English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 114205/145239 (79%)
Visitors : 52526148      Online Users : 983
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/54866
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/54866


    Title: 基於耐延遲網路之移動式信任者與獎勵機制設計
    Mobile trusted bank and incentive strategy design in delay tolerant networks
    Authors: 林昶瑞
    Lin, Chan Juei
    Contributors: 蔡子傑
    Tsai, Tzu Chieh
    林昶瑞
    Lin, Chan Juei
    Keywords: 耐延遲網路
    獎勵機制
    自私節點
    DTN
    Incentive
    Selfish
    Date: 2011
    Issue Date: 2012-10-30 14:01:31 (UTC+8)
    Abstract: DTN(Delay Tolerant Networks)是一種缺乏網路基礎設備的網路架構,在這類的網路架構下,無線節點之間的通訊連線並非同時存在,而是間歇式建立的。因為節點的移動、或是裝置省電模式運作與環境因素的影響,造成連線可能不定時的失效。有不保證連線特性的網路,在DTN網路中節點間相遇的機會很少,節點間利用 Store-Carry-Forward 的方式傳遞訊息,且有相當長的傳遞延遲(Propagation Delay)。在這樣的網路特性下,傳統的文獻中,都是假設所有節點都會幫忙傳遞。但不幸的,在現實生活中有自私節點(Selfish Nodes)的存在,因自己本身設備資源有限,如電力資源、網路資源...等,節點不願意幫忙傳送訊息,這些自私節點的存在,會對DTN網路架構造成破壞,導致無法傳送訊息到目的地。為了解決自私節點的問題,我們提出了MTBIS(Mobile Trusted Bank of Incentive Strategies),當發送節點(Source Node)要求傳送訊息時,給予回饋給幫忙轉傳訊息的節點,來鼓勵節點間互相幫忙傳送訊息,我們稱這些回饋為Incentive Credit。而節點也可利用Incentive Credit來要求別的節點幫忙轉傳訊息。另外也加入SI(Social Incentive)機制,與DGT(Dynamic Grudger Threshold) ,吸引自私節點願意幫忙轉傳訊息,改進了 MTBIS 在自私節點環境下的不足, 利用經濟學的角度來解決節點運用Credit的問題,借此提高訊息的傳遞率(Delivery Ratio)。
    本篇研究也注重於自私節點的模擬,利用四種不同特性的節點: Sucker(傻瓜)、Cheater (騙子)、Grudger(小氣鬼)、Ecci(投機者), 這些自私節點會照成DTN在設計上無法使用,甚至降低訊息的傳達率,因此我們模擬了這些自私節點的行為,並且使用我們所提出的獎勵機制,來解決這些自私節點的問題,實驗結果也證明,Grudger可以有效的抑制自私節點對效能大幅降低的問題,與傳統的演算法相較,效能高出34%。
    DTN (Delay Tolerant Networks) is a network structure without need to use any infrastructure. In DTNs, wireless connections between nodes do not always exist, i.e., nodes are connected intermittently. Due to the mobility, power issues, or surrounding environment of nodes, connections between nodes may be disruptive occasionally or randomly. In a DTN, nodes usually transfer the message to the encountering nodes. By this way, the messages are stored, carried, and forwarded to the next nodes, possibly the destination. However, in reality, nodes may not be willing to help each other for the message forwarding. More specifically, there are “Selfish nodes” which refuse to forward messages due to issues such as energy and network bandwidth. Thus it will prevent messages from being forwarded to its destination.
    In order to solve the problem of message forwarding failure caused by selfish nodes, we proposed an Incentive Strategy called “MTBIS (Mobile Trusted Bank and Incentive Strategies)”. We construct a rewarding scheme called “Incentive Credit” for nodes who forward the messages for the source node. In addition, to increase the intention of the selfish nodes for forwarding messages, we add two more mechanism called SI(Social Incentive) and DGT(Dynamic Grudger Threshold). The DGT uses credits to solve selfish node problems from an economics point of view to enhance MTBIS to work with existence of selfish nodes.
    In this thesis, we emphasis on the simulation of the behaviors of selfish nodes, using four different types of nodes: the “Sucker”, the “Cheater”, the “Grudger”, and the “Ecci”. These selfish nodes will decrease the success rate of message forwarding, and even make the DTN unusable. We simulated the behaviors of these selfish nodes, using the rewarding scheme we proposed. From the results of our experiment, we see that the Grudger can effectively deal with performance issues caused by selfish nodes, and the system can gain 34% in performance compared to the traditional algorithms.
