Next Article in Journal
Learning Observer-Based Sensor Fault-Tolerant Control of Distributed Generation in an Islanded Microgrid for Bus Voltage Stability Enhancement
Next Article in Special Issue
Reconfigurable Intelligent Surface-Aided Cooperative NOMA with p-CSI Fading Channel toward 6G-Based IoT System
Previous Article in Journal
Domain Feature Mapping with YOLOv7 for Automated Edge-Based Pallet Racking Inspections
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything

by
Ashwin Balaji
1,
Sanjay Kumar Dhurandher
1 and
Isaac Woungang
2,*
1
Department of Information Technology, Netaji Subhas University of Technology, New Delhi 110078, India
2
Department of Computer Science, Toronto Metropolitan University, Toronto, ON M5B 2K3, Canada
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(18), 6928; https://doi.org/10.3390/s22186928
Submission received: 3 August 2022 / Revised: 6 September 2022 / Accepted: 7 September 2022 / Published: 13 September 2022
(This article belongs to the Special Issue Recent Advances in Next Generation Wireless Sensor and Mesh Networks)

Abstract

:
The Internet of Everything (IoE) is a smart system that interconnects smart entities by incorporating low-cost or low-energy gadgets that are useful for communication with people, processes, data, and devices/things. In such an instantaneously connected environment, network-enabled heterogeneous devices may exhibit non-cooperative behaviour which may lead to the degradation of the network. To address this performance degradation, the proposed Post-quantum based Incentive technique for Non-cooperating nodes in internet of Everything (PINE) protocol provides an end-to-end reliable solution by incorporating location-aware post-quantum encryption in these networks while addressing the non-cooperative behaviour of the nodes by employing an effective strategy in a bi-directional multi-hop relay environment. This proposed protocol further aims to evaluate the consequences of non-cooperative nodes by considering various metrics, namely, number of nodes, message size, execution time, memory consumption, average residual energy, percentage of selfish nodes, and blackhole nodes detection, aiming to achieve significant accuracy in an IoE environment.

Graphical Abstract

1. Introduction

The Internet of Everything (IoE) (shown in Figure 1) is a network of sensor devices that collect and exchange data or information without the need for human engagement [1]. IoE refers to the intelligent interconnection of people, processes, data, and digital objects. In addition, the Internet of Things (IoT) is a network of billions of things and devices that use various wired and wireless network protocols [2] to detect, measure, and analyse their state in public or private networks [3,4]. By the next decade, it is expected that our technological future will be made of a variety of appliances, devices, and beings that are all connected to the Internet [1]. However, if we can determine the true distinction between IoT and IoE, the IoT focuses on physical objects and entities interacting with one another, while the IoE provides the smart network to connect all of these principles into a single system [3,4]. The IoT has been restricted to automating Machine-To-Machine communication or devices [2] whereas, IoE involves Machine-To-Machine (M2M), Person-To-Machine (P2M), and Person-To-Person (P2P) connections [1]. As a result, phones, tablets, and computers as well as data, people, and business processes all contribute to this intelligent ecosystem. The IoE ecosystem can be applied to various use cases, including but not limited to education, transportation [4,5], entertainment, defence [4], smart environments [6], healthcare devices [6], etc., all these becoming heterogeneous smart nodes that communicate with another in the network [3,4].
In a world where everyone and everything is increasingly connected, wired and wireless network domains generate enormous opportunities to uncover network connectivity gaps. This network environment generates a very large amount of data, which are exposed to different types of cyber attacks due to the expansion in information and communication technology. Malevolent entities, including but not limited to bots, people, and network devices, may wish to exploit such flaws. Data security and privacy are seen as critical components in establishing trust between gadgets and humans. Meanwhile, the Internet of Things is delivering a torrent of data, and safeguarding all of it is a difficult task. Cyber-crime and security breaches are increasing rapidly as a result of the exponential or unfettered expansion of technology. Most businesses are aware of their digital flaws, however, due to the high level of sophistication involved in executing a network assault, they tend to overlook or have little control over digital security. Because the global cyber-security industry is expected to be worth more than USD 20 trillion by 2025, and cyber-crime will cost more than USD 5 trillion, a proactive approach may be necessary to recover and mitigate dynamic unpredictable threats in IoE, IoT, and cloud computing, which together are expected to add more than USD 30 trillion to the global economy [7]. In Figure 2, cyber attackers attempt to exploit the vulnerability and jeopardise the dependability of the IoE network by applying different attacking techniques; the IoE architecture must be defensive enough to withstand such types of attacks and avoid economic loss.
Wireless Sensor Networks (WSNs) are a cooperative network of many sensor devices that interact over a short distance to share data either with or without an internet gateway [8]. The WSN ecosystem has expanded exponentially over the years, promoting advancement in the field of Information and Communication Technology (ICT) [4] and leading to the emergence of different types of networks, for instance, Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs), Internet of Things (IoT), Internet of Everything (IoE), and Opportunistic Networks (OppNets) [9,10,11], to name only a few, all of which have numerous use cases. As ICT influences people’s daily lives, it has an implicit impact on the macro-economic growth of society as well.
Before progressing further, it is crucial to identify, supervise and eliminate the factors responsible for creating security concerns in wireless networks in order to build a strong and transparent relationship among the involved entities and develop an impenetrable ecosystem. Delicate factors that are mainly responsible for susceptibility include data integrity, device heterogeneity, data management, ownership and access control, synchronization, location spoofing, hardware/software tampering, and power or energy constraints [12,13,14,15,16]. With the fast expansion of smart devices employed in numerous technical domains, both heterogeneity and energy consumption have increased tremendously [17]; energy efficiency is a critical factor in sensor-based networks [18]. Understanding how energy is being consumed by sensor nodes allows for modelling and deployment of effective solutions for evaluation, the intent being to align with real-world sensor network applications. To identify non-cooperative nodes [19], an approach that can integrate an efficient processing algorithm for energy calculation and communication-routing protocols is required [20], with the feedback taking the form of incentives from the neighbour nodes to overcome energy shortages [21].
There are primarily two types of data encryption techniques: symmetric and asymmetric (or public key) cryptography. AES, DES, RSA, ECC, and other famous algorithms assist in protecting against data security breaches. All of these cryptographic approaches, however, are insufficient to guard against quantum assaults [22]. The quantum algorithm of Shor and Grover is noteworthy for breaking symmetric and asymmetric key cryptosystems that are based on integer factorization and discrete logarithmic computational problems. Shor’s period-finding technique mainly relies on quantum superposition, or the ability to exist in several states at the same time [22]. Traditional key exchange, encryption, and signature systems are ineffective in dealing with massive amounts of IoE data and can be easily breached. The worst-case hardness [23] of solving geometrical problems over high-vector lattices, such as the Shortest Vector Problem (SVP) and the Closest Vector Problem (CVP) [24,25], both of which rely on the evaluation of a basis function on the lattice [23], is the cornerstone of lattice cryptography. Lattice vectors create a lattice grid by generating a large number of mathematical basis vectors. Due to the great complexity of the lattice grid, quantum computers may or may not be able to solve these problems [26]. Additionally, reducing a problem from worst-case to average-case offers an advantage in integrating learning with errors (LWE) [25] and lattice-based cryptography for applications to real-world security challenges in a trouble-free manner, eventually leading to the creation of a fail-safe cryptographic system especially suited for the breakneck IoE ecosystem.

1.1. Motivation and Contributions

According to various findings and studies, the main real-time network vulnerability that must be addressed and eliminated to allow secure end-to-end IoE communication, apart from data leakage, data alteration, and eavesdropping, is the non-cooperation of the nodes in the network. As such, it is crucial to identify misbehaving network nodes by employing incentive-based or reward-based mechanisms to promote the participation of honest nodes in the network as much as possible, with the intent of achieving network veracity. When numerous active and passive network threats are combined with the capabilities of quantum computers, the network becomes unstable, putting secrecy and integrity at risk. To offer resilience against network gaps discovered during end-to-end IoE communication, a technique is required to identify dishonest entities while maintaining post-quantum end-to-end reliability. Furthermore, to the best of our knowledge no studies in the existing literature have addresses this particular issue in the Internet of Everything context using post-quantum geo-encrypted end-to-end data communication. Taking the above into account, the PINE protocol is proposed to solve the aforementioned security concerns through the following contributions:
  • In order to maintain data confidentiality, integrity, and availability in a communication network, the protocol integrates a future-safe end-to-end lattice geo-encryption technique in a bi-directional multi-hop mobile relay IoE network to deliver a confidential message from the sender(s) to the receiver(s) and vice versa.
  • The protocol demonstrates a robust attack model which reports non-cooperative relay nodes to the sender node and mitigates such nodes with the assistance of the direct and overheard network information (NetInfo), which contains the details of the Node-Id, EnergyStatus, PacketForwardCount, PacketDropCount, Timestamp, and Incentive accumulated by the relay node and the relay node’s neighbour (known as neighbour-relay nodes).
  • Decisively, the sender node is liable for generating incentives (in the form of currency) for the cooperative or non-cooperative nodes by comparing the direct and overheard NetInfo received from both the relay and neighbour-relay nodes.
  • The sender maintains an Incentive Table (InTab) to facilitate further judgement in choosing the nodes and flooding the resulting incentive value to the respective nodes based on both direct and overheard NetInfo. By employing such a strategy, the sender and forwarding nodes can make intelligent decisions to select the next worthy hop.
  • The protocol further addresses and defends against non-cooperation network attacks namely, Type-III selfish attacks and blackhole attacks.

1.2. Paper Organization

This research article is organized as follows: (1) Section 2 provides a literature survey explaining the recent advancements in the field of post-quantum and energy-aware networks. (2) Section 3 explains the proposed PINE protocol and describes various other aspects related to the protocol. (3) The paper concludes in Section 4 by providing an evaluation and analysis of the protocol considering various important metrics.

