Abstract
Performance and communication security in the Internet of Things (IoT) area draw a major concern for both academic and industrial communities. Indeed, an emerging number of IoT protocols are getting involved in the protocol stack, implying that the need for new security measures is also increasing. The Media Access Control (MAC) protocol Time Slot Channel Hopping (TSCH) has recently gained significant popularity thanks to its reliability and robustness. It quickly became the basis of IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH), a complete communication stack tailored for Industrial IoT networks. In this paper, we are interested in the lack of cooperation of some network nodes, referred to as selfishness, which often leads to network performance degradation. We introduce this concept in 6TiSCH networks for the first time, and we show how they get immunized. We first define a selfishness framework, and we integrate it into the 6top Protocol (6P). Then, we introduce a fuzzy logic-based technique enabling the detection of selfish nodes, along with an anticipatory countermeasure that tells cooperative nodes how to deal with selfish neighbors. We implement and integrate the proposed algorithms into the 6TiSCH simulator, and we conduct a thorough experimental study. Simulation results show how much the latency, Packet Delivery Ratio (PDR), and throughput are affected and how our proposal can significantly improve them.
Similar content being viewed by others
References
IEEE Standard for low-rate wireless networks, April 2016. IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011).
Municio, E., Daneels, G., Vučnić, M., Latré, S., Famaey, J., Tanaka, Yasuyuki, et al. (2019). Simulating 6tisch networks. Transactions on Emerging Telecommunications Technologies, 30(3), e3494.
Cena, G., Demartini, C. G., Vakili, M. G., Scanzio, S., Valenzano, A., & Zunino, C. (2020). Evaluating and modeling IEEE 802154 TSCH resilience against Wi-Fi interference in new-generation highly-dependable wireless sensor networks. Ad Hoc Networks, 106, 102199.
Vallati, C., Brienza, S., Anastasi, G., & Das, S. K. (2019). Improving network formation in 6tisch networks. IEEE Transactions on Mobile Computing, 18(1), 98–110.
Mohamadi, M., & Senouci, M. R. (2019). Scheduling algorithms for IEEE 802.15.4 TSCH networks: A survey. In Demigha, O., Djamaa, B., & Amamra, A. (Eds.), Advances in computing systems and applications (pp. 4–13). Springer.
Haxhibeqiri, J., Karaağaç, A., Moerman, I., & Hoebeke, J. (2019). Seamless roaming and guaranteed communication using a synchronized single-hop multi-gateway 802.15.4e TSCH network. Ad Hoc Networks, 86, 1–14.
Daneels, G., Spinnewyn, B., Latré, S., & Famaey, J. (2018). Resf: Recurrent low-latency scheduling in IEEE 802.15.4e TSCH networks. Ad Hoc Networks, 69, 100–114.
Duquennoy, S., Al Nahas, B., Landsiedel, O., & Watteyne, T. (2015). Orchestra: Robust mesh networks through autonomously scheduled TSCH. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys ’15, page 337–350, New York, NY, USA, 2015. Association for Computing Machinery.
Jin, Y., Raza, U., Aijaz, A., Sooriyabandara, M., & Gormus, S. (2017). Content centric cross-layer scheduling for industrial IoT applications using 6TiSCH. IEEE Access, 6, 234–244.
Kharb, Seema, & Singhrova, A. (2019). A survey on network formation and scheduling algorithms for time slotted channel hopping in industrial networks. Journal of Network and Computer Applications, 126, 59–87.
Wang, Q., Vilajosana, X., & Watteyne, T. (2018). 6TiSCH Operation sublayer (6top) Protocol (6P). RFC 8480, November
Yadav, H., & Pati, H. K. (2018). A survey on selfish node detection in manet. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) (pp. 217–221). IEEE.
Nobahary, S., Garakani, H. G., Khademzadeh, A., & Rahmani, A. M. (2019). Selfish node detection based on hierarchical game theory in IoT. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–19.
Luo, J., Liu, X., & Fan, M. (2009). A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks, 53(14), 2396–2407.