    Reference: 【1】Rongxing Lu; Xiaodong Lin; Haojin Zhu; Xuemin Shen; Preiss, B.; , "Pi: A practical incentive protocol for delay tolerant networks," Wireless Communications, IEEE Transactions on , vol.9, no.4, pp.1483-1493, April 2010
    【2】Haojin Zhu; Xiaodong Lin; Rongxing Lu; Yanfei Fan; Xuemin Shen; , "SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks,"Vehicular Technology, IEEE Transactions on , vol.58, no.8, pp.4628-4639, Oct. 2009
    【3】Qi He; Dapeng Wu; Khosla, P.; , "SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks," Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE , vol.2, no., pp. 825- 830 Vol.2, 21-25 March 2004
    【4】Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, and David K. Y. Yau. 2004. A game theoretic approach to provide incentive and service differentiation in P2P networks. In Proceedings of the joint international conference on Measurement and modeling of computer systems(SIGMETRICS `04/Performance `04). ACM, New York, NY, USA, 189-198.
    【5】Richard Dawkins. The Selfish Gene. Oxford University Press, 1989 edition, 1976.
    【6】Rongxing Lu; Xiaodong Lin; Haojin Zhu; Chenxi Zhang; Pin-Han Ho; Xuemin Shen; , "A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks," Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE , vol., no., pp.3237-3242, March 31 2008-April 3 2008
    【7】Tanase, M.; Cristea, V.; , "Quality of Service in Large Scale Mobile Distributed Systems Based on Opportunistic Networks," Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on , vol., no., pp.849-854, 22-25 March 2011
    【8】 Alan Demers, Carl Hauser, Dan Greene, John Larson, and Wes Irish, “Epidemic algorithms for replicated database maintenance,” Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, pp. 1-12, August 1987.
    【9】Vahdat A and Becker D, “Epidemic routing for partially connected ad hoc networks,” Technical report, Duke University, 2000.
    【10】Cauligi S. Raghavendra, Konstantinos Psounis, and Thrasyvoulos Spyropoulos, “Spray and Wait: an efficient routing scheme for intermittently connected mobile networks,” Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, pp. 252–259, August 2005.
    【11】 Silvia Giordano, Alessandro Puiatti, and Hoang Anh Nguyen, “Probabilistic routing in intermittently connected networks,” A World of Wireless, Mobile and Multimedia Networks, International Symposium, pp. 1-6, June 2007.
    【12】Mihai Tanase and Valentin Cristea. 2011. Quality of Service in Large Scale Mobile Distributed Systems Based on Opportunistic Networks. In Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA `11). IEEE Computer Society, Washington, DC, USA, 849-854.
    【13】Shevade, U.; Han Hee Song; Lili Qiu; Yin Zhang; , "Incentive-aware routing in DTNs," Network Protocols, 2008. ICNP 2008. IEEE International Conference on , vol., no., pp.238-247, 19-22 Oct. 2008.
    【14】Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, and Mark Lillibridge. 2001. Incentives for Sharing in Peer-to-Peer Networks. In Proceedings of the Second International Workshop on Electronic Commerce (WELCOM `01), Ludger Fiege, Gero M\\&\\#252;hl, and Uwe G. Wilhelm (Eds.). Springer-Verlag, London, UK, 75-87.
    【15】Sonja Buchegger and Jean-Yves Le Boudec. 2002. Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking \\& computing (MobiHoc `02). ACM, New York, NY, USA, 226-236. DOI=10.1145/513800.513828.
    【16】Elgan Huang, Jon Crowcroft, and Ian Wassell. 2004. Rethinking incentives for mobile ad hoc networks. In Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems (PINS `04). ACM, New York, NY, USA, 191-196.
    【17】Michal Feldman, Kevin Lai, Ion Stoica, and John Chuang. 2004. Robust incentive techniques for peer-to-peer networks. In Proceedings of the 5th ACM conference on Electronic commerce (EC `04). ACM, New York, NY, USA, 102-111. DOI=10.1145/988772.988788
    【18】Ari Keränen, Jörg Ott, and Teemu Kärkkäinen. 2009. The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (Simutools `09). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, , Article 55 , 10 pages. DOI=10.4108/ICST.SIMUTOOLS2009.5674.
    Description: 碩士
    國立政治大學
    資訊科學學系
    99753018
    100
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0997530182
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    018201.pdf12462KbAdobe PDF2347View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback