针对节点自私性的对等网络激励机制技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
由于对等网络开放、自由、自组织等特性导致的节点自私行为引发对等网络资源共享不足,在造成服务能力下降,破坏网络健壮性的同时,已经成为限制对等网络发展的重要因素之一。激励机制具有抑制节点自私性,鼓励节点协作、提升节点贡献的特性,是对等网络提供高效、可靠服务能力的有效保障。以往对等网络中激励机制的应用和研究往往需要中心服务器或者复杂体系结构的支持,造成较大网络开销。
     通过分析传统激励方法与抑制节点自私性方法的不足,基于对当前激励机制研究现状和趋势的分析,本文对对等网络中三个重要阶段—网络拓扑构建阶段、数据分发阶段、以及路由定位阶段中自私节点大量存在影响网络性能的重要问题进行了深入研究,提出无需复杂体系结构的激励方法。取得如下成果:
     1.提出了一种基于互惠贡献能力的网络拓扑调整优化方法。对等网络拓扑结构是实现资源高效搜索定位的基本保证。以往研究忽视了节点传输能力对网络拓扑调整的影响,导致优化调整后的网络拓扑尽管使合作节点得到汇聚,但资源分发性能依然低效。本文提出一种新的互惠贡献能力计算方法,该方法综合考虑节点自主行为特性以及传输能力,突出资源交易时间特性和交易连续性对互惠贡献能力的放大影响,达到更快识别自私、恶意节点的目的。在此基础上,提出了一个周期性、分布式、自调整拓扑优化算法。实验证明,本算法降低了自私节点对网络性能的影响,与现有网络拓扑调整方法相比较,有效缩短了资源查询定位跳数,提高了资源分发效率,并具有更小的网络开销。
     2.提出了基于节点贡献和贡献意愿的带宽资源分配方法。在系统带宽资源有限情况下,源节点合理选择带宽资源分配策略是实现数据内容高效传输的重要前提。以往的带宽分配研究或者没有考虑节点贡献进行随机等量分配,或者按照节点绝对贡献进行比例分配,忽视了节点异构能力在贡献中起到的作用。本文提出了一个两阶段带宽资源分配算法,实现了具有激励性质的公平带宽资源分配。首先,基于社会效用最大化原理,按照节点的贡献量进行比例分配。然后基于第一阶段分配结果,再针对节点贡献意愿进行带宽微调整。实验证明,整个算法在较少调整迭代次数内,实现了公平、高效的带宽分配。在基本不改变按节点绝对贡献分配资源的基础上,本算法小范围调整节点的带宽收益,提高了资源分配公平性,同时提升了对等网络的整体效用。
     3.提出了一种基于信念更新的节点消息转发合作策略。节点对系统消息的协作转发,是维护整个系统稳定运行的基础。针对对等网络路由定位阶段中,由于网络噪音导致节点产生合作性误判,从而难以形成有效合作的问题,本文将消息转发过程建模为重复博弈模型,提出了一种考虑网络噪音和误判情形下的基于信念更新的节点消息转发合作策略。节点根据自身的私有收益历史信息和不完美观测结果,利用贝叶斯规则更新自己对对手节点采取合作策略的信念,并独立做出是否合作的决策,最大化长期收益。这种合作策略在重复博弈中实现了贯序均衡,实验证明节点采取任何偏离这种合作转发的策略都不能获得额外收益,并且该方法确保合作节点获得比自私节点更高的平均收益。
P2P systems become increasingly popular since its scalability with no central infrastructure, however, the inherited characteristics, such as open, free and self-organization etc, cause the selfish behavior of participant nodes. The selfishness and free-riding phenomenon have become a crucial problem and one of the important factors of limiting P2P network development. The incentive mechanism aimed to suppress the node selfishness and encourage the cooperation between nodes, is proposed by researchers to promote the node to contribute, and guarantee the effectiveness of P2P network offering high-efficient, reliable service ability. However, traditional incentive studying often needs a central server or the complicated system infrastructure in the past, leading to large expenses and cost.
     Based on current status and tendency of incentive mechanism research, we address several critical problems in distributed Peer-to-Peer environment, especially in three important stages:the topology construction and maintenance stage; content distribution stage and routing and message transmission stage. The contribution of this dissertation includes:
     1. Propose a reciprocated contribution capacity based topology optimization approach. The topology structure of p2p network is a basic assurance of high-efficient performance for resource search. In literature, little attention has been paid on the selfishness effects of topology. In order to tackle the problems that selfish (malicious) nodes occupy the center of the P2P network resulting in inefficient network performance, a local historical transaction based Reciprocal Contribution Capacity (RCC) of peers and an effective topology optimization approach (RCTO) is proposed. It is desirable for RCTO to establish connections between peers with higher RCC. Otherwise, selfish nodes would be recognized and forced to the marginal of P2P network. It is shown through experiments that RCTO can greatly shorten the search hops for authentic resource. Compared with counterpart RC-ATP, RCTO achieves higher resource distribution efficiency and incurs less cost.
     2. Propose a contribution willingness-based two phase bandwidth resource allocation approach (Cowtra). Previous studies addressing the free-rider problems focus on how to utilize peer absolute contribution to differentiate services quality, while neglecting the role of relative contribution of peers, leading to unfairness of resource (e.g bandwidth) allocation. At first stage of Cowtra, our approach guarantees the bandwidth of a source peer is distributed properly according to the peer contribution using social warfare maximum mechanism. Then at second stage, an iterative bandwidth micro adjustment process is conducted to softly reassign the amount of received bandwidth, with regard to the peer's relative contribution, namely Willingness of Contribution (WoC). In this way, a rational peer would try to act more contributive and cooperative to get a better result. Cowtra promotes the fairness of bandwidth allocation, as peers get the resource in proportion with their contribution and WoC. Simulations demonstrate that Cowtra largely increases the fairness of bandwidth allocation and improve the peer utility in overall system.
     3. Propose a belief-based message relaying cooperative strategy. Known the cooperation between the nodes to relay messages unselfishly is the foundation that the whole p2p system operates steadily, we study the message-relay problem by modeling it as a repeated game with imperfect observation and under erroneous-prone judgment environment, and propose a strategy only relying on node's own historical actions and its private imperfect observation of other node's information. Then node updates the belief of the others cooperative action using Bayes's rule, and take a proper action to maximization its long-term payoffs. Simulation and analysis demonstrate that selfish node who deviates from the proposed strategy can't obtain any extra income, and this method guarantees that the cooperative node gets the average income higher than the selfish node.
引文
[1]V. K. Dejan S. Milojicic, Rajan Lukose, "Peer-to-Peer Computing " HL Laboratories Research Report,2002.
    [2]E. Adar, Huberman,B.A., "Freeriding on Gnutella," in First Monday, October,2000.
    [3]Y.-J. Joung, T. Chiu, and S. Chen, "Capitalizing on Free Riders in P2P Networks," in Euro-Par 2007 Parallel Processing,2007, pp.526-536.
    [4]P. C. Feldman M, Chuang J,Stoica I, "Free-riding and whitewashing in peer-to-peer systems," IEEE Journal on Selected Areas in Communications, pp. 1010-1019,2006.
    [5]H. Daniel, "Free Riding on Gnutella Revisited:The Bell Tolls?," in IEEE Distributed Systems. vol.6, C. Geoff and W. James, Eds.,2005.
    [6]W. Saddi and F. Guillemin, "Measurement Based Modeling of eDonkey Peer-to-Peer File Sharing System," in Managing Traffic Performance in Converged Networks,2007, pp.974-985.
    [7]A. Frederic, "Ten weeks in the life of an eDonkey server," IEEE International Symposium on Parallel&Distributed Processing(ipdps),2009.
    [8]L. R. a. L. Liu, "Free Riding:A New Challenge to Peer-to-Peer File Sharing Systems," in Peer-to-Peer Computing Track, Hawaii International Conference on System Sciences (HICSS-2003),2003.
    [9]P. Golle, K. Leyton-Brown, I. Mironov, and M. Lillibridge, "Incentives for Sharing in Peer-to-Peer Networks," in Electronic Commerce,2001, pp.75-87.
    [10]S. Qixiang, "SLIC:A Selfish Link-Based Incentive Mechanism for Unstructured Peer-to-Peer Networks," 2004, pp.506-515.
    [11]M. B. G. Kostas G. Anagnostakis, "Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing," Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04), pp.524-533,2004.
    [12]S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The EigenTrust Algorithm for Reputation Management in P2P Networks," Stanford InfoLab, Working Paper2002.
