期刊文献+

MANET增强合作模型的理论研究 被引量:3

Theoretical Study with the Model for MANET Cooperation Enforcement
下载PDF
导出
摘要 为了解决移动Ad hoc网络(MANET)中因保存能量而拒绝合作的节点自私性问题,对刺激合作的激励模型进行了研究,提出了将经济学上的委托一代理关系应用到Ad hoc网络的发报方与参与转发数据包的节点上.利用简化的博弈原理,使合作双方虚拟货币收支达到一定的纳什均衡.模型将刺激合作方案设计转化为发报方的最优激励合同设计问题,从而在理论上保证发报方以最小的成本设计一种机制,促使转发节点尽力工作,在一定程度上抑制了合作中的自私性行为. To solve the selfishness problems caused in energy saving in mobile Ad hoe network (MANET), an incentive model is studied by introducing the principal-agent theory into the relationship between the source nodes and the participating nodes. The income and outcome of both sides can reach the Nash equilibrium by using the simple game theory. This model changes the cooperation plan designing into the optimal incentive contract designing, with which the source nodes will theoretically take the lowest cost for making the participating nodes work hard. Therefore the selfishness can restrained to a certain degree.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第5期21-24,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60372097 60432040 60572020) 北京市自然科学基金项目(4052021) 教育部博士点基金项目(20060013008) 韩国仁荷大学IT研究中心项目(INHA UWB-ITRC)
关键词 AD HOC 自私性 委托-代理 纳什均衡 博弈 Ad hoc selfishness principal-agent Nash equilibrium game theory
  • 相关文献

参考文献12

  • 1Miranda H, Rodrigues L. Preventing selfishness in open mobile Ad hoc networks[EB/OL], http://www, newcastle, research, ec. org/cabernet/workshops/radicals/ 2002/Papers/Bertinoro/21. pdf.
  • 2Marti S, Giuli T J. Mitigating routing misbehavior in mobile Ad hoe networks[C]//MobiCOM 2000. Boston: [s.n. ], 2000.. 255-265.
  • 3Michiardi P, Molva R. Simulation-based analysis of security exposures in mobile Ad hoc networks[C]//Proceedings of European Wireless Conference. Firenze: [s. n. ], 2002.
  • 4Buchegger S, Boudec J Y L. Performance analysis of the Confidant protocol: cooperation of nodes-fairness in dynamic Ad-hoc networks[C]//MobiHOC 2002. Lausanne: [s. n. ], 2002 : 226-236.
  • 5Buchegger S, Boudec J Y L. Nodes bearing grudges; Towards routing security, fairness, and robustness in mobile Ad hoc networks[ C]//Proceedings of the 10th Euromiero Workshop on Parallel, Distributed and Network-based Processing. Canary Islands: [s. n. ], 2002: 403-410.
  • 6Michiardi P, Molva R. Core: a collaborative reputetion mechanism to enforce node cooperation in mobile Ad hoc networks[C]//CMS2002. Portoroz: [s. n. ], 2002: 107- 121.
  • 7Buttyan L, Hubaux J P. Report on a working session on security in wireless Ad hoc networks [ J ]. Mobile Computing and Communications Review, 2003, 7 (1) : 74- 94.
  • 8Michiardi P, Molva R. Game theoretic analysis of security in mobile Ad hoc networks[EB/OL]. 2002. http:// www. eurecom, fr / util / publidownload, en. htm? id = 981.
  • 9Buttyan L, Hubaux J P. Enforcing service availability in mobile Ad hoc WANs [ C]//MobiHOC 2000. Boston: [s.n.], 2000: 87-96.
  • 10Buttyan L, Hubaux J P. Stimulating cooperation in selforganizing mobile Ad hoe networks [J ]. Mobile Networks and Applications, 2003, 8(5): 579-592.

二级参考文献5

共引文献19

同被引文献40

  • 1王海涛,宋丽华.ad hoc网络的可生存性问题及设计挑战[J].电信科学,2006,22(4):59-63. 被引量:3
  • 2Komathy K, Narayanasamy P. Best neighbor strategy to enforce cooperation among selfish nodes in wireless Ad Hoc networks[J]. Computer Communications, 2007, 30 (18) : 3721-3735.
  • 3Wang Yong, Attebury G, Ramamurthy B. A survey of security issues in wireless sensor networks[J]. IEEE Commun Surveys & Tutorials, 2006, 8(2) : 2-23.
  • 4Song Shanshan, Hwang K, Zhou Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation [ J ]. IEEE Internet Computing, 2005, 9 (6) : 24-34.
  • 5Perkins C, Belding-Royer E, Das S. RFC 3561 , Ad Hoc on-demand distance vector (AODV) routing[S], 2003.
  • 6Josang A. A logic for uncertain probabilities[ J]. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3) : 279-311.
  • 7Theodorakopoulos G, Baras J S, On trust models and trust evaluation metrics for Ad Hoc networks [J]. IEEE Journal on Selected Areas in Communications, 2006, 24 (2) : 318-328.
  • 8Yu Wei. Game theoretic analysis of cooperation stimulation and security in autonomous mobile Ad Hoc networks [ J ]. IEEE Trans on Mobile Computing, 2007, 6(5) : 507-521.
  • 9Wu Jidong, ZITTERBART M. Service awareness and its challenges in mobile ad hoe networks[C]//Workshop of Information 2001. Wien: IEEE Press, 2001:934-938.
  • 10PAPADOPOULI M, SCHULZRINNE H. Seven degrees of separation in ad hoc networks[C]//Proc of 27th GLOBECOM. San Fransisco: IEEE Press, 2000:527-533.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部