussed procedure. This addition can significantly improve overall performance and decrease the latency in the network, as route selection is optimised through the consideration of reactive or proactive routing techniques.
- The protocol abstains from addressing several different network attacks, including good-mouthing, bad-mouthing, and distributed denial of service (DDoS), etc., which aim to exhaust network resources and ultimately disturb network reliability and durability. For example, several existing papers [44,56] have explained the issues faced due to good-mouthing and bad-mouthing attacks; in a good-mouthing attack, a cluster of non-cooperative entities collaborate to provide favourable feedback to a non-cooperative entity, resulting in it rapidly earning a high reputation, whereas in a bad-mouthing attack the non-cooperative entities collaborate to reduce the trust of a cooperative node by providing false feedback to disrupt the trust framework. Furthermore, in a DDoS attack [2,7,14,30,31,44], the victim’s node is flooded with traffic originating from different sources to break down the system, leading to network unavailability. These are significant problems to be addressed in real-world scenarios, as they can drastically impact customer-facing services involved in the IoE framework, potentially leading to economic loss. Hence, integrating such attack resistance into this protocol is highly relevant.
- Furthermore, the protocol does not address the authenticity of IoE devices. In the current protocol, we have assumed that the source and destination nodes are or genuine; however, this may not be the case in reality, as authentication techniques are needed in order to provide an additional layer of security by verifying network devices before performing any communication activities. An intruder must then break the system authentication to enter into the network and control the traffic. Hence, to minimize direct access to the network by intruders, a proven and an effective authentication technique can be integrated with the protocol presented here in order to provide further direction to error-free post-quantum attack-resisting network systems.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- The Internet of Everything Global Public Sector Economic Analysis. Cisco, 2013. Available online: https://www.cisco.com/c/dam/en_us/about/business-insights/docs/ioe-value-at-stake-public-sector-analysis-faq.pdf (accessed on 24 January 2022).
- Dey, N.; Shinde, G.; Mahalle, P.; Olesen, H. The Internet of Everything: Advances, Challenges and Applications; De Gruyter: Berlin, Germany, 2019. [Google Scholar] [CrossRef]
- Farias da Costa, V.C.; Oliveira, L.; de Souza, J. Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors 2021, 21, 568. [Google Scholar] [CrossRef] [PubMed]
- Liu, Y.; Dai, H.N.; Wang, Q.; Shukla, M.K.; Imran, M. Unmanned aerial vehicle for internet of everything: Opportunities and challenges. Comput. Commun. 2020, 155, 66–83. [Google Scholar] [CrossRef]
- Abbasi, S.; Rahmani, A.M.; Balador, A.; Sahafi, A. Internet of Vehicles: Architecture, services, and applications. Int. J. Commun. Syst. 2021, 34, e4793. [Google Scholar] [CrossRef]
- Samie, F.; Bauer, L.; Henkel, J. IoT technologies for embedded computing: A survey. In Proceedings of the 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ ISSS), Pittsburgh, PA, USA, 2–7 October 2016; IEEE: New York, NY, USA, 2016; pp. 1–10. [Google Scholar] [CrossRef]
- Benjamin, C.D. Transatlantic Cyber Insecurity and Cybercrime: Economic Impact and Future Prospects. EPRS|European Parliamentary Research Service, 2017. Available online: https://www.europarl.europa.eu/RegData/etudes/STUD/2017/603948/EPRS_STU(2017)603948_EN.pdf (accessed on 4 February 2022).
- Ali, M.; Nadeem, M.; Siddique, A.; Ahmad, S.; Ijaz, A. Addressing Sinkhole Attacks in Wireless Sensor Networks—A Review. Int. J. Sci. Technol. Res. 2020, 9, 406–411. [Google Scholar]
- Daniel, S.; Prashanth, K.; Edison, P. Residual Energy Monitoring in Wireless Sensor Networks [Technical Report]. Halmstad University, 2011. Available online: https://www.divaportal.org/smash/get/diva2:446791/FULLTEXT01.pdf (accessed on 22 January 2022).