Raza, A., Al-Karaki, J. N., & Abbas, H. (2016). Analyzing packet forwarding Schemes for selfish behavior in MANETs. Information Technology: New Generations (pp. 227–236). Springer.
Jedari, B., Xia, F., Chen, H., Das, S. K., Tolba, A., & Zafer, A. (2019). A social-based watchdog system to detect selfish nodes in opportunistic mobile networks. Future Generation Computer Systems, 92, 777–788.
Hasani, H., & Babaie, S. (2019). Selfish node detection in ad hoc networks based on fuzzy logic. Neural Computing and Applications, 31(10), 6079–6090.
Das, S. K., Saha, B. J., & Chatterjee, P. S. (2014). Selfish node detection and its behavior in WSN. In Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1–6). IEEE.
Priya, M. D., Suganya, T., Malar, A. C. J., Dhivyaprabha, E., Prasad, P. K., & Vardhan, L. V. (2020). An efficient scheduling algorithm for sensor-based IoT networks. Inventive communication and computational technologies (pp. 1323–1331). Springer.
Refaei, M. T., Srivastava, V., DaSilva, L., & Eltoweissy, M. (2005). A reputation-based mechanism for isolating selfish nodes in ad hoc networks. In The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (pp. 3-11). IEEE.
Komathy, K., & Narayanasamy, P. (2007). Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network. Computer Communications, 30(18), 3721–3735.
Hernandez-Orallo, E., Serrat, M. D., Cano, J., Calafate, C. T., & Manzoni, P. (2012). Improving selfish node detection in manets using a collaborative watchdog. IEEE Communications Letters, 16(5), 642–645.
Xiao, XueFeng, Li, Y., Kui, X., & Vasilakos, A. V. (2014). Assessing the influence of selfishness on the system performance of gossip based vehicular networks. Wireless Networks, 20(7), 1795–1805.
Theerthagiri, Prasannavenkatesan. (2020). Fucem: Futuristic cooperation evaluation model using Markov process for evaluating node reliability and link stability in mobile ad hoc network. Wireless Networks, 26, 4173–4188.
Ullah, Z., Khan, M. S., Ahmed, I., Javaid, N., & Khan, M. I. (2016). Fuzzy-based trust model for detection of selfish nodes in manets. In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) (pp. 965–972). IEEE.
Singh, Kuldeep, & Verma, A. K. (2018). A fuzzy-based trust model for flying ad hoc networks (FANETs). International Journal of Communication Systems, 31(6), e3517.
Lei, T., Wang, S., Li, J., You, I., & Yang, Fangchun. (2016). Detecting and preventing selfish behaviour in mobile ad hoc network. The Journal of Supercomputing, 72(8), 3156–3168.
Kumar, Sunil, & Dutta, K. (2018). Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks. Wireless Personal Communications, 101(4), 2029–2052.
Patel, P., & Jhaveri, R. (2017). A honeypot scheme to detect selfish vehicles in vehicular ad-hoc network. Computing and Network Sustainability (pp. 389–401). Singapore: Springer.
Afghah, F., Shamsoshoara, A., Njilla, L., & Kamhoua, C. (2018). A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish iot devices. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp 312–317). IEEE.
Cuka, M., Elmazi, D., Ikeda, M., Matsuo, K., Barolli, L., & Takizawa, M. (2020). Selection of IoT devices in opportunistic networks: A fuzzy-based approach considering IoT device’s selfish behaviour. In L. Barolli, M. Takizawa, F. Xhafa, & T. Enokido (Eds.), Advanced information networking and applications (pp. 251–264). Springer.
Xu, L., Lin, Z., & Ye, A. (2006). Analysis and countermeasure of selfish node problem in mobile ad hoc network. In 2006 10th International Conference on Computer Supported Cooperative Work in Design. (pp. 1–4). IEEE.
Seredynski, M., Bouvry, P., & Klopotek, M. A. (2007). Preventing selfish behavior in ad hoc networks. In 2007 IEEE Congress on Evolutionary Computation (pp. 3554–3560). IEEE.
