期刊文献+

基于信誉的延迟容忍网络双重Spray and Wait增强方案 被引量:1

Enhanced binary Spray and Wait scheme based on reputation for DTN
下载PDF
导出
摘要 引入转发证据的概念,设计了节点行为观测协议,提出一种基于信誉的双重Spray and Wait增强方案。通过对原始协议直接传输阶段的建模,使得信誉门限的确定建立在概率计算的基础上。仿真结果表明,在自私节点存在的环境中,与原始方案相比,增强方案能够减少自私行为对网络的危害,提高网络性能。 A concept of forwarding credential was introduced, and a detection protocol of behavior was designed. A novel scheme which enhanced the prevalent binary Spray and Wait routing scheme was integrated with reputation to resist the impairment of selfishness. According to the model of bundle transferring, the determination of reputation threshold was based on probability computation. The simulation results suggest that the enhanced scheme gain an advantage over origi- nal one under selfish misbehavior.
出处 《通信学报》 EI CSCD 北大核心 2012年第12期79-84,共6页 Journal on Communications
基金 国家自然科学基金资助项目(61101073)~~
关键词 信誉 延迟容忍网络 激励方案 路由 reputation DTN incentive schemes routing
  • 相关文献

参考文献1

二级参考文献13

  • 1Trung Dong Huynh,Nicholas R. Jennings,Nigel R. Shadbolt.An integrated trust and reputation model for open multi-agent systems[J].Autonomous Agents and Multi - Agent Systems.2006(2)
  • 2Paul Resnick,Richard Zeckhauser,John Swanson,Kate Lockwood.The value of reputation on eBay: A controlled experiment[J].Experimental Economics.2006(2)
  • 3W. T. Luke Teacy,Jigar Patel,Nicholas R. Jennings,Michael Luck.TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources[J].Autonomous Agents and Multi - Agent Systems.2006(2)
  • 4Chrysanthos D.Reputation mechanism mesign in online trading environments with pure moral hazard[].Inf Syst Res.2005
  • 5Kevin W,Emin G S.Experience with an object reputation system for peer-to-peer filesharing[].NSDI‘: Proceedings of the rd conference on rd Symposium on Networked Systems Design & Implementation.2006
  • 6Luke T,Jigar P,Nicholas R, et al.TRAVOS: Trust and reputation in the context of inaccurate information sources[].Auton Agents Multi-Agent Syst.2006
  • 7Chang E,Dillon T S,Hussain F K.Trust and reputation relationships in service-oriented environments[].Proceedings of rd International Conference on Information Technology and Applications (ICITA ).2005
  • 8Jurca R,Faltings.An Incentive compatible reputation mechanism[].Proceedings of the IEEE International Conference on E-Commerce.2003
  • 9Trung D H,Nicholas R J,Nigel R S.An integrated trust and reputation model for open multi-agent systems[].Auton Agents Multi-Agent Syst.2006
  • 10Marti S,Garcia M H.Taxonomy of trust: categorizing p2p reputation systems[].Comp Netw.2006

共引文献6

同被引文献19

  • 1Fall K.A delay-tolerant network architecture for challenged internets[C]//Proc.of ACM SIGCOMM’03.New York:ACM Press,2003:27-34.
  • 2Becker V D.Epidemic routing for partially connected ad hoc networks[R].Technique Report,CS-2000-06,Department of Computer Science,Duke University,Durham,NC,2000.
  • 3Spyropoulos T,Psounis K,Raghavendra C S.Spray and wait:An efficient routing scheme for intermittently connected mobile networks[C]//Proc.of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking.Philadelphia:ACM,2005:252-259.
  • 4Lindgren A,Doria A,Schelén O.Probabilistic routing in intermittently connected networks[J].ACM SIGMOBILE Mobile Computing and Communications Review,2003,7(3):19-20.
  • 5Wang Y,Jain S,Martonosi M,et al.Erasure-Coding based routing for opportunistic networks[C]//Proc.of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking.Philadelphia:ACM,2005:229-236.
  • 6Fawal EI A,Boudec Le J Y,Salamation K.Vulnerabilities in Epidemic Forwarding[C]//World of Wireless Mobile and Multimedia Networks.Espoo Finland,2007:1-6.
  • 7Burgess J,Bissias G D,Corner M,et al.Surviving attacks on disruptiontolerant networks without authentication[C]//Proc.ACM MobiH oc,2007:61-70.
  • 8Chuah M,Yang P.Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme[C]//Proceedings of 18th International Conference on Computer Communications and Networks.San Francisco,CA,2009:1-6.
  • 9Li Yong,Hui Pan,Su Li,et al.Evaluating the Impact of Social Selfishness on the Epidemic Routing in Delay Tolerant Networks[J].IEEE Communications Letters,2010,14(11):1026-1028.
  • 10Choo F C,Chan M C,Chang E C.Robustness of DTN against Routing Attacks[C]//2010 Second International Conference on Communication Systems and Networks.Bangalore,2010:1-10.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部