- Shan, A.; Fan, X.; Wu, C.; Zhang, X. Quantitative Study on Impact of Static/Dynamic Selfishness on Network Performance in VANETs. IEEE Access 2021, 9, 13186–13197. [Google Scholar] [CrossRef]
- Avoussoukpo, C.B.; Ogunseyi, T.B.; Tchenagnon, M. Securing and facilitating communication within opportunistic networks: A holistic survey. IEEE Access 2021, 9, 55009–55035. [Google Scholar] [CrossRef]
- Shabbir, A.; Khalid, F.; Shaheed, S.M.; Abbas, J.; Zia-Ul-Haq, M. Security: A core issue in mobile ad hoc networks. J. Comput. Commun. 2015, 3, 41. [Google Scholar] [CrossRef]
- Mittal, S.; Dahiya, S. Identification technique for all passive selfish node attacks in a mobile network. Int. J. 2015, 3, 46–51. [Google Scholar]
- Aly, M.; Khomh, F.; Haoues, M.; Quintero, A.; Yacout, S. Enforcing security in Internet of Things frameworks: A systematic literature review. Internet Things 2019, 6, 100050. [Google Scholar] [CrossRef]
- Voas, J.; Kuhn, R.; Laplante, P.; Applebaum, S. Internet of things (IoT) trust concerns. In NIST Cybersecurity White Paper; NIST: Gaithersburg, MD, USA, 17 October 2018. [Google Scholar]
- Horyachyy, O. Comparison of Wireless Communication Technologies Used in a Smart Home: Analysis of Wireless Sensor Node Based on Arduino in Home Automation Scenario. Master’s Thesis, Blekinge Institute of Technology, Karlskrona, Switzerland, 2017. [Google Scholar]
- Rana, B.; Singh, Y.; Singh, P.K. A systematic survey on internet of things: Energy efficiency and interoperability perspective. Trans. Emerg. Telecommun. Technol. 2021, 32, e4166. [Google Scholar] [CrossRef]
- Navarro, M.; Li, Y.; Liang, Y. Energy profile for environmental monitoring wireless sensor networks. In Proceedings of the 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), Bogota, Colombia, 4–6 June 2014; IEEE: New York, NY, USA, 2014; pp. 1–6. [Google Scholar] [CrossRef]
- Khan, M.A.; Nasralla, M.M.; Umar, M.M.; Iqbal, Z.; Rehman, G.U.; Sarfraz, M.S.; Choudhury, N. A survey on the noncooperative environment in smart nodes-based Ad Hoc networks: Motivations and solutions. Secur. Commun. Netw. 2021, 2021, 9921826. [Google Scholar] [CrossRef]
- Dimitriou, G.; Kikiras, P.K.; Stamoulis, G.I.; Avaritsiotis, I.N. A tool for calculating energy consumption in wireless sensor networks. In Proceedings of the Panhellenic Conference on Informatics, Volos, Greece, 11–13 November 2005; Springer: Berlin/Heidelberg, Germany; pp. 611–621. [Google Scholar] [CrossRef]
- Kim, W.; Umar, M.M.; Khan, S.; Khan, M.A. Novel Scoring for Energy-Efficient Routing in Multi-Sensored Networks. Sensors 2022, 22, 1673. [Google Scholar] [CrossRef] [PubMed]
- ETSI White Paper No. 8. Quantum Safe Cryptography and Security: An Introduction, Benefits, Enablers and Challenges; European Telecommunications Standards Institute: Sophia Antipolis Cedex, France, 2015.
- Chris, P. Lattice cryptography for the internet. In Proceedings of the International Workshop on Post-Quantum Cryptography, Waterloo, ON, Canada, 1–3 October 2014; Springer: Cham, Switzerland, 2014; pp. 197–219. [Google Scholar] [CrossRef]
- Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM 2009, 56, 1–40. [Google Scholar] [CrossRef]
- Stebila, D. Introduction to Post-Quantum Cryptography and Learning with Errors [PowerPoint Slides]. McMaster University, University of Waterloo, 2018. Available online: https://summerschool-croatia.cs.ru.nl/2018/slides/Introductiontopost-quantumcryptographyandlearningwitherrors.pdf (accessed on 13 December 2021).
