Non-Cooperative Game Forwarding Leveraging User Trustworthiness in Mobile Edge Networks
Abstract
:1. Introduction
- NCGT leverages node performance and social relations such as nodal residual energy ratio, contact probability, service degree and link stability, and EW method to objectively measure nodal trustworthy strength, which fundamentally ensures the reliability of relay node selection and the security of data transmission.
- GSR (golden section ratio) is used to screen optimal game objects for each forwarding, which effectively improve the operation efficiency of NCGT model.
- NCGT adds nodal trustworthiness in forwarding requests, takes forwarding and non-forwarding as game strategy set, and obtains node forwarding probability via Nash equilibrium, so as to reduce network redundancy, competition and conflict and improve forwarding efficiency.
- NCGT is evaluated on a mixed network environment that includes the information from an analog network and one real dataset via comparing with S-MODEST [14] and AODV+FDG [11]. The simulation results show that NCGT has the greatest advantages in four aspects: cumulative delivery rate, average delivery latency, transmission energy consumption and system throughput.
2. Related Work
3. User Trustworthiness Measurement Based on Multi-Factor
- Ensure the reasonable utilization of node energy to increase the network life;
- Ensure the security of data transmission. Try to select nodes with high credibility to avoid potential network attacks such as eavesdropping, active attack and denial of service caused by malicious or selfish nodes;
- Ensure topology stability. Try to choose a path with strong link to reduce routing changes and network burden.
4. Trustworthiness-Based Non-Cooperative Game Forwarding Model (NCGT)
4.1. Selection of Game Objects
Algorithm 1: Selection of Game Objects. | |
Input: | the node with forwarding packets; user set ; |
the related parameters of nodal trustworthiness measurement; | |
the target node ; GSR ; | |
Output: | Game Objects set . |
1 | ; ; ; |
2 | for each do |
3 | Calculate according to Equation (1); |
4 | Calculate according to Equation (2); |
5 | Calculate according to Equation (3); |
6 | Calculate according to Equation (4); |
7 | Calculate according to Equations (5)–(7); |
8 | end for |
9 | result of excluding in descending order of ; |
10 | ; |
11 | the top neighbors in ; |
12 | return ; |
- In distributed computing environment, real-time computing will consume more computing resources.
- The user behavior is periodic [34], and the game objects also have the law of periodic change. Frequent user computing cannot significantly improve the performance of data transmission.
4.2. NCGT Strategy
4.3. NCGT Rule and Algorithm
Algorithm 2: NCGT Model. | |
Input: | the node with forwarding packets; |
the target node ; | |
1 | BEGIN |
2 | = {All neighbor nodes within the effective communication range of }; |
3 | = null; = 0; |
4 | for each do |
5 | if (( == ) or (there are routes from to )) and ( never received data to be forwarded) |
6 | then { passes the data to directly or through ; |
7 | jump to step 20;} |
8 | end for |
9 | Algorithm 1 for ; |
10 | for each do |
11 | Calculate according to Equations (8)–(10); |
12 | = ; // is the random function. |
13 | if () and ( never received data to be forwarded) |
14 | then {obtain by Equation (5); |
15 | add to the forwarded data; |
16 | forwards the data to ; |
17 | jump to step 1 and perform relevant operations on ; |
18 | } |
19 | end for |
20 | END |
5. Performance Evaluation and Analysis
5.1. Simulation Settings
5.2. Comparison Algorithms and Metrics
5.3. Results and Analysis
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
MEC | Mobile edge computing |
EW | Entropy weight |
GSR | Golden section ratio |
References
- Shakarami, A.; Shahidinejad, A.; Ghobaei-Arani, M. An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach. J. Netw. Comput. Appl. 2021, 178, 102974. [Google Scholar] [CrossRef]
- Hui, P.; Crowcroft, J.; Yoneki, E. Bubble Rap: Social-based forwarding in delay-tolerant networks. IEEE Trans. Mob. Comput. 2011, 10, 1576–1589. [Google Scholar] [CrossRef] [Green Version]