2. Literature Survey

This section presents a survey of the recent literature and contributions associated with the proposed research work; an extensive overview of the survey is provided in Table 1.
A series of recent studies have indicated that, despite the surging interest in relay-enabled IoT networks, there is limited exposure available in this research area. As far as IoT relays are concerned, nodes are primitively meant for data forwarding. Relays can be broadly categorized as mobile relays, for example, Vehicle-to-Vehicle (V2V), Pedestrian-to-Vehicle (P2V), or immobile relays such as Vehicle-to-Infrastructure (V2I) and Pedestrian-to-Infrastructure (P2I) relays. Moreover, immobile relays can become mobile, as can be extensively seen in the environment, for example, Infrastructure-to-Everything (I2X), Pedestrian-to-Everything (P2X), etc. It should be noted that when operating a mobile wireless network involving resource-constrained nodes, resources must be preserved and managed to improve energy efficiency, memory, communication latency, and transmission speed in order to avoid performance challenges [27,28,29,30]. Network relay nodes can alleviate overload in the wireless network. The installation of relays between wireless end-point devices, especially IoT, can increase network quality. Furthermore, the energy consumed in single-hop long-distance communication can be minimized if the relays listen to intermediate nodes in order to pass the message, especially for longer distances and durations [27]. Hence, to maintain the network constancy an effective protocol must be defined to save node resources.
Considering the major aspects of the proposed P I N E protocol, the literature survey can be broadly categorized into two major parts:
A. Post-quantum-based Geo-encryption: The term geo-encryption, otherwise known as location-aware encryption, refers to an encryption technique in which the cipher-text may only be decrypted at certain latitude and longitude coordinates. When the data are decrypted from a different location, the decryption attempt fails and no information about the plain-text is revealed. It is crucial and challenging to preserve the location privacy, especially when the network nodes are in mobility [14,31,32]. While it is impossible to completely avoid network attacks in such an environment, the impact of attacks over the network can be diminished by employing effective secure data transmission in the network [32]. Wireless networks are considered to be more vulnerable to security assaults than conventional networks. Shabbir et al. [12] explain that the wireless network is considered to be the foundation of the emerging networks, namely, MANETs. Hence, it is implied that IoE acquires all the security threats to which wireless networks are susceptible, not only those limited to MANETs. In order to protect data transmission between the sender and receiver, various security techniques have been proposed, including public/private-key cryptography, authentication, digital signatures, etc., for use in resolving distinct network-related issues.
A survey on various security threats and authentication approaches to WSNs was conducted by Karakaya et al. [33]. The authors discussed various security attacks, namely, information spoofing and modification, sinkhole attacks, sybil attacks, selective packet forwarding, wormhole attacks, and flood attacks. They reviewed various authentication protocols for WSNs, namely, SNEP, μ T E S L A , SPINS, and LEAP. However, the authors diverged from discussing non-cooperating nodes and the importance of post-quantum encryption, instead directing future researchers to implement low-cost and high computational power lightweight post-quantum-based protocols to protect the network. Another survey conducted by Seyhan et al. [30] concentrated on the impact of lattice-based cryptosystems in resource-constrained IoT devices. The authors thoroughly discussed the current trends, usage, applicability, and efficiency of lattice cryptosystems in resource-constrained IoT devices.
Barreto et al. [34] proposed a post-quantum-based U B K security credential management system q S C M S to facilitate the provisioning process for V 2 X . The authors claimed that Elliptical Curve Cryptography ( E C C ) is susceptible to quantum attacks, which may breach privacy and authenticity in such a scenario. The protocol focuses on protecting the confidentiality and integrity of the private key and certificate. However, it is deficient in addressing and dealing with blackhole attacks and with non-cooperative vehicles in real-time.
In another analysis, Mi et al. [35] implemented a privacy-preserving scheme using N T R U to safeguard location-based querying in VANETs. The authors integrated the advantages of N T R U and 1-Out-n oblivious transfer to secure the location queries. However, the model is insufficient to demonstrate the challenges due to non-cooperative nodes.
A solution demonstrated by Agarkar et al. [36] utilized a lightweight R-LWE-based privacy-preserving scheme for prosumer-side networks in a smart grid IoT ( L R S P P P ) . Although, the model is secure against man-in-the-middle (MITM), denial of service (DoS), and replay attacks, the authors reported that it could not identify or mitigate the node selfishness in the network.
In an alternative strategy, Srivastava et al. [37] developed an end-to-end lattice-based security solution for hierarchical DTNs. To secure inter- and intra-cluster communication in DTNs, the authors described such different schemes as identity-based key agreement, identity-based key update, and non-interactive key agreement. Employing such a strategy, their model successfully prevented MITM, replay, dictionary, and parallel session attacks, and was able to maintains forward and backward session key secrecy. However, the model falls short of providing a solution to identifying and handling non-cooperative nodes in the network employing lattice-based geo-encryption.
A privacy-preserving authentication scheme implemented by Mundhe et al. [38] offers security against quantum attacks by employing efficient ring signature-based conditional privacy-preserving authentication ( R C P P A ) in VANETs to achieve vehicle authentication, conditional privacy, and message authentication. Conditional privacy achieves non-repudiation in the scheme, which determines the real identity of the malicious vehicle and ensures anonymity and unforgeability. The RCPPA scheme provides security against various attacks, namely, impersonation, replay, modification, and MITM attacks. However, the work does not address end-to-end lattice geo-encryption to determine and manage misbehaving vehicles in the network.
In another proposed work, Chen et al. [39] developed a lattice-based distributed pseudonym updating and vehicle certificate revocation mechanism (V-LDAA) for VANETs. V-LDAA counters Trusted Platform Module (TPM) theft attacks and provides user-controlled anonymity, unlinkability, and unforgeability against quantum attacks. Although the model addresses lattice security and misbehaving vehicles, it is inadequate to support end-to-end lattice geo-encryption.
Lizardo et al. [40] proposed a Sharelock protocol to secure end-to-end security in IoT group communications in support of message exchange and storage in nodes that are communicating through untrusted edge nodes. Their protocol describes the impact of quantum-based attacks in the future. The protocol employs authenticated NTRU encryption to attain 128-bit post-quantum security. Although Sharelock considers various active and passive attacks, namely, eavesdropping, replay attacks, and key manipulation, it is deficient against blackhole attacks in lattice-based location-aware encryption, as the authors assume cooperativeness in their approach.
Session-key negotiation was implemented by Zhu et al. [41] utilizing NTRUEncrypt security and was applied to an in-vehicle microcontroller. The approach used by the authors focused on comparing existing session key negotiations algorithms, namely, RSA and ECDH, in order to analyze performance and efficiency considering key generation time, key negotiation time, and memory occupation. However, this approach lacks lattice-based geo-encryption and is insufficient to address selfish nodes and blackhole attacks.
B. Selfish node mitigation and Incentive mechanism: One of the challenging aspects of demonstrating an end-to-end bi-directional IoE relay network, apart from addressing lattice-based post-quantum geo-encryption, is the detection and mitigation of selfish nodes. There have been many surveys explaining the significance of monitoring the network and isolating selfish nodes. It is crucial to introduce countermeasures against misbehaving nodes and selfishness with the aim of verifying the correctness and integrity of network operations [42]. In multi-hop communication, establishing cooperation and coordination among the self-operated nodes is a challenging task. In such a network, smart nodes are typically operated by utilizing confined resources, namely, energy, processing, storage, and bandwidth for message forwarding. Smart nodes may refrain from cooperating, especially in a mobile environment, becoming liable for degraded network performance and leading to disruption of data gathering and information exchange rates, unbalanced work distribution, and rising end-to-end delay [19]. Misbehaving node solutions are broadly categorized as preventive-based and detection-based techniques. Of these, incentive-based solutions are classified into three different types, namely, reputation-, credit-, and barter-based methods [19,43,44]. Furthermore, there are three different types of selfish node-based attacks in MANETs [19,45,46,47], which are mentioned below:
  • Type-I: The selfish nodes send regular control data packets during the route discovery and maintenance stages, but do not participate as relay nodes in forwarding the data packets. Such nodes are regarded as extremely hazardous to the overall routing operations. These nodes first participate in route discovery, then subsequently repudiate the provision of relay services for others. Packet drops and end-to-end delay are greatly escalated in such scenarios. It is feasible that selfish nodes might not adopt non-cooperative feedback for all nodes, and instead aim only at a particular set of nodes. One of the most important reasons for this is social approval or disapproval.
  • Type-II: The selfish nodes do not engage in data transmission for other nodes, either during the route discovery or route maintenance stages. These nodes exclusively utilize their energy to power their own data processing and transmission. Routing protocols often do not take such nodes into account. This class of selfish nodes might not receive or transmit any route information. These nodes have the potential to significantly deteriorate data transmission traffic and network connectivity.
  • Type-III: These nodes modify their amount of cooperation based on their resource levels. At first, these nodes behave as regular nodes. As time passes, the nodes begin to decline to cooperate with others due to a decrease in their resource levels. It is feasible that nodes in a smart ecosystem will associate their remaining energy levels with their selfishness levels. These nodes are just as hazardous as Type-I selfish nodes. The nodes help in route discovery to establish a network topology, then they subsequently disrupt the data flow by discarding the data packets. Because of these nodes, the routing protocol must restart the route discovery process or choose another alternate path for data transfer.
Thus, it can be assumed that Type-III selfish attacks should be addressed to maintain the network stability.
Fayaz et al. [47] implemented a model for counteracting selfish nodes using a reputation-based system in MANETs to detect and mitigate malicious and selfish nodes against Type-I and Type-II attackers. However, their proposed approach does not address post-quantum data security aspects.
Chen et al. [48] proposed a secure WSN topology protocol called T L E S that is trust-aware and has low energy consumption. The authors explain that the nodes construct the network topology by considering their neighbour’s trust value, residual energy, and distance to the base station. However, while the nodes are not mobile, each node knows the location of peer nodes. The authors claim that the cluster head node determines the next hop by considering the residual energy cost, distance, and degree, aiming to establish a safe, reliable, and energy retaining network. Moreover, the model identifies malicious and selfish node attacks by combining trust factors. However, the model does not address lattice or post-quantum-based location encryption.
Ponnusamy et al. [49] proposed an algorithm for Selfish Node Removal using Reputation Model (SNRRM). Calculation of the reputation, current node energy level, and communication ratio are considered during the routing operation. However, the authors do not discuss the data security aspect during communication in such an environment.
A prediction-based trust management model framework was proposed by Alnumay et al. [50] to facilitate nodes’ construction of a trustworthy route and reliable data delivery in MANET-IoT. To calculate the direct trust, Node A monitors the traffic of all neighbour nodes of Node B in a particular period. Network nodes are categorized as good or bad based on their behaviour. After collecting the trust information from the nodes, a final resultant trust is calculated using the ARMA/GARCH likelihood function. The model addresses various attacks, namely, address spoofing, selfish attacks, byzantine/blackhole/DoS attacks, and sleep deprivation attacks. However, the proposed trust management framework does not replace cryptography, instead adding an extra layer of security to the MANET-IoT.
A quantitative investigation performed by Shan et al. [51] considered mobility, density, proportion, and a combination of selfish nodes, with the goal of evaluating the impact of dynamic node selfishness due to energy consumption in MANETs in terms of packet loss, round-trip delay, and throughput. However, this work did not explore the characteristics of data security by employing any post-quantum-based encryption techniques.
A performance evaluation performed by Dias et al. [52] explains a cooperative reputation system for vehicular delay-tolerant networks (VDTNs) that can allow network nodes to detect, identify, and mitigate contacts with selfish or misbehaving nodes by applying a reputation system. In the control phase, the control information, namely, node type, geographical location, route, speed, supported link technology properties, energy status, and buffer status are all considered. Finally, the reputation system accepts or discards a node’s contact based on a comparison of the node’s reputation score against the network reputation threshold. Hence, a reputation score is used to categorize nodes as accepted, denied, or blacklisted. However, the model is insufficient when handling post-quantum data security aspects and blackhole attacks.
Rehman et al. [53] developed an Incentive and Punishment Scheme (IPS) mainly focused on the participation of the nodes in network operations. An elected node supervises the other nodes’ behaviour by considering their active participation status, i.e., the sending and receiving of messages in the network. Selfish nodes have a chance to cooperatively participate in the network; if a node repeatedly shows selfish behaviour, it is removed from the cluster and a node removal message is broadcasted within the cluster. However, this scheme is insufficient for post-quantum-based data security and blackhole attacks.
Kumar et al. [54] proposed an altruism-based trust-dependent message forwarding protocol (ATDTN) for opportunistic networks in which a dynamically changing altruism trust value is derived from the node’s participation in message forwarding. The altruism value of a node in a social context is dependent on various attributes, namely, empathy, reputation, kinship, anonymity, activeness, cost, personal enmity, and future prospects. However, while the authors elaborately addressed the perspective of altruism in the wireless network, they did not address post-quantum-based data security.
Dhurandher et al. [55] proposed a message trust-based secure multipath routing protocol for opportunistic networks (MT-SMRP). Their protocol scheme relays the message to the destination via disjoint paths and applies a soft encryption technique without key exchange to protect the network from blackhole, greyhole, and message fabrication attacks. Although the protocol implements a lightweight encryption approach for constrained devices, in the post-quantum era this model may fall short for handling quantum attacks.
A trust-based security approach was proposed by Kandhoul et al. [56] for opportunistic IoT (T_CAFE) to defend networks against several attacks, namely, sybil, bad-mouthing, good-mouthing, blackhole, and packet fabrication attacks. The trust value was computed by utilizing the direct and indirect trust to categorize nodes as benign or malicious. However, this model may not be secure against post-quantum attacks, as it neglects the relevant data security aspects.
Kandhoul et al. [57] implemented an efficient and secure data forwarding mechanism with the aim of providing security against blackhole and packet fabrication attacks in O p p I o T by applying a G F R S A -based secure routing protocol. The protocol performs content-based security for encrypting messages using RSA asymmetric cryptography, energy-aware secure routing, and other proactive measures to mitigate blackhole and packet-fabricating nodes. However, this model is insufficient for protection against post-quantum attacks.
Kim et al. [21] proposed a node status and score-based route optimization protocol (NSSROP) to select the best relay nodes while choosing the routing paths. In their protocol, a node’s reputation is calculated based on its energy and information related to the possible routes for relay selection. If the reputation value of a node is less than a prescribed threshold, that node is isolated and categorized as selfish. However, the proposed protocol does not address protection against post-quantum attacks.
Table 1. Overview of literature survey.
Table 1. Overview of literature survey.
ReferencesFeaturesDrawbacksExperimentationAttack Model
Barreto et al. [34]Post-quantum lattice-based butterfly-key expansion in SCMS for V2X.
Protecting the confidentiality of the key and certificate, integrity of the pseudonym certificate, and unlinkability of the pseudonym certificate.
Does not address lattice-based geo-encryption.
Deficient against selfish node and blackhole attacks.
Software simulation
Mi et al. [35]NTRU-based privacy-preserving scheme to protect location-based querying in VANETs.
Location queries are secured using 1-Out-n Oblivious transfer.
The model lacks protection against non-cooperative nodes and blackhole attack.Software simulationAuthentication attack
Agarkar et al. [36]Security and privacy are preserved using the lightweight R-LWE lattice technique for the prosumer network in smart-grid IoT.Lacks security against node selfishness and blackhole attack.Software simulation1. MITM attack
2. DoS attack
3. Replay attack
Srivastava et al. [37]End-to-end lattice-based security for hierarchical DTNs.
Inter and intra-cluster security using identity-based key-agreement and update scheme, non-interactive key-agreement scheme.
Location-aware lattice LWE encryption is not addressed.
Lacks security against selfish nodes and blackhole attacks.
Software simulation1. MITM attack
2. Replay attack
3. Parallel session attack
4. Dictionary attack
Mundhe et al. [38]A lattice ring signature-based privacy-preserving authentication (RCPPA) scheme for VANETs.
Determines the real identity of the malicious vehicle and ensures anonymity and unforgeability.
Does not address Blackhole attacks.
Scheme lacks lattice based geo-encryption.
NS-31. Impersonation attack
2. Replay attack
3. Modification attack
4. MITM attack
Chen et al. [39]Lattice-based pseudonym update and certificate revocation (V-LDAA) for VANETs. Provides anonymity, unlinkability, and unforgeability against quantum attacks.Insufficient against blackhole attacks.Software simulation
Lizardo et al. [40]Sharelock protocol to provide end-to-end security in group IoT communications.
NTRU based authenticated encryption.
Location-aware lattice-based encryption is not addressed.
Deficient against node selfishness and blackhole attacks.
MICAz sensor1. Eavesdropping
2. Key manipulation
3. Replay attacks
Zhu et al. [41]NTRUEncrypt based session-key negotiation to the In-Vehicle controller.
Analysis of performance parameters in terms of key-generation time, key-negotiation time and memory consumption.
Absence of location-aware lattice encryption.
Insecure against misbehaving nodes and blackhole attacks.
Infineon AURIX TriBoard TC397
Fayaz et al. [47]Reputation-based framework to detect selfish nodes by computing each node’s Contribution-to-Consumption ratio.Deficiency of geo-encrypted post-quantum based data security.NS-2Selfish attack
Chen et al. [48]A trust-aware and low-energy consumption protocol (TLES) for WSNs.
Network topology is constructed by considering neighbour’s trust value, residual energy, location, distance and degree.
Lack of mobility model and location-aware lattice encryption.
Insecure against blackhole attacks.
Software simulation1. Selfish attack
2. Node compromise detection
Ponnusamy et al. [49]Selfish Node Removal using Reputation Model (SNRRM) algorithm for MANETs.
Reputation is computed using the node’s current energy level and the communication ratio during the routing operation.
Location-aware lattice encryption is not addressed.
Deficient against blackhole attack.
NS-2Selfish attack
Alnumay et al. [50]A prediction-based trust management model framework to construct a trustworthy route and reliable data delivery in MANET-IoT.
Network nodes are categorized as good and bad behaviours. Final trust is calculated using ARMA/GARCH likelihood function.
Need for location-aware lattice-based encryption.NS-21. Address spoofing
2. Selfish attack
3. Byzantine, Blackhole, DoS attack
4. Sleep deprivation attack
Shan et al. [51]Considered mobility, density, proportion, and combination of selfish nodes intending to evaluate the impact of dynamic node selfishness due to energy consumption in MANETs.Lack of lattice-based geo-encryption.Omnet++Selfish attack
Dias et al. [52]Performance evaluation of a cooperative reputation system for VDTNs.
Detect, identify, and mitigate contacts with selfish or misbehaviour nodes using the reputation system.
The control information considered are node type, geographical location, route, speed, supported link technologies properties, energy status, and buffer status.
The reputation system accepts or discards the node’s contact based on the reputation score.
Neglects post-quantum location-aware security.
Does not address blackhole attacks.
VDTNsim ToolSelfish attack
Rehman et al. [53]Incentive and Punishment Scheme (IPS) to allow participation of a node in network operations.
The elected node supervises the other node’s behaviour.
Lack of lattice-based data security.
Insufficient to handle blackhole attacks.
VDTNSim ToolSelfish attack
Kumar et al. [54]Protocol to perform altruism-based trust-dependent message forwarding (ATDTN) for OppNets.
Altruism value is dependent on attributes such as empathy, reputation, kinship, anonymity, activeness, cost, personal enmity, and future prospects.
Altruism trust is derived by considering the node participation in message forwarding.
Neglects end-to-end post-quantum based geo-encryption.ONE simulatorSelfish attack
Dhurandher et al. [55]A message trust-based secure multipath routing protocol for opportunistic networks (MT-SMRP).
Protocol relays the message to the destination via disjoint paths and applies a soft-encryption technique.
Protocol lacks lattice-
based security.
ONE simulator1. Blackhole attack
2. Grey-hole attack
3. Message-fabrication attack
Kandhoul et al. [56]A trust-based security approach T_CAFE for OppNets.
Trust value is computed by utilizing the direct and indirect trusts to categorise nodes as benign or malicious.
Neglects post-quantum encryption to defend against quantum attacksONE simulator1. Blackhole attack
2. Sybil attack
3. Bad-mounting and Good-mouthing attack
4. Fabrication attack
Kandhoul et al. [57]An efficient data-forwarding technique applying GFRSA-based routing protocol for OppIoT.
Content security using RSA, energy-aware routing, and detection and isolation of blackhole and packet-fabricating nodes.
The protocol is insufficient to defend against quantum attacks.ONE simulator1. Blackhole attack
2. Packet fabricating attack
Kim et al. [21]A score-based route optimization protocol (NSSROP) to select the best relay nodes while choosing paths.
Computes reputation using parameters, namely, energies and possible routes for relay selection.
If reputation is less than threshold, the nodes are tagged as selfish.
Insufficient to defend against post-quantum attacks.MATLABSelfish attack

