{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:44Z","timestamp":1740123584790,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11227-021-04202-8","type":"journal-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:03:16Z","timestamp":1641772996000},"page":"8389-8408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A new selfish thing detection method based on Voronoi diagram for Internet of Things"],"prefix":"10.1007","volume":"78","author":[{"given":"Nasim","family":"Razzaghi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7830-2496","authenticated-orcid":false,"given":"Shahram","family":"Babaie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,10]]},"reference":[{"key":"4202_CR1","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1007\/s10586-019-02986-2","volume":"23","author":"P Azad","year":"2020","unstructured":"Azad P, Navimipour NJ, Rahmani AM, Sharifi A (2020) The role of structured and unstructured data managing mechanisms in the Internet of things. Cluster Comput 23:1185\u20131198. https:\/\/doi.org\/10.1007\/s10586-019-02986-2","journal-title":"Cluster Comput"},{"key":"4202_CR2","doi-asserted-by":"publisher","first-page":"4778","DOI":"10.1007\/s11227-020-03471-z","volume":"77","author":"S Sharma","year":"2021","unstructured":"Sharma S, Verma VK (2021) Security explorations for routing attacks in low power networks on internet of things. J Supercomput 77:4778\u20134812. https:\/\/doi.org\/10.1007\/s11227-020-03471-z","journal-title":"J Supercomput"},{"key":"4202_CR3","doi-asserted-by":"publisher","first-page":"11007","DOI":"10.1007\/s00521-018-3820-7","volume":"32","author":"WG de Oliveira J\u00fanior","year":"2020","unstructured":"de Oliveira J\u00fanior WG, de Oliveira JM, Munoz R, de Albuquerque VHC (2020) A proposal for Internet of Smart Home Things based on BCI system to aid patients with amyotrophic lateral sclerosis. Neural Comput Appl 32:11007\u201311017. https:\/\/doi.org\/10.1007\/s00521-018-3820-7","journal-title":"Neural Comput Appl"},{"key":"4202_CR4","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s11277-019-06738-8","volume":"110","author":"S Idwan","year":"2020","unstructured":"Idwan S, Mahmood I, Zubairi JA, Matar I (2020) Optimal management of solid waste in smart cities using Internet of Things. Wirel Pers Commun 110:485\u2013501. https:\/\/doi.org\/10.1007\/s11277-019-06738-8","journal-title":"Wirel Pers Commun"},{"key":"4202_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/J.COMPELECENG.2019.01.007","volume":"74","author":"G Choudhary","year":"2019","unstructured":"Choudhary G, Sharma V, You I (2019) Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Comput Electr Eng 74:59\u201373. https:\/\/doi.org\/10.1016\/J.COMPELECENG.2019.01.007","journal-title":"Comput Electr Eng"},{"key":"4202_CR6","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1007\/s12083-016-0456-1","volume":"10","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Wen J (2017) The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Netw Appl 10:983\u2013994. https:\/\/doi.org\/10.1007\/s12083-016-0456-1","journal-title":"Peer-to-Peer Netw Appl"},{"key":"4202_CR7","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s11277-019-06407-w","volume":"108","author":"S Balaji","year":"2019","unstructured":"Balaji S, Nathani K, Santhakumar R (2019) IoT technology, applications and challenges: a contemporary survey. Wirel Pers Commun 108:363\u2013388. https:\/\/doi.org\/10.1007\/s11277-019-06407-w","journal-title":"Wirel Pers Commun"},{"key":"4202_CR8","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","volume":"22","author":"M Stoyanova","year":"2020","unstructured":"Stoyanova M, Nikoloudakis Y, Panagiotakis S et al (2020) A Survey on the Internet of Things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutorials 22:1191\u20131221. https:\/\/doi.org\/10.1109\/COMST.2019.2962586","journal-title":"IEEE Commun Surv Tutorials"},{"key":"4202_CR9","doi-asserted-by":"crossref","unstructured":"Hail MAM, Amadeo M, Molinaro A, Fischer S (2015) On the performance of caching and forwarding in information-centric networking for the IoT. In: Lecture Notes in Computer Science. Springer Verlag, pp 313\u2013326","DOI":"10.1007\/978-3-319-22572-2_23"},{"key":"4202_CR10","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/TSUSC.2017.2691049","volume":"2","author":"T Anagnostopoulos","year":"2017","unstructured":"Anagnostopoulos T, Zaslavsky A, Kolomvatsos K et al (2017) Challenges and opportunities of waste management in IoT-enabled smart cities: a survey. IEEE Trans Sustain Comput 2:275\u2013289. https:\/\/doi.org\/10.1109\/TSUSC.2017.2691049","journal-title":"IEEE Trans Sustain Comput"},{"key":"4202_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/J.SUSCOM.2020.100448","author":"AE Varjovi","year":"2020","unstructured":"Varjovi AE, Babaie S (2020) Green Internet of Things (GIoT): vision, applications and research challenges. Sustain Comput Informatics Syst. https:\/\/doi.org\/10.1016\/J.SUSCOM.2020.100448","journal-title":"Sustain Comput Informatics Syst"},{"key":"4202_CR12","doi-asserted-by":"publisher","first-page":"4883","DOI":"10.1109\/JSYST.2020.2976827","volume":"14","author":"MM Gharamaleki","year":"2020","unstructured":"Gharamaleki MM, Babaie S (2020) A new distributed fault detection method for wireless sensor networks. IEEE Syst J 14:4883\u20134890. https:\/\/doi.org\/10.1109\/JSYST.2020.2976827","journal-title":"IEEE Syst J"},{"key":"4202_CR13","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.future.2017.10.049","volume":"92","author":"B Jedari","year":"2019","unstructured":"Jedari B, Xia F, Chen H et al (2019) A social-based watchdog system to detect selfish nodes in opportunistic mobile networks. Futur Gener Comput Syst 92:777\u2013788. https:\/\/doi.org\/10.1016\/j.future.2017.10.049","journal-title":"Futur Gener Comput Syst"},{"key":"4202_CR14","doi-asserted-by":"publisher","first-page":"6079","DOI":"10.1007\/s00521-018-3431-3","volume":"31","author":"H Hasani","year":"2019","unstructured":"Hasani H, Babaie S (2019) Selfish node detection in ad hoc networks based on fuzzy logic. Neural Comput Appl 31:6079\u20136090. https:\/\/doi.org\/10.1007\/s00521-018-3431-3","journal-title":"Neural Comput Appl"},{"key":"4202_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01797-3","author":"V Gomathy","year":"2020","unstructured":"Gomathy V, Padhy N, Samanta D et al (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-01797-3","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4202_CR16","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1016\/j.future.2019.07.021","volume":"101","author":"L Liu","year":"2019","unstructured":"Liu L, Ma Z, Meng W (2019) Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Futur Gener Comput Syst 101:865\u2013879. https:\/\/doi.org\/10.1016\/j.future.2019.07.021","journal-title":"Futur Gener Comput Syst"},{"key":"4202_CR17","doi-asserted-by":"publisher","first-page":"13307","DOI":"10.1007\/s10586-018-1851-6","volume":"22","author":"K Rama Abirami","year":"2019","unstructured":"Rama Abirami K, Sumithra MG (2019) Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection. Cluster Comput 22:13307\u201313316. https:\/\/doi.org\/10.1007\/s10586-018-1851-6","journal-title":"Cluster Comput"},{"key":"4202_CR18","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1109\/JSYST.2019.2925033","volume":"14","author":"C Zhang","year":"2020","unstructured":"Zhang C, Ge J, Gong F et al (2020) Security-reliability tradeoff for untrusted and selfish relay-assisted D2D communications in heterogeneous cellular networks for IoT. IEEE Syst J 14:2192\u20132201. https:\/\/doi.org\/10.1109\/JSYST.2019.2925033","journal-title":"IEEE Syst J"},{"key":"4202_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03597-0","author":"R Zhao","year":"2021","unstructured":"Zhao R, Wang Y, Xiao G et al (2021) A selfish herd optimization algorithm based on the simplex method for clustering analysis. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-020-03597-0","journal-title":"J Supercomput"},{"key":"4202_CR20","doi-asserted-by":"publisher","first-page":"12263","DOI":"10.1007\/s10586-017-1607-8","volume":"22","author":"S Raju","year":"2019","unstructured":"Raju S, Chandrasekaran M (2019) An improved neighbor cooperation using adjacent node cooperation in peer to peer networks. Cluster Comput 22:12263\u201312274. https:\/\/doi.org\/10.1007\/s10586-017-1607-8","journal-title":"Cluster Comput"},{"key":"4202_CR21","doi-asserted-by":"publisher","first-page":"118","DOI":"10.2478\/acss-2018-0015","volume":"23","author":"S Nobahary","year":"2018","unstructured":"Nobahary S, Babaie S (2018) A credit-based method to selfish node detection in mobile ad-hoc network. Appl Comput Syst 23:118\u2013127. https:\/\/doi.org\/10.2478\/acss-2018-0015","journal-title":"Appl Comput Syst"},{"key":"4202_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2020.107482","volume":"182","author":"N Ullah","year":"2020","unstructured":"Ullah N, Kong X, Lin L et al (2020) Real-time dissemination of emergency warning messages in 5G enabled selfish vehicular social networks. Comput Networks 182:107482. https:\/\/doi.org\/10.1016\/J.COMNET.2020.107482","journal-title":"Comput Networks"},{"key":"4202_CR23","doi-asserted-by":"publisher","first-page":"2404","DOI":"10.17762\/TURCOMAT.V12I9.3720","volume":"12","author":"M Ponnusamy","year":"2021","unstructured":"Ponnusamy M et al (2021) Detection of selfish nodes through reputation model in mobile adhoc network\u2014MANET. Turk J Comput Math Educ 12:2404\u20132410. https:\/\/doi.org\/10.17762\/TURCOMAT.V12I9.3720","journal-title":"Turk J Comput Math Educ"},{"key":"4202_CR24","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1109\/TAES.2014.130168","volume":"51","author":"S Esmailifar","year":"2015","unstructured":"Esmailifar S, Saghafi F (2015) Moving target localization by cooperation of multiple flying vehicles. IEEE Trans Aerosp Electron Syst 51:739\u2013746. https:\/\/doi.org\/10.1109\/TAES.2014.130168","journal-title":"IEEE Trans Aerosp Electron Syst"},{"key":"4202_CR25","doi-asserted-by":"publisher","first-page":"2490","DOI":"10.1109\/TWC.2017.2665544","volume":"16","author":"T Ying","year":"2017","unstructured":"Ying T, Feng W, Su W, Jiang W (2017) On the degrees of freedom of MIMO X networks with non-cooperation transmitters. IEEE Trans Wirel Commun 16:2490\u20132504. https:\/\/doi.org\/10.1109\/TWC.2017.2665544","journal-title":"IEEE Trans Wirel Commun"},{"key":"4202_CR26","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/J.COMCOM.2020.01.009","volume":"152","author":"F Shang","year":"2020","unstructured":"Shang F, Niu X, He D et al (2020) Resource allocation and admission control algorithm based on non-cooperation game in wireless mesh networks. Comput Commun 152:63\u201371. https:\/\/doi.org\/10.1016\/J.COMCOM.2020.01.009","journal-title":"Comput Commun"},{"key":"4202_CR27","doi-asserted-by":"publisher","first-page":"6036","DOI":"10.1007\/s11227-020-03507-4","volume":"77","author":"A Sharma","year":"2021","unstructured":"Sharma A, Goyal N, Guleria K (2021) Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes. J Supercomput 77:6036\u20136055. https:\/\/doi.org\/10.1007\/s11227-020-03507-4","journal-title":"J Supercomput"},{"key":"4202_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/6359806","volume":"2019","author":"A Socievole","year":"2019","unstructured":"Socievole A, Caputo A, De Rango F, Fazio P (2019) Routing in mobile opportunistic social networks with selfish nodes. Wirel Commun Mob Comput 2019:1\u201315. https:\/\/doi.org\/10.1155\/2019\/6359806","journal-title":"Wirel Commun Mob Comput"},{"key":"4202_CR29","doi-asserted-by":"crossref","unstructured":"Razaque A, Abdulghafour M, Khan MJ (2017) Detection of selfish attack over wireless body area networks. In: 2017 IEEE Conference on Open Systems. IEEE, pp 48\u201352","DOI":"10.1109\/ICOS.2017.8280273"},{"key":"4202_CR30","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/J.ADHOC.2018.10.019","volume":"85","author":"AE Hilal","year":"2019","unstructured":"Hilal