MP2P high capacity and security resource node selection strategy based on Bayesian game
Academic paper|更新时间:2024-06-05
|
MP2P high capacity and security resource node selection strategy based on Bayesian game
Journal on CommunicationsVol. 37, Issue 1, Pages: 110-115(2016)
作者机构:
1. 哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001
2. 中国电信集团公司哈尔滨分公司,黑龙江 哈尔滨 150001
作者简介:
基金信息:
The National Natural Science Foundation of China(61073042);The National Natural Science Foundation of China(61202455);Research Funds for the Central Uni-versities(HEUCF100612)
Yan LIU, yin ZHANGGuo, zhou HEJin, et al. MP2P high capacity and security resource node selection strategy based on Bayesian game[J]. Journal on Communications, 2016, 37(1): 110-115.
DOI:
Yan LIU, yin ZHANGGuo, zhou HEJin, et al. MP2P high capacity and security resource node selection strategy based on Bayesian game[J]. Journal on Communications, 2016, 37(1): 110-115. DOI: 10.11959/j.issn.1000-436x.2016012.
MP2P high capacity and security resource node selection strategy based on Bayesian game
Considering the changes of MP2P topology due to the limitation of the capability
the unreliable and the churn of the node
the efficiency and safety resource node selection strategy based on Bayesian game were proposed in MP2P network. Firstly
the safety resource calculation method was designed that takes the node capability and the node reputa-tion into consideration. Secondly
adopting the Bayesian game theory to connect the resource nodes
ensuring the re-questing node can intercommunicate with the high efficiency and safety resource node
the strategy can efficiently reduce failure rate of the resource nodes
greatly improving the network efficiency.
关键词
Keywords
references
NIU X Z . Research on Key Issues of Mobile Peer-to-peer Networks [D ] . Chengdu: University of Electronic Science and Technology of China , 2008 .
HAN J S , LEE K J , SONG J W , et al . Mobile peer-to-peer systems using super peers for mobile environments [C ] // ICOIN'08 . New York, USA , c 2008 : 1 - 4 .
LIU S H . Research on Peer Selection Algorithm of Mobile P2P Net-works [D ] . Chengdu: University of Electronic Science and Technology of China , 2012 .
XIA H L , WANG N . Neighbour peer selection scheme based on effec-tive capacity for mobile peer-to-peer streaming [J ] . Digital Communi-cations , 2013 , 10 ( 5 ): 89 - 98 .
PALOMAR E . Dealing with sporadic strangers, or the (un itability of trust for mobile P2P security [C ] // The 18th International Workshop on Database and Expert Systems Applications . Piscataway , IEEE Press , c 2007 : 779 - 783 .
ZHENG Y . A conceptual architecture of a trusted mobile environ-ment [C ] // The Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing . Piscatawa , IEEE Press , c 2006 : 75 - 81 .
PENG H . Research on Security Schemes in Complex Peer to Peer Network Systems [D ] . Shanghai ; Shanghai Jiaotong University , 2012 .
YAO J , LI Z W , GUO B . Real-time performance of peer-to-peer net-work [J ] . Application Research of Computers , 2011 , 28 ( 1 ): 20 - 24 .
WANG X Y , XIAO Y M . Game Theory and its Application [M ] . Bei-jing : Science Press , 2008 .
FENG W F , HUANG Y C . Research on MIS algorithm of SINR model in wireless sensor networks [J ] . Microelectronics & Computer , 2014 , 31 ( 6 ): 166 - 170 .