    [13]J. J. D. Mol, J. A. Pouwelse, D. H. J. Epema, and H. J. Sips, "Free-Riding, Fairness, and Firewalls in P2P File-Sharing," in Peer-to-Peer Computing,2008. P2P'08. Eighth International Conference on,2008, pp.301-310.
    [14]K. Wongrujira, H.-t. Tim, and A. Seneviratne, "Incentive service model for P2P," in Computer Systems and Applications,2005. The 3rd ACS/IEEE International Conference on,2005, p.81.
    [15]C. Courcoubetis and R. Weber, "Incentives for large peer-to-peer systems," Ieee Journal on Selected Areas in Communications, vol.24, pp.1034-1050, May 2006.
    [16]R. Landa, M. Rio, D. Griffin, R. Clegg, and E. Mykoniati, "Incentives Against Hidden Action in QoS Overlays," in Peer-to-Peer Computing,2008. P2P'08. Eighth International Conference on,2008, pp.12-21.
    [17]T. Silverston,O. Fourmaux, and J. Crowcroft, "Towards an Incentive Mechanism for Peer-to-Peer Multimedia Live Streaming Systems," in Peer-to-Peer Computing,2008. P2P'08. Eighth International Conference on, 2008, pp.125-128.
    [18]Y. Jiadi, L. Minglu, H. Feng, and X. Guangtao, "Free-Riding Analysis of BitTorrent-Like Peer-to-Peer Networks," in Services Computing,'2006. APSCC '06. IEEE Asia-Pacific Conference on,2006, pp.534-538.
    [19]L. Minglu, Y. Jiadi, and W. Jie, "Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems:Modeling Analysis and Improvement," Parallel and Distributed Systems, IEEE Transactions on, vol.19, pp.954-966,2008.
    [20]A. L. Jia and C. Dah Ming, "Designs and Evaluation of a Tracker in P2P Networks," in Peer-to-Peer Computing,2008. P2P'08. Eighth International Conference on,2008, pp.227-230.
    [21]P. K. G. S.Saroiu, and S.D.Gribble, "A measurement study of peer-to-peer file sharing systems," In Proceedings of Multimedia Computing and Networking 2002(MMCN02),2002.
    [22]S. Meng, C. Shi, D. Han, X. Zhu, and Y. Yu, "A Statistical Study of Today's Gnutella," in Frontiers of WWW Research and Development-APWeb 2006, 2006, pp.189-200.
    [23]R. Guerraoui, K. Huguenin, A. M. Kermarrec, and M. Monod, "On tracking freeriders in gossip protocols," in Peer-to-Peer Computing,2009. P2P'09. IEEE Ninth International Conference on,2009, pp.139-142.
    [24]S. Sen and W. Jia, "Analyzing peer-to-peer traffic across large networks,' Networking, IEEE/ACM Transactions on, vol.12, pp.219-232,2004.
    [25]A. B. Thomas Karagiannis, Nevil Brownlee, Kimberly C. Claffy, and Michalis Faloutsos, "Is p2p dying or just hiding?," IEEE Globecom 2004-Global Internet and Next Generation Networks,2004.
    [26]S. G. M. Koo and C. S. G Lee, "An incentive-compatible mechanism for efficient distribution of bulk contents on peer-to-peer networks," Telecommunication Systems, vol.34, pp.81-90, Feb 2007.
    [27]L. Mekouar, Y. Iraqi, and R. Boutaba, "A contribution-based service differentiation scheme for peer-to-peer systems," Peer-to-Peer Networking and Applications, vol.2, pp.146-163,2009.
    [28]P. N. a. K. W. R. F. Clevenot, "Multiclass P2P networks:Static resource allocation for service differentiation and bandwidth diversity," Performance Evaluation, vol.62, pp.32-49,2005.
    [29]A. Habib and J. Chuang, "Service differentiated peer selection:An incentive mechanism for peer-to-peer media streaming," Ieee Transactions on Multimedia, vol.8, pp.610-621, Jun 2006.
    [30]L. C. S. J. ZHAO Qiao, CHIU Dah Ming, "Analysis of Adaptive Incentive Protocols for P2P Networks," INFOCOM 2009.28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies,2009.
    [31]G. Iosifidis and I. Koutsopoulos, "Reputation-Assisted Utility Maximization Algorithmsfor Peer-to-Peer Networks," in Quality of Service,2008. IWQoS 2008. 16th International Workshop on,2008, pp.20-29.
