{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:27:58Z","timestamp":1768285678047,"version":"3.49.0"},"reference-count":58,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Everything (IoE) is a smart system that interconnects smart entities by incorporating low-cost or low-energy gadgets that are useful for communication with people, processes, data, and devices\/things. In such an instantaneously connected environment, network-enabled heterogeneous devices may exhibit non-cooperative behaviour which may lead to the degradation of the network. To address this performance degradation, the proposed Post-quantum based Incentive technique for Non-cooperating nodes in internet of Everything (PINE) protocol provides an end-to-end reliable solution by incorporating location-aware post-quantum encryption in these networks while addressing the non-cooperative behaviour of the nodes by employing an effective strategy in a bi-directional multi-hop relay environment. This proposed protocol further aims to evaluate the consequences of non-cooperative nodes by considering various metrics, namely, number of nodes, message size, execution time, memory consumption, average residual energy, percentage of selfish nodes, and blackhole nodes detection, aiming to achieve significant accuracy in an IoE environment.<\/jats:p>","DOI":"10.3390\/s22186928","type":"journal-article","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T22:37:28Z","timestamp":1663108648000},"page":"6928","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9100-7720","authenticated-orcid":false,"given":"Ashwin","family":"Balaji","sequence":"first","affiliation":[{"name":"Department of Information Technology, Netaji Subhas University of Technology, New Delhi 110078, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9573-7069","authenticated-orcid":false,"given":"Sanjay Kumar","family":"Dhurandher","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Netaji Subhas University of Technology, New Delhi 110078, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2484-4649","authenticated-orcid":false,"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Toronto Metropolitan University, Toronto, ON M5B 2K3, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,13]]},"reference":[{"key":"ref_1","unstructured":"(2022, January 24). The Internet of Everything Global Public Sector Economic Analysis. Available online: https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/business-insights\/docs\/ioe-value-at-stake-public-sector-analysis-faq.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Dey, N., Shinde, G., Mahalle, P., and Olesen, H. (2019). The Internet of Everything: Advances, Challenges and Applications, De Gruyter.","DOI":"10.1515\/9783110628517"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Farias da Costa, V.C., Oliveira, L., and de Souza, J. (2021). Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors, 21.","DOI":"10.3390\/s21020568"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.comcom.2020.03.017","article-title":"Unmanned aerial vehicle for internet of everything: Opportunities and challenges","volume":"155","author":"Liu","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e4793","DOI":"10.1002\/dac.4793","article-title":"Internet of Vehicles: Architecture, services, and applications","volume":"34","author":"Abbasi","year":"2021","journal-title":"Int. J. Commun. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Samie, F., Bauer, L., and Henkel, J. (2016, January 2\u20137). IoT technologies for embedded computing: A survey. Proceedings of the 2016 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ ISSS), Pittsburgh, PA, USA.","DOI":"10.1145\/2968456.2974004"},{"key":"ref_7","unstructured":"Benjamin, C.D. (2022, February 04). Transatlantic Cyber Insecurity and Cybercrime: Economic Impact and Future Prospects. Available online: https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2017\/603948\/EPRS_STU(2017)603948_EN.pdf."},{"key":"ref_8","first-page":"406","article-title":"Addressing Sinkhole Attacks in Wireless Sensor Networks\u2014A Review","volume":"9","author":"Ali","year":"2020","journal-title":"Int. J. Sci. Technol. Res."},{"key":"ref_9","unstructured":"Daniel, S., Prashanth, K., and Edison, P. (2022, January 22). Residual Energy Monitoring in Wireless Sensor Networks [Technical Report]. Available online: https:\/\/www.divaportal.org\/smash\/get\/diva2:446791\/FULLTEXT01.pdf."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"13186","DOI":"10.1109\/ACCESS.2021.3051976","article-title":"Quantitative Study on Impact of Static\/Dynamic Selfishness on Network Performance in VANETs","volume":"9","author":"Shan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"55009","DOI":"10.1109\/ACCESS.2021.3071309","article-title":"Securing and facilitating communication within opportunistic networks: A holistic survey","volume":"9","author":"Avoussoukpo","year":"2021","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"41","DOI":"10.4236\/jcc.2015.312005","article-title":"Security: A core issue in mobile ad hoc networks","volume":"3","author":"Shabbir","year":"2015","journal-title":"J. Comput. Commun."},{"key":"ref_13","first-page":"46","article-title":"Identification technique for all passive selfish node attacks in a mobile network","volume":"3","author":"Mittal","year":"2015","journal-title":"Int. J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"100050","DOI":"10.1016\/j.iot.2019.100050","article-title":"Enforcing security in Internet of Things frameworks: A systematic literature review","volume":"6","author":"Aly","year":"2019","journal-title":"Internet Things"},{"key":"ref_15","unstructured":"Voas, J., Kuhn, R., Laplante, P., and Applebaum, S. (2018). Internet of things (IoT) trust concerns. NIST Cybersecurity White Paper, NIST."},{"key":"ref_16","unstructured":"Horyachyy, O. (2017). Comparison of Wireless Communication Technologies Used in a Smart Home: Analysis of Wireless Sensor Node Based on Arduino in Home Automation Scenario. [Master\u2019s Thesis, Blekinge Institute of Technology]."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"e4166","DOI":"10.1002\/ett.4166","article-title":"A systematic survey on internet of things: Energy efficiency and interoperability perspective","volume":"32","author":"Rana","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Navarro, M., Li, Y., and Liang, Y. (2014, January 4\u20136). Energy profile for environmental monitoring wireless sensor networks. Proceedings of the 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), Bogota, Colombia.","DOI":"10.1109\/ColComCon.2014.6860416"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"9921826","DOI":"10.1155\/2021\/9921826","article-title":"A survey on the noncooperative environment in smart nodes-based Ad Hoc networks: Motivations and solutions","volume":"2021","author":"Khan","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Dimitriou, G., Kikiras, P.K., Stamoulis, G.I., and Avaritsiotis, I.N. (2005, January 11\u201313). A tool for calculating energy consumption in wireless sensor networks. Proceedings of the Panhellenic Conference on Informatics, Volos, Greece.","DOI":"10.1007\/11573036_58"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kim, W., Umar, M.M., Khan, S., and Khan, M.A. (2022). Novel Scoring for Energy-Efficient Routing in Multi-Sensored Networks. Sensors, 22.","DOI":"10.3390\/s22041673"},{"key":"ref_22","unstructured":"(2015). ETSI White Paper No. 8. Quantum Safe Cryptography and Security: An Introduction, Benefits, Enablers and Challenges, European Telecommunications Standards Institute."},{"key":"ref_23","unstructured":"Chris, P. (2014, January 1\u20133). Lattice cryptography for the internet. Proceedings of the International Workshop on Post-Quantum Cryptography, Waterloo, ON, Canada."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1568318.1568324","article-title":"On lattices, learning with errors, random linear codes, and cryptography","volume":"56","author":"Regev","year":"2009","journal-title":"J. ACM"},{"key":"ref_25","unstructured":"Stebila, D. (2021, December 13). Introduction to Post-Quantum Cryptography and Learning with Errors [PowerPoint Slides]. Available online: https:\/\/summerschool-croatia.cs.ru.nl\/2018\/slides\/Introductiontopost-quantumcryptographyandlearningwitherrors.pdf."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"71","DOI":"10.3390\/iot2010005","article-title":"Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms","volume":"2","author":"Asif","year":"2021","journal-title":"IoT"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"132675","DOI":"10.1109\/ACCESS.2021.3112940","article-title":"Relaying in the Internet of Things (IoT): A Survey","volume":"9","author":"Uyoata","year":"2021","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Hassan, R., Qamar, F., Hasan, M.K., Aman, A.H.M., and Ahmed, A.S. (2020). Internet of Things and its applications: A comprehensive survey. Symmetry, 12.","DOI":"10.3390\/sym12101674"},{"key":"ref_29","first-page":"291","article-title":"A survey on Internet of Things architectures","volume":"30","author":"Ray","year":"2018","journal-title":"J. King Saud Univ.\u2014Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1729","DOI":"10.1007\/s10586-021-03380-7","article-title":"Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: A survey","volume":"25","author":"Seyhan","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Khan, S., Sharma, I., Aslam, M., Khan, M.Z., and Khan, S. (2021). Security challenges of location privacy in VANETs and state-of-the-art solutions: A survey. Future Internet, 13.","DOI":"10.3390\/fi13040096"},{"key":"ref_32","first-page":"9629381","article-title":"Understanding security requirements and challenges in Internet of Things (IoT): A review","volume":"2019","author":"Hameed","year":"2019","journal-title":"J. Comput. Netw. Commun."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Karakaya, A., and Akleylek, S. (2018, January 22\u201325). A survey on security threats and authentication approaches in wireless sensor networks. Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey.","DOI":"10.1109\/ISDFS.2018.8355381"},{"key":"ref_34","unstructured":"Barreto, P.S., Ricardini, J.E., Simplicio, M.A., and Patil, H.K. (2021, December 21). qscms: Post-quantum certificate provisioning process for V2X. Cryptology ePrint Archive. Available online: https:\/\/eprint.iacr.org\/2018\/1247.pdf."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"7823979","DOI":"10.1155\/2018\/7823979","article-title":"NTRU implementation of efficient privacy-preserving location-based querying in VANET","volume":"2018","author":"Mi","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"e01321","DOI":"10.1016\/j.heliyon.2019.e01321","article-title":"LRSPPP: Lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid","volume":"5","author":"Agarkar","year":"2019","journal-title":"Heliyon"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/s12083-019-00776-6","article-title":"A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography","volume":"13","author":"Srivastava","year":"2020","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1007\/s11277-020-07396-x","article-title":"Ring signature-based conditional privacy-preserving authentication in VANETs","volume":"114","author":"Mundhe","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"4660875","DOI":"10.1155\/2021\/4660875","article-title":"V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System","volume":"2021","author":"Chen","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_40","first-page":"102772","article-title":"End-to-end secure group communication for the Internet of Things","volume":"58","author":"Lizardo","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Liu, Y., Wu, M., Li, J., Liu, S., and Zhao, J. (2022). Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt. Electronics, 11.","DOI":"10.3390\/electronics11060856"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Michiardi, P., and Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Advanced Communications and Multimedia Security, Springer.","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.cose.2018.04.015","article-title":"A taxonomy on misbehaving nodes in delay tolerant networks","volume":"77","author":"Khalid","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1186\/s13673-019-0183-8","article-title":"Trust-based recommendation systems in Internet of Things: A systematic literature review","volume":"9","author":"Mohammadi","year":"2019","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.eij.2015.05.003","article-title":"Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs","volume":"16","author":"Sengathir","year":"2015","journal-title":"Egypt. Inform. J."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Vij, A., Sharma, V., and Nand, P. (2018, January 12\u201313). Selfish node detection using game theory in MANET. Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India.","DOI":"10.1109\/ICACCCN.2018.8748632"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Fayaz, M., Mehmood, G., Khan, A., Abbas, S., Fayaz, M., and Gwak, J. (2022). Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics, 11.","DOI":"10.3390\/electronics11020185"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"716468","DOI":"10.1155\/2015\/716468","article-title":"Trust-aware and low energy consumption security topology protocol of wireless sensor network","volume":"2015","author":"Chen","year":"2015","journal-title":"J. Sens."},{"key":"ref_49","first-page":"2404","article-title":"Detection of selfish nodes through reputation model in mobile adhoc network-MANET","volume":"12","author":"Ponnusamy","year":"2021","journal-title":"Turk. J. Comput. Math. Educ."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Alnumay, W., Ghosh, U., and Chatterjee, P. (2019). A Trust-Based predictive model for mobile ad hoc network in internet of things. Sensors, 19.","DOI":"10.3390\/s19061467"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Shan, A., Fan, X., Wu, C., Zhang, X., and Fan, S. (2021). Quantitative study on the impact of energy consumption based dynamic selfishness in MANETs. Sensors, 21.","DOI":"10.3390\/s21030716"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1186\/1687-1499-2014-88","article-title":"Performance evaluation of a cooperative reputation system for vehicular delay-tolerant networks","volume":"2014","author":"Dias","year":"2014","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"109026","DOI":"10.1109\/ACCESS.2019.2933873","article-title":"Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov)","volume":"7","author":"Rehman","year":"2019","journal-title":"IEEE Access"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"e3232","DOI":"10.1002\/dac.3232","article-title":"An altruism-based trust-dependent message forwarding protocol for opportunistic networks","volume":"30","author":"Kumar","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"e4364","DOI":"10.1002\/dac.4364","article-title":"Message trust-based secure multipath routing protocol for opportunistic networks","volume":"33","author":"Dhurandher","year":"2020","journal-title":"Int. J. Commun. Syst."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"3463","DOI":"10.1049\/iet-com.2019.0657","article-title":"T_CAFE: A trust based security approach for opportunistic IoT","volume":"13","author":"Kandhoul","year":"2019","journal-title":"IET Commun."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11277-020-08010-w","article-title":"An efficient and secure data forwarding mechanism for opportunistic IoT","volume":"118","author":"Kandhoul","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"e5246","DOI":"10.1002\/dac.5246","article-title":"Reliable data communication using post-quantum encryption in Internet of Everything","volume":"2022","author":"Balaji","year":"2022","journal-title":"Int. J. Commun. Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6928\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:30:41Z","timestamp":1760142641000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,13]]},"references-count":58,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["s22186928"],"URL":"https:\/\/doi.org\/10.3390\/s22186928","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,13]]}}}