3. Proposed Approach—PINE Protocol

3.1. Node Characteristics

  • Sender node ( S ) : The sender creates a lattice-encrypted message for the receiver. It intelligently decides and forwards the encrypted message to the next available cooperative node. It generates the incentives for all the relay nodes involved in message-passing at the end of the communication cycle. The sender node combines direct and overheard information to calculate the resultant incentive of the network nodes involved in message-passing. Finally, an I n T a b is maintained to choose the right nodes.
  • Forwarding nodes ( F j ) : These nodes pass the encrypted message to the next hop. Each forwarding node intelligently identifies the next hop by considering the incentive value obtained from interpreting the N e t I n f o , intending to minimize the communication with maliciously behaving nodes. At the end of the communication cycle, F j is provided with an incentive based on the network behaviour feedback received at node S, where j = 0 to R 1 .
  • Receiver node ( R ) : The receiver node listens to the channel, receives the encryption message, and decrypts it to analyze the information. After successful/unsuccessful decryption, the receiver sends an acknowledgement or negative acknowledgement (ACK/NACK) packet destined to the sender via the same route by which the packet reached the receiver (known as the bi-directional route). It should be noted that the receiver node possesses the same capability as the sender node, as the receiver can become a sender in future communication with other nodes.
  • Non-cooperative nodes ( N C j ) : These nodes tend to breach network operations to disrupt network stability. These nodes are malicious packet droppers and are involved in circulating direct false N e t i n f o with other nodes, namely, nodes S or F j . These nodes are penalized by node S and may or may not participate in upcoming communication cycles depending on the incentive value.
  • Cooperative nodes ( C j ) : Contrary to N C j , cooperative nodes tend to maintain network stability by not involving themselves in malicious activities such as packet-dropping and by involvement in identifying N C j nodes and reporting them to the S node. Cooperative nodes are involved in communicating the overheard true information with the S node if the direct nodes to S misbehave. Cooperative nodes tend to communicate the direct true N e t I n f o if in contact with node S.

