高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于博弈理论的无线自组织网增强协作模型研究

李添泽 武穆清 李沛哲 廖文星 马伟

李添泽, 武穆清, 李沛哲, 廖文星, 马伟. 基于博弈理论的无线自组织网增强协作模型研究[J]. 电子与信息学报, 2015, 37(12): 2802-2807. doi: 10.11999/JEIT150356
引用本文: 李添泽, 武穆清, 李沛哲, 廖文星, 马伟. 基于博弈理论的无线自组织网增强协作模型研究[J]. 电子与信息学报, 2015, 37(12): 2802-2807. doi: 10.11999/JEIT150356
Li Tian-ze, Wu Mu-qing, Li Pei-zhe, Liao Wen-xing, Ma Wei. Ad hoc Network Cooperation Enforcement Model Based on Game Theory[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2802-2807. doi: 10.11999/JEIT150356
Citation: Li Tian-ze, Wu Mu-qing, Li Pei-zhe, Liao Wen-xing, Ma Wei. Ad hoc Network Cooperation Enforcement Model Based on Game Theory[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2802-2807. doi: 10.11999/JEIT150356

基于博弈理论的无线自组织网增强协作模型研究

doi: 10.11999/JEIT150356
基金项目: 

网络体系架构与融合北京市重点实验室主任基金(2015BKL-NSAC-ZJ-06)

Ad hoc Network Cooperation Enforcement Model Based on Game Theory

Funds: 

The Director Funds of Laboratory of Network System Architecture and Convergence (2015BKL-NSAC-ZJ-06)

  • 摘要: 为了解决无线自组织网络中转发节点因自身能量与存储空间限制而拒绝协作的自私性问题,该文从分析数据包源节点与转发节点的收益与开销特性出发,基于虚拟货币的奖励机制,结合博弈理论提出无线自组织网络增强协作模型。该模型将网络协作问题转化为数据包转发路径中多转发节点与源节点收益的博弈均衡问题,在保障双方利益的基础上提出最优的激励方式,促进通信协作的进行。另外,为最大化网络生存时间与避免拥塞,该模型对转发节点的电量与存储空间状态做了相应的约束。
  • Marti S and Giuli T J. Mitigating routing misbehavior in mobile Ad hoc networks[C]. MibiCOM 2000, USA, Boston, 2000: 255-265.
    Michiardi P and Molva R. Simulation-based analysis of security exposures in mobile Ad hoc networks[C]. Proceedings of European Wireless Conference, Firenze, Italy, 2002: 275-281.
    Malnar M Z and Neskovic N J. An analysis of performances of multi-channel routing protocol based on different link quality
    metrics[C]. International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, Nis, Serbia, 2011: 737-740.
    Buchegger S and Boudec J Y L. Performance analysis of the Confidant protocol: cooperation of nodes-fairness in dynamic Ad-hoc networks[C]. MobiHOC, Lausanne, Switzerland, 2002: 226-236.
    Michiardi P and Molva R. A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[C]. Conference on Communications and Multimedia Security, Portoroz, 2002: 107-121.
    汪洋, 林闯, 李学林, 等. 基于非合作博弈的无线网络路由机制研究[J]. 计算机学报, 2009, 32(1): 54-68.
    Wang Yang, Lin Chuang, Li Xue-lin, et al.. Non-cooperation game based research on routing schemes for wireless networks[J]. Chinese Journal of Computers, 2009, 32(1): 54-68.
    Akkarajitsakul K. Game theoretic approaches for multiple access in wireless networks: a survey[J]. IEEE Communications Surveys and Tutorials, 2012, 13(3): 372-395.
    Brown D R and Fazel F. A game theoretic study of energy efficient cooperative wireless networks[J]. Journal of Communications and Networks, 2011, 13(3): 266-276.
    Alizadeh Y, Sabaei M, and Tavallaie O. Game theoretic modeling of joint topology control and forwarding in MANET based on local information[C]. Computational Intelligence and Communication Networks (CICN), Mathura, India, 2013: 510-515.
    Sarkar S and Datta R. A game theoretic model for stochastic routing in self-organized MANETs[C]. Wireless Communications and Networking Conference (WCNC), Shanghai, China, 2013: 1962-1967.
    Rong C. Cooperative game based relay vehicle selection algorithm for VANETs[C]. Communications and Information Technologies (ISCIT), Seoul, Korea, 2014: 30-34.
    Anderegg L and Eidenbenz S. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents[C]. International Conference on Mobile Computing and Networking, California, USA, 2003: 245-259.
    Buttyan L and Hubaux J P. Enforcing service availability in mobile Ad hoc WANs[C]. MobiHOC, Boston, USA, 2000: 87-96.
    Zhong S, Chen J, and Yang Y R. Sprite: a simple cheat proof credit-base system for mobile ad hoc networks[C]. INFOCOM, San Francisco, USA, 2003: 1987-1997.
    郑慧芳, 蒋挺, 周正. MANET增强合作模型的理论研究[J]. 北京邮电大学学报, 2008, 31(10): 21-24.
    Zheng Hui-fang, Jiang Ting, and Zhou Zheng. Theoretical study with the model for MANET cooperation enforcement[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(10): 21-14.
    Akkarajitsakul K, Hossain E, and Niyato D. Coalition-based cooperative packet delivery under uncertainty: a dynamic Bayesian coalitional game[J]. IEEE Transactions on Mobile Computing, 2013, 12(2): 371-385.
    Li Z and Shen H. Game-theoretic analysis of cooperation incentive strategies in mobile Ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2012, 11(8): 1287-1303.
    Naserian M and Tepe K. Dynamic probabilistic forwarding in wireless Ad hoc networks based on game theory[C]. Vehicular Technology Conference (VTC Spring), Seoul, Korea, 2014: 1-5.
    张华鹏, 张宏斌. 基于重复博弈的Ad hoc网络合作转发模型[J]. 电子与信息学报, 2014, 36(3): 703-707.
    Zhang Hua-peng and Zhang Hong-bin. Cooperative forwarding model based on repeated game in Ad hoc networks[J]. Jourenal of Electronics Information Technology, 2014, 36(3): 703-707.
    黄开枝, 洪颖, 罗文宇. 基于演化博弈机制的物理层安全协作方法[J]. 电子与信息学报, 2015, 37(1): 193-197.
    Huang Kai-zhi, Hong Ying, and Luo Wen-yu. A method for physical layer security cooperation based on evolutionary game[J]. Journal of Electronics Information Technology, 2015, 37(1): 193-197.
    Tang Chang-bing, Li Ang, and Li Xiang. When reputation enforces evolutionary cooperation in unreliable MANETs[J]. IEEE Transactions on Cybernetics, 2014, PP(99): 1-1.
    Safaei Z, Sabaei M, and Torgheh F. An efficient reputation-based mechanism to enforce cooperation in MANETs[C]. Application of Information and Communication Technologies, Venice, Italy, 2009: 1-6.
    Sengathir J, Manoharan R, and Kumar R. Markovian process based reputation mechanisms for detecting selfish nodes in MANETs: A survey[C]. Advanced Computing (ICoAC), Madras, India, 2013: 217-222.
    蒋小杰, 芮兰兰, 郭少勇, 等. 一种基于信誉的移动自组网区分服务激励机制[J]. 电子与信息学报, 2012, 29(7): 1299-1303.
    Jiang Xiao-jie, Rui Lan-lan, Guo Shao-yong, et al.. A Reputation-based service differentiated incentive mechanism for MANETs[J]. Journal of Electronics Information Technology, 2012, 29(7): 1299-1303.
    Liu L, Guo Y, and Yin L. Analyzing asking/bidding price in dynamic game for cooperative authentication[C]. Computer Communications Workshops (INFOCOM WKSHPS), Toronto, Canada, 2014: 165-166.
    Liu Li-cai, Yin Li-hua, Guo Yun-chuan, et al.. Bargaining-based dynamic decision for cooperative authentication in MANETs[C]. Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 2014: 212-220.
  • 加载中
计量
  • 文章访问数:  1298
  • HTML全文浏览量:  102
  • PDF下载量:  637
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-03-25
  • 修回日期:  2015-08-28
  • 刊出日期:  2015-12-19

目录

    /

    返回文章
    返回