    [32]T. K. Adam Wierzbicki, Radoslaw Nielek, Anwitaman Datta, "Trust and Fairness Management in P2P and Grid systems," Technical Report,2009.
    [33]A. Satsiou and L. Tassiulas, "Trust-based exchange of services to motivate cooperation in P2P networks," Peer-to-Peer Networking and Applications,2010.
    [34]E. D. Fabrizio Cornelli, et al., "Choosing Reputable Servents in a P2P Network, In Proceedings of the 11th World Wide Web Conference,2002.
    [351 A. Nandi, T. W. Ngan, A. Singh, P. Druschel, and D. S. Wallach, "Scrivener: Providing incentives in cooperative content distribution systems," in Middleware 2005, Proceedings. vol.3790, G Alonso, Ed.,2005, pp.270-291.
    [36]L. L. Li Xiong, "PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities," Knowledge and Data Engineering, IEEE Transactions on, pp.843-857,2007.
    [37]S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "Incentives for combatting freeriding on P2P networks," in Euro-Par 2003 Parallel Processing, Proceedings. vol.2790, H. Kosch, L. Boszormenyi, and H. Hellwagner, Eds., 2003, pp.1273-1279.
    [38]R. Zhou, K. Hwang, and M. Cai, "GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks," IEEE Trans. on Knowl. and Data Eng., vol.20, pp. 1282-1295,2008.
    [39]T. I. Michael Piatek, et al., "One Hop Reputations for Peer to Peer File Sharing Workloads," 5th USENIX Symposium on Networked Systems Design Implementation, (NSDI),2008.
    [40]M. Meulpolder, J. A. Pouwelse, D. H. J. Epema, and H. J. Sips, "BarterCast:A practical approach to prevent lazy freeriding in P2P networks," in Parallel & Distributed Processing,2009. IPDPS 2009. IEEE International Symposium on, 2009, pp.1-8.
    [41]路卫娜,郭磊涛,“P2P流媒体系统中积分检测相结合的激励机制,”中国科学院研究生院学报,pp.61-68,2009.
    [42]S. Ye and F. Makedon, "Collaboration-aware peer-to-peer media streaming," in Proceedings of the 12th annual ACM international conference on Multimedia New York, NY, USA:ACM,2004.
    [43]D. Hausheer, N. C. Liebau, A. Mauthe, R. Steinmetz, and B. Stiller, "Token-based accounting and distributed pricing to introduce market mechanisms in a peer-to-peer file sharing scenario," in Peer-to-Peer Computing, 2003. (P2P 2003). Proceedings. Third International Conference on,2003, pp. 200-201.
    [44]M. Mowbray, F. Brasileiro, N. Andrade, and J. Santana, "A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids," in Peer-to-Peer Computing,2006. P2P 2006. Sixth IEEE International Conference on,2006, pp. 193-202.
    [45]B. L. W. Wang, "Market-Driven Bandwidth Allocation in Selfish Overlay Networks," Proc.24th Ann. Joint Conf. IEEE Computer and Communications Societies (INFOCOM 05),2005.
    [46]F. P. Wei-Cherng Liao, Konstantinos Psounis, "A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis," Journal of Communications, vol.1, pp.24-35,2006.
    [47]M. J. F. Christina Aperjis, and Ramesh Johari, "Peer-Assisted Content Distribution with Prices," Proc. ACM SIGCOMM Conference on emerging Networking EXperiments and Technologies (CoNext'08),2008.
    [48]C. A. Michael J. Freedman, and Ramesh Johari, "Prices are Right:Managing resources and incentives in peer-assisted content distribution," Proc.7th International Workshop on Peer-to-Peer Systems (IPTPS'08) 2008.
    [49]S. C. V.Vishnumurthy, andE.G.Sirer, "KARMA:A Secure Economic Framework for P2P Resource Sharing," SIGCOMM 2003-Workshop on. Economics of peer-to-peer systems(P2P Econ),2003.
    [50]V. P. K.Tamilmani, andA.Mohr., "SWIFT:A System with Incentives for Trading.," SIGCOMM 2004-Workshop on. Economics of peer-to-peer systems(P2P Econ),2004.
    [51]Z. Zhan, C. Shigang, and Y. Myungkeun, "MARCH:A Distributed Incentive Scheme for Peer-to-Peer Networks," in INFOCOM 2007.26th IEEE International Conference on Computer Communications. IEEE,2007, pp. 1091-1099.
