• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yue Guangxue, Li Renfa, Chen Zhi, Zhou Xu. Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 382-397.
Citation: Yue Guangxue, Li Renfa, Chen Zhi, Zhou Xu. Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 382-397.

Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks

More Information
  • Published Date: March 14, 2011
  • In a real peer-to-peer (P2P) network, large amounts of network measurement results show that free riding is prevalent in almost all P2P reliable streaming media networks, which reduces the robustness, availability, service response speed, and lifetime of P2P reliable streaming media networks. Research of the reasonable and effective mechanisms to prohibit free-riders and incite selfish nodes to contribute more to the system has become an important direction for application research of P2P reliable streaming media network. Analysis by the intrinsic characteristics of free-riding and the related impacts on system performance, the behaviors of P2P reliable streaming media nodes are modeled and an idea with the goal of keeping moderate safety by allowing some errors but no crimes is introduced without sacrificing overall performance. Furthermore, the game theory is used to restrain free-riders and encourage them to be more altruistic. Reputation, contribution, and revenue of each node are adopted as metrics to assess the model. And the existence of Nash equilibrium for the model is proved; the rules, constraints, and a detailed analysis of it are given as well. Simulations show that the proposed model is effective in countering free-riding behavior, improving the performance and quality of service (QoS) of the P2P reliable streaming media network. It is able to keep relative balance.
  • Related Articles

    [1]Shi Jianzhi, Wang Xingwei, Yi Bo. Analysis Method of the JointCloud Resource Market: A Game-Theoretic Approach[J]. Journal of Computer Research and Development, 2023, 60(9): 1988-1999. DOI: 10.7544/issn1000-1239.202330411
    [2]Sun Yan, Ji Weifeng, Weng Jiang, Zhao Beiying. Optimal Strategy of Moving Target Defense Based on Differential Game[J]. Journal of Computer Research and Development, 2021, 58(8): 1789-1800. DOI: 10.7544/issn1000-1239.2021.20200524
    [3]Yu Yaxin, Wang Lei. An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311. DOI: 10.7544/issn1000-1239.2019.20180068
    [4]Meng Fei, Lan Julong, Hu Yuxiang. A Cooperative Game Based Data Center Backbone Network Bandwidth Allocation Policy[J]. Journal of Computer Research and Development, 2016, 53(6): 1306-1313. DOI: 10.7544/issn1000-1239.2016.20148400
    [5]Wang Xiaoyan, Chen Jinchuan, Guo Xiaoyan, Du Xiaoyong. A Nash-Pareto Strategy Based Automatic Data Distribution Method and Its Supporting Tool[J]. Journal of Computer Research and Development, 2015, 52(9): 1965-1975. DOI: 10.7544/issn1000-1239.2015.20140832
    [6]He Yunhua, Sun Limin, Yang Weidong, Li Zhi, Li Hong. Privacy Preserving for Node Trajectory in VSN: A Game-Theoretic Analysis Based Approach[J]. Journal of Computer Research and Development, 2014, 51(11): 2483-2492. DOI: 10.7544/issn1000-1239.2014.20131074
    [7]Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
    [8]Huang Tingpei, Chen Haiming, Zhang Zhaoliang, Cui Li. Variable-Width Channel Allocation Based on Game Theory in 802.11 Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2059-2069.
    [9]Wang Bo, Huang Chuanhe, Yang Wenzhong, Dan Feng, and Xu Liya. An Incentive-Cooperative Forwarding Model Based on Punishment Mechanism in Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 398-406.
    [10]Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.

Catalog

    Article views (889) PDF downloads (634) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return