期刊文献+

基于博弈的无线Mesh网络高效可靠路由算法 被引量:1

Game-based efficient and reliable routing algorithm in wireless Mesh networks
下载PDF
导出
摘要 由于无线网络节点自身资源有限,末端节点往往会表现出自私行为以保证其生存时间和工作效率.针对这些特点提出了一种基于博弈的能量容忍策略(ETS)模型,该模型在经典针锋相对(TFT)策略的基础上,加入合作度及能量容忍因子,宽容节点一定程度的自私行为,并给予自私节点改过自新的机会,使其能够恢复合作.同时,基于ETS设计一种路由激励机制,通过奖惩激励自私节点放弃自私行为,并对能量相对较低的节点进行保护,在一定程度上避免个别繁忙节点过度消耗,均衡网络能量,延长了网络的运行时间.实验表明ETS激励机制在防止节点自私行为、优化网络吞吐率和网络生存时间方面等表现出较好的性能优势. Due to their limited resources, the end nodes often show selfish behavior for its lifetime and ef- fidenc3'. In this paper, we protxe a strategy based on the game called energy tolerance strategy (ETS) model. Main thinking of the rn^el are as folows. Bas~ on the classic tit for tat (TFT) stmt^y, we first add tolerance factor including energy and cooperation, which has a certain degree of tolerance for selfish node behavior and gives the opportunity of rehabilitation to selfish nodes so that they can quickly resume cooperation. Then, this paper pro~ a way to encoumqges load balancing. The mechanism encourages selfish nodes to give up selfish behavior, and recovers cooperative behavior rapidly after receiving system punishments and excessive consumption of busy nodes, It also keeps the balance of energy throughout the network, and extends the network' s running time. Experiments indicate that the mechanism shows a better performance advantage in preventing the selfish behavior of nodes and optimizing network through- put and network lifetime.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2013年第5期41-47,共7页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家自然科学基金资助项目(60903196 61272451)
关键词 无线MESH网络 博弈论 路由机制 wireless Mesh network game theory routing mechanism
  • 相关文献

参考文献9

  • 1Buttyan L, Hubaux J. Stimulating cooperation in self-orga- nizing mobile Ad Hoc networks[J]. Mobile Networks and Applications, 2003, 8(5): 579-582.
  • 2Buttyan L, Hubaux J. Enforcing service availability in mo- bile Ad-Hoc WANs[C]//Proceedings of the 4th ACM In- ternational Symposium on Mobile Ad-Hoc Networking and Computing (Mobi-HOC), Boston, 2000 :87 - 96.
  • 3Zhong S, (;hen J, Yang Y R. Sprite: A simple, cheat- proof, credit-based system for mobile Ad-Hoc networks [C]//Proceedings of the 22th IEEE International Confer- ence on Computer Communications, San Francisco Califor- nia,2003: 1987- 1997.
  • 4Marti S, Giuli T J, Lai K, et al. Mitigating muting mis- behavior in mobile Ad Hoc networks[ C] //Proceedings of the 6th International Conference on Mobile Computing and Networking, Boston, 2000: 255-265.
  • 5Lu Yan, Stephen Hailes, Licia Capra. Analysis of packet retaying models and incentive strategies in wireless Ad-Hoc networks with game theory [ C ]//22nd International Con- ference on Advanced Information Networking and Applica- tions, 2008,28:1062 - 1069.
  • 6Guan Wang, Yu Sun, Jianwei Liu. A modified cooperation stimulation mechanism based on game theory in Ad-Hoc networks[ C]//IEEE International Conference on Informa- tion Theory and Information Security, 2010:379- 383.
  • 7汪洋,林闯,李泉林,王竞奇,姜欣.基于非合作博弈的无线网络路由机制研究[J].计算机学报,2009,32(1):54-68. 被引量:32
  • 8Buchegger S, Boudec J L. Performance analysis of the con- fidant protocol: Cooperation of nodes-fairness in dynamic Ad-Hoc networks [ C]//Proceeclings of the IEEE/ACM Symposium on Mobile Ad-Hoc Networking and Computing Lausanne, Switzerland, 2002:226-236.
  • 9陈晶,杜瑞颖,王丽娜,田在荣.网络环境下一种基于概率密度的信任博弈模型[J].电子学报,2010,38(2):427-433. 被引量:14

二级参考文献42

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2Mui L. Computational models of trust and reputation Agents, evolutionary games, and social networks EPh. D. dissertationS. Massachusetts Institute of Technology, Cambridge, MA, USA, 2003
  • 3Josang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. Deeision Support Systems, 2007, 43(2): 618-644
  • 4Marti S, Giuli T J, Lai K, Baker M. Mitigating routing misbehavior in mnobile ad hoe networks//Proeeedings of the 6th International Conference on Mobile Computing and Networking(Mobieom). Boston, MA, USA, 2000:255-265
  • 5Buehegger S, Boudec J L. Performance analysis of the confidant protocol: Cooperation of nodes--Fairness in dynamic ad-hoc networks//Proeeedings of the IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (Mobi- HOC). Lausanne, Switzerland, 2002:226-236
  • 6Michiardi P, Molva R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks//Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security. Deventer, The Netherlands, 2002:107-121
  • 7Buttyan L, Hubaux J. Stimulating cooperation in self-organizing mobile ad hoe networks. Mobile Networks and Applications, 2003, 8(5): 579-582
  • 8Buttyan L, Hubaux J. Enforcing service availability in mobile ad-hoc wans//Proeeedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). Boston, MA, USA, 2000:87-96
  • 9Srinivasan V, Nuggehalli P, Chiasserini C F, Rao R R. Cooperation in wireless ad hoc networks//Proceedings of the 22th IEEE International Conference on Computer Communi- cations (Infocom). San Francisco California, USA, 2003: 808-817
  • 10Srinivasan V, Nuggehalli P, Chiasserini C F, Rao R R. Energy eciency of ad hoc wireless networks with selfish users// Proceedings of the European Wireless Conference (EW2002). Florence, Italy, 2002

共引文献44

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部