3.2. Assumptions

  • All the nodes in the network are aware of each other’s location through Global Navigation Satellite Systems (GNSS), that is, a node maintains a neighbour table containing the Media Access Control (MAC) address, the Internet Protocol (IP) address, and the location of the neighbours; it transmits this to the neighbour nodes from time to time, promoting location exchange.
  • In the network, non-cooperative nodes N C j are only authorized to alter their residual energy, as the current energy level is in the direct control of N C j , whereas other attributes (except for EnergyStatus, i.e., PacketForwardCount, PacketDropCount, Timestamp and Incentive) are not in the control of such nodes, as such information is monitored and stored by peer nodes.
  • Nodes in the network behave cooperatively at the beginning of the communication sessions, i.e., until network stabilization (refer to Section 3.3.1 and Figure 3), and the network nodes may tend to misbehave after a certain period of time, especially in the operation phase (refer to Section 3.3.2).
  • The incentive procedure performed by node S may happen after certain periodic intervals, though not after every round-trip session cycle in order to reduce the network overhead and save the computing resources. Furthermore, the incentive for the cooperative or non-cooperative relays is communicated through the trusted nodes.

3.3. Protocol Design

The protocol comprises three phases, namely, the Initialization Phase, Operational Phase, and Attack Detection Phase. It is primarily concerned with safe data exchange between mobile IoE devices by addressing issues raised by non-cooperative nodes in an end-to-end bi-directional relay network. To demonstrate our proposed technique, a lattice-based LWE cryptosystem integrated with N e t I n f o while considering the geolocation of the IoE device(s) is considered. In such an environment, it is understood that in the direction of node S to node R, S performs encryption and R decrypts the information, whereas in the direction of node R to node S, R performs encryption and S decrypts the information.

3.3.1. Initialization Phase

  • Before establishing data communication, the S node transmits its IP address i p _ a d d r S , MAC address m a c _ a d d r S , and latitude–longitude L o c a t i o n S G N S S information to node R and in turn requests R’s IP address i p _ a d d r R , MAC address m a c _ a d d r R , and latitude–longitude L o c a t i o n R G N S S information. Node R maintains I n f o S transmitted by S and generates a response for node S. After successfully receiving the response, S maintains I n f o R transmitted by node R to keep track and proceed with message exchange among the connected nodes.
  • During the session time until T i m e T , node S identifies a set of neighbour nodes { N e i g h b o u r S } in a distance range ( D i s t a n c e ) to proceed with communication. Node S requests E n e r g y S t a t u s { N e i g h b o u r S } and L o c a t i o n { N e i g h b o u r S } from all { N e i g h b o u r S } nodes with the aim of learning their energy status and concluding whether such nodes can fulfil the service by acting as forwarding nodes. To this end purpose, node S collects the energy status { N e i g h b o u r S } along with the current distance (calculated using L o c a t i o n { N e i g h b o u r S } ) to greedily nominate the next-hop F j from the set of { N e i g h b o u r S } , i.e., F j { N e i g h b o u r S } , considering the high-energy and low-distance nodes, then transmits the lattice LWE encrypted-text E n c R [58].
  • Further, the selected F j node nominates the next-hop F j + 1 from the set of { N e i g h b o u r F j } or F j + 1 { N e i g h b o u r F j } based on the same rules by which node S selected and nominated F j , using a greedy nomination by considering the low-distance and high-energy, i.e., the F j requests for L o c a t i o n { N e i g h b o u r F j } and E n e r g y S t a t u s { N e i g h b o u r F j } .
  • As it is assumed that all { N e i g h b o u r F j } (known as neighbour-relay(s) to F j ) overhear the information about F j , any node in the set of { N e i g h b o u r F j } overhears the network activities and constructs the N e t I n f o F j profile with respect to relay containing attributes F j , namely, N o d e i d F j , E n e r g y S t a t u s F j , P a c k e t F o r w a r d C o u n t F j , P a c k e t D r o p C o u n t F j , and T i m e s t a m p F j . After E n c R reaches node R, the receiver R generates and transmits ACK/NACK via the same bi-directional route towards node S.
  • Any node employing the P I N E protocol calculates the energy consumption [20] or E n e r g y S t a t u s by negating Equation (1) and/or (2) from the total energy. Moreover, the total energy of a node depends on its energy holding capacity and device efficiency in terms of resource management.
  • In the next step, node S requests the direct and overheard N e t I n f o from the neighbours and distant neighbours to compute the incentives by considering P a c k e t F o r w a r d C o u n t , P a c k e t D r o p C o u n t , and E n e r g y S t a t u s for the respective relay and neighbour-relay nodes utilizing Equation (3) and the updated I n T a b after a certain time T i m e T h r e s h o l d to make decisions for the subsequent communication cycles. Moreover, in the Initialization Phase, all forwarding nodes F j are considered to be cooperative nodes C j , as the network tends to behave non-cooperatively after a time and the protocol encounters non-cooperative nodes N C j mostly in the Operational Phase (refer to Section 3.3.2). Here, exponential decay functions are employed to minimize the incentive value by a consistent rate depicting lower energy of the nodes over a time.
  • This greedy approach is performed to stabilize and socialize with peer nodes. During the initial part of this communication, N e t I n f o is gathered for selecting nodes based on historical information. Thus, this phase is implemented in order to build the historical information for future decisions. Future decisions are determined based on N e t I n f o and incentives generated by node S. Here, Network Stabilization (refer to Figure 3) denotes that each and every node has been involved in any part of the communication cycle or visited at least once in order to avoid null entries in the table. Wireless networks are often prone to node bias, and hence it is crucial to address this case in order to promoting fairness among the nodes.
  • When the network stabilizes, i.e., if no null entries are found, node S can make a clear judgement as to how to identify the next-hop nodes in subsequent communication cycles by considering the direct energy status, incentive, and overheard N e t I n f o (refer to Section 3.3.2) rather than relying on the energy status and distance range. Finally, if there are more packets to send in the upcoming communication cycles, then a new session S e s s i o n I n i t i a l i z a t i o n starts again to transmit a new E n c R to node R.
    This selection and nomination procedure continues until the encrypted text reaches node R, which is elaborated in Algorithm 1.
Algorithm 1 Initialization Phase
1:     S wishes to send an E n c R message to R
2:     Instantiate S and R to perform the communication process
3:     Transmit I n f o S [ i p _ a d d r S , m a c _ a d d r S , l L o c a t i o n S G N S S ] to R
4:      Store R I n f o S
5:      In response, transmit I n f o R [ i p _ a d d r R , m a c _ a d d r R , L o c a t i o n R G N S S ] to S
6:     Store S I n f o R
7:      S performs context-awareness to recognise neighbour nodes using D i s t a n c e
8:      While ( S e s s i o n I n i t i a l i z a t i o n T i m e T   | |  Timeout() ≠ True) do
9:    If  ( R { N e i g h b o u r S } )
10:       Transmit E n c R to R
11:      If  ( N e x t P a c k e t   = =   T r u e )
12:         S e s s i o n I n i t i a l i z a t i o n = S e s s i o n I n i t i a l i z a t i o n + 1
13:      Else
14:        Set S e s s i o n I n i t i a l i z a t i o n = End()
15:      End If
16:    Else
17:      S requests EnergyStatus from all the nodes from the set { N e i g h b o u r S }
18:      Set j = 0
19:      S nominates F j considering high-energy and low-distance nodes, F j { N e i g h b o u r S }
20:       S transmits E n c R to nominated F j , F j S
21:    End If
22:     While  ( R { N e i g h b o u r F j } )  do
23:       F j [ L o c a t i o n { N e i g h b o u r F j } ,   E n e r g y S t a t u s { N e i g h b o u r F j } ]
24:      Select and nominate F j + 1 { N e i g h b o u r F j } , considering high-energy and low-distance,
F j + 1 { N e i g h b o u r F j }
25:      Transmit E n c R , F j + 1 F j
26:      While  ( { N e i g h b o u r F j } E m p t y ( ) )  do
27:        All Overhearing nodes { N e i g h b o u r F j } stores network activities in N e t I n f o F j
28:      End While
29:     j = j + 1
30:     End While
31:    R decrypts E n c R and transmits ACK/NACK via the same bi-directional route to S
32:    S requests for direct and overheard N e t I n f o after receiving ACK/NACK
33:    S computes I n c e n t i v e for the relay nodes using N e t I n f o in Step 32
         I n c e n t i v e C u r r e n t I n c e n t i v e P r e v i o u s + 0 . 5 ( F o r w a r d C o u n t D r o p C o u n t ) l o g 2 ( E n e r g y S t a t u s )
34:    If  ( E x e c u t i o n T i m e ( )   > =   T h r e s h o l d T i m e )
35:      S ← Update I n T a b
36:    End If
37:    If  ( N e t w o r k S t a b i l i z a t i o n = = T r u e )
38:      If  ( N e x t P a c k e t   = =   T r u e )
39:        Call Operation Phase: Algorithm 2
40:      Else
41:        Set S e s s i o n I n i t i a l i z a t i o n = End()
42:      End If
43:    Else
44:       S e s s i o n I n i t i a l i z a t i o n = S e s s i o n I n i t i a l i z a t i o n + 1
45:    End If
46:     End While
E S R = E T r a n s m i t K B i t p a c k e t N R e l a y n o d e s D P a t h l o s s f a c t o r + E R e c e i v e K B i t p a c k e t L O v e r h e a r i n g n o d e s
E S F 1 , 2 , 3 . . R = E T r a n s m i t K B i t p a c k e t D P a t h l o s s f a c t o r + N O v e r h e a r i n g n o d e s E R e c e i v e K B i t p a c k e t
I n c e n t i v e C u r r e n t = I n c e n t i v e P r e v i o u s + 0 . 5 ( F o r w a r d C o u n t D r o p C o u n t ) l o g 2 ( E n e r g y S t a t u s )
I n c e n t i v e C u r r e n t = I n c e n t i v e P r e v i o u s 0 . 5 ( D r o p C o u n t F o r w a r d C o u n t ) l o g 2 ( E n e r g y S t a t u s )