    [52]M. Sirivianos, Y. Xiaowei, and S. Jarecki, "Robust and Efficient Incentives for Cooperative Content Distribution," Networking, IEEE/ACM Transactions on, vol.17, pp.1766-1779,2009.
    [53]H. MyungJoo and A. Gul, "ARA:a robust audit to prevent free-riding in P2P networks," in Peer-to-Peer Computing,2005. P2P 2005. Fifth IEEE International Conference on,2005, pp.125-132.
    [54]T. Bocek, M. Shann, D. Hausheer, and B. Stiller, "Game theoretical analysis of incentives for large-scale, fully decentralized collaboration networks," in Parallel and Distributed Processing,2008. IPDPS 2008. IEEE International Symposium on,2008, pp.1-8.
    [55]T. Bocek, F. V. Hecht, D. Hausheer, B. Stiller, and Y. El-khatib, "CompactPSH: An efficient transitive TFT incentive scheme for Peer-to-Peer Networks," in Local Computer Networks,2009. LCN 2009. IEEE 34th Conference on,2009, pp.483-490.
    [56]C. Buragohain, D. Agrawal, and S. Suri, "A game theoretic framework for incentives in P2P systems," in Peer-to-Peer Computing,2003. (P2P 2003). Proceedings. Third International Conference on,2003, pp.48-56.
    [57]I. Keidar, R. Melamed, and A. Orda, "EquiCast:Scalable multicast with selfish users," Computer Networks, vol.53, pp.2373-2386,2009.
    [58]R. M. a. A. O. Idit Keidar, "EquiCast:Scalable Multicast with Selfish Users," In the 25th ACM Symposium on Principles of Distributed Computing (PODC'06), pp.63-71,2006.
    [59]Q. Lian, Y. Peng, M. Yang, Z. Zhang, Y. Dai, and X. Li, "Robust incentives via multi-level Tit-for-Tat," Concurrency and Computation-Practice & Experience, vol.20, pp.167-178, Feb 2008.
    [60]T. Locher, S. Schmid, and R. Wattenhofer, "Rescuing Tit-for-Tat with Source Coding," in Peer-to-Peer Computing,2007. P2P 2007. Seventh IEEE International Conference on,2007, pp.3-10.
    [61]R. H. Axelrod, William D., "The Evolution of Cooperation," Science, pp. 1390-1396,1981.
    [62]M. Chen and G. W. Yang, "Reciprocity:Enforcing contribution in P2P perpendicular downloading," Ieice Transactions on Information and Systems, vol. E89D, pp.563-569, Feb 2006.
    [63]D. Carra, G. Neglia, and P. Michiardi, "On the Impact of Greedy Strategies in BitTorrent Networks:The Case of BitTyrant," in Peer-to-Peer Computing, 2008. P2P'08. Eighth International Conference on,2008, pp.311-320.
    [64]J.H. P. M.Sirivianos, R.Chen,andX.Yang, "Free-riding in BitTorrent networks with the large view exploit," in Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS),2007.
    [65]K. L. Dave Levin, Neil Spring,Bobby Bhattacharjee, "Bittorrent is an auction: analyzing and improving bittorrent's incentives," ACM SIGCOMM Computer Communication Review, vol.38, pp.243-254,2008.
    [66]W. Liu, D. Peng, C. Lin, Z. Chen, and J. Song, "Enhancing tit-for-tat for incentive in BitTorrent networks," Peer-to-Peer Networking and Applications, vol.3, pp.27-35,2009.
    [67]M. S. Hyunggon Park, "A Framework for Foresighted Resource Reciprocation in P2P Networks," IEEE Transactions on Multimedia, vol.11, pp.101-116,2009.
    [68]A. Blanc, L. Yi-Kai, and A. Vahdat, "Designing incentives for peer-to-peer routing," in INFOCOM 2005.24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE,2005, pp.374-385 vol.1.
    [69]M. F. Kevin Lai, Ion Stoica, John Chuang "Incentives for Cooperation in Peer-to-Peer Networks," 1st Workshop on Economics of Peer-to-Peer SystemsⅠ(EconP2P),2003.
    [70]J. J. Jaramillo and R. Srikant, "A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks," Ad Hoc Networks, vol.8, pp.416-429,2009.
    [71]Y. L. Li Xiao, Lionel M. Ni, "Improving Unstructured Peer-to-Peer Systems by Adaptive Connection Establishment," IEEE Transactions on Computers, vol.54, pp.1091-1103,2005.