- Bai, Y.; Shao, X.; Yang, W.; Wang, W.; Feng, P.; Liu, S.; Zhang, X.; Wang, R. Nodes contact probability estimation approach based on Bayesian network for DTN. In Proceedings of the NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018. [Google Scholar]
- Li, J.; Li, X.; Cheng, X.; Yuan, J.; Zhang, R. A trustworthiness-enhanced reliable forwarding scheme in mobile Internet of Things. J. Netw. Comput. Appl. 2019, 140, 40–53. [Google Scholar] [CrossRef]
- Li, J.; Li, X.; Yuan, J.; Zhang, R.; Fang, B. Fog computing-assisted trustworthy forwarding scheme in mobile Internet of Things. IEEE Internet Things J. 2019, 6, 2778–2796. [Google Scholar] [CrossRef]
- Wang, R.; Wang, Z.; Ma, W.; Deng, S.; Huang, H. Epidemic Routing Performance in DTN With Selfish Nodes. IEEE Access 2019, 7, 65560–65568. [Google Scholar] [CrossRef]
- Harrati, Y.; Abdali, A. Performance Analysis of Adaptive Fuzzy Spray and Wait Routing Protocol. J. Commun. 2019, 14, 739–744. [Google Scholar] [CrossRef]
- Li, J.; Li, X.; Yuan, J.; Zhang, R. An Energy-Constrained Forwarding Scheme Based on Group Trustworthiness in Mobile Internet of Things. IEEE Syst. J. 2022, 16, 531–542. [Google Scholar] [CrossRef]
- Fu, W.; Zhou, X. Data forwarding optimization algorithm based on game model in unmanned aerial vehicle network. Comput. Eng. 2019, 45, 146–151. [Google Scholar]
- Kanthimathi, N. Void handling using Geo-Opportunistic Routing in underwater wireless sensor networks. Comput. Electr. Eng. 2017, 64, 365–379. [Google Scholar] [CrossRef]
- Mohammad, N.; Kemal, T. Game theoretic approach in routing protocol for wireless ad hoc networks. Ad Hoc Netw. 2009, 7, 569–578. [Google Scholar]
- Tian, X.; Zhu, Y.H.; Chi, K.; Liu, J.; Zhang, D. Reliable and energy-efficient data forwarding in industrial wireless sensor networks. IEEE Syst. J. 2017, 11, 1424–1434. [Google Scholar] [CrossRef]
- Saini, T.K.; Sharma, S.C. Recent advancements, review analysis, and extensions of the AODV with the illustration of the applied concept. Ad Hoc Netw. 2020, 103, 102148. [Google Scholar] [CrossRef]
- Kiran, V.; Rani, S.; Singh, P. Towards a light weight routing security in iot using non-cooperative game models and dempster–shaffer theory. Wirel. Pers. Commun. 2020, 110, 1729–1749. [Google Scholar] [CrossRef]
- Naouri, A.; Wu, H.; Nouri, N.A.; Dhelim, S.; Ning, H. A Novel Framework for Mobile-Edge Computing by Optimizing Task Offloading. IEEE Internet Things J. 2021, 8, 13065–13076. [Google Scholar] [CrossRef]
- Dhelim, S.; Ning, H.; Farha, F.; Chen, L.; Atzori, L.; Daneshmand, M. IoT-enabled social relationships meet artificial social intelligence. IEEE Internet Things J. 2021, 8, 17817–17828. [Google Scholar] [CrossRef]
- Hao, K.; Ding, Y.; Li, C.; Wang, B.; Liu, Y.; Du, X.; Wang, C.Q. An Energy-Efficient Routing Void Repair Method Based on an Autonomous Underwater Vehicle for UWSNs. IEEE Sens. J. 2020, 21, 5502–5511. [Google Scholar] [CrossRef]
- Khan, Z.A.; Karim, O.A.; Abbas, S.; Javaid, N.; Zikria, Y.B.; Tariq, U. Q-learning based energy-efficient and void avoidance routing protocol for underwater acoustic sensor networks. Comput. Netw. 2021, 197, 108309. [Google Scholar] [CrossRef]
- Li, Z.; Wang, C.; Yang, S.; Jiang, S.; Li, X. Lass: Local-activity and social-similarity based data forwarding in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 174–184. [Google Scholar] [CrossRef] [Green Version]
- Jang, S.Y.; Park, S.K.; Cho, J.H.; Lee, D. CARES: Context-Aware Trust Estimation System for Realtime Crowdsensing Services in Vehicular Edge Networks. ACM Trans. Internet Technol. (TOIT) 2022. [Google Scholar] [CrossRef]
- Klaiqi, B.; Chu, X.; Zhang, J. Energy-and spectral-efficient adaptive forwarding strategy for multi-hop device-to-device communications overlaying cellular networks. IEEE Trans. Wirel. Commun. 2018, 17, 5684–5699. [Google Scholar] [CrossRef]
- Wu, D.; Yang, B.; Wang, H.; Wu, D.; Wang, R. An energy-efficient data forwarding for heterogeneous WBANs. IEEE Access 2016, 4, 7251–7261. [Google Scholar] [CrossRef]
