期刊文献+

自私性机会网络中的节点激励策略研究 被引量:7

Research on Incentive Strategy of Nodes in Selfish Opportunistic Network
下载PDF
导出
摘要 机会网络中的节点由于自身资源受限,在转发消息时具有自私性。为了激励节点相互合作,已经提出的激励策略用虚拟货币激励自私节点转发消息,但存在虚拟货币不足和虚假报价的问题。为解决上述问题,提出一种基于可透支虚拟货币机制的节点激励策略。该策略设计了可透支的虚拟货币机制,以节点消息转发能力作为货币透支担保来解决虚拟货币不足的问题;策略中的交易机制保持资源状态和财富状态公开,如果消息交易无法一次完成,交易双方将根据对方的资源状态和财富状态友好地进行二次议价来抑制节点虚假报价的问题。仿真实验验证了该策略中节点激励机制的有效性以及可透支虚拟货币机制的有效性,并证明该策略有效地抑制了节点的虚假报价现象。 Nodes in opportunistic network are selfish due to limited resource when transmitting messages.In order to encourage nodes to cooperate with each other,the incentive strategies have been proposed to use virtual currency to motivate selfish nodes to transmit messages,but there exist problems of virtual currency shortage and mendacious offer.With the purpose of solving the above problems,this paper proposed a node incentive strategy based on the mechanism of overdraft virtual currency.The strategy designs mechanism of overdraft virtual currency,which uses the ability of messages transmitting of a node as monetary overdraft guarantee to solve the problem of virtual currency shortage.The resource and wealth status are public in the trading mechanism of the strategy,if the message transaction cannot be completed once,the two sides will friendly bargain based on resource and wealth status to suppress the issue of mendacious offer.Simulation results show that the proposed strategy is of effectiveness of the strategy and mechanism of virtual currency,and can suppress the issue of mendacious offer.
出处 《计算机科学》 CSCD 北大核心 2017年第4期213-217,222,共6页 Computer Science
基金 河南省教育厅科技研究重点项目(14A520021)资助
关键词 机会网络 自私节点 虚拟货币 虚假报价 Opportunistic network Selfish nodes Virtual currency Mendacious offer
  • 相关文献

参考文献4

二级参考文献68

  • 1ChenJ, Cao X, Zhang Y, Xu W, Sun Y. Measuring the performance of movement-assisted certificate revocation list distribution in VANET. Wireless Communieation and Mobile Computing, 2011, 11(7): 888-898.
  • 2Warthman F. The interplanetary Internet [networked space communications]. IEEE Spectrum, 2005, 42(8) : 30-35.
  • 3Juang P, Oki H, Martonosi M. Energy-effieient computing for wildlife traeking~ Design tradeoffs and early experiences with zebranet//Proceedings of the 10th International Confer- enee on Architectural Support for Programming Languages and Operating System. San Jose, USA, 2002:96-107.
  • 4Small Tara, Haas Zygmunt J. The shared wireless infestation model: A new ad hoc networking paradigm//Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing. New York, USA, 2003:233-244.
  • 5Resta Giovanni, Santi Giovanni. A framework for routing performance analysis in delay tolerant networks with applica- tion to non cooperative networks. IEEE Transactions on Parallel and Distributed Systems, 2011, 23(1): 2-10.
  • 6Li N, Das S. RADON: Reputation-assisted data forwarding in opportunistic networks//Proceedings of the 2nd Interna tional Workshop on Mobile Opportunistic Networking. Pisa, Italy, 2010:8-14.
  • 7Shevade U, Song H, et al. Incentive-aware routing in DTNs//Proceedings o{ the IEEE International Conference on Network Protocols. Orlando, USA, 2008:238-247.
  • 8Chen B, Chan M. MobiCent.. A Credit-based incentive sys- tem for disruption tolerant network//Proeeedings of the IEEE Conference on Computer Communications. San Diego, USA, 2010: 14-19.
  • 9Lindgren A, Doria A, Schelon O. Probabilistic routing in in- termittently connected networks. ACM SIGMOBLE Mobile Computing and Communications Review, 2003, 7(3): 19 -20.
  • 10Dutta Prajit K. Strategies and Games: Theory and Practice. Massachusetts, USA.. MIT Press,1999.

共引文献36

同被引文献57

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部