CN105722149A - Topology construction excitation method based on reputation value - Google Patents

Topology construction excitation method based on reputation value Download PDF

Info

Publication number
CN105722149A
CN105722149A CN201610033427.0A CN201610033427A CN105722149A CN 105722149 A CN105722149 A CN 105722149A CN 201610033427 A CN201610033427 A CN 201610033427A CN 105722149 A CN105722149 A CN 105722149A
Authority
CN
China
Prior art keywords
node
credit value
value
network
topological structure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610033427.0A
Other languages
Chinese (zh)
Other versions
CN105722149B (en
Inventor
张晖
任文辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201610033427.0A priority Critical patent/CN105722149B/en
Publication of CN105722149A publication Critical patent/CN105722149A/en
Application granted granted Critical
Publication of CN105722149B publication Critical patent/CN105722149B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • H04W40/10Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/12Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/22Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a topology construction excitation method based on a reputation value. The method comprises steps of setting a wireless ubiquitous network communication scene; and assuming that there is a business demand node, a surround idle network region set K={k1, k2, ..., kn} and a relay node set gama={R1, R2, ..., Rn} corresponding to all idle network regions in a jam network region A in the scene. The method is applied to a wireless ubiquitous environment; by use of network performance indexes, an optimal idle network region is selected; based on history interaction information, by constructing an efficient mathematic model, a direct reputation value and an indirect reputation value of node evaluation are calculated, thereby obtaining a comprehensive reputation value of the node; and then via the periodic topology construction excitation algorithm, a topology structure connected to the node is adjusted, so cooperation nodes are allowed to be connected with each other while selfish nodes are repelled to network edges, thereby greatly accelerating enthusiasm of cooperation and forwarding of nodes with low reputation values.

Description

Topological structure motivational techniques based on credit value
Technical field
The present invention relates to a kind of wireless general in the environment based on the topological structure motivational techniques of credit value, belong to multimedia communication technology field.
Background technology
Development along with wireless communication technology, different requirements for coverage, number of users, type of service and service quality (QoS), research and develop various cellular communications network, WLAN (WLAN), Wireless Personal Network (WPAN) and satellite communication network at interior various wireless communication network at present, and more new wireless network is also continuing to bring out.These networks adopt different network technologies to supplement each other, jointly exist, and constitute the wireless ubiquitous environment of ubiquitous Multi net voting multi-service fusion.But, cluster characteristic wireless general user at ambient determines user traffic and concentrates on a certain network or specific cell (such as Cellular Networks community), causes that the play of this network or Zone flow is risen and the relative free situation of adjacent isomorphism or heterogeneous network resource, business.Connect by constituting the peer-to-peer network of Ad-hoc formula between terminal node and cooperate forwarding data, thus realizing being transferred to adjacent dormant network by the service traffics of business demand node from congested network, it is achieved wireless general each network traffics at ambient are balanced with load.But, Ad-hoc network has the features such as dynamic, opening and autonomy, the behavior making node faces serious selfishness and credit problems, is embodied in the uncontrolled use etc. of the uncooperative behavior of selfish node, " hitchhiking " and cooperative nodes resource.Based on the research direction that the trust management of prestige cooperates as excitation node, its Major Difficulties is in that how to utilize rationally effective mathematical model that the prestige of node is evaluated all-sidedly and accurately on the reputation information basis collected and utilize the purpose of certain mechanism realization excitation and punishment.Therefore, also increasingly receive publicity for the Study on Incentive Mechanism based on credit value.
Now, wireless general machine-processed for node activations and algorithm research at ambient is broadly divided into three directions: based on prestige, based on ideal money (including auction mechanism), based on game theoretic motivational techniques.But there is a lot of weak point in above-mentioned incentive mechanism, including: 1, only consider single-point-excitation, it does not have divide cooperative nodes and selfish node from the whole network angular area, cause that the search location to cooperative nodes and data forwarding performance decline.2, the mechanism having is more difficult acceptance in offered load, as increased extra hardware device or " bank " to Manage Currency based on ideal money mechanism.3, it is better than in cooperation policy and fairness based on credit mechanism based on game theory mechanism, but because the unstability of wireless network, the distributivity of wireless Ubiquitous Network interior joint and mobility, game theory result sometimes can not directly be applied.It is further noted that the performance of whole network is not optimum state under equilibrium state in betting model.And the present invention can solve the problems referred to above well.
