期刊文献+

INCENTIVE MECHANISMS FOR TRUSTWORTHY ROUTING BASED ON GAME MODEL OF THE STRATEGIES OF NODES IN P2P NETWORKS

INCENTIVE MECHANISMS FOR TRUSTWORTHY ROUTING BASED ON GAME MODEL OF THE STRATEGIES OF NODES IN P2P NETWORKS
下载PDF
导出
摘要 The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then,two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed,namely trust associated mechanism and trust compensated mechanism. Simulation results show that the incentive mechanisms proposed in this paper will encourage cooperation actions of good nodes and restrain malicious actions of bad nodes,which ensure the trustworthiness of routing consequently. The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then, two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed, namely trust associated mechanism and trust compensated mechanism. Simulation results show that the in- centive mechanisms proposed in this paper will encourage cooperation actions of good nodes and re- strain malicious actions of bad nodes, which ensure the trustworthiness of routing consequently.
出处 《Journal of Electronics(China)》 2009年第6期842-852,共11页 电子科学学刊(英文版)
基金 Supported by the Hi-Tech R&D Program (863) of China (2006AA01Z232) the Research Innovation Program for Graduate Student in Jiangsu Province (CX07B-11OZ)
关键词 Peer-to-Peer (P2P) network ROUTING Node GAME Strategy P2P网络 路由策略 激励机制 中节点 博弈论 策略模型 对等网络 盈利模式
  • 相关文献

参考文献10

  • 1N. Fedotova,L. Veltri.Byzantine generals prob- lem in the light of P2P computing[].Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.2006
  • 2L. Hou,,H. X. Duan,,J. P. Wu.Scheduling peers based on credit construction period in peer-to-peer networks[].th IEEE International Conference on Parallel and Distributed Systems.2008
  • 3C. Hota,,M. S. V. Srikanth,,A. Yla-Jaaski,,J. Lindqvist, et al.Safeguarding against Sybil attacks via social networks and multipath routing[].Second International Conference on Communications and Networking in China.2007
  • 4A. Blanc,Y. K. Liu,,A. Vahdat.Designing in- centives for peer-to-peer routing[].th Annual Joint Conference of the IEEE Computer and Communica- tions Societies.2005
  • 5J. M. Fu,,H. J. Xiong,,Z. Li, et al.PerformTrust: trust model integrated past and current performance in p2p file sharing systems[].IEEE/ACS International Con- ference on Computer Systems and Applications.2008
  • 6X. Q. Liu,,S. B. Yang,,L. T. Guo, et al.Profit sharing based routing trust evaluation algorithm in P2P network[].Third China Grid Annual Conference.2008
  • 7A. Josang,,T. Bhuiyan.Optimal trust network analysis with subjective logic[].Second International Conference on Emerging Security Information Sys- tems and Technologies.2008
  • 8M. Harish,,G. S. Mahalakshmi,,T. V. Geetha.Game theoretic model for P2P trust management[].International Conference on Computational Intelli- gence and Multimedia Applications.2007
  • 9SEARS W,YU Z,GUAN Y.An adaptive reputationbased trust framework for peer-to-peer applications. Fourth IEEE International Symposium on Network Computing and Applications . July27-292005
  • 10Feldman,M.,Papadimitriou,C.,Chuang,J.Free-riding and whitewashing in Peer-to-Peer systems[].IEEE Journal of Selected Areas in Communications.2006

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部