3.3.2. Operational Phase

In the previous phase, the discussion primarily focused on node selection, encryption, nomination, and overhearing during the round-trip communication cycle, i.e., the transmission of R E n c R and SACK/NACK, along with addressing issues with avoiding node bias in the network.
  • To proceed with network operation in a stabilized network for communication cycles, initially, during the session time until T i m e T node S analyzes the information stored in I n T a b and requests E n e r g y S t a t u s from the next worthy hop node N S such that N S { N e i g h b o u r S } based on the incentive. However, before blindly relying on InTab, node S should be aware that the selected hop node from { N e i g h b o r S } may or may not be cooperative, i.e., N S may transmit the direct true or false E n e r g y S t a t u s N S to S when aiming to increase its chances of selection and becoming F j . Therefore, to verify the cooperativeness of N S , S requests the overheard N e t I n f o N S , i.e., N e t I n f o , from the neighbour-relay nodes in order to compare N e t I n f o N S (specifically the E n e r g y S t a t u s N S ) with the direct E n e r g y S t a t u s N S and entries in InTab. If any information mismatch is found, N S is rejected and penalized for responding with direct false information, and S selects, nominates, and verifies the other next available neighbour from { N e i g h b o r S } .
  • Furthermore, if the direct E n e r g y S t a t u s N S requested by node S is aligned with the overheard N e t I n f o N S (specifically the E n e r g y S t a t u s N S ) and InTab, such a node N S is tagged as cooperative F j and S successfully transmits E n c R to F j .
  • The selected and nominated F j performs context-awareness to discover the set of neighbour nodes { N e i g h b o u r F j } ; F j , similar to node S, follows the same procedure for the selection and nomination of F j + 1 . After network stabilization, all the nodes are aware of the incentive value flooded by S; therefore, F j requests the direct E n e r g y S t a t u s N F j from N F j such that N F j { N e i g h b o u r F j } based on high incentive in order to service operations. N F j transmits the direct E n e r g y S t a t u s N F j ; in the meantime, to identify any non-cooperative activity of N F j , F j requests for overheard N e t I n f o N F j (specifically the E n e r g y S t a t u s N F j ) to compare the received direct and overheard information.
  • If any discrepancy is found, F j selects and nominates the next N F j { N e i g h b o u r F j } as F j + 1 based on the fresh direct and overheard information received. All of the { N e i g h b o u r F j } overhears the network activity of packet forwarding or intentional packet-dropping by F j and updates the N e t I n f o F j . It is worth noting that while it may appear that F j is a cooperative node, it might exhibit a non-cooperative behaviour while performing node selection and nomination and forwarding the packet to F j + 1 , not in terms of forging E n e r g y S t a t u s but rather in terms of inability to forward the packet or intentional dropping of the packet. Taking this a step further, if F j successfully transmits E n c R to F j + 1 , then the neighbour nodes of F j increment P a c k e t F o r w a r d C o u n t , or if F j drops the packet while sending E n c R to F j + 1 , every node in the set { N e i g h b o u r F j } increments P a c k e t D r o p C o u n t . Therefore, in the next communication session, packet-dropping nodes have the lowest selection chances based on the final incentive calculated by node S. After a certain time, if ACK/NACK is not received from node R, node S assumes that the packet is lost and requests N e t I n f o from the neighbours and distant-neighbours to inspect the issue of intentional packet dropping by a node or a dead node. If a node intentionally dropped the packet, S refrains from considering the packet-dropping node and tries to retransmit the packet. Certainly, if an overheard N e t I n f o of a node reflects an abundant amount of residual energy and is a node is involved in packet dropping as well, this will raise a red flag.
  • If F j and F j + 1 are both cooperative then, similar to the approach discussed above, N F j + 1 { N e i g h b o u r F j + 1 } has to be selected and nominated as a successor to F j + 1 . For this reason, F j + 1 requests direct information from N F j + 1 and overheard N e t I n f o N F j + 1 from neighbour-relay nodes. If N F j + 1 appears to be non-cooperative after comparing the direct and overheard information, then F j + 1 re-discovers a new path or a new node to promote guaranteed delivery of E n c R to node R. Such false activities are recorded or overheard by the neighbour-relay nodes, including the last recorded T i m e s t a m p . It should be emphasized that the timestamp in the proposed protocol denotes the last updated activity, and is meant to provide resistance against replay attacks. Moreover, I n T a b is revised after a certain threshold time to reduce network overhead. The whole process is discussed in Algorithm 2. Finally, this procedure continues until the selection and nomination of F R 1 occurs.
Algorithm 2 Operational Phase
1:While  ( S e s s i o n O p e r a t i o n a l T i m e T   | |   T i m e o u t ( ) T r u e )  do
2:   S requests for direct and overheard N e t I n f o
3:  S computes I n c e n t i v e for the relay nodes using N e t I n f o in Step 2
4:  If (Incentive ≥ T h r e s h o l d I n c e n t i v e )
5:     If (ForwardCount ≱ DropCount)
6:       I n c e n t i v e C u r r e n t I n c e n t i v e P r e v i o u s 0 . 5 ( D r o p C o u n t F o r w a r d C o u n t ) l o g 2 ( E n e r g y S t a t u s )
7:    Else
8:       I n c e n t i v e C u r r e n t I n c e n t i v e P r e v i o u s + 0 . 5 ( F o r w a r d C o u n t D r o p C o u n t ) l o g 2 ( E n e r g y S t a t u s )
9:    End If
10:  Else
11:     Such nodes are tagged as N C j
12:  End If
13:  S chooses N S { N e i g h b o u r S } by analysing I n T a b
14:  S requests direct E n e r g y S t a t u s from N S and overheard N e t I n f o N S from neighbours of N S to V e r i f y N S
15:  Set V e r i f y N S as T r u e or F a l s e by considering Step 14
16:  If  ( V e r i f y N S = = T r u e )
17:    Set j = 0
18:      F j N S
19:    While  ( R { N e i g h b o u r F j } )  do
20:       F j selects high-incentive node N F j from { N e i g h b o u r F j }
21:       F j [ L o c a t i o n N F j ,   E n e r g y S t a t u s N F j ,   N e t I n f o N F j ] to V e r i f y N F j
22:      Set V e r i f y N F j as T r u e or F a l s e by considering Step 21
23:      If  ( V e r i f y N F j = = T r u e )
24:        If  ( F j  Malicious packet dropper)
25:           F j + 1 N F j
26:          Transmit E n c R , F j + 1 F j
27:        Else
28:          Set T i m e o u t ( ) = T r u e
29:        End If
30:      Else
31:         Choose new N F j , such that N F j { N e i g h b o u r F j } till F j + 1 N F j
32:      End If
33:      While  ( { N e i g h b o u r F j } E m p t y ( ) )  do
34:          All Overhearing nodes { N e i g h b o u r F j } stores network activities in N e t I n f o F j
35:       End While
36:     j = j + 1
37:    End While
38:    R decrypts E n c R and transmits ACK/NACK via the same bi-directional route to S
39:  Else
40:      Choose new N S , such that N S { N e i g h b o u r S } till F j N S
41:  End If
42:  If  ( E x e c u t i o n T i m e ( )   > =   T h r e s h o l d T i m e )
43:    S ← Update I n T a b
44:  End If
45:  If  ( N e x t P a c k e t = = T r u e )
46:      S e s s i o n O p e r a t i o n a l = S e s s i o n O p e r a t i o n a l + 1
47:  Else
48:     Set S e s s i o n O p e r a t i o n a l = End()
49:  End If
50: End While

3.3.3. Attack Detection Phase

In addition to addressing security breaches related to confidentiality, integrity [58], and availability, the P I N E protocol shows resistance and detection against active attacks, i.e., selfish and blackhole attacks.

Selfish Node Detection—Energy Spoofing

  • Following initial network stabilization, node S may proceed with the next communication cycle by requesting E n e r g y S t a t u s N S from { N e i g h b o u r S } . It has been shown that during the network stabilization process, node S collects N e t I n f o from the neighbours and distant neighbours to construct InTab.
  • Node S identifies all the active neighbours and selects and nominates one of the neighbour nodes N S { N e i g h b o u r S } based on the incentive. This selected and nominated N S is assumed to be free from malicious activities by node S, which may or may not be true even after fixing N S as F j .
  • To address the energy-spoofing selfish attack shown in Figure 4 while responding to node S, the activities of N S are overheard by the neighbour-relays and N e t I n f o N S is generated. It should be noted that the overheard information is listened to by all nodes in the set of neighbour nodes { N e i g h b o u r N S } to N S .
  • Node S compares the N e t I n f o N S with the direct E n e r g y S t a t u s N S and I n T a b . If the comparison is found to be T r u e , i.e., no traces of energy spoofing, then N S is finally selected and nominated to be a forwarding node F j . However, if this comparison turns out to be F a l s e , then node S raises a red flag for N S and continues searching for a worthy F j by considering the fresh direct and overheard information of the next worthy node based on the incentive from { N e i g h b o u r S } ; this process continues until a single honest node belonging to { N e i g h b o u r S } is found.
  • If F j is found from the set { N e i g h b o u r S } , then F j further selects and nominates F j + 1 by requesting and comparing the direct E n e r g y S t a t u s N j and overheard N e t I n f o N j , where high-incentive N j { N e i g h b o u r F j } . If the comparison is F a l s e , a new node from the set { N e i g h b o u r F j } is selected and fresh direct and overheard information is requested for comparison. If the comparison turns out to be T r u e , then the same process is continued until F R 1 .
Note: Different color representation in the figure are as follows: (1) Red color: Failed verification/communication interruption or process, (2) Green color: Successful verification/uninterrupted communication or process, (3) Blue color: Active overhearing by the nearby nodes, (4) Brown color: Next node selection.

Blackhole Attack Detection

  • As shown in the previous sections, after the selection and nomination of F j from the set of { N e i g h b o u r S } , node S transmits E n c R to F j and this process continues until the message E n c R reaches node R when considering the energy spoofing scenario.
  • After node S calculates the incentive for relay nodes as shown in Algorithm 2 using Equations (3) and (4), node S forwards the calculated incentive to the relay nodes and these relay nodes further forward the incentive to the neighbour-relay nodes until it reaches all the nodes, with the goal of recognizing the reputation of each node.
  • To proceed with blackhole attack detection (refer to Figure 5), F j requests E n e r g y S t a t u s N F j from a selected node in { N e i g h b o u r F j } such that N F j { N e i g h b o u r F j } . After receiving the E n e r g y S t a t u s N F j , F j further requests the overheard N e t I n f o N F j to verify the E n e r g y S t a t u s N F j and N e t I n f o N F j . If the verification turns out to be T r u e , N F j is selected and nominated as F j + 1 , similar to Figure 4.
  • However, there may be a chance that the forwarding nodes execute an attack not in terms of energy but rather through a malicious packet drop. Apart from the attack discussed in the previous section, such nodes are hazardous to the network as well. Suppose E n c R is maliciously dropped by F j while forwarding the packet to the newly selected and nominated F j + 1 . Employing the same concept, the set of nodes in { N e i g h b o u r F j } , including F j + 1 , recognizes the malicious packet-drop, as the neighbour nodes can overhear the session. Hence, all neighbour nodes { N e i g h b o u r F j } including F j + 1 increments the P a c k e t D r o p C o u n t with respect to F j . If no malicious packet drop is recognized at F j , { N e i g h b o u r F j } , including F j + 1 , increments P a c k e t F o r w a r d C o u n t when E n c R reaches F j + 1 .
  • In the meantime, node S waits for A C K to identify the current status of the network. After the session times out due to packet drop or packet loss, S requests N e t I n f o from its neighbours and distant neighbours to identify the reason for the fault.
  • Node S aggregates and stores N e t I n f o in I n T a b to identify the cause of session time-out. Node S intelligently identifies and concludes that F j (in this case) maliciously dropped the packet at a particular timestamp even though it had sufficient energy to forward the packet. These insights are identified using the N e t I n f o stored in I n T a b containing the attributes EnergyStatus, PacketForwardCount, PacketDropCount, Timestamp, and Incentive. Moreover, the timestamp in the protocol ensures that replay attacks are avoided during session execution [36,37,38]. Furthermore, such packet-dropping nodes are penalized and tagged as non-cooperative N C j . Node S then re-sends the packet E n c R to the next-best hop by analyzing the I n T a b , hence promoting the lowest selection chances of the N C j nodes to maintain network stability.
  • It is worth mentioning that nodes can sometimes tend to drop packets for many unaddressed reasons, one of which can be a blackhole attack. If a node selfishly drops a packet, the node incurs an incentive deduction; however, this does not means that the node cannot participate in the route discovery or maintenance phases in the upcoming sessions, whereas the P I N E protocol allows non-cooperative nodes N C j to behave as cooperative nodes C j in the network by providing incentives. If a node repeatedly drops packets and the calculated incentive is less than the set threshold incentive, the P I N E protocol takes the necessary action by completely ignoring such nodes in subsequent sessions.
Note: Different color representation in the figure are as follows: (1) Red color: Failed verification/communication interruption or process, (2) Green color: Successful verification/uninterrupted communication or process, (3) Blue color: Active overhearing by the nearby nodes, (4) Brown color: Next node selection.