Summary of the invention
Present invention aim at for above-mentioned the deficiencies in the prior art, inspiration problem especially for the load balance in the wireless general region of Multi net voting at ambient and multiple terminals node, a kind of topological structure motivational techniques based on credit value are proposed, the method be applied to wireless general in the environment, network performance index is utilized to select optimum dormant network region, based on history mutual information, the direct credit value to Node evaluation and indirect credit value is calculated by building effective mathematical model, thus obtaining the comprehensive credit value of egress, then pass through periodic topological structure excitation algorithm and adjust the topological structure that node connects, the network edge that cooperative nodes is connected with each other and selfish node is ostracised, and then it is greatly promoted the enthusiasm that the cooperation of low credit value node forwards.
This invention address that its technical problem is adopted the technical scheme that: a kind of topological structure motivational techniques based on credit value, the method setting wireless Ubiquitous Network communication scenes, it is assumed that there is business demand node s, ambient idle network area collection Κ={ k in this scene in the A of congested network region1,k2,…knAnd Κ in via node collection Γ={ R corresponding to each dormant network region1,R2,…Rn}。
Method flow:
Step 1: business demand node s selects performance-optimal network region k according to network capacity c and offered load l two indices from set Κ*And correspondence via node collection R*
Step 2: business demand node s with broadcast mode to R*In via node send service request and consider remaining power energy e, node load l' according to principle of optimality from R*The optimum via node r of middle selection*As service providing node.Business demand node s records via node interactive information, and 1 represents acceptance request and elected as service providing node by business demand node s, and 0 represents reject the service request.
Step 3: when the topological structure cycle arrives, according to history mutual information between node, the direct credit value of computing node.First, its recorded node history mutual information is divided in different time sections by business demand node s τ at timed intervals, then calculates the credit value in each time period, and computing formula is as follows:
DT sj t ( n ) = min ( 1 , DT sj t ( n - 1 ) + a * k g ) ; accept request max ( 0 , DT sj t ( n - 1 ) - m 2 * k m ) ; refuse request
WhereinRepresenting the t time period interior nodes s credit rating value to node j, n represents the interactive information article number in the t time period.A is that node j provides the number of times forwarding service, κ continuously for sgIt is excitation factor, a* κgOn the basis of upper once credit rating, cooperative nodes is encouraged in a linear fashion.M is that node j refuses to provide the number of times forwarding service, κ for s continuouslymIt is penalty factor, m2mBy square in the way of on the basis of upper once credit rating, selfish node is punished.The seriality of a was refused to provide for s to forward service to calculate for initiateing with j the last time, and m is in like manner.The feature decayed to characterize the importance of node historical transactional information in time remote, utilizes the characteristic of quadratic function to describe the weight w (t) of directly credit value in different time sections, is shown below, it may be assumed that
w ( t ) = ( t S T L - 1 ) 2 , ( t = 0 , 1 , 2 , ... , S T L )
Wherein w (t) is with the t function successively decreased, and STL (storetimelimit) is the reputation information storage time limit of default, and the reputation information record more than STL is no longer participate in calculating.It is weighted on average obtaining the node s direct credit value to j to credit value in different time sections with w (t):
DT s j = 1 S T L Σ t = 1 S T L ( DT s j t * w ( t ) ) .