AE, MacKenzie AB (2019) A distributed coalition game model for cooperation in MANETs. Ad Hoc Netw 85:46\u201359. https:\/\/doi.org\/10.1016\/J.ADHOC.2018.10.019","journal-title":"Ad Hoc Netw"},{"key":"4202_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03507-4","author":"A Sharma","year":"2020","unstructured":"Sharma A, Goyal N, Guleria K (2020) Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-020-03507-4","journal-title":"J Supercomput"},{"key":"4202_CR32","doi-asserted-by":"crossref","unstructured":"Jain S, Verma A (2019) Bubble rap incentive scheme for prevention of node selfishness in delay-tolerant networks. In: Advances in Intelligent Systems and Computing. Springer, Singapore, pp 289\u2013303","DOI":"10.1007\/978-981-10-8968-8_25"},{"key":"4202_CR33","doi-asserted-by":"publisher","first-page":"29419","DOI":"10.1109\/ACCESS.2018.2834912","volume":"6","author":"H Wang","year":"2018","unstructured":"Wang H, Wang H, Guo F et al (2018) ARAG: a routing algorithm based on incentive mechanisms for DTN with nodes\u2019 selfishness. IEEE Access 6:29419\u201329425. https:\/\/doi.org\/10.1109\/ACCESS.2018.2834912","journal-title":"IEEE Access"},{"key":"4202_CR34","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.adhoc.2014.08.018","volume":"24","author":"A Jesudoss","year":"2015","unstructured":"Jesudoss A, Raja SVK, Sulaiman A (2015) Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw 24:250\u2013263. https:\/\/doi.org\/10.1016\/j.adhoc.2014.08.018","journal-title":"Ad Hoc Netw"},{"key":"4202_CR35","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1093\/comjnl\/bxt042","volume":"56","author":"Y Sun","year":"2013","unstructured":"Sun Y, Guo Y, Ge Y et al (2013) Improving the transmission efficiency by considering non-cooperation in ad hoc networks. Comput J 56:1034\u20131042. https:\/\/doi.org\/10.1093\/comjnl\/bxt042","journal-title":"Comput J"},{"key":"4202_CR36","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1007\/s11227-017-2150-3","volume":"74","author":"W Zhang","year":"2018","unstructured":"Zhang W, Zhu S, Tang J, Xiong N (2018) A novel trust management scheme based on Dempster\u2013Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74:1779\u20131801. https:\/\/doi.org\/10.1007\/s11227-017-2150-3","journal-title":"J Supercomput"},{"key":"4202_CR37","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1564-4","author":"S Nobahary","year":"2019","unstructured":"Nobahary S, Garakani HG, Khademzadeh A, Rahmani AM (2019) Selfish node detection based on hierarchical game theory in IoT. Eurasip J Wirel Commun Netw. https:\/\/doi.org\/10.1186\/s13638-019-1564-4","journal-title":"Eurasip J Wirel Commun Netw"},{"key":"4202_CR38","doi-asserted-by":"publisher","first-page":"31759","DOI":"10.1109\/ACCESS.2018.2833210","volume":"6","author":"J Li","year":"2018","unstructured":"Li J, Gao X, Yang Q et al (2018) Neural-network aided dynamic control for delivering media streams in selfish wireless networks with unknown node-selfishness. IEEE Access 6:31759\u201331771. https:\/\/doi.org\/10.1109\/ACCESS.2018.2833210","journal-title":"IEEE Access"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04202-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04202-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04202-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T13:48:10Z","timestamp":1648820890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04202-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,10]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["4202"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04202-8","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,1,10]]},"assertion":[{"value":"9 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version. This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue. The following authors have affiliations with organizations with direct or indirect financial interest in the subject matter discussed in the manuscript:","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}