• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Xiaoyu, Shang Tao, Liu Jianwei. Detect-Defray Mechanism Based Motivation Scheme for Selfish Nodes of Network Coding[J]. Journal of Computer Research and Development, 2017, 54(11): 2620-2627. DOI: 10.7544/issn1000-1239.2017.20160777
Citation: Zhang Xiaoyu, Shang Tao, Liu Jianwei. Detect-Defray Mechanism Based Motivation Scheme for Selfish Nodes of Network Coding[J]. Journal of Computer Research and Development, 2017, 54(11): 2620-2627. DOI: 10.7544/issn1000-1239.2017.20160777

Detect-Defray Mechanism Based Motivation Scheme for Selfish Nodes of Network Coding

More Information
  • Published Date: October 31, 2017
  • Network coding is a new technology in the field of data transmission. In network coding, nodes are allowed to encode the data received from different nodes so that bandwidth utilization and network throughput can be improved. Whereas, if there are some selfish nodes in the network, these selfish nodes will delay or refuse coding and forwarding. It will increase the delay of network coding and reduce the efficiency of communication. When the problem gets more serious, the network coding will break off, and communication chaos will arise. In order to solve this problem, the motivation scheme based on detect-defray mechanism for selfish nodes of network coding is proposed. In the motivation scheme, firstly, the delay of nodes for encoding and forwarding will be detected, which can be the cost of network coding. Then it operates the defrayment part, in which network coding is regarded as a kind of economic behavior, and source nodes are consumers, and intermediate nodes are providers, and remuneration will be defrayed for providers from consumers when defrayment mechanism operates. Since intermediate nodes benefit from network coding when providing services, the enthusiasm of intermediate nodes for network coding can be improved, meanwhile the delay of network coding will be reduced. Scheme analysis shows that, the motivation scheme can reduce the delay of network coding and control the nodes' selfishness effectively. Finally, the effectiveness of network coding can be improved.
  • Related Articles

    [1]Wang Chenglong, Yi Jiangyan, Tao Jianhua, Ma Haoxin, Tian Zhengkun, Fu Ruibo. Global and Temporal-Frequency Attention Based Network in Audio Deepfake Detection[J]. Journal of Computer Research and Development, 2021, 58(7): 1466-1475. DOI: 10.7544/issn1000-1239.2021.20200799
    [2]Wang Zuan, Tian Youliang, Yue Chaoyue, Zhang Duo. Consensus Mechanism Based on Threshold Cryptography Scheme[J]. Journal of Computer Research and Development, 2019, 56(12): 2671-2683. DOI: 10.7544/issn1000-1239.2019.20190053
    [3]Hai Mo, Zhu Jianming. A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks[J]. Journal of Computer Research and Development, 2019, 56(6): 1205-1218. DOI: 10.7544/issn1000-1239.2019.20180419
    [4]He Yunhua, Li Mengru, Li Hong, Sun Limin, Xiao Ke, Yang Chao. A Blockchain Based Incentive Mechanism for Crowdsensing Applications[J]. Journal of Computer Research and Development, 2019, 56(3): 544-554. DOI: 10.7544/issn1000-1239.2019.20170670
    [5]Wei Songjie, Wu Chao, Luo Na, Zhang Gongxuan. Traffic Latency Characterization and Fingerprinting in Mobile Cellular Networks[J]. Journal of Computer Research and Development, 2019, 56(2): 363-374. DOI: 10.7544/issn1000-1239.2019.20170501
    [6]Yang Xue, Dong Hongbin, Teng Xuyang. Budget Constraint Auction Mechanism for Online Video Advertisement[J]. Journal of Computer Research and Development, 2017, 54(2): 415-427. DOI: 10.7544/issn1000-1239.2017.20160491
    [7]Wang En, Yang Yongjian, Li Li. Game of Life Based Congestion Control Strategy in Delay Tolerant Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2393-2407. DOI: 10.7544/issn1000-1239.2014.20130736
    [8]Rong Xiaohui, Chen Feng, Deng Pan, and Ma Shilong. A Large-scale Device Collaboration Mechanism[J]. Journal of Computer Research and Development, 2011, 48(9): 1589-1596.
    [9]Wang Bo, Huang Chuanhe, Yang Wenzhong, Dan Feng, and Xu Liya. An Incentive-Cooperative Forwarding Model Based on Punishment Mechanism in Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 398-406.
    [10]Jia Zhaoqing, Xue Guangtao, Tang Xinhuai, Zhang Pengzhu, You Jinyuan. A Trust Management Mechanism in Unstructured P2P[J]. Journal of Computer Research and Development, 2010, 47(4): 645-652.

Catalog

    Article views (953) PDF downloads (518) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return