iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.3390/S23010099
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T16:26:31Z","timestamp":1726763191759},"reference-count":43,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T00:00:00Z","timestamp":1671667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Since several Internet of Things (IoT) applications have been widely deployed on unstable wireless networks, such as the Delay Tolerant Network (DTN), data communication efficiency in DTN remains a challenge for IoT applications. Vehicular Delay Tolerant Network (VDTN) has become one of DTN\u2019s potential applications, in which the network experiences connectivity interruption due to the lack of an end-to-end relay route. VDTNs focus on node cooperation to achieve this goal. As a result, it is essential to ensure that almost all network nodes adopt the protocol to preserve network performance. This is a challenging task since nodes may diverge from the basic protocol to optimize their effectiveness. This article presents an Efficient Monitoring System (EMS) to detect and respond to just selfish nodes to minimize their entire network and data communication efficacy. The scheme is based on a network-wide cooperative sharing of node reputation. It is also necessary to increase overall network efficiency by tracking selfish nodes. The NS-2 simulator is used to run this experimental setup. Simulation results indicate that the proposed scheme performs better in terms of probability of package delivery, package delivery delay, energy consumption, and amount of packet drops. For 80% selfish nodes in the network, the packet delivery of EMS is 37% and 31% better than SOS and IPS. Similarly, the average delivery delay of EMS is 22% and 18% lower than SOS and IPS when 80% selfish nodes are incorporated in the network.<\/jats:p>","DOI":"10.3390\/s23010099","type":"journal-article","created":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T08:55:21Z","timestamp":1671785721000},"page":"99","source":"Crossref","is-referenced-by-count":10,"title":["EMS: Efficient Monitoring System to Detect Non-Cooperative Nodes in IoT-Based Vehicular Delay Tolerant Networks (VDTNs)"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2944-4740","authenticated-orcid":false,"given":"Ghani Ur","family":"Rehman","sequence":"first","affiliation":[{"name":"Department of Computer Science and Bioinformatics, Khushal Khan Khattak University, Karak 27000, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6723-5486","authenticated-orcid":false,"given":"Muhammad","family":"Zubair","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Bioinformatics, Khushal Khan Khattak University, Karak 27000, Pakistan"}]},{"given":"Iqbal","family":"Qasim","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Science and Technology Bannu, Bannu 28100, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3444-4609","authenticated-orcid":false,"given":"Afzal","family":"Badshah","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Software Engineering, International Islamic University, Islamabad 44000, Pakistan"}]},{"given":"Zafar","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Gujrat, Gujrat 50700, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9697-6766","authenticated-orcid":false,"given":"Muhammad","family":"Aslam","sequence":"additional","affiliation":[{"name":"School of Computing Engineering and Physical Sciences, University of West of Scotland, Glasgow G72 0LH, UK"},{"name":"Scotland Academy, Wuxi Taihu University, Wuxi 214063, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4751-8574","authenticated-orcid":false,"given":"Syeda Fizah","family":"Jilani","sequence":"additional","affiliation":[{"name":"Department of Physics, Physical Sciences Building, Aberystwyth University, Aberystwyth SY23 3BZ, UK"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,22]]},"reference":[{"key":"ref_1","first-page":"97","article-title":"That \u2018internet of things\u2019 thing","volume":"22","author":"Ashton","year":"2009","journal-title":"RFID J."},{"key":"ref_2","first-page":"2422","article-title":"Survey of authentication and privacy schemes in vehicular ad hoc networks","volume":"21","author":"Anbar","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Al-Shareeda, M.A., Manickam, S., Mohammed, B.A., Al-Mekhlafi, Z.G., Qtaish, A., Alzahrani, A.J., Alshammari, G., Sallam, A.A., and Almekhlafi, K. (2022). Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU). Sustainability, 14.","DOI":"10.3390\/su14169961"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"e3864","DOI":"10.1002\/dac.3864","article-title":"IoT-based wireless body area networks for disaster cases","volume":"33","year":"2020","journal-title":"Int. J. Commun. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"8065","DOI":"10.1109\/JIOT.2019.2902840","article-title":"An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks","volume":"6","author":"Ma","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Mao, Y., Zhou, C., Ling, Y., and Lloret, J. (2019). An optimized probabilistic delay tolerant network (DTN) routing protocol based on scheduling mechanism for internet of things (IoT). Sensors, 19.","DOI":"10.3390\/s19020243"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2189","DOI":"10.1007\/s11276-015-1085-y","article-title":"An adaptive and efficient buffer management scheme for resource-constrained delay tolerant networks","volume":"22","author":"Moetesum","year":"2016","journal-title":"Wirel. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"325027","DOI":"10.1155\/2015\/325027","article-title":"Routing protocols for vehicular delay tolerant networks: A survey","volume":"11","author":"Kang","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s11276-020-02458-1","article-title":"An efficient and intelligent routing strategy for vehicular delay tolerant networks","volume":"27","author":"Singh","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Rehman, G.U., Ghani, A., Muhammad, S., Singh, M., and Singh, D. (2020). Selfishness in Vehicular Delay-Tolerant Networks: A Review. Sensors, 20.","DOI":"10.3390\/s20103000"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Dong, Y., Zhang, F., Lin, J.F., Jiao, W., and Zhang, Y. (2020). Learning for Multiple-Relay Selection in a Vehicular Delay Tolerant Network. IEEE Access 8, 175602\u2013175611.","DOI":"10.1109\/ACCESS.2020.3026373"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Sharma, R., and Gupta, D.V. (2018). A Reputation-Based Mechanism to Detect Selfish Nodes in DTNs. International Conference on Communications and Cyber Physical Engineering, Springer.","DOI":"10.1007\/978-981-13-0212-1_7"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"106646","DOI":"10.1016\/j.compeleceng.2020.106646","article-title":"Survey on blockchain-based applications in internet of vehicles","volume":"84","author":"Mendiboure","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1393","DOI":"10.1109\/JSAC.2021.3065038","article-title":"Age of Information-Based Wireless Powered Communication Networks With Selfish Charging Nodes","volume":"39","author":"Zheng","year":"2021","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Socievole, A., Caputo, A., De Rango, F., and Fazio, P. (2019). Routing in mobile opportunistic social networks with selfish nodes. Wirel. Commun. Mob. Comput., 2019.","DOI":"10.1155\/2019\/6359806"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4182","DOI":"10.1109\/TVT.2020.2968494","article-title":"Dagiov: A framework for vehicle to vehicle communication using directed acyclic graph and game theory","volume":"69","author":"Hassija","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1016\/j.comcom.2020.03.041","article-title":"Vehicle communication network in intelligent transportation system based on internet of things","volume":"160","author":"Zhang","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.physa.2017.12.100","article-title":"An extended two-lane car-following model accounting for inter-vehicle communication","volume":"495","author":"Ou","year":"2018","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Abbasi, I.A., and Shahid, K.A. (2018). A review of vehicle to vehicle communication protocols for VANETs in the urban environment. Future Internet, 10.","DOI":"10.3390\/fi10020014"},{"key":"ref_20","unstructured":"Nguyen, D.H.P., and Zolt\u00e1n, R. (2018, January 13\u201315). The current security challenges of vehicle communication in the future transportation system. Proceedings of the IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Nakazawa, T., Tang, S., and Obana, S. (2020). CCN-based inter-vehicle communication for efficient collection of road and traffic information. Electronics, 9.","DOI":"10.3390\/electronics9010112"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TII.2022.3188963","article-title":"A secure data sharing scheme in Community Segmented Vehicular Social Networks for 6G","volume":"19","author":"Khowaja","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Khan, W.U., Jamshed, M.A., Lagunas, E., Chatzinotas, S., Li, X., and Ottersten, B. (2022). Energy efficiency optimization for backscatter enhanced NOMA cooperative V2X communications under imperfect CSI. IEEE Trans. Intell. Transp. Syst.","DOI":"10.1109\/TITS.2022.3187567"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"7862","DOI":"10.1109\/TII.2022.3161029","article-title":"NOMA-enabled backscatter communications for green transportation in automotive-industry 5.0","volume":"18","author":"Khan","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Chakrabarti, C., and Basu, S. (2019, January 4\u20137). A blockchain based incentive scheme for post disaster opportunistic communication over DTN. Proceedings of the 20th International Conference on Distributed Computing and Networking, Bangalore, India.","DOI":"10.1145\/3288599.3295584"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"109026","DOI":"10.1109\/ACCESS.2019.2933873","article-title":"IPS: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov)","volume":"7","author":"Rehman","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"e4191","DOI":"10.1002\/ett.4191","article-title":"Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks","volume":"32","author":"Rehman","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"e4455","DOI":"10.1002\/dac.4455","article-title":"SOS: Socially omitting selfishness in IoT for smart and connected communities","volume":"36","author":"Rehman","year":"2020","journal-title":"Int. J. Commun. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"214","DOI":"10.2991\/ijndc.k.200925.001","article-title":"Secure Communications by Tit-for-Tat Strategy in Vehicular Networks","volume":"8","author":"Mostefa","year":"2020","journal-title":"Int. J. Networked Distrib. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"5932183","DOI":"10.1155\/2018\/5932183","article-title":"A secure incentive scheme for vehicular delay tolerant networks using cryptocurrency","volume":"2018","author":"Park","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"6377","DOI":"10.1109\/TVT.2015.2477164","article-title":"A secure credit-based incentive mechanism for message forwarding in non-cooperative DTNs","volume":"65","author":"Chen","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/TMC.2016.2546910","article-title":"On the design of a reward-based incentive mechanism for delay tolerant networks","volume":"16","author":"Seregina","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_33","first-page":"168","article-title":"Selfish dynamic punishment scheme: Misbehavior detection in MANETs using cooperative repeated game","volume":"20","author":"Sharah","year":"2020","journal-title":"IJCSNS"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"753024","DOI":"10.1155\/2014\/753024","article-title":"Social contribution-based routing protocol for vehicular network with selfish nodes","volume":"10","author":"Gong","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Men, C., Yu, H., and Cheng, X. (2015, January 26\u201327). A secure credit-based incentive scheme for opportunistic networks. Proceedings of the 7th IEEE International Conference on Intelligent Human-Machine Systems and Cybernetics, Hangzhou, China.","DOI":"10.1109\/IHMSC.2015.94"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Loudari, S., Abouhassane, A., Benamar, N., and Younis, M. (2019, January 19\u201321). DASH: A Distributed Approach for Selfishness Handling in a DTN. Proceedings of the 2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM), Manama, Bahrain.","DOI":"10.1109\/MENACOMM46666.2019.8988586"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Park, S., Aslam, B., and Zou, C. (2011, January 9\u201312). Long-term reputation system for vehicular networking based on vehicle\u2019s daily commute routine. Proceedings of the 2011 IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2011.5766507"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1186\/1687-1499-2014-88","article-title":"Performance evaluation of a cooperative reputation system for vehicular delay-tolerant networks","volume":"1","author":"Dias","year":"2014","journal-title":"Eurasip J. Wirel. Commun. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1007\/s11277-013-1443-y","article-title":"A dempster\u2013shafer based tit-for-tat strategy to regulate the cooperation in vanet using qos-olsr protocol","volume":"75","author":"Wahab","year":"2014","journal-title":"Wirel. Pers. Commun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.comcom.2017.02.008","article-title":"Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs","volume":"104","author":"Otrok","year":"2017","journal-title":"Comput. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1016\/j.adhoc.2011.12.010","article-title":"ICARUS: HybrId inCentive mechAnism for coopeRation stimUlation in ad hoc networkS","volume":"1","author":"Charilas","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1080\/17445760.2013.852194","article-title":"A novel hybrid incentive mechanism for node cooperation in mobile cyber-physical systems","volume":"29","author":"Wang","year":"2014","journal-title":"Int. J. Parallel Emergent Distrib. Syst."},{"key":"ref_43","first-page":"1629","article-title":"Open-source network simulation tools: An overview","volume":"2","author":"Gupta","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET)"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/1\/99\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T13:16:45Z","timestamp":1723382205000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/1\/99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,22]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["s23010099"],"URL":"https:\/\/doi.org\/10.3390\/s23010099","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,12,22]]}}}