Load balancing mechanism and selfish nodes detection in peer-to-peer network

被引:0
|
作者
机构
[1] Changsha Aeronautical Vocational and Technical College, 410014, Changsha
[2] School of Information Science and Engineering, Central South University, 410083, Changsha
[3] School of Information Engineering, Jiaozuo University
来源
Liu, M. | 1600年 / Asian Network for Scientific Information卷 / 12期
关键词
Detection mechanism; Load balancing mechanism; Peer-to-peer network; Selfish node;
D O I
10.3923/itj.2013.5577.5582
中图分类号
学科分类号
摘要
Due to its limited resources and other objective factors and subjective attitude of the impact of peer nodes in the network often exhibit selfishness. Therefore, encourage selfish nodes cooperate to detect and become an important research by allowing nodes to freely express their subjective forward attitude. To achieve the detection of selfish nodes, it is taking into account not only the quality of the link and node energy and other objective factors that determine the path forward probability and taking into account the path under the influence of selfish nodes forwarding the subjective probability. To select the path with the highest probability of integrated transponder, it is reducing the impact of selfish nodes when the node selfishness spend time re-designed a punishment mechanism based load balancing to encourage cooperation model participation and cooperation of nodes according to the degree of harm node selfishness. The right is taken appropriate punitive measures between nodes monitoring mechanism and strict punishment mechanism to ensure the implementation of strategic defense. The simulation results show that the detection and load balancing not only in the energy constrained and rational selfish nodes case seeking to the appropriate route, but also to inspire too selfish nodes actively participate in the network. © 2013 Asian Network for Scientific Information.
引用
收藏
页码:5577 / 5582
页数:5
相关论文
共 50 条
  • [21] Research on the implicit feedback mechanism in peer-to-peer trust models
    Xianfu Meng
    Hongxi Meng
    Tianjiao Li
    Peer-to-Peer Networking and Applications, 2017, 10 : 1257 - 1269
  • [22] A Peer-to-Peer RFID Resolution Framework for Supply Chain Network
    Shrestha, Safal
    Kim, Dong Seong
    Lee, Seulki
    Park, Jong Sou
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 318 - 322
  • [23] Research of Trust Model Based on Peer-to-Peer Network Security
    Kun, Huang
    Lu, Wang
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 126 - 129
  • [24] Context-aware routing for peer-to-peer network on MANETs
    Shah, Nadir
    Qian, Depei
    NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, : 135 - +
  • [25] Popularity based network statistical analysis in peer-to-peer application
    Wang Jing-Xin
    Wang Yue
    Li Yi-Peng
    Yuan Jian
    Shan Xiu-Ming
    Feng Zhen-Ming
    Ren Yong
    ACTA PHYSICA SINICA, 2011, 60 (11)
  • [26] Research on the implicit feedback mechanism in peer-to-peer trust models
    Meng, Xianfu
    Meng, Hongxi
    Li, Tianjiao
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (05) : 1257 - 1269
  • [27] Overview of peer-to-peer network and its applications: Pros and cons
    Saito, Nobuo
    3rd International Conference on Computing, Communications and Control Technologies, Vol 2, Proceedings, 2005, : 19 - 24
  • [28] Evaluation of Video Streaming Performance over Peer-to-Peer Network
    Memon, Shafquat Ali
    Hassan, Syed Raheel
    Memon, Nisar Ahmed
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, : 413 - 420
  • [29] Analysis on the Performance Dependency of Channel Models in a Wireless Peer-to-Peer Network
    Wang, Yupeng
    Liu, Tianlong
    Yu, Zelong
    Li, Yufeng
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [30] STARS: Ad-Hoc Peer-to-Peer Online Social Network
    Quang Long Trieu
    Tran Vu Pham
    COMPUTATIONAL COLLECTIVE INTELLIGENCE - TECHNOLOGIES AND APPLICATIONS, PT I, 2012, 7653 : 385 - 394