- Jiao, P.; Guo, X.; Jing, X.; He, D.; Wu, H.; Pan, S.; Gong, M.; Wang, W. Temporal network embedding for link prediction via vae joint attention mechanism. IEEE Trans. Neural Netw. Learn. Syst. (Early Access). 2021. [Google Scholar] [CrossRef]
- Zarzoor, A.R. Enhancing dynamic source routing (DSR) protocol performance based on link quality metrics. In Proceedings of the 2021 IEEE International Seminar on Application for Technology of Information and Communication (iSemantic), Semarangin, Indonesia, 18–19 September 2021. [Google Scholar]
- Balaji, S.; Julie, E.G.; Robinson, Y.H.; Kumar, R.; Thong, P.H. Design of a security-aware routing scheme in mobile ad-hoc network using repeated game model. Comput. Stand. Interfaces 2019, 66, 103358. [Google Scholar] [CrossRef]
- Wang, Q.; Li, J.; Qi, Q.; Zhou, P.; Wu, D.O. A Game-Theoretic Routing Protocol for 3-D Underwater Acoustic Sensor Networks. IEEE Internet Things J. 2020, 7, 9846–9857. [Google Scholar] [CrossRef]
- Das, S.K.; Tripathi, S. Adaptive and intelligent energy efficient routing for transparent heterogeneous ad-hoc network by fusion of game theory and linear programming. Appl. Intell. 2018, 48, 1825–1845. [Google Scholar] [CrossRef]
- Huang, K.; Chen, X.; Di, X.; Du, Q. Dynamic driving and routing games for autonomous vehicles on networks: A mean field game approach. Transp. Res. Part C Emerg. Technol. 2021, 128, 103189. [Google Scholar] [CrossRef]
- Qin, X.; Wang, X.; Wang, L.; Lin, Y.; Wang, X. An efficient probabilistic routing scheme based on game theory in opportunistic networks. Comput. Netw. 2019, 149, 144–153. [Google Scholar] [CrossRef]
- Attiah, A.; Amjad, M.F.; Chatterjee, M.; Zou, C. An evolutionary routing game for energy balance in Wireless Sensor Networks. Comput. Netw. 2018, 138, 31–43. [Google Scholar] [CrossRef]
- Ricardo, J.E.; Rosado, Z.M.M.; Pataron, E.K.C.; Vargas, V.Y.V. Measuring legal and socioeconomic effect of the declared debtors usign the ahp technique in a neutrosophic framework. Neutrosophic Sets Syst. 2021, 44, 357–366. [Google Scholar]
- Chen, P. Effects of the entropy weight on TOPSIS. Expert Syst. Appl. 2021, 168, 114186. [Google Scholar] [CrossRef]
- Bahri, H.; Harrag, A. Ingenious golden section search MPPT algorithm for PEM fuel cell power system. Neural Comput. Appl. 2021, 33, 8275–8298. [Google Scholar] [CrossRef]
- Zhang, D.Q.; Wang, Z.; Guo, B.; Zhou, X.S. A dynamic community creation mechanism in opportunistic mobile social networks. In Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA, USA, 9–11 October 2011. [Google Scholar]
- Wang, Q.W.; Qi, Q.; Cheng, W.; Li, D. Node degree estimation and static game forwarding strategy based routing protocol for ad hoc networks. J. Softw. 2020, 31, 1802–1816. [Google Scholar]
- Sarker, I.H. Behavminer: Mining user behaviors from mobile phone data for personalized services. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Athens, Greece, 19–23 March 2018. [Google Scholar]
The Other Nodes | ||
---|---|---|
(When at Least One Node) | (When All Nodes) | |
0 |
Parameter | Value |
---|---|
packet size | 50~100 KB |
queue length on node | 300~500 |
buffer size of node | 5~10 MB |
initial energy of node | 19~100% |
proportion of malicious nodes (%) | 5, 15, 35, 60, 85 |
movement mode of node | random site moving model |
maximum movement speed of node | 6 m/s |
data stream | CBR |
data transmission rate | 1 Mbps |
communication radius of node | 250 m |
10 J/bit | |
simulation time | 300 s |
pause time | 10 s |
time to live (TTL) | 5 h |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, J.; Li, X.; Li, G.; Zhang, R. Non-Cooperative Game Forwarding Leveraging User Trustworthiness in Mobile Edge Networks. Sustainability 2022, 14, 4473. https://doi.org/10.3390/su14084473
Li J, Li X, Li G, Zhang R. Non-Cooperative Game Forwarding Leveraging User Trustworthiness in Mobile Edge Networks. Sustainability. 2022; 14(8):4473. https://doi.org/10.3390/su14084473
Chicago/Turabian StyleLi, Jirui, Xiaoyong Li, Guozhi Li, and Rui Zhang. 2022. "Non-Cooperative Game Forwarding Leveraging User Trustworthiness in Mobile Edge Networks" Sustainability 14, no. 8: 4473. https://doi.org/10.3390/su14084473