- Asif, R. Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms. IoT 2021, 2, 71–91. [Google Scholar] [CrossRef]
- Uyoata, U.; Mwangama, J.; Adeogun, R. Relaying in the Internet of Things (IoT): A Survey. IEEE Access 2021, 9, 132675–132704. [Google Scholar] [CrossRef]
- Hassan, R.; Qamar, F.; Hasan, M.K.; Aman, A.H.M.; Ahmed, A.S. Internet of Things and its applications: A comprehensive survey. Symmetry 2020, 12, 1674. [Google Scholar] [CrossRef]
- Ray, P.P. A survey on Internet of Things architectures. J. King Saud Univ.—Inf. Sci. 2018, 30, 291–319. [Google Scholar] [CrossRef] [Green Version]
- Seyhan, K.; Nguyen, T.N.; Akleylek, S.; Cengiz, K. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: A survey. Clust. Comput. 2022, 25, 1729–1748. [Google Scholar] [CrossRef]
- Khan, S.; Sharma, I.; Aslam, M.; Khan, M.Z.; Khan, S. Security challenges of location privacy in VANETs and state-of-the-art solutions: A survey. Future Internet 2021, 13, 96. [Google Scholar] [CrossRef]
- Hameed, S.; Khan, F.I.; Hameed, B. Understanding security requirements and challenges in Internet of Things (IoT): A review. J. Comput. Netw. Commun. 2019, 2019, 9629381. [Google Scholar] [CrossRef]
- Karakaya, A.; Akleylek, S. A survey on security threats and authentication approaches in wireless sensor networks. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; IEEE: New York, NY, USA, 2018; pp. 1–4. [Google Scholar] [CrossRef]
- Barreto, P.S.; Ricardini, J.E.; Simplicio, M.A., Jr.; Patil, H.K. qscms: Post-quantum certificate provisioning process for V2X. Cryptology ePrint Archive. 2018. Available online: https://eprint.iacr.org/2018/1247.pdf (accessed on 21 December 2021).
- Mi, B.; Huang, D.; Wan, S. NTRU implementation of efficient privacy-preserving location-based querying in VANET. Wirel. Commun. Mob. Comput. 2018, 2018, 7823979. [Google Scholar] [CrossRef]
- Agarkar, A.A.; Agrawal, H. LRSPPP: Lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid. Heliyon 2019, 5, e01321. [Google Scholar] [CrossRef] [PubMed]
- Srivastava, G.; Agrawal, R.; Singh, K.; Tripathi, R.; Naik, K. A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography. Peer-to-Peer Netw. Appl. 2020, 13, 348–367. [Google Scholar] [CrossRef]
- Mundhe, P.; Yadav, V.K.; Singh, A.; Verma, S.; Venkatesan, S. Ring signature-based conditional privacy-preserving authentication in VANETs. Wirel. Pers. Commun. 2020, 114, 853–881. [Google Scholar] [CrossRef]
- Chen, L.; Tu, T.; Yu, K.; Zhao, M.; Wang, Y. V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System. Secur. Commun. Netw. 2021, 2021, 4660875. [Google Scholar] [CrossRef]
- Lizardo, A.; Barbosa, R.; Neves, S.; Correia, J.; Araujo, F. End-to-end secure group communication for the Internet of Things. J. Inf. Secur. Appl. 2021, 58, 102772. [Google Scholar] [CrossRef]
- Zhu, Y.; Liu, Y.; Wu, M.; Li, J.; Liu, S.; Zhao, J. Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt. Electronics 2022, 11, 856. [Google Scholar] [CrossRef]
- Michiardi, P.; Molva, R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security; Springer: Boston, MA, USA, 2002; pp. 107–121. [Google Scholar] [CrossRef]
- Khalid, W.; Ullah, Z.; Ahmed, N.; Cao, Y.; Khalid, M.; Arshad, M.; Cruickshank, H. A taxonomy on misbehaving nodes in delay tolerant networks. Comput. Secur. 2018, 77, 442–471. [Google Scholar] [CrossRef]
