期刊文献+

基于不完全信息博弈的P2P网络节点行为策略模型 被引量:2

A Game Model of Nodes' Strategies with Incomplete Information in P2P Network
在线阅读 下载PDF
导出
摘要 提出了一种新型P2P网络节点的基于不完全信息博弈的行为策略模型.模型中,节点的行为策略集合与节点类型相互映射.在此基础上,分析了在不完全信息博弈中各类型节点调整自身策略的算法以及采取背叛策略的条件.最后,模拟了节点行为策略博弈的演化过程,验证了模型的有效性. This paper presents a game model of node strategies with incomplete information in P2P networks. The model classifies node strategies to several sets according to the node types. Based on it, the paper analyzes the transfer conditions of different strategies in the game model with incomplete information, as well as the betrayal of the node types. Simulation of the evolution of the game is carried out, showing effectiveness of the proposed model.
出处 《应用科学学报》 CAS CSCD 北大核心 2008年第5期448-454,共7页 Journal of Applied Sciences
基金 国家“863”高技术研究发展计划(No.2006AA01Z232) 江苏省自然科学基金(No.BK2007603) 南京邮电大学人才引进(No.NY2007044)资助项目
关键词 P2P网络 节点 类型 策略 博弈模型 peer-to-peer network, node, type, strategy, game model
  • 相关文献

参考文献14

  • 1FELDMAN M, PAPADIMITRIOU C, CHUANG J, STOICAI. Free-riding and whitewashing in peer-to-peer systems [ J ]. Selected Areas in Communications, 2006, 24 (5) : 1010 -1019.
  • 2LIU Yaning, WANG Hongbo, LIN Yu, CHENG Shiduan. Modeling and quantifying the impact of P2P file sharing traffic on traditional intemet traffic [ C ]//22nd International Conference on Advanced Information Networking and Applications Workshops ( AINAW ), 2008, Japan, 25- 28 March, 2008: 1428- 1433.
  • 3YANG Mao, FENG Qinyuan, DAI Yafei, ZHANG Zheng. A multi-dimensional reputation system combined with trust and incentive mechanisms in P2P file sharing systems [ C ]//27th International Conference on Distributed Computing Systems Workshops ( ICDCSW ), 2007, Toronto, Canada, 22 - 29 June, 2007 : 1129 - 1134.
  • 4LIAN Qiao, ZHANG Zheng, YANG Mao, ZHAO Ben, DAI Yafei, LI Xiaoming. An empirical study of collusion behavior in the maze P2P file-sharing system [ C]//27th International Conference on Distributed Computing Systems (ICDCS), 2007, Toronto, Canada, 25 -27 June, 2007: 1056 - 1065.
  • 5WANG Wenyu, ZrtAO Li, YUAN Ruixi. Improving cooperation in peer-to-peer systems using social networks [ C ]//20th International Parallel and Distributed Processing Symposium (IPDPS), 2006, Rhodes Island, Greece, 25 - 29 April, 2006 : 703 - 711.
  • 6NATALYA F, LUCA V. Byzantine generals problem in the light of P2P computing [C]//3rd Annual International Conference on Mobile and Ubiquitous Systems-Workshops, 2006,San Jose, USA, 17-21 July, 2006:1 -5.
  • 7WILLIAM S, YU Zhen, GUAN Yong. An adaptive reputation-based trust framework for peer-to-peer applications [ C]//Network Computing and Applications, Fourth IEEE International Symposium on, Boston, USA,27 - 29 July, 2005 : 13 - 20.
  • 8DOU Wen. The research on trust-aware P2P topologies and constructing technologies [ D]. Changsha : National University of Defense Technology, 2003.
  • 9CORNELLI F, DAMIANI E, SABRINA D C D V,PARABOSCHI S, SAMARATI P. Choosing reputable servents in a P2P network [C]//Proceedings of the llth International Conference on World Wide Web, Hawaii, USA, 2002: 376 - 386.
  • 10KAMVAR S D, SCHLOSSER M T, MOLINA H G. The eigentrust algorithm for reputation management in P2P networks [C]//Proceedings of the 12th International World Wide Web Conference, Budapest, Hungary, 2003 : 640 - 651.

同被引文献43

  • 1贾春福,钟安鸣,张炜,马勇.网络安全不完全信息动态博弈模型[J].计算机研究与发展,2006,43(z2):530-533. 被引量:11
  • 2胡光俊,闫怀志.基于动态博弈的网络诱骗信息获取策略研究[J].科技导报,2005,23(1):32-34. 被引量:2
  • 3林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 4Major G, William T. Cyberspace Operations: Air Force Space Command Takes the Lead [J]. High Frontier,2009,5(3): 3-5.
  • 5Jormakka J, Molsa J V E. Modeling Information Warfare as a Game [J]. Journal of Information Warfare,2005,4 (2): 112-25.
  • 6Basar T. The Gaussian Test Channel with an Intelligent Jam- mer [ J ]. IEEE Transactions on Information Theory, 1983,29 ( 1 ): 152-157.
  • 7Kashyap A, Basar T, Srikant R. Correlated Jamming on MI- MO Gaussian Fading Channels [J]. IEEE Transactions on Information Theory, 2004,50 (9): 2119-2123.
  • 8Carin L,Cybenko G,Hughes J. Quantitaitve Evaluation of Risk for Invenstment Efficient Strategies in Cybersecurity: the Queries Methodology [J]. IEEE Computer,2008,41 (8),21-26.
  • 9Bistareli S, Fioravanti F, Peretti P. Defense Tree for Economic Evaluation of Security Investments [ C ]//Proceedings of the First International Conference OU Availabifity,Reliability and Security, 2006.
  • 10Saad W, Han Z, Basar T. Physical Layer Security: Coalitional Game for Distributed Cooperation [ C ]//International Sympo- sium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Network, Seoul, USA, 2009.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部