4. Evaluation and Analysis

  • This protocol employs three different scripts written in Python language, namely, sender, forwarding node, and receiver scripts. The sender and receiver scripts are used for executing sender and receiver nodes, whereas the forwarding node script focuses on simulating the relay nodes. Furthermore, our analysis here was conducted by keeping multiple forwarding node scripts to simulate and achieve the results.
  • The protocol was successfully simulated for up to 50 nodes (excluding nodes S and R) considering an energy value of 10,000–20,000 Joules (J) for each node. This protocol has the potential to work for >20,000 J by substantially varying the respective device power and time capability, as it is known that Energy = Power (W)Time (t). Practically, on average the protocol considers a device’s energy capacity of up to 20,000 J, as it provides an experimental simulation to consider even a basic device with computing power. Furthermore, the protocol considers a node to be dead if E n e r g y < 100 J, and thus communication may not be possible with such nodes.
  • The evaluation and analysis of the model was conducted in the below-mentioned simulation environment (refer to Table 2).
Table 2. Simulation environment.
Table 2. Simulation environment.
Computer ModelDell Inspiron 3576
Operating SystemMicrosoft Windows 10 Pro
ProcessorIntel(R) Core(TM) i5-7200U CPU @ 2.50 GHz, 2.712 GHz, 2 Core(s), 4 Logical Processor(s)
Random Access Memory (RAM)16 Giga-Bytes
Read Only Memory (ROM)1 Tera-Bytes
Solid-State Drive (SSD)120 Giga-Bytes
Python Environment IDEScientific Python Development Environment (SPYDER)—Anaconda Platform
MAC Layer802.11
Number of Nodes (Excluding S and R )10–50 Nodes
Transmission Range200 Metres

4.1. Comparison of Execution Time, Memory Consumption, and Average Residual Energy with Message Size

  • For this analysis, the protocol evaluated the results by varying the Message Size (in Characters) to find the effect on the Execution Time (in Seconds) per device Memory Consumption (in Megabytes) and Average Residual Energy (in Joules).
  • The proposed protocol evaluated the results by keeping the session size or communication cycles to a constant value of 100 in order to obtain realistic observations, considering a number of forwarding nodes up to 30.
  • The results were computed by considering up to 30 forwarding nodes to justify the energy consumption with respect to the number of nodes, as it is understood that as the number of nodes in the network increases the energy consumption increases as well, resulting in additional dead nodes. The results here are thus shown for up to 30 forwarding nodes considering 10,000 J for each node.
  • In Table 3 and Figure 6, it can be observed that as the message size increases the protocol execution time increases with it when considering the number of forwarding nodes to be 30. These results show that the protocol takes ≈180 s or 3 min to transmit 10,000 characters of information when considering almost 100 communication cycles.
  • In Table 4 and Figure 7, it can be seen that the protocol consumes more memory for 10 forwarding nodes compared to a higher number of forwarding nodes, namely, 20 and 30, due to the higher memory consumption involved in network stabilization; throughout the process, constant communication is required to perceive the status of the neighbour nodes until I n T a b can be constructed for efficient node selection and nomination in further communication cycles, as outlined in Section 3.3.1. After stabilization, the results show that the memory consumption at each node is directly proportional to message size. Hence, it can be concluded that our proposed PINE protocol provides better results for greater message sizes when considering the trade-off. This result leads to the conclusion that ≈144.19 MB of memory is consumed by each node for transmission of up to 10,000 characters of message when considering 30 forwarding nodes.
  • In Table 5 and Figure 8, the results reveal that as the message size increases the average residual energy needed to execute the protocol decreases when considering up to 30 forwarding nodes. It can be observed that the average residual energy is inversely proportional to the message size, as ≈210.91 J of average residual energy is left among all the forwarding nodes when the message size is 10,000 characters.

4.2. Comparison of Execution Time, Memory Consumption, and Average Residual Energy with Number of Nodes

  • In this analysis, the results were evaluated by varying the number of forwarding nodes to find the effect on the execution time (in Seconds) per device memory consumption (in Megabytes) and average residual energy (in Joules).
  • This proposed protocol evaluated the results by keeping the message size to a constant value of 1000 characters in order to obtain realistic observations by considering a number of sessions or communication cycles up to 300.
  • The results here were computed by considering the energy per node value as 20,000 J considering 50 forwarding nodes, excluding nodes R and S, unlike in Section 4.1, where the energy per node value was considered as 10,000 J for at most 30 forwarding nodes.
  • In Table 6 and Figure 9, it can be observed that the number of forwarding nodes is directly proportional to the total execution time of the protocol for varying session size up to 300 when keeping a constant message size of 1000 characters. These results indicate a maximum execution time of ≈638.23 s or 10 min while communicating with 50 forwarding nodes in the IoE network.
  • In Table 7 and Figure 10, the results reveal that as the forwarding node increases, the memory consumption at each node increases for session size up to 300 to transmit 1000 characters. The protocol shows a maximum memory consumption of ≈145.67 MB for at most 50 forwarding nodes in the network.
  • In Table 8 and Figure 11, the results shows that the number of forwarding nodes is inversely proportional to the average residual energy in the network nodes. The protocol exhibits ≈479.39 J of average residual energy for 50 forwarding nodes.

4.3. Comparison of Selfish Node and Blackhole Detection with Number of Nodes

  • This section presents interesting results obtained by comparing the effect of the number of forwarding nodes with the percentage of selfish nodes and blackhole nodes detected in the IoE network. These results were evaluated by keeping a constant message size of 1000 characters for a session size of up to 300 sessions.
  • Furthermore, these results consider 33 % non-cooperative nodes, namely, selfish or blackhole nodes, to avoid providing network control to non-cooperative nodes, as this can disrupt the network stability, contrary to Section 4.1 and Section 4.2, where all the nodes were assumed to be cooperative throughout the analysis.
  • It should be noted that in this analysis, the energy per node is considered as 20,000 J, as in Section 4.2. Furthermore, the main focus in this section is to identify selfish and blackhole nodes, rather than on execution time, memory consumption, or residual energy, as it was in Section 4.1 and Section 4.2. Hence, this analysis stresses the protocol’s capability. Certainly, the protocol can adapt to higher energy per node; however, for analysis, the energy value is considered to be a constant value, aiming to obtain the results in a more realistic way. Moreover, during the operation, if the protocol identifies any dead node, i.e., E n e r g y < 100 J, the protocol’s accuracy is reduced due to low observed energy.
  • In Table 9 and Figure 12, the accuracy of the protocol is reduced as the session size increases due to the involvement of energy-spoofing non-cooperative N C j nodes in the network. The reliability of the protocol stands at an overall accuracy of 100%, 92.5%, and 80% when considering a session size of 100, 200, and 300, respectively.
  • In Table 10 and Figure 13, the overall accuracy of the protocol degrades as the session size increases due to the inclusion of blackhole nodes in the network. Moreover, the ratio of dead nodes compared to energy-spoofing nodes increases due to high energy-deriving operations such as new node or path discovery after T i m e o u t ( ) . The overall reliability of the protocol achieves 100%, 80%, and 70% when considering a session size of 100, 200, and 300, respectively.

5. Conclusions

In this paper, we have proposed a protocol called PINE that successfully implements lattice-based LWE message cryptography with the aim of solving network non-cooperation in an IoE environment. The proposed model addresses the data integrity, confidentiality, and network availability issues involved in the mobile computing environment and effectively works for at most 50 forwarding nodes with significant accuracy. Certainly, the number of nodes can be increased further by maintaining the necessary energy per device to avoid protocol failure during the operation. One of the exciting tasks involved in this research is the implementation of a geo-encrypted lattice LWE cryptography model [58]; another is addressing non-cooperative relay nodes when considering the network vulnerabilities at different instances of network operation. As far as previous studies and research are concerned, to the best of our knowledge no prior work has suggests a lattice-based LWE solution in a bi-directional relay network considering network non-cooperation, especially in a location-aware mobile IoE environment. In this paper, we have evaluated and analyzed the proposed approach considering various performance metrics, namely, the number of nodes, message size, execution time, memory consumption, average residual energy, percentage of selfish nodes, and blackhole nodes detection. The results show that our protocol is an effective and reliable solution which can minimize battery or energy discharge, memory processing requirements, and execution time in IoE devices under the discussed conditions.
The limitations of the PINE protocol are as follows:
  • The protocol does not focus on optimal or minimum cost route selection; rather, the protocol focuses on selecting an optimal set of routes based on the energy status and incentives of the nodes in the stabilized network. Hence, the PINE protocol is effective for longer communication sessions with multiple receivers in which it is desirable to increase security. For example, the model primarily identifies the next hop based on energy status and distance from the source node, whereas an additional method can be incorporated involving well-defined or verified/tested minimum cost routing-based sensor network protocols for the discussed procedure. This addition can significantly improve overall performance and decrease the latency in the network, as route selection is optimised through the consideration of reactive or proactive routing techniques.
  • The protocol abstains from addressing several different network attacks, including good-mouthing, bad-mouthing, and distributed denial of service (DDoS), etc., which aim to exhaust network resources and ultimately disturb network reliability and durability. For example, several existing papers [44,56] have explained the issues faced due to good-mouthing and bad-mouthing attacks; in a good-mouthing attack, a cluster of non-cooperative entities collaborate to provide favourable feedback to a non-cooperative entity, resulting in it rapidly earning a high reputation, whereas in a bad-mouthing attack the non-cooperative entities collaborate to reduce the trust of a cooperative node by providing false feedback to disrupt the trust framework. Furthermore, in a DDoS attack [2,7,14,30,31,44], the victim’s node is flooded with traffic originating from different sources to break down the system, leading to network unavailability. These are significant problems to be addressed in real-world scenarios, as they can drastically impact customer-facing services involved in the IoE framework, potentially leading to economic loss. Hence, integrating such attack resistance into this protocol is highly relevant.
  • Furthermore, the protocol does not address the authenticity of IoE devices. In the current protocol, we have assumed that the source and destination nodes are T r u e or genuine; however, this may not be the case in reality, as authentication techniques are needed in order to provide an additional layer of security by verifying network devices before performing any communication activities. An intruder must then break the system authentication to enter into the network and control the traffic. Hence, to minimize direct access to the network by intruders, a proven and an effective authentication technique can be integrated with the protocol presented here in order to provide further direction to error-free post-quantum attack-resisting network systems.