Step 4: on direct credit value basis, uses each recommended node recommendation reputation value of behavior similarity Weight and utilizes the indirect credit value of normalization factor computing node.In single recommended node situation, the direct credit value of recommended node i is μ by node s, it is recommended that the direct credit value of objective appraisal node j is β by node i, then the indirect credit value of objective appraisal node j is μ β by node s;In many recommended nodes situation, in order to ensure the verity of recommendation behavior, by behavior similarity Weight recommendation reputation value.(i, s) is shown below the credit rating behavior similarity Sim of s and i, namely
S i m ( i , s ) = Σ v ∈ C Z ( s , i ) μ s v μ i v Σ v ∈ C Z ( s , i ) μ s v 2 Σ v ∈ C Z ( s , i ) μ s v 2
Wherein (s i) represents there was mutual node set with s and i to C Ζ.As weight, behavior similarity is described the node s indirect credit value to objective appraisal node j is:
IDT s j = 1 μ s 1 + μ s 2 + ... + μ s n Σ m = 1 n μ s m 2 * S i m ( m , s ) * β m j
Wherein μsmRepresent node s to recommended node m ∈ 1,2 ..., the direct credit value of n}, βmjRepresent the recommended node m direct credit value to objective appraisal node j.Calculate the direct credit value of gained and the indirect credit value of this step gained according to step 3, calculate comprehensive credit value TsjFor:
Tsj=α * DTsj+(1-α)*IDTsj
Wherein α ∈ [0,1].
Step 5: after the comprehensive credit value of node updates, business demand node s calls topological structure excitation algorithm and completes self topology adjustment.Topological structure excitation algorithm is divided into node link control algolithm (i.e. LCA, Linkcontrolalgorithm) and node connection request verification algorithm (i.e. CVA, Connectionrequestverificationalgorithm);LCA is responsible for deleting and the linking and to high credit value node initiation connection request, and set node self maintained three set of low credit value node, including:
(1) it is familiar with node set FSs.Represent there was mutual node set with node s.When the topological structure cycle each time arrives, node s calculates the direct credit value of all nodes and indirect credit value in this set, then obtains comprehensive credit value and updates FSs。FSs=i | whohascooperatedwiths}.
(2) high credit value node set HTSs.Represent credit value TsiMore than minimum prestige threshold value TminNode set.HTSs=i | Tsi> Tmin, HTSs∈FSs
(3) neighbor node set NSs.Expression and node s have the existing node set of annexation.About NSsThree parameter respectively τmin: NSsIn minimum nodes.τmax: the NS set according to node self computing capabilitysIn maximum nodes, τmax> τmin。τbase: the credit value that topological structure process interior joint makes great efforts to safeguard is higher than TminNodes, τmin< τbase< τmax.Node s is from HTSsIn choose the node updates NS of high credit values, reach at NSsInterior joint number is not less than τbaseBasis on optimization NSsThe purpose of interior joint credit value.NSs=i | whoconnectswiths}, NSs∈FSs
CVA is responsible for the credit value of the node of assessment initiation connection request and chooses whether to be attached with it according to the interstitial content in self neighbor node set.
Beneficial effect:
1, the general Multi net voting multiple terminals scene at ambient of the present invention first setting wireless, interactive history information based on business demand node, the direct credit value of utilization time attenuation function weighted calculation interaction node, and Behavior-based control similarity weight calculates the indirect credit value of interaction node with normalization factor, thus obtaining the comprehensive credit value of interaction node.
2, the present invention periodically adjusts network topology structure by adjusting three set of node maintenance, thus efficiently differentiating cooperative nodes and selfish node, and encourages selfish node to pass through cooperation forwarding self credit value of raising.
3, the present invention is simple, it is easy to accomplish, there is good application prospect.
Accompanying drawing explanation
Fig. 1 is the method flow diagram of the present invention.
Detailed description of the invention
Below in conjunction with Figure of description, the invention is described in further detail.
