Load balancing mechanism and selfish nodes detection in peer-to-peer network

被引:0
|
作者
机构
[1] Changsha Aeronautical Vocational and Technical College, 410014, Changsha
[2] School of Information Science and Engineering, Central South University, 410083, Changsha
[3] School of Information Engineering, Jiaozuo University
来源
Liu, M. | 1600年 / Asian Network for Scientific Information卷 / 12期
关键词
Detection mechanism; Load balancing mechanism; Peer-to-peer network; Selfish node;
D O I
10.3923/itj.2013.5577.5582
中图分类号
学科分类号
摘要
Due to its limited resources and other objective factors and subjective attitude of the impact of peer nodes in the network often exhibit selfishness. Therefore, encourage selfish nodes cooperate to detect and become an important research by allowing nodes to freely express their subjective forward attitude. To achieve the detection of selfish nodes, it is taking into account not only the quality of the link and node energy and other objective factors that determine the path forward probability and taking into account the path under the influence of selfish nodes forwarding the subjective probability. To select the path with the highest probability of integrated transponder, it is reducing the impact of selfish nodes when the node selfishness spend time re-designed a punishment mechanism based load balancing to encourage cooperation model participation and cooperation of nodes according to the degree of harm node selfishness. The right is taken appropriate punitive measures between nodes monitoring mechanism and strict punishment mechanism to ensure the implementation of strategic defense. The simulation results show that the detection and load balancing not only in the energy constrained and rational selfish nodes case seeking to the appropriate route, but also to inspire too selfish nodes actively participate in the network. © 2013 Asian Network for Scientific Information.
引用
收藏
页码:5577 / 5582
页数:5
相关论文
共 50 条
  • [1] Research on trust mechanism for peer-to-peer network
    Li Y.-J.
    Dai Y.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (03): : 390 - 405
  • [2] A Survey of Reputation and Trust Mechanism in Peer-to-Peer Network
    Gong Shang-Fu
    Zhu Jian-Lei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 116 - 119
  • [3] Parallel Load Balancing Strategies for Tree-Structured Peer-to-Peer Networks
    Chen, Yaw-Huei
    Ju, Yu-Ren
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 468 - 479
  • [4] Research of peer-to-peer network architecture
    Li, ZP
    Huang, DY
    Liu, IR
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 312 - 315
  • [5] Designing a novel Peer-to-Peer Network
    Lin, Fudong
    Lin, Fuhong
    Ding, Fei
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 381 - 383
  • [6] Implementation of secure peer group in peer-to-peer network
    Li, ZP
    Dong, YG
    Zhuang, L
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 192 - 195
  • [7] Active distributed Peer-to-Peer network architecture
    Huang, DY
    Li, ZP
    Zhang, Y
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 111 - 114
  • [8] Network statistical analysis in peer-to-peer application
    Li Yi-Peng
    Ren Yong
    Yuan Jian
    Wang Yue
    Huang Xiao-Hong
    Shan Xiu-Ming
    ACTA PHYSICA SINICA, 2011, 60 (05)
  • [9] An Efficient Caching Mechanism for Video-on-Demand Service over Peer-to-Peer Network
    Xie, Hailin
    Gao, Ling
    Zhang, Lin
    Zhang, Zhe
    Yang, Min
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 251 - 256
  • [10] PNECOS: A Peer-to-Peer Network Coding Streaming System
    Chung, Tein-Yaw
    Wang, Chih-Cheng
    Chen, Yung-Mu
    Chang, Yang-Hui
    JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (03): : 261 - 270