    [72]D. Hales, "From selfish nodes to cooperative networks-emergent link-based incentives in peer-to-peer networks," in Peer-to-Peer Computing,2004. Proceedings. Proceedings. Fourth International Conference on,2004, pp. 151-158.
    [73]T. Condie, S. D. Kamvar, and H. Garcia-Molina, "Adaptive peer-to-peer topologies," in Peer-to-Peer Computing,2004. Proceedings. Proceedings. Fourth International Conference on,2004, pp.53-62.
    [74]田慧蓉,邹仕洪,王文东,程时端,”激励一致的自适应P2P拓扑构造,”软件学报,vol.17(04),pp.845-863,2006.
    [75]H. R. Tian, S. H. Zou, W. D. Wang, and S. D. Cheng, "Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment," Computer Communications, vol.29, pp.3567-3579, Nov 2006.
    [76]张骞,刘积仁,”一种有效的Peer-to-Peer自适应拓扑进化协议,”软件学报,vo1.18(02),pp.400-411,2007.
    [77]K. Murat, K. Ibrahim, and U. Ozgur, "Free Riding in Peer-to-Peer Networks," in IEEE Internet Computing. vol.13,2009, pp.92-98.
    [78]A. Satsiou and L. Tassiulas, "A Trust-Based Exchange Framework for Multiple Services in P2P Systems," in Peer-to-Peer Computing,2007. P2P 2007. Seventh IEEE International Conference on,2007, pp.45-52.
    [79]X. Y. Yang and G de Veciana, "Performance of peer-to-peer networks:Service capacity and role of resource sharing policies," Performance Evaluation, vol.63, pp.175-194, Mar 2006.
    [80]S. Anna, "Reputation-Based Resource Allocation in P2P Systems of Rational Users," Ieee Transactions on Parallel and Distributed Systems, vol.21, pp. 466-479,2010.
    [81]M. M. Meo, F., "A Rational Model for Service Rate Allocation in Peer-to-Peer Networks," Proc. IEEE INFOCOM, pp.2798-2802,2005.
    [82]S. Agarwal, M. Laifenfeld, A. Hagedorn, A. Trachtenberg, and M. Alanyali, "Fair and distributed peer-to-peer allocation of a common, refillable resource," Journal of Parallel and Distributed Computing, vol.69, pp.974-988, Dec 2009.
    [83]G. Tan and S. A. Jarvis, "A payment-based incentive and service differentiation scheme for peer-to-peer streaming broadcast," Ieee Transactions on Parallel and Distributed Systems, vol.19, pp.940-953, Jul 2008.
    [84]D. Schlosser, T. Hobfeld, and K. Tutschku, "Comparison of Robust Cooperation Strategies for P2P Content Distribution Networks with Multiple Source Download," in Peer-to-Peer Computing,2006. P2P 2006. Sixth IEEE International Conference on,2006, pp.31-38.
    [85]F. Bin, C. Dah-Ming, and J. C. S. Lui, "The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design," in Network Protocols,2006. ICNP'06. Proceedings of the 2006 14th IEEE International Conference on,2006, pp. 239-248.
    [86]F. Bin, J. C. S. Lui, and C. Dah-Ming, "The Design Trade-Offs of BitTorrent-Like File Sharing Protocols," Networking, IEEE/ACM Transactions on, vol.17, pp.365-376,2009.
    [87]X. Y. Yang and G de Veciana, "Performance of Peer-to-Peer Networks:Service Capacity and Role of Resource Sharing Policies," IEEE INFOCOM 2004 Conference,2004.
    [88]Y. Q. Ma, S. C. M. Lee, J. C. S. Lui, and D. K. Y. Yau, "An incentive mechanism for p2p networks incentive mechanism for p2p networks," In Proc. of the 24th International Conference on Distributed Computing Systems (ICDCS), pp.516-523,2004.
    [89]R. T. B. Ma, S. C. M. Lee, J. C. S. Lui, and D. K. Y. Yau, "Incentive and service differentiation in P2P networks:A game theoretic approach," Ieee-Acm Transactions on Networking, vol.14, pp.978-991, Oct 2006.
    [90]Y. Q. Ma and D. S. Wang, "An approach to fair resource sharing in peer-to-peer systems," in Networking-Icn 2005, Pt 2. vol.3421, P. Lorenz and P. Dini, Eds., 2005, pp.643-652.