The present invention is at the wireless general heterogeneous network that there is multiple access in the environment, as: such as the network such as cellular basestation, WLAN, WIMAX, set business demand node s in this traffic model to be within the scope of cellular basestation A and connect base station network, business demand node s rises due to its place Zone flow play, need to carry out service traffics transfer, and near business demand node s, there is n isomery of relative free, i.e. (or isomorphism) network area Κ={ k1,k2,…knAnd Κ in via node collection Γ={ R corresponding to each dormant network region1,R2,…Rn}.Then node s selects the network area k of performance the best according to network capacity c and offered load l two indices from set Κ*As business migration object, corresponding optimum via node integrates as R*.For network area ki, its network capacity c is more big, the more low then network performance of offered load lMore high.Definition is as shown in Equation 1, it may be assumed that
&eta; k i = l k i - 1 + c k i , i &Element; { 1 , 2 , ... , n } Formula 1
To the all-network region in Κ, shown in formula 2, optimizing model processes availability energy optimum network region k*, optimizing model is:
k * = arg max &eta; k i
s . t &eta; k i = l k i - 1 + c k i Formula 2
ki∈ Κ={ k1,k2,…,kn}
Owing to there is following two hindering factor: 1) community A and network area k*Isomery, therefore both communication standards are different, for instance under 3G environment, and China Mobile adopts TD-SCDMA, and CHINAUNICOM adopts WCDMA;2) community A and network area k*Communication coverage area is not overlapping, and node s must complete the migration of grouped data by the via node closed on.Node s with broadcast mode to R*In via node send service request and record via node interactive information, 0 represent reject the service request, 1 represent accept request and elected as service providing node, service providing node r by business demand node s*Need to meet:
r * = argmax e k i l k i &prime; Formula 3
Wherein ki∈ Κ={ k1,k2,…,kn,Expression remaining power energy,Represent node load.
When the topological structure cycle arrives, the first direct credit value of computing node.Direct credit value be requesting node without the recommendation of intermediary node direct credit rating value to service node, between node, history mutual information is to calculate the basic document of direct credit value, we first at timed intervals τ its recorded node history mutual information is divided in different time sections, then calculating the credit value in each time period, computing formula is as follows:
DT sj t ( n ) = min ( 1 , DT sj t ( n - 1 ) + a * k g ) ; accept request max ( 0 , DT sj t ( n - 1 ) - m 2 * k m ) ; refuse request Formula 4
WhereinRepresenting the t time period interior nodes s credit rating value to node j, n represents the interactive information article number in the t time period.A is that node j provides the number of times forwarding service, κ continuously for sgIt is excitation factor, a* κgOn the basis of upper once credit rating, cooperative nodes is encouraged in a linear fashion.M is that node j refuses to provide the number of times forwarding service, κ for s continuouslymIt is penalty factor, m2mBy square in the way of on the basis of upper once credit rating, selfish node is punished.The seriality of a was refused to provide for s to forward service to calculate for initiateing with j the last time, and m is in like manner.
Decaying due to importance in time remote of node historical transactional information, we adopt the quadratic function that Open Side Down to describe the weight w (t) of directly credit value in different time sections, are shown below, it may be assumed that
w ( t ) = ( t S T L - 1 ) 2 , ( t = 0 , 1 , 2 , ... , S T L ) Formula 5
Wherein w (t) is with the t function successively decreased, and STL (storetimelimit) is the reputation information storage time limit of default, and the reputation information record more than STL is no longer participate in calculating.Therefore the direct credit value expression formula of j can be obtained by node s:
DT s j = 1 S T L &Sigma; t = 1 S T L ( DT s j t * w ( t ) ) Formula 6
After the direct credit value of node obtains, use each recommended node recommendation reputation value of behavior similarity Weight and utilize the indirect credit value of normalization factor computing node.In single recommended node situation, the indirect credit value expression formula of objective appraisal node j is by node s:
IDTsj=μ β formula 7
Wherein μ is the node s direct credit value to recommended node i, and β is the recommended node i direct credit value to objective appraisal node j.