Tang, J., Cheng, Y., Hao, Y., & Zhou, C. (2010). Real-time detection of selfish behavior in IEEE 802.11 wireless networks. In 2010 IEEE 72nd Vehicular Technology Conference-Fall (pp. 1–5). IEEE.
Yan, M., Xiao, L., Du, L., & Huang, L. (2011). On selfish behavior in wireless sensor networks: A game theoretic case study. In 2011 Third International Conference on Measuring Technology and Mechatronics Automation, 2, 752–756.
Benazir, S.A.M., & Umarani, V. (2016). Detection of selfish & malicious behavior using dtn-chord monitoring in mobile networks. In 2016 International Conference on Information Communication and Embedded Systems (ICICES) (pp. 1–5). IEEE.
Ghonge, M. M., Jawandhiya, P. M., & Thakare, V. M. (2017). Selfish attack detection in mobile ad hoc networks. In 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (pp. 1–4). IEEE.
Abirami, K. Rama., & Sumithra, M. G. (2018). Preventing the impact of selfish behavior under manet using neighbor credit value based aodv routing algorithm. Sādhanā, 43(4), 60.
Jhaveri, Rutvij H., & Patel, N. M. (2017). Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, 30(7), e3148.
Jhaveri, R. H., Patel, N. M., Zhong, Yubin, & Sangaiah, A. K. (2018). Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot. IEEE Access, 6, 20085–20103.
Vilajosana, X., Watteyne, T., Chang, T., Vučinić, M., Duquennoy, S., & Thubert, P. (2020). Ietf 6tisch: A tutorial. IEEE Communications Surveys Tutorials, 22(1), 595–615.
IPv6 over the TSCH mode of IEEE 802.15.4e (6tisch). https://datatracker.ietf.org/wg/6tisch/charter/. Accessed: 2019-06-23.
Chang, T., Vučinić, M., Vilajosana, X., Duquennoy, S., & Dujovne, D. (2020). 6TiSCH Minimal scheduling function (MSF). Internet-Draft draft-ietf-6tisch-msf-12, Internet Engineering Task Force, March. Work in Progress.
Almusaylim, Z. A., Alhumam, A., & Jhanjhi, N. Z. (2020). Proposing a secure RPL based internet of things routing protocol: A review. Ad Hoc Networks, 101, 102096.
Palattella, M. R., Watteyne, T., Wang, Q., Muraoka, K., Accettura, N., Dujovne, D., et al. (2016). On-the-fly bandwidth reservation for 6tisch wireless industrial networks. IEEE Sensors Journal, 16(2), 550–560.
Kayacan, E., & Khanesar, M. A. (2016). Fundamentals of type-1 fuzzy logic theory. In E. Kayacan & M. A. Khanesar (Eds.), Fuzzy neural networks for real time control applications: Concepts, modeling and algorithms for fast learning (pp. 13–24). Butterworth-Heinemann.
Bai, Y., & Wang, D. (2006). Fundamentals of fuzzy logic contro–fuzzy sets, fuzzy rules and defuzzifications. In Advanced fuzzy logic technologies in industrial applications. Springer. (pp. 17-36)
Wang, M., Zhu, T., Zhang, T., Zhang, J., Yu, S., & Zhou, W. (2020). Security and privacy in 6G networks: New areas and new challenges. Digital Communications and Networks, 6(3), 281–291.
Porambag, P., Gür, G., Osorio, D. P. M., Liyanage, M., & Ylianttila, M. (2021). 6g security challenges and potential solutions. Preprint at https://www.researchgate.net/publication/350824205_6G_Security_Challenges_and_Potential_Solutions#fullTextFileContent
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Boufenneche, Y., Zitouni, R., George, L. et al. Selfishness in secure internet of things networks: 6TiSCH case study. Wireless Netw 27, 3927–3946 (2021). https://doi.org/10.1007/s11276-021-02711-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-021-02711-1