    [91]A. E.-A. Yonghe Yan, Ehab Al-Shaer "Ranking-based Optimal Resource Allocation in "Peer-to-Peer Networks," in INFOCOM 2007.26th IEEE International Conference on Computer Communications. IEEE,2007.
    [92]K. Eger and U. Killat, "Bandwidth Trading in Unstructured P2P Content Distribution Networks," in Peer-to-Peer Computing,2006. P2P 2006. Sixth IEEE International Conference on,2006, pp.39-48.
    [93]K. Eger and U. Killat, "Fair resource allocation in peer-to-peer networks (extended version)," Computer Communications, vol.30, pp.3046-3054, Nov 2007.
    [94]K. Eger and U. Killat, "Bandwidth trading in BitTorrent-like P2P networks for content distribution," Computer Communications, vol.31, pp.201-211, Feb 2008.
    [95]R.Gupta and A. K. Somani, "An incentive driven lookup protocol for chord-based peer-to-peer (P2P) networks," in High Performance Computing-Hipc 2004. vol.3296, L. Bouge and V. K. Prasanna, Eds.,2004, pp.8-18.
    [96]W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks," Multimedia, IEEE Transactions on, vol.11, pp.396-412,2009.
    [97]W. Wenjing, M. Chatterjee, and K. Kwiat, "Cooperation in Ad Hoc Networks with Noisy Channels," in Sensor, Mesh and Ad Hoc Communications and Networks,2009. SECON'09.6th Annual IEEE Communications Society Conference on,2009, pp.1-9.
    [98]V. Srivastava and L. A. Dasilva, "Equilibria for Node Participation in Ad Hoc Networks-An Imperfect Monitoring Approach," in Communications,2006. ICC '06. IEEE International Conference on,2006, pp.3850-3855.
    [99]W. S. Lin, H. V. Zhao, and K. J. R. Liu, "Attack-resistant cooperation strategies in P2P live streaming social networks," in Signals, Systems and Computers, 2008 42ndAsilomar Conference on,2008, pp.1373-1377.
    [100]U. Shevade, S. Han Hee, Q. Lili, and Z. Yin, "Incentive-aware routing in DTNs," in Network Protocols,2008. ICNP 2008. IEEE International Conference on,2008, pp.238-247.
    [101]李丹,吴建平,崔勇,”应用层组播用户的自私性研究,”软件学报,pp.625-635,2007.
    [102]A. F. a. I. Keidar, "Discouraging Selfishness in Lossy Peer-to-Peer Networks,' Technion-Israel Institute of Technology Technique Report,2009.
    [103]Z. Dan, O. Ileri, and N. Mandayam, "Bandwidth exchange as an incentive for relaying," in Information Sciences and Systems,2008. CISS 2008.42nd Annual Conference on,2008, pp.749-754.
    [104]Y. Hu, M. Feng, L. N. Bhuyan, and V. Kalogeraki, "Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks," in INFOCOM 2009, IEEE,2009, pp.352-360.
    [105]C. H. Li, B. Yu, and K. Sycara, "An incentive mechanism for message relaying in unstructured peer-to-peer systems," Electronic Commerce Research and Applications, vol.8, pp.315-326, Nov-Dec 2009.
    [106]M. R. Raeesi N, J. Habibi, P. Raoufi, and H. Rostami, "A New Algorithm for Combating Free-Riders in Structured P2P Networks," in Advances in Computer Scienc and Engineering,2009,pp.372-379.
    [107]E. B. Klemens Bohm, "Free riding-aware forwarding in Content-Addressable Networks," The International Journal on Very Large Data Bases vol.16, pp.463-482,2007.
    [108]N. V. Fedotova08-Fedotova, L., "Reputation Management for DHT-Based Collaborative Environments," Next Generation Internet Networks, pp.316-321, 2008.
    [109]R. B. D. Levin, C. Lumezanu, N. Spring, and B. Bhattacharjee., "Motivating Participation in Internet Routing Overlays," In Proc. of NetEcon,2008.
    [110]M. Feldman, Chuang, J., Stoica, I., and Shenker, S., "Hidden-Action in Multi-Hop Routing," In ACM Conference on Electronic Commerce (EC'05), 2005.
    [111]J.-Y. L. B. Sonja Buchegger, "Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes-Fairness In Dynamic Ad-hoc NeTworks)."," Proceedings of MobiHoc,2002.