Author Contributions

Methodology, S.K.D. and I.W.; Software, A.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. The Internet of Everything Global Public Sector Economic Analysis. Cisco, 2013. Available online: https://www.cisco.com/c/dam/en_us/about/business-insights/docs/ioe-value-at-stake-public-sector-analysis-faq.pdf (accessed on 24 January 2022).
  2. Dey, N.; Shinde, G.; Mahalle, P.; Olesen, H. The Internet of Everything: Advances, Challenges and Applications; De Gruyter: Berlin, Germany, 2019. [Google Scholar] [CrossRef]
  3. Farias da Costa, V.C.; Oliveira, L.; de Souza, J. Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors 2021, 21, 568. [Google Scholar] [CrossRef] [PubMed]
  4. Liu, Y.; Dai, H.N.; Wang, Q.; Shukla, M.K.; Imran, M. Unmanned aerial vehicle for internet of everything: Opportunities and challenges. Comput. Commun. 2020, 155, 66–83. [Google Scholar] [CrossRef]
  5. Abbasi, S.; Rahmani, A.M.; Balador, A.; Sahafi, A. Internet of Vehicles: Architecture, services, and applications. Int. J. Commun. Syst. 2021, 34, e4793. [Google Scholar] [CrossRef]
  6. Samie, F.; Bauer, L.; Henkel, J. IoT technologies for embedded computing: A survey. In Proceedings of the 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ ISSS), Pittsburgh, PA, USA, 2–7 October 2016; IEEE: New York, NY, USA, 2016; pp. 1–10. [Google Scholar] [CrossRef]
  7. Benjamin, C.D. Transatlantic Cyber Insecurity and Cybercrime: Economic Impact and Future Prospects. EPRS|European Parliamentary Research Service, 2017. Available online: https://www.europarl.europa.eu/RegData/etudes/STUD/2017/603948/EPRS_STU(2017)603948_EN.pdf (accessed on 4 February 2022).
  8. Ali, M.; Nadeem, M.; Siddique, A.; Ahmad, S.; Ijaz, A. Addressing Sinkhole Attacks in Wireless Sensor Networks—A Review. Int. J. Sci. Technol. Res. 2020, 9, 406–411. [Google Scholar]
  9. Daniel, S.; Prashanth, K.; Edison, P. Residual Energy Monitoring in Wireless Sensor Networks [Technical Report]. Halmstad University, 2011. Available online: https://www.divaportal.org/smash/get/diva2:446791/FULLTEXT01.pdf (accessed on 22 January 2022).
  10. Shan, A.; Fan, X.; Wu, C.; Zhang, X. Quantitative Study on Impact of Static/Dynamic Selfishness on Network Performance in VANETs. IEEE Access 2021, 9, 13186–13197. [Google Scholar] [CrossRef]
  11. Avoussoukpo, C.B.; Ogunseyi, T.B.; Tchenagnon, M. Securing and facilitating communication within opportunistic networks: A holistic survey. IEEE Access 2021, 9, 55009–55035. [Google Scholar] [CrossRef]
  12. Shabbir, A.; Khalid, F.; Shaheed, S.M.; Abbas, J.; Zia-Ul-Haq, M. Security: A core issue in mobile ad hoc networks. J. Comput. Commun. 2015, 3, 41. [Google Scholar] [CrossRef]
  13. Mittal, S.; Dahiya, S. Identification technique for all passive selfish node attacks in a mobile network. Int. J. 2015, 3, 46–51. [Google Scholar]
  14. Aly, M.; Khomh, F.; Haoues, M.; Quintero, A.; Yacout, S. Enforcing security in Internet of Things frameworks: A systematic literature review. Internet Things 2019, 6, 100050. [Google Scholar] [CrossRef]
  15. Voas, J.; Kuhn, R.; Laplante, P.; Applebaum, S. Internet of things (IoT) trust concerns. In NIST Cybersecurity White Paper; NIST: Gaithersburg, MD, USA, 17 October 2018. [Google Scholar]
  16. Horyachyy, O. Comparison of Wireless Communication Technologies Used in a Smart Home: Analysis of Wireless Sensor Node Based on Arduino in Home Automation Scenario. Master’s Thesis, Blekinge Institute of Technology, Karlskrona, Switzerland, 2017. [Google Scholar]
  17. Rana, B.; Singh, Y.; Singh, P.K. A systematic survey on internet of things: Energy efficiency and interoperability perspective. Trans. Emerg. Telecommun. Technol. 2021, 32, e4166. [Google Scholar] [CrossRef]
  18. Navarro, M.; Li, Y.; Liang, Y. Energy profile for environmental monitoring wireless sensor networks. In Proceedings of the 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), Bogota, Colombia, 4–6 June 2014; IEEE: New York, NY, USA, 2014; pp. 1–6. [Google Scholar] [CrossRef]
  19. Khan, M.A.; Nasralla, M.M.; Umar, M.M.; Iqbal, Z.; Rehman, G.U.; Sarfraz, M.S.; Choudhury, N. A survey on the noncooperative environment in smart nodes-based Ad Hoc networks: Motivations and solutions. Secur. Commun. Netw. 2021, 2021, 9921826. [Google Scholar] [CrossRef]
  20. Dimitriou, G.; Kikiras, P.K.; Stamoulis, G.I.; Avaritsiotis, I.N. A tool for calculating energy consumption in wireless sensor networks. In Proceedings of the Panhellenic Conference on Informatics, Volos, Greece, 11–13 November 2005; Springer: Berlin/Heidelberg, Germany; pp. 611–621. [Google Scholar] [CrossRef]
  21. Kim, W.; Umar, M.M.; Khan, S.; Khan, M.A. Novel Scoring for Energy-Efficient Routing in Multi-Sensored Networks. Sensors 2022, 22, 1673. [Google Scholar] [CrossRef] [PubMed]
  22. ETSI White Paper No. 8. Quantum Safe Cryptography and Security: An Introduction, Benefits, Enablers and Challenges; European Telecommunications Standards Institute: Sophia Antipolis Cedex, France, 2015.
  23. Chris, P. Lattice cryptography for the internet. In Proceedings of the International Workshop on Post-Quantum Cryptography, Waterloo, ON, Canada, 1–3 October 2014; Springer: Cham, Switzerland, 2014; pp. 197–219. [Google Scholar] [CrossRef]
  24. Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM 2009, 56, 1–40. [Google Scholar] [CrossRef]
  25. Stebila, D. Introduction to Post-Quantum Cryptography and Learning with Errors [PowerPoint Slides]. McMaster University, University of Waterloo, 2018. Available online: https://summerschool-croatia.cs.ru.nl/2018/slides/Introductiontopost-quantumcryptographyandlearningwitherrors.pdf (accessed on 13 December 2021).
  26. Asif, R. Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms. IoT 2021, 2, 71–91. [Google Scholar] [CrossRef]
  27. Uyoata, U.; Mwangama, J.; Adeogun, R. Relaying in the Internet of Things (IoT): A Survey. IEEE Access 2021, 9, 132675–132704. [Google Scholar] [CrossRef]
  28. Hassan, R.; Qamar, F.; Hasan, M.K.; Aman, A.H.M.; Ahmed, A.S. Internet of Things and its applications: A comprehensive survey. Symmetry 2020, 12, 1674. [Google Scholar] [CrossRef]
  29. Ray, P.P. A survey on Internet of Things architectures. J. King Saud Univ.—Inf. Sci. 2018, 30, 291–319. [Google Scholar] [CrossRef] [Green Version]
  30. Seyhan, K.; Nguyen, T.N.; Akleylek, S.; Cengiz, K. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: A survey. Clust. Comput. 2022, 25, 1729–1748. [Google Scholar] [CrossRef]
  31. Khan, S.; Sharma, I.; Aslam, M.; Khan, M.Z.; Khan, S. Security challenges of location privacy in VANETs and state-of-the-art solutions: A survey. Future Internet 2021, 13, 96. [Google Scholar] [CrossRef]
  32. Hameed, S.; Khan, F.I.; Hameed, B. Understanding security requirements and challenges in Internet of Things (IoT): A review. J. Comput. Netw. Commun. 2019, 2019, 9629381. [Google Scholar] [CrossRef]
  33. Karakaya, A.; Akleylek, S. A survey on security threats and authentication approaches in wireless sensor networks. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; IEEE: New York, NY, USA, 2018; pp. 1–4. [Google Scholar] [CrossRef]
  34. Barreto, P.S.; Ricardini, J.E.; Simplicio, M.A., Jr.; Patil, H.K. qscms: Post-quantum certificate provisioning process for V2X. Cryptology ePrint Archive. 2018. Available online: https://eprint.iacr.org/2018/1247.pdf (accessed on 21 December 2021).
  35. Mi, B.; Huang, D.; Wan, S. NTRU implementation of efficient privacy-preserving location-based querying in VANET. Wirel. Commun. Mob. Comput. 2018, 2018, 7823979. [Google Scholar] [CrossRef]
  36. Agarkar, A.A.; Agrawal, H. LRSPPP: Lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid. Heliyon 2019, 5, e01321. [Google Scholar] [CrossRef] [PubMed]
  37. Srivastava, G.; Agrawal, R.; Singh, K.; Tripathi, R.; Naik, K. A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography. Peer-to-Peer Netw. Appl. 2020, 13, 348–367. [Google Scholar] [CrossRef]
  38. Mundhe, P.; Yadav, V.K.; Singh, A.; Verma, S.; Venkatesan, S. Ring signature-based conditional privacy-preserving authentication in VANETs. Wirel. Pers. Commun. 2020, 114, 853–881. [Google Scholar] [CrossRef]
  39. Chen, L.; Tu, T.; Yu, K.; Zhao, M.; Wang, Y. V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System. Secur. Commun. Netw. 2021, 2021, 4660875. [Google Scholar] [CrossRef]
  40. Lizardo, A.; Barbosa, R.; Neves, S.; Correia, J.; Araujo, F. End-to-end secure group communication for the Internet of Things. J. Inf. Secur. Appl. 2021, 58, 102772. [Google Scholar] [CrossRef]
  41. Zhu, Y.; Liu, Y.; Wu, M.; Li, J.; Liu, S.; Zhao, J. Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt. Electronics 2022, 11, 856. [Google Scholar] [CrossRef]
  42. Michiardi, P.; Molva, R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security; Springer: Boston, MA, USA, 2002; pp. 107–121. [Google Scholar] [CrossRef]
  43. Khalid, W.; Ullah, Z.; Ahmed, N.; Cao, Y.; Khalid, M.; Arshad, M.; Cruickshank, H. A taxonomy on misbehaving nodes in delay tolerant networks. Comput. Secur. 2018, 77, 442–471. [Google Scholar] [CrossRef]
  44. Mohammadi, V.; Rahmani, A.M.; Darwesh, A.M.; Sahafi, A. Trust-based recommendation systems in Internet of Things: A systematic literature review. Hum.-Centric Comput. Inf. Sci. 2019, 9, 21. [Google Scholar] [CrossRef]