In many recommended nodes situation, when recommending for binode, node h and i has the direct credit value β to node j respectivelyhj、βijAnd recommend to node s, μshAnd μsiThe respectively node s direct credit value to h, i.Then node s can calculate the indirect credit value IDT of node jsjFor:
IDT s j = ( &mu; s h &mu; s h + &mu; s i ) &mu; s h &beta; h j + ( &mu; s i &mu; s h + &mu; s i ) &mu; s i &beta; i j Formula 8
Usually, when recommended node number is more than 2, formula 8 is extended to:
IDT s j = ( &mu; s 1 &mu; s 1 + &mu; s 2 + ... + &mu; s n ) &mu; s 1 &beta; 1 j + ( &mu; s 2 &mu; s 1 + &mu; s 2 + ... + &mu; s n ) &mu; s 2 &beta; 2 j + ... + ( &mu; s n &mu; s 1 + &mu; s 2 + ... + &mu; s n ) &mu; s n &beta; n j = 1 &mu; s 1 + &mu; s 2 + ... + &mu; s n &Sigma; m = 1 n &mu; s m 2 &beta; m j Formula 9
WhereinM ∈ 1,2 ..., n} is normalization factor, it is ensured that IDTsj∈ (0,1).Prove as follows:
By μsm∈ (0,1) and βmj∈ (0,1), can obtain μsmβmj∈ (0,1);Therefore:
IDT s j < &mu; s 1 &mu; s 1 + &mu; s 2 + ... + &mu; s n + &mu; s 2 &mu; s 1 + &mu; s 2 + ... + &mu; s n + ... + &mu; s n &mu; s 1 + &mu; s 2 + ... + &mu; s n = 1 Formula 10
Meanwhile, be easy to get IDTsj> 0, therefore IDTsj∈(0,1)。
In order to ensure the verity of recommendation behavior, by behavior similarity Weight recommendation reputation value.The credit rating behavior similarity Sim of s and i (i, s) is shown below, it may be assumed that
S i m ( i , s ) = &Sigma; v &Element; C Z ( s , i ) &mu; s v &mu; i v &Sigma; v &Element; C Z ( s , i ) 2 &mu; s v 2 &Sigma; v &Element; C Z ( s , i ) &mu; i v 2 Formula 11
Wherein, (s i) represents there was mutual node set with s and i to C Ζ.Obtain the node s indirect credit value to objective appraisal node j in conjunction with formula 9, (11) be:
IDT s j = 1 &mu; s 1 + &mu; s 2 + ... + &mu; s n &Sigma; m = 1 n &mu; s m 2 * S i m ( m , s ) * &beta; m j Formula 12
According to formula 6 and formula 12, the comprehensive credit value of node s computing node j as shown in Equation 13:
Tsj=α * DTsj+(1-α)*IDTsjFormula 13
Wherein α ∈ [0,1], it is possible to adjust the size of α, for direct credit value DTilWith indirect credit value IDTilDistribute different weight preferences.
Node s calls topological structure excitation algorithm and completes self topology adjustment.Node topology structure excitation algorithm is divided into node link control algolithm (LCA-Linkcontrolalgorithm) and node connection request verification algorithm (CVA-Connectionrequestverificationalgorithm).LCA is responsible for deleting and the linking and to high credit value node initiation connection request, and set node self maintained three set of low credit value node, including:
(1) it is familiar with node set FSs.Represent there was mutual node set with node s.When the topological structure cycle each time arrives, node s calculates the direct credit value of all nodes and indirect credit value in this set, then obtains comprehensive credit value and updates FSs。FSs=i | whohascooperatedwiths}.
(2) high credit value node set HTSs.Represent credit value TsiMore than minimum prestige threshold value TminNode set.HTSs=i | Tsi> Tmin, HTSs∈FSs
(3) neighbor node set NSs.Expression and node s have the existing node set of annexation.About NSsThree parameter respectively τmin: NSsIn minimum nodes.τmax: the NS set according to node self computing capabilitysIn maximum nodes, τmax> τmin。τbase: the credit value that topological structure process interior joint makes great efforts to safeguard is higher than TminNodes, τmin< τbase< τmax.Node s is from HTSsIn choose the node updates NS of high credit values, reach at NSsInterior joint number is not less than τbaseBasis on optimization NSsThe purpose of interior joint credit value.NSs=i | whoconnectswiths}, NSs∈FSs
The LCA of the present invention is divided into three steps to carry out, including:
1, FS is updated according to formula 13s、HTSsAnd NSsIn node credit value.
2、HTSsSelect FSsMiddle credit value is more than minimum prestige threshold value TminAnd not at HTSsIn node be added, namely HTS s + { i | i &Element; FS s &cap; i &NotElement; HTS s &cap; T i > T m i n } .
3, first by NSsMiddle credit value is lower than TminThe link of node delete because mutual through after a while between node, it may appear that some node credit values reduce and not in the situation of satisfied requirement;Then, if NSsInterior joint number N um (NSs) < τbase, from HTSsNode e=Max_T (the HTS that prioritizing selection credit value is bigs), if NSsDo not comprise e and then send connection request to e, if request is by verifying, NS will be added tos, i.e. NSs+ { e} otherwise continues traversal Max_T (HTSs-e}), until Num (NSs)≥τbase.If τbase≤Num(NSs)≤τmax, then NS is comparedsMiddle credit value minimum node p=Min_T (NSs) and q=Max_T (HTSs) credit value size, if credit value Tp< TqThen to q transmission connection request, if request is by verifying, deletes the connection with p the connection of foundation and q, repeat said process and NSs-{Min_T(NSs) and NSs+{Max_T(HTSs).The mark that LCA algorithm terminates is Num (NSs) between τbaseAnd τmaxBetween and NSsThe credit value of interior joint is all higher than HTSsThe credit value of interior joint or HTSsFor sky, being described as of formulation:
Formula 14
Owing to node is more prone to the node cooperation high with credit value and refuses the connection request of low credit value node, therefore some credit value relatively low but more than TminIts Num of node (NS) long-term less than τbase, it is impossible to improve its credit value by the effective cooperation with neighbor node, thus causing vicious cycle.For the problems referred to above, it is assumed that n topological structure periodic knot Num (NS) < τ continuouslybase, then τ is reduced by decline factor delta ∈ (0,1)baseValue be τ 'base, the definition of δ is as shown in Equation 11, it may be assumed that
&delta; = &tau; b a s e - &tau; b a s e &prime; &tau; b a s e - &tau; min Formula 15
τ ' can be solved by formula 11base:
τ'base=(1-δ) * τbase+δ*τminFormula 16
CVA is responsible for the credit value of the node of assessment initiation connection request and chooses whether to be attached with it according to the interstitial content in self neighbor node set.Assuming that connection request node is s, requested node is r.Neighbor node quantity Num (NS according to rr) and τmaxMagnitude relationship be divided into two kinds of situations to judge, including:
1, the neighbor node quantity Num (NS of node rs)≥τmax.If not for the history credit rating information of s (namely be strange node to r, s) in node r, then refusal accepts the connection request of s;Otherwise, if the connection request accepting s depends on the credit value T of ssWith Min_T (NSr) credit valueMagnitude relationship between the two, ifThen replace s and Min_T (NSr);Otherwise refuse its connection request.
2, the neighbor node quantity Num (NS of node rr) < τmax.If node r has the credit value T of the history credit rating information to s and ss> Tmin, then its connection request is accepted.If not history credit rating information to s in node r, then r is with probability PAccAccept the connection request of s, and give its initial credit value 0.5.PAccDefinition as shown in Equation 13, its implication is: it is more big that more few its of the neighbor node of node r accepts the probability of s connection request, otherwise more little.
P A c c = 1 - N u m ( NS r ) &tau; m a x Formula 17
As it is shown in figure 1, the invention provides a kind of topological structure motivational techniques based on credit value, the process that implements of the method includes as follows:
Step 1: select the performance-optimal network region k near business demand node s according to formula 2*And correspondence via node collection R*
Step 2: business demand node s with broadcast mode to R*Middle via node sends service request and records via node interactive information, and 0 represents reject the service request, and 1 expression accepts request and elected as service providing node, service providing node r by business demand node s*Determine by formula 3.
Step 3: when the topological structure cycle arrives, using formula 6 calculates business demand node s to FSsThe direct credit value DT of interior jointsj
Step 4: on direct credit value basis, adopts behavior similarity mathematical model shown in formula