期刊文献+

基于博弈的移动自组网协作策略研究与分析

Research and Analysis of Game Theory Based Node Cooperation Strategies in Mobile Ad Hoc Networks
下载PDF
导出
摘要 针对移动自组网中自私节点拒绝转发数据包的服务请求,影响整体网络性能的问题进行研究,基于经济学中提出的博弈理论,描述了节点检测记录相邻节点的协作率而识别自私节点的方法,提出了基于统计信息的节点协作重复博弈策略LTFT和LEpTFT,并提出节点根据不同协作目标进行策略选择的方法,分析表明该策略和方法能够有效激励协作并孤立自私节点,能有效的解决网络性能与节点收益的权衡问题,在一定程度上解决节点的协作问题。 With the aim at solving the problem of a selfish node refusing forward service requests of a mobile Ad hoc network,based on a Game theory in economics,this paper describes the method of identifying selfish nodes through detecting the cooperation rates of neighboring nodes and proposes statistics based on repeated Game strategies LTFT and LEpTFT.Also,the paper proposes a rule of adopting different strategies according to different aims of cooperation.Analysis shows that the strategies and rule can effectively encourage cooperation and punish selfishness to solve network problem and nodes to benefit from tradeoffs.
作者 陈丽欣
出处 《计算机系统应用》 2010年第10期182-186,共5页 Computer Systems & Applications
基金 广东商学院自然科学基金(08YB52004)
关键词 博弈 移动自组网 协作意愿 自私节点 LEpTFT策略 game theory mobile Ad hoc networks cooperation intention selfish node LEpTFT strategies
  • 相关文献

参考文献8

  • 1Buttyan L, Hubaux J. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications, 2003,8(5):579- 592. 被引量:1
  • 2Zhong S, Chen J, Yang YR. Sprite: A simple cheat-proof credit-based system for mobile ad hoc networks. Proc. of the IEEE INFOCOM 2003 Washington: IEEE Computer Society, 2003,3: 1987- 1997. 被引量:1
  • 3Buchegger S, Boudec JYL. Performance Analysis of the CONFIDANT Protocol. Proceedings of MobiHoc 2002. 被引量:1
  • 4Michiardi P, Molva R. Core: A COllaborative REputation mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. Proceedings of IFIP Communication and Multimedia Security Conference 2002. 被引量:1
  • 5Anderegg L, Eidenbenz S. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile Ad hoc networks with selfish agents. Proc. ofACM MobiCom. 2003. 被引量:1
  • 6Srinivasan V, Nuggehalli E Cooperation in wireless ad hoc networks. Proc. of the IEEE INFOCOM 2003. Washington: IEEE Computer Society, 2003.808- 817. 被引量:1
  • 7Michiardi P, Molva R. Game Theoretic Analysis of Security in Mobile Ad Hoc Networks. Institut Eurecom Research Report RR- 02 - 070, April 2002. 被引量:1
  • 8Felegyhazi M, Hubaux JP, Buttyan L. Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Trans. On Mobile Computing, 2006,5(5):463 - 476. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部