    [1121 P. Qi He Dapeng Wu Khosla, "SORI:a secure and objective reputation-based incentive scheme for ad-hoc networks " Wireless Communications and Networking Conference,2004. WCNC,2004.
    [113]J.-P. H. L. Buttyan, "Enforcing service availability in mobile ad-hoc WANs," Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC),2000.
    [114]C. J. Zhong S, Yang Y R., "Sprite:A simple, cheat-proof,credit-based system for mobile ad-hoc networks," Proceedings of the 22t h IEEE International Conference on Computer Communications (Infocom),2003.
    [115]M. R. Michiardi P "Core:A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security.,2002.
    [116]E. Kalyvianaki and I. Pratt, "Building adaptive peer-to-peer systems," in Peer-to-Peer Computing,2004. Proceedings. Proceedings. Fourth International Conference on,2004, pp.268-269.
    [117]J. Dinger and H. Hartenstein, "On the challenge of assessing overlay topology adaptation mechanisms," in Peer-to-Peer Computing,2005. P2P 2005. Fifth IEEE International Conference on,2005, pp.145-147.
    [118]J. Shneidman and D. Parkes, "Rationality and Self-Interest in Peer to Peer Networks," in Peer-to-Peer Systems Ⅱ,2003, pp.139-148.
    [119]N. L. Arnaud Legout, Eddie Kohler,Lixia Zhang, "Clustering and sharing incentives in BitTorrent systems," Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, (SIGMETRICS),2007.
    [120]H. Z. T. S. Eugene Ng, "Predicting Internet network distance with coordinates-based approach," In Proceedings of the IEEE INFOCOM.,2002.
    [121]R. S. a. N. Borisov, "EigenSpeed:Secure Peer-to-peer Bandwidth Evaluation," 8th International Workshop on Peer-to-Peer Systems (IPTPS'09),2009.
    [122]T. C. M.Schlosser, and S.Kamvar., "Simulatinga File Sharing P2P Network," In First Workshop on Semantics in P2P and Grid Computing,2002.
    [123]K. C. a. S. B. Ellen W. Zegura, "How to Model an Internetwork," Proc. of the IEEE INFOCOM,1996.
    [1241 X. Haivong, M. Bonan, and D. Yafei, "SODA:Towards a framework for self optimization via demand adaptation in Peer-to-Peer networks," in Peer-to-Peer 163-170. Computing,2009. P2P'09. IEEE Ninth International Conference on,2009, pp.
    [125]J.Mundinger, R. Weber, and G. Weiss, "Analysis of Peer-to-Peer File Dissemination amongst Users of Different Upload Capacities," Performance Evaluation Review, Performance 2005 Issue,2006.
    [126]F. Pianese, D. Perino, J. Keller, and E. W. Biersack, "PULSE:An adaptive, incentive-based, unstructured P2P live streaming system," Ieee Transactions on Multimedia, vol.9, pp.1645-1660, Dec 2007.
    [127]D. M. Kreps, "A Course in Microeconomic Theory.," Princeton University Press, Princeton, New Jersey,,1990.
    [128]R.Jain, "The Art of Computer Systems Performance Analysis, Techniques for Experimental Design," Measurement, Simulation, and Modeling,JohnWiley&Sons,1991.
    [129]A. Montresor and M. Jelasity, "PeerSim:A scalable P2P simulator," in Peer-to-Peer Computing,2009. P2P'09. IEEE Ninth International Conference on,2009, pp.99-100.
    [130]J. Park and M. van der Schaar, "A Game Theoretic Analysis of Incentives in Content Production and Sharing Over Peer-to-Peer Networks," Selected Topics in Signal Processing, IEEE Journal of,2010.
    [131]Y. Drougas and V. Kalogeraki, "A Fair Resource Allocation Algorithm for Peer-to-Peer Overlays," "in INFOCOM 2006.25th IEEE International Conference on Computer Communications. Proceedings,2006, pp.1-6.
    [132]I. O. V. Bhaskar, "Belief-Based Equilibria in the Repeated Prisoners'Dilemma with Private Monitoring," Journal of Economic Theory, vol.102, pp.40-69, 2002.
    [133]D. M. K. a. R.Wilson, "Sequential Equilibria," Econometrica, pp.863-894, 1982.
    [134]D.Bertsekas, "Dynamic Programming and Optimal Control," Athena Scientific, Belmont,MA,2001.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700