- Mohammadi, V.; Rahmani, A.M.; Darwesh, A.M.; Sahafi, A. Trust-based recommendation systems in Internet of Things: A systematic literature review. Hum.-Centric Comput. Inf. Sci. 2019, 9, 21. [Google Scholar] [CrossRef]
- Sengathir, J.; Manoharan, R. Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs. Egypt. Inform. J. 2015, 16, 231–241. [Google Scholar] [CrossRef]
- Vij, A.; Sharma, V.; Nand, P. Selfish node detection using game theory in MANET. In Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 12–13 October 2018; IEEE: New York, NY, USA, 2018; pp. 104–109. [Google Scholar] [CrossRef]
- Fayaz, M.; Mehmood, G.; Khan, A.; Abbas, S.; Fayaz, M.; Gwak, J. Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics 2022, 11, 185. [Google Scholar] [CrossRef]
- Chen, Z.; He, M.; Liang, W.; Chen, K. Trust-aware and low energy consumption security topology protocol of wireless sensor network. J. Sens. 2015, 2015, 716468. [Google Scholar] [CrossRef]
- Ponnusamy, M. Detection of selfish nodes through reputation model in mobile adhoc network-MANET. Turk. J. Comput. Math. Educ. 2021, 12, 2404–2410. [Google Scholar] [CrossRef]
- Alnumay, W.; Ghosh, U.; Chatterjee, P. A Trust-Based predictive model for mobile ad hoc network in internet of things. Sensors 2019, 19, 1467. [Google Scholar] [CrossRef] [Green Version]
- Shan, A.; Fan, X.; Wu, C.; Zhang, X.; Fan, S. Quantitative study on the impact of energy consumption based dynamic selfishness in MANETs. Sensors 2021, 21, 716. [Google Scholar] [CrossRef]
- Dias, J.A.; Rodrigues, J.J.; Shu, L.; Ullah, S. Performance evaluation of a cooperative reputation system for vehicular delay-tolerant networks. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 88. [Google Scholar] [CrossRef]
- Rehman, G.U.; Ghani, A.; Zubair, M.; Naqvi, S.H.A.; Singh, D.; Muhammad, S. Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov). IEEE Access 2019, 7, 109026–109037. [Google Scholar] [CrossRef]
- Kumar, A.; Dhurandher, S.K.; Woungang, I.; Obaidat, M.S.; Gupta, S.; Rodrigues, J.J. An altruism-based trust-dependent message forwarding protocol for opportunistic networks. Int. J. Commun. Syst. 2017, 30, e3232. [Google Scholar] [CrossRef]
- Dhurandher, S.K.; Singh, J.; Woungang, I.; Kumar, R.; Gupta, G. Message trust-based secure multipath routing protocol for opportunistic networks. Int. J. Commun. Syst. 2020, 33, e4364. [Google Scholar] [CrossRef]
- Kandhoul, N.; Dhurandher, S.K.; Woungang, I. T_CAFE: A trust based security approach for opportunistic IoT. IET Commun. 2019, 13, 3463–3471. [Google Scholar] [CrossRef]
- Kandhoul, N.; Dhurandher, S.K. An efficient and secure data forwarding mechanism for opportunistic IoT. Wirel. Pers. Commun. 2021, 118, 217–237. [Google Scholar] [CrossRef]
- Balaji, A.; Dhurandher, S.K. Reliable data communication using post-quantum encryption in Internet of Everything. Int. J. Commun. Syst. 2022, 2022, e5246. [Google Scholar] [CrossRef]
Message Size | Execution Time for Number of Nodes = 10 | Execution Time for Number of Nodes = 20 | Execution Time for Number of Nodes = 30 |
---|---|---|---|
10 | 22.89 s | 46.96 s | 81.42 s |
100 | 30.17 s | 84.48 s | 129.15 s |
1000 | 60.85 s | 104.21 s | 138.7 s |
10,000 | 92.72 s | 146.33 s | 180.97 s |
Message Size | Memory Consumption for Number of Nodes = 10 | Memory Consumption for Number of Nodes = 20 | Memory Consumption for Number of Nodes = 30 |
---|---|---|---|
10 | 136.67 MB | 135.85 MB | 135.98 MB |
100 | 136.13 MB | 136.39 MB | 137.08 MB |
1000 | 136.52 MB | 138.68 MB | 139.57 MB |
10,000 | 137.44 MB | 141.31 MB | 144.19 MB |
Message Size | Average Residual Energy for Number of Nodes = 10 | Average Residual Energy for Number of Nodes = 20 | Average Residual Energy for Number of Nodes = 30 |
---|---|---|---|
10 | 7390.96 J | 5283.77 J | 3339.76 J |
100 | 5569.38 J | 3120.54 J | 2208.64 J |
1000 | 1831.17 J | 1153.90 J | 851.33 J |
10,000 | 1056.86 J | 560.03 J | 210.91 J |
Number of Nodes | Execution Time for Session Size = 100 | Execution Time for Session Size = 200 | Execution Time for Session Size = 300 |
---|---|---|---|
10 | 61.38 s | 109.63 s | 144.60 s |
20 | 111.37 s | 141.28 s | 258.42 s |
30 | 140.85 s | 251.47 s | 498.59 s |
40 | 239.14 s | 455.19 s | 616.89 s |
50 | 418.21 s | 585.97 s | 638.23 s |
Number of Nodes | Memory Consumption for Session Size = 100 | Memory Consumption for Session Size = 200 | Memory Consumption for Session Size = 300 |
---|---|---|---|
10 | 132.72 MB | 134.98 MB | 135.86 MB |
20 | 133.10 MB | 135.12 MB | 138.72 MB |
30 | 134.29 MB | 138.27 MB | 144.71 MB |
40 | 137.56 MB | 144.2 MB | 146.75 MB |
50 | 144.93 MB | 146.01 MB | 145.47 MB |
Number of Nodes | Average Residual Energy for Session Size = 100 | Average Residual Energy for Session Size = 200 | Average Residual Energy for Session Size = 300 |
---|---|---|---|
10 | 4890.21 J | 3950.81 J | 2008.94 J |
20 | 3672.45 J | 2229.99 J | 1865.26 J |
30 | 2346.06 J | 1623.84 J | 1081.49 J |
40 | 1298.67 J | 968.58 J | 802.37 J |
50 | 922.55 J | 840.6 J | 479.39 J |
Number of Nodes | Percentage of Selfish Nodes Detected for Session Size = 100 | Percentage of Selfish Nodes Detected for Session Size = 200 | Percentage of Selfish Nodes Detected for Session Size = 300 |
---|---|---|---|
10 | 100% | 100% | 100% |
20 | 100% | 100% | 100% |
30 | 100% | 100% | 100% |
40 | 100% | 95% | 87.5% |
50 | 100% | 96% | 86% |
Overall Accuracy | 100% | 92.5% | 80% |
Number of Nodes | Percentage of Blackhole Nodes Detected for Session Size = 100 | Percentage of Blackhole Nodes Detected for Session Size = 200 | Percentage of Blackhole Nodes Detected for Session Size = 300 |
---|---|---|---|
10 | 100% | 100% | 100% |
20 | 100% | 100% | 100% |
30 | 100% | 100% | 93.33% |
40 | 100% | 92.5% | 87.5% |
50 | 100% | 90% | 86% |
Overall Accuracy | 100% | 80% | 70% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Balaji, A.; Dhurandher, S.K.; Woungang, I. PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything. Sensors 2022, 22, 6928. https://doi.org/10.3390/s22186928
Balaji A, Dhurandher SK, Woungang I. PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything. Sensors. 2022; 22(18):6928. https://doi.org/10.3390/s22186928
Chicago/Turabian StyleBalaji, Ashwin, Sanjay Kumar Dhurandher, and Isaac Woungang. 2022. "PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything" Sensors 22, no. 18: 6928. https://doi.org/10.3390/s22186928
APA StyleBalaji, A., Dhurandher, S. K., & Woungang, I. (2022). PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything. Sensors, 22(18), 6928. https://doi.org/10.3390/s22186928