浏览全部资源
扫码关注微信
1. 哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001
2. 中国电信集团公司哈尔滨分公司,黑龙江 哈尔滨 150001
[ "刘岩(1980-),男,山东莱州人,哈尔滨工程大学博士生,主要研究方向为移动对等网、人工免疫等。" ]
[ "张国印(1962-),男,山东黄县人,哈尔滨工程大学教授、博士生导师,主要研究方向为网络与信息安全、嵌入式系统等。" ]
[ "何金洲(1979-),男,黑龙江哈尔滨人,中国电信集团哈尔滨分公司助理工程师,主要研究方向为移动对等网、3G/4G无线网络优化及协议等。" ]
[ "徐锋(1977-),男,河北沧州人,哈尔滨工程大学博士生,主要研究方向为移动对等网、信息系统安全等。" ]
网络出版日期:2016-01,
纸质出版日期:2016-01-25
移动端阅览
刘岩, 张国印, 何金洲, 等. 基于贝叶斯博弈的MP2P高性能安全资源节点选择策略[J]. 通信学报, 2016,37(1):110-115.
Yan LIU, yin ZHANGGuo, zhou HEJin, et al. MP2P high capacity and security resource node selection strategy based on Bayesian game[J]. Journal on communications, 2016, 37(1): 110-115.
刘岩, 张国印, 何金洲, 等. 基于贝叶斯博弈的MP2P高性能安全资源节点选择策略[J]. 通信学报, 2016,37(1):110-115. DOI: 10.11959/j.issn.1000-436x.2016012.
Yan LIU, yin ZHANGGuo, zhou HEJin, et al. MP2P high capacity and security resource node selection strategy based on Bayesian game[J]. Journal on communications, 2016, 37(1): 110-115. DOI: 10.11959/j.issn.1000-436x.2016012.
针对MP2P网络节点运算能力有限、移动性强、可靠性弱导致网络拓扑结构频繁变化,提出一种基于贝叶斯博弈的MP2P高性能安全资源节点选择策略。该策略首先综合考虑节点的性能、信誉,设定了一种计算安全资源节点的方案,然后采用静态贝叶斯博弈理论进行信任资源节点连接通信,确保请求资源节点连接高性能安全资源节点,该方案有效降低了资源节点的失效率,提高了网络效率。
Considering the changes of MP2P topology due to the limitation of the capability
the unreliable and the churn of the node
the efficiency and safety resource node selection strategy based on Bayesian game were proposed in MP2P network. Firstly
the safety resource calculation method was designed that takes the node capability and the node reputa-tion into consideration. Secondly
adopting the Bayesian game theory to connect the resource nodes
ensuring the re-questing node can intercommunicate with the high efficiency and safety resource node
the strategy can efficiently reduce failure rate of the resource nodes
greatly improving the network efficiency.
NIU X Z . Research on Key Issues of Mobile Peer-to-peer Networks [D ] . Chengdu: University of Electronic Science and Technology of China , 2008 .
HAN J S , LEE K J , SONG J W , et al . Mobile peer-to-peer systems using super peers for mobile environments [C ] // ICOIN'08 . New York, USA , c 2008 : 1 - 4 .
LIU S H . Research on Peer Selection Algorithm of Mobile P2P Net-works [D ] . Chengdu: University of Electronic Science and Technology of China , 2012 .
XIA H L , WANG N . Neighbour peer selection scheme based on effec-tive capacity for mobile peer-to-peer streaming [J ] . Digital Communi-cations , 2013 , 10 ( 5 ): 89 - 98 .
PALOMAR E . Dealing with sporadic strangers, or the (un itability of trust for mobile P2P security [C ] // The 18th International Workshop on Database and Expert Systems Applications . Piscataway , IEEE Press , c 2007 : 779 - 783 .
ZHENG Y . A conceptual architecture of a trusted mobile environ-ment [C ] // The Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing . Piscatawa , IEEE Press , c 2006 : 75 - 81 .
PENG H . Research on Security Schemes in Complex Peer to Peer Network Systems [D ] . Shanghai ; Shanghai Jiaotong University , 2012 .
YAO J , LI Z W , GUO B . Real-time performance of peer-to-peer net-work [J ] . Application Research of Computers , 2011 , 28 ( 1 ): 20 - 24 .
WANG X Y , XIAO Y M . Game Theory and its Application [M ] . Bei-jing : Science Press , 2008 .
FENG W F , HUANG Y C . Research on MIS algorithm of SINR model in wireless sensor networks [J ] . Microelectronics & Computer , 2014 , 31 ( 6 ): 166 - 170 .
0
浏览量
646
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构