  45. Sengathir, J.; Manoharan, R. Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs. Egypt. Inform. J. 2015, 16, 231–241. [Google Scholar] [CrossRef]
  46. Vij, A.; Sharma, V.; Nand, P. Selfish node detection using game theory in MANET. In Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 12–13 October 2018; IEEE: New York, NY, USA, 2018; pp. 104–109. [Google Scholar] [CrossRef]
  47. Fayaz, M.; Mehmood, G.; Khan, A.; Abbas, S.; Fayaz, M.; Gwak, J. Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics 2022, 11, 185. [Google Scholar] [CrossRef]
  48. Chen, Z.; He, M.; Liang, W.; Chen, K. Trust-aware and low energy consumption security topology protocol of wireless sensor network. J. Sens. 2015, 2015, 716468. [Google Scholar] [CrossRef]
  49. Ponnusamy, M. Detection of selfish nodes through reputation model in mobile adhoc network-MANET. Turk. J. Comput. Math. Educ. 2021, 12, 2404–2410. [Google Scholar] [CrossRef]
  50. Alnumay, W.; Ghosh, U.; Chatterjee, P. A Trust-Based predictive model for mobile ad hoc network in internet of things. Sensors 2019, 19, 1467. [Google Scholar] [CrossRef] [Green Version]
  51. Shan, A.; Fan, X.; Wu, C.; Zhang, X.; Fan, S. Quantitative study on the impact of energy consumption based dynamic selfishness in MANETs. Sensors 2021, 21, 716. [Google Scholar] [CrossRef]
  52. Dias, J.A.; Rodrigues, J.J.; Shu, L.; Ullah, S. Performance evaluation of a cooperative reputation system for vehicular delay-tolerant networks. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 88. [Google Scholar] [CrossRef]
  53. Rehman, G.U.; Ghani, A.; Zubair, M.; Naqvi, S.H.A.; Singh, D.; Muhammad, S. Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov). IEEE Access 2019, 7, 109026–109037. [Google Scholar] [CrossRef]
  54. Kumar, A.; Dhurandher, S.K.; Woungang, I.; Obaidat, M.S.; Gupta, S.; Rodrigues, J.J. An altruism-based trust-dependent message forwarding protocol for opportunistic networks. Int. J. Commun. Syst. 2017, 30, e3232. [Google Scholar] [CrossRef]
  55. Dhurandher, S.K.; Singh, J.; Woungang, I.; Kumar, R.; Gupta, G. Message trust-based secure multipath routing protocol for opportunistic networks. Int. J. Commun. Syst. 2020, 33, e4364. [Google Scholar] [CrossRef]
  56. Kandhoul, N.; Dhurandher, S.K.; Woungang, I. T_CAFE: A trust based security approach for opportunistic IoT. IET Commun. 2019, 13, 3463–3471. [Google Scholar] [CrossRef]
  57. Kandhoul, N.; Dhurandher, S.K. An efficient and secure data forwarding mechanism for opportunistic IoT. Wirel. Pers. Commun. 2021, 118, 217–237. [Google Scholar] [CrossRef]
  58. Balaji, A.; Dhurandher, S.K. Reliable data communication using post-quantum encryption in Internet of Everything. Int. J. Commun. Syst. 2022, 2022, e5246. [Google Scholar] [CrossRef]
Figure 1. Internet of Everything.
Figure 1. Internet of Everything.
Sensors 22 06928 g001
Figure 2. Security in Internet of Everything.
Figure 2. Security in Internet of Everything.
Sensors 22 06928 g002
Figure 3. The protocol initially stabilizes the network for proper decision-making in upcoming sessions. (1) Node S chooses the next hop by considering energy status and distance. (2) Packet forwarding and returning of A C K packet along the bi-directional route. (3) S generates incentives for all relay nodes based on N e t I n f o obtained from direct and overheard nodes. (4) The F 1 node is chosen as the next hop, as its energy residue is more than the peer nodes of S. (5) Optimal route selection to reach node R via F 3 . (6) S generates incentives for all the relay nodes after receiving the ACK/NACK packet via the same route.
Figure 3. The protocol initially stabilizes the network for proper decision-making in upcoming sessions. (1) Node S chooses the next hop by considering energy status and distance. (2) Packet forwarding and returning of A C K packet along the bi-directional route. (3) S generates incentives for all relay nodes based on N e t I n f o obtained from direct and overheard nodes. (4) The F 1 node is chosen as the next hop, as its energy residue is more than the peer nodes of S. (5) Optimal route selection to reach node R via F 3 . (6) S generates incentives for all the relay nodes after receiving the ACK/NACK packet via the same route.
Sensors 22 06928 g003
Figure 4. Selfish node—energy spoofing.
Figure 4. Selfish node—energy spoofing.
Sensors 22 06928 g004aSensors 22 06928 g004b
Figure 5. Selfish node—blackhole attack.
Figure 5. Selfish node—blackhole attack.
Sensors 22 06928 g005
Figure 6. Execution time vs. message size.
Figure 6. Execution time vs. message size.
Sensors 22 06928 g006
Figure 7. Memory consumption vs. message size.
Figure 7. Memory consumption vs. message size.
Sensors 22 06928 g007
Figure 8. Average residual energy vs. message size.
Figure 8. Average residual energy vs. message size.
Sensors 22 06928 g008
Figure 9. Execution time vs. number of nodes.
Figure 9. Execution time vs. number of nodes.
Sensors 22 06928 g009
Figure 10. Memory consumption vs. number of nodes.
Figure 10. Memory consumption vs. number of nodes.
Sensors 22 06928 g010
Figure 11. Average residual energy vs. number of nodes.
Figure 11. Average residual energy vs. number of nodes.
Sensors 22 06928 g011
Figure 12. Selfish node detection vs. number of nodes.
Figure 12. Selfish node detection vs. number of nodes.
Sensors 22 06928 g012
Figure 13. Blackhole node detection vs. number of nodes.
Figure 13. Blackhole node detection vs. number of nodes.
Sensors 22 06928 g013
Table 3. Comparison between execution time and message size.
Table 3. Comparison between execution time and message size.
Message SizeExecution Time for Number of Nodes = 10Execution Time for Number of Nodes = 20Execution Time for Number of Nodes = 30
1022.89 s46.96 s81.42 s
10030.17 s84.48 s129.15 s
100060.85 s104.21 s138.7 s
10,00092.72 s146.33 s180.97 s
Table 4. Comparison between memory consumption and message size.
Table 4. Comparison between memory consumption and message size.
Message SizeMemory Consumption for Number of Nodes = 10Memory Consumption for Number of Nodes = 20Memory Consumption for Number of Nodes = 30
10136.67 MB135.85 MB135.98 MB
100136.13 MB136.39 MB137.08 MB
1000136.52 MB138.68 MB139.57 MB
10,000137.44 MB141.31 MB144.19 MB
Table 5. Comparison between average residual energy and message size.
Table 5. Comparison between average residual energy and message size.
Message SizeAverage Residual Energy for Number of
Nodes = 10
Average Residual Energy for Number of
Nodes = 20
Average Residual Energy for Number of
Nodes = 30
107390.96 J5283.77 J3339.76 J
1005569.38 J3120.54 J2208.64 J
10001831.17 J1153.90 J851.33 J
10,0001056.86 J560.03 J210.91 J
Table 6. Comparison between execution time and number of nodes.
Table 6. Comparison between execution time and number of nodes.
Number of NodesExecution Time for Session Size = 100Execution Time for Session Size = 200Execution Time for Session Size = 300
1061.38 s109.63 s144.60 s
20111.37 s141.28 s258.42 s
30140.85 s251.47 s498.59 s
40239.14 s455.19 s616.89 s
50418.21 s585.97 s638.23 s
Table 7. Comparison between memory consumption and number of nodes.
Table 7. Comparison between memory consumption and number of nodes.
Number of NodesMemory Consumption for Session Size = 100Memory Consumption for Session Size = 200Memory Consumption for Session Size = 300
10132.72 MB134.98 MB135.86 MB
20133.10 MB135.12 MB138.72 MB
30134.29 MB138.27 MB144.71 MB
40137.56 MB144.2 MB146.75 MB
50144.93 MB146.01 MB145.47 MB
Table 8. Comparison between average residual energy and number of nodes.
Table 8. Comparison between average residual energy and number of nodes.
Number of NodesAverage Residual Energy for Session Size = 100Average Residual Energy for Session Size = 200Average Residual Energy for Session Size = 300
104890.21 J3950.81 J2008.94 J
203672.45 J2229.99 J1865.26 J
302346.06 J1623.84 J1081.49 J
401298.67 J968.58 J802.37 J
50922.55 J840.6 J479.39 J
Table 9. Comparison between selfish node detection and number of nodes.
Table 9. Comparison between selfish node detection and number of nodes.
Number of NodesPercentage of Selfish Nodes Detected for Session Size = 100Percentage of Selfish Nodes Detected for Session Size = 200Percentage of Selfish Nodes Detected for Session Size = 300
10100%100%100%
20100%100%100%
30100%100%100%
40100%95%87.5%
50100%96%86%
Overall Accuracy100%92.5%80%
Table 10. Comparison between blackhole node detection and number of nodes.
Table 10. Comparison between blackhole node detection and number of nodes.
Number of NodesPercentage of Blackhole Nodes Detected for Session Size = 100Percentage of Blackhole Nodes Detected for Session Size = 200Percentage of Blackhole Nodes Detected for Session Size = 300
10100%100%100%
20100%100%100%
30100%100%93.33%
40100%92.5%87.5%
50100%90%86%
Overall Accuracy100%80%70%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Balaji, A.; Dhurandher, S.K.; Woungang, I. PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything. Sensors 2022, 22, 6928. https://doi.org/10.3390/s22186928

AMA Style

Balaji A, Dhurandher SK, Woungang I. PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything. Sensors. 2022; 22(18):6928. https://doi.org/10.3390/s22186928

Chicago/Turabian Style

Balaji, Ashwin, Sanjay Kumar Dhurandher, and Isaac Woungang. 2022. "PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything" Sensors 22, no. 18: 6928. https://doi.org/10.3390/s22186928

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop