期刊文献+

基于概率博弈的无线自组网信任推荐激励策略的研究 被引量:6

On Incentive Strategies for Trust Recommendations in Wireless Ad Hoc Networks with Probability Game
下载PDF
导出
摘要 无线自组网中信任推荐依赖于节点间协作,而信任系统自身无法为该行为提供信任评价。为分析节点间信任推荐交互过程建立了重复概率博弈模型,在此基础上分析了TFT,GTFT,OT,GT 4种激励策略对提升节点间信任推荐协作的影响以及各激励策略的均衡边界条件成立的差异。仿真表明,在高突发自私行为比率情况下,GTFT激励策略能保持较高的有效推荐率,提升自私节点的信任推荐协作性,进而帮助信任系统在联合攻击情况下做出及时准确的信任评价。 Trust-recommended behaviors rely on the cooperation among nodes in wireless ad hoc network and trust system itself cannot provide trust evaluations for the behaviors.We proposed a repeated probability game to facilitate the study of the interaction process for trust-recommended behaviors between nodes.Based on the model,we analyzed the INFLUENCE of the four types of incentive strategies,namely TFT,GTFT,OT,GT to motivate the trust-recommended behavior between nodes,as well as the DIFFERENCE of the equilibrium boundary conditions of the four incentives strategies.Simulation results show that,in the high rate of sudden selfish behaviors,GTFT strategy keeps Efficient Recommendation Ratio at a higher level,motivates the cooperation of trust-recommended behaviors and then helps the trust system to make timely and accurate trust evaluations in the case of collusion attacks.
出处 《计算机科学》 CSCD 北大核心 2011年第4期65-71,共7页 Computer Science
基金 国家自然科学基金(60673154 60573132) 江苏省高校自然科学研究(09KJD520005)资助
关键词 概率博弈 无线自组网 信任推荐 联合攻击 Probability game Wireless ad hoc network Trust recommendation Collusion attack
  • 相关文献

参考文献16

  • 1Buchegger S, Boudec J-Y L. Self-policing mobile ad hoc networks by reputation systems[J]. IEEE Communications Magazine, 2005,43(7) :101-107.
  • 2Buchegger S, Boudec J-Y L. A Robust Reputation System for P2P and Mobile Ad-Hoe Networks[C]//Proe. P2PEeon 2004. Harvard Univ. ,Cambridge,MA,June 2004.
  • 3Marti S, Giuli T J , Lai K, et al. Mitigating routing misbehavior in mobile ad hoc networks[C]//Proceedings of the Annual International Conference on Mobile Computing and Networking (MOBICOM) 2000. Boston: ACM Press, 2000 : 255-265.
  • 4Virendra M, Krishnamurthy A, Narayanan K, et al. Environment-Aware Trusted Data Delivery in Multipath Wireless Protocols[A]//Communications in Computer and Information Science(CCIS) 2007[C]. Berlin Heidelberg: Springer, 2007 : 396-401.
  • 5Theodorakpoulos G, Baras J S. On trust models and trust evaluation metrics for ad-hoe networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24 (2): 318-328.
  • 6Theodorakpoulos G. Distributed trust evaluation in ad-hoc networks[D]. Maryland: University of Maryland, 2004.
  • 7Sun Y,Yu W, Han Z. Information theoretic framework of trust modeling and evaluation for ad hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006,249(2):674-679.
  • 8Ma A,Sm E-K,Awf H, et al. A survey on trust and reputation schemes in ad hoc networks[]//Proc, of the 2008 3rd Int' 1 Conf. on Availability,Reliability and Security. USA: IEEE Computer Society Press, 2008 : 881-886.
  • 9Li Rui-dong, Li Jie, Liu Peng, et al. An Objective Trust Management Framework for Mobile Ad Hoc Networks[A]//Vehicular Technology Conference 2007[C] . VTC 007 Spring. April 2007: 56-60.
  • 10Mejia M,Pena N,Munoz J L, et al. A review of trust modeling in ad hoc networks[J]. Internet Research,2009,19(01):88-104.

二级参考文献48

  • 1IETF Mobile Ad-hoe Networks (manet) working group. [Online]. http://www. ietf. org/html. charters/manet-charter. html
  • 2Gnutella. [Online]. http://www. gnutella. com
  • 3Stoica I, Morris R, Karger D, et al. Chord.. A scalable peer-to-peer lookup service for internet applications//Proceedings of the ACM SIGCOMM ' 01 Conference. San Diego, California, August 2001 : 149-160
  • 4Gupta R, Somani A K. Reputation Management Framework and Its Use as Currency in Large-scale Peer-to-Peer Networks// Fourth International Conference on Peer-to-Peer Computing (P2P'04). 2004
  • 5Dewan P,Dasgupta P. Securing P2P networks using peer reputations: Is there a silver bullet//IEEE Consumer Communications and Networking Conference(CCNC). 2005
  • 6Marti S, Gareia-Molina H. Limited Reputation Sharing in P2P Systems//ACM Conference on Eleetronie Commerce (EC'04). 2004
  • 7Buchegger S, Le Boudec Jean-Yves. A Robust Reputation System for P2P and Mobile Ad-hoe Networks. P2PEcon, 2004
  • 8Jaramillo J J , Srikant R. DARWIN : Distributed and Adaptive Reputation mechanism for Wireless ad-hoc Networks. Mobi- Corn' 07. Montr6al, Qu6bec, Canada, September 2007
  • 9Olmedilla D, Rana O, Matthews B, et al. Security and trust issues in semantic grids//Proceedings of the Dagsthul Seminar. Semantic Grid: The Convergence of Technologies, 2005, 05271
  • 10Aringhieri R, Damiani E, Paraboschi S, et al. Fuzzy Techniques for Trust and Reputation Management in Anonymous Peer-to- Peer Systems. Journal of the American Society for Information Science and Technology, 2006,57 (4)

共引文献25

同被引文献37

  • 1Yang D Y, Liao W J. On Bandwidth-Efficient Overlay Multicast [J]. IEEE Transactions on Parallel and Distributed Systems, 2007,18(11): 1503-1515.
  • 2Zhang W Z, Zheng Q H, Li H F, et al. An Overlay Multicast Protocol for Live Sreaming and Delay-guaranteed Interative Media[J]. Journal of Network and Computer Applications, 2012,35 (1) : 20-28.
  • 3Perlman R. Models for IP Muhicast [C]//12th IEEE International Conference on Networks. Institute of Electrical and Electronics Engineers, 2004 : 678-682.
  • 4Kang H J, Oh H R, Song H. Overlay Real-Time Video Multicast System [ J ]. IEICE Transactions on Communication, 2010, 93 (4) : 879-888.
  • 5Feng L X, Yan B P, Luo W M. Overlay Multicast Network Opti mization and Simulation Based on Narada Protocol[C] //10th In- ternational Conference on Advanced Communication Technolo- gy. Institute of Electrical and Electronics Engineers, 2008:2215 2220.
  • 6Tan X R, Datta S. Building Multicast Trees for Multimedia Str- eaming in Heterogeneous P2P Networks[C]//Systems Commu- nications 2005. 2005:141-146.
  • 7Venkataraman V, Yoshida K, Francis P. Chunkyspread: Hetero- genous Unstructured Tree-Based Peer-to-Peer Multicast [C]// 14th IEEE International Conference on Network Protocols. IEEE, 2006 : 2-11.
  • 8Hales D. From Selfish Nodes to Cooperative Networks-Emer- gent Link-based Incentives in Peer-to-Peer Networks [C]// Fourth International Conference on Peer-to-Peer Computing. IEEE,2004:151-158.
  • 9Feldman M, Papadimitriou C, Chuang .l. Free-riding and White- washing in Peer-to-Peer Systems[J]. IEEE Journal on Selected Areas in Communications, 2006,24(5) : 1010-1019.
  • 10Yang M, Feng Q, Dai W F. A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems[C]//27th International Conference on Dis- tributed Computing Systems Workshops. IEEE, 2007 : 29-29.

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部