期刊文献+

MSNs中基于TCC感知的数据转发方法 被引量:1

Data forwarding method based on TCC-aware in mobile social networks
下载PDF
导出
摘要 现有的移动社交网络数据转发方法大多没有考虑到处存在的暂态连通区域(TCC),导致数据转发质量较低。为此,根据5组真实数据对TCC属性与数据转发性能的关系进行分析,提出一种基于TCC感知的数据转发算法。考虑到该算法会增加网络中数据拷贝的数量,提出改进型TCC感知数据转发策略,通过选择TCC中的最优节点集,避免它们的相遇重叠现象,利用少量节点实现数据转发机会最大化。仿真结果表明,所提方法的性能在数据投递率和网络开销方面的性能优于当前其它数据转发算法。 The existing data forwarding methods seldom consider transient connected components(TCC)in mobile social networks,leading to the low quality of data forwarding.To solve this problem,the relationship between TCC attributes and data forwarding performance was analyzed according to the five groups' real data,and a TCC-aware data forwarding algorithm was proposed.Considering that the mentioned algorithm increased the number of data copies in mobile social networks,the improved TCC-aware data forwarding strategy was proposed,which can enhance the TCC-aware data forwarding by selecting an optimal set of nodes in the TCC to avoid overlap in their contacts and maximize the data forwarding opportunity with a small number of nodes.Simulation results show that the proposed TCC-aware data forwarding strategies outperform existing data forwarding strategies in terms of data delivery ratio and network overhead.
出处 《计算机工程与设计》 北大核心 2017年第6期1556-1563,共8页 Computer Engineering and Design
关键词 移动社交网络 暂态连通区域 数据转发 最优节点集 数据投递率 网络开销 mobile social networks transient connected components data forwarding optimal set of nodes data delivery ratio network overhead
  • 相关文献

参考文献2

二级参考文献24

  • 1彭泗清.信任的建立机制:关系运作与法制手段[J].社会学研究,1999(2):55-68. 被引量:381
  • 2Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Pro-ceedings of the International Conference on Mobile Systems.Applications, and Services (MobiSys,03). San Fransisco,USA, 2003; 31-42.
  • 3Pan X, Xu J,Meng X. Protecting location privacy againstlocation-dependent attacks in mobile services. IEEE Transac-tions on Knowledge and Data Engineering, 2012, 24 (8):1506-1519.
  • 4Mokbel M F, Chow C Y,Aref W G. The newcasper:Queryprocessing for location services without compromising privacy//Proceedings of the 32nd Conference of Very Large Databases(VLDB 2006). Seoul, 2006:763-774.
  • 5Bamba B,Liu L. Supporting anonymous location queries inmobile environments with privacy grid//Proceedings of the17th International Conference on World Wide Web (WWW2008). Beijing, 2008; 237-246.
  • 6Krumm J. A survey of computational location privacy.Personal and Ubiquitous Computing, 2009,13(6):391-399.
  • 7Huo Z, Meng X, Hu H,Huang Y. You can walk alone:Trajectory privacy-preserving through significant stays pro-tection//Proceedings of the 17th International Conference onDatabase Systems for Advanced Applications (DASFAA,12).Busan, Korea,2012:351-366.
  • 8You T H, Peng W C,Lee W C. Protecting moving trajecto-ries with dummies//Proceedings of the 8th InternationalConference on Mobile Data Management (MDM,07). Mann-heim, Germany, 2007 ; 278-282.
  • 9Terrovitis M, Mamoulis N. Privacy preserving in the publi-cation of trajectories//Proceedings of the 9th InternationalConference on Mobile Data Management (MDM,08). Bei-jing, China, 2008:65-72.
  • 10Gruteser M, Liu X. Protecting privacy in continuous locationtracking applications. IEEE Security and Privacy, 2004,2(2):28-34.

共引文献159

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部