期刊文献+

P2P网络中基于全局信任值的激励机制 被引量:3

Incentive Mechanism Based on Global Trust Values in P2P Networks
原文传递
导出
摘要 针对自由骑问题,提出一种基于全局信任值的激励机制,以激励节点积极贡献、可靠服务。在大规模的P2P网络中,节点间交易的随机性造成建立重复博弈的概率极低,导致TfT(Tit-for-Tat)策略失效。节点的全局信任值能够反映节点对网络贡献大小与服务质量好坏,基于节点间全局信任值的差异设置服务响应规则、查询转发规则以及邻居选择规则,形成一种普适性更强的激励机制,间接体现TfT策略。仿真实验表明,这种激励机制能够抑制自由骑,鼓励节点共享资源。 Aiming at the flee-tiding problem, an incentive mechanism based on the global trust value of nodes was proposed to encourage nodes to contribute actively and service dependably. The randomicity of trades between nodes results in the probability to build up a repeated game is very low, and brings about the TIT (Tit-for-Tat) strategy to loss effect in the large-scale P2P network. Global trust values of nodes can reflect their contribution and service quality to networks. Based on the difference of global trust values between nodes, some rules including response of service, forward of query and selection of neighbor are established to form an incentive mechanism which has good universality and reflect the TfT strategy indirectly. Simulations show the incentive mechanism can suppress free-riders and encourage nodes to share resources.
出处 《系统仿真学报》 CAS CSCD 北大核心 2013年第5期1046-1052,共7页 Journal of System Simulation
基金 国家自然科学基金(60973127) 湖南省教育厅科研项目(10C0759 07A024) 湖南省自然科学基金(10JJ2044) 湖南省高校科技创新团队支持计划资助(湘教通[2012]318号)
关键词 对等网络 激励机制 自由骑 全局信任值 peer-to-peer network incentive mechanism flee-riding global trust value
  • 相关文献

参考文献13

  • 1Hughes D, Coulson G, Walkerdine J. Free riding on Gnutella revisited: the bell tolls? [J]. IEEE Distributed Systems Online (S1541-4922), 2005, 6(6): 1-18.
  • 2Zhao Y, Hou X X, Yang M, et al. Measurement study and application of social network in the Maze P2P file-shing system [C]// Proceedings of the 1st Int'l Conf. on Scalable Information Systems. New York, USA: ACM Press, 2006: 290-293.
  • 3Runfang Zhou, Kai Hwang. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing [J]. IEEE Transactions on Parallel and Distributed Systems (S1045-9219), 2007, 18(5): 460-473.
  • 4Feldman M, Papadimitriou C, Chuang J, et al. Free-riding and whitewashing in peer-to-peer systems [J]. IEEE Journal on Selected Areas in Communications (S0733-8716), 2006, 24 (5): 1010-1019.
  • 5Castro M, Druschel P, Ganesh A, et al. Security for structured peer-to-peer overlay networks [C]// Proceeding of 5th Symposium on Operating Systems Design and Implementation (OSDI 2002). Boston, MA, USA:ACM Press, 2002:102-115.
  • 6Friedman E J, Resnick P. The social cost of cheap pseudonyms [J]. Journal of Economics and Management Strategy (S1058-6407), 2001, 10(2): 173-199.
  • 7Axelrod R, Hamilton W D. The evolution of cooperation [M]. New York, USA: Basic Books, 1984: 78-97.
  • 8Bram Cohen. BitTorrent Protocol [EB/OL] (2011-4-12) [2011-6-10]. http://bitconjurer.org/BitTorrent.
  • 9Cohen B. Incentives build robusmess in BitTorrent [C]// Proceeding of the First Workshop on the Economics of Peer-to-Peer Systems (P2P-Eeon'03), Berkeley, CA, USA: ACM Press, 2003:231-238.
  • 10欧阳竟成,林亚平,周四望,张建明,易叶青.P2P环境下的全局信任值分级计算方法[J].通信学报,2008,29(8):38-45. 被引量:5

二级参考文献18

  • 1李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 2GRANVILLE L Z, ROSE D M, PANISSON A, et al. Managing computer networks using peer-to-peer technologies[J]. IEEE Commu- nications Magazine, 2005,43(10):62-68.
  • 3Kazaa(EB/OL): http://www.kazaa.com/,2006.
  • 4LIANG J, KUMAR R, XI Y, et al. Pollution in P2P file sharing systems[A]. Proceeding of the IEEE Infocom 2005[C]. 2005. 1174-1185.
  • 5KAMWAR S D, SCHLOSSER M T, GARCIA-MOL1NA H. The EigenTrust algorithm for reputation management in P2P networks[A]. Proceeding of the 12th Int'l World Wide Web Conference[C]. Budapest, Hungary,2003. 640-651.
  • 6XIONG L, LIU L. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7):843-857.
  • 7SAROIU S, GUMMADI K P, DUNN R J, et al. An analysis of Internet content delivery systems[A]. Proceeding of the 5th Symposium on Operating Systems Design and Implementation[C]. Association, 2002. 315-327.
  • 8SEN S, WANG J. Analyzing peer-to-peer traffic across large networks[J]. IEEE Transactions on Networking, 2004,12(2):219-232.
  • 9HAVELIWALA T H, KAMVAR S D. The second eigenvalue of the google matrix[EB/OL], http://dbpubs.stanford.edu/publ2003-20,2003.
  • 10ZHOU R, HWANG K. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(5):460-473.

共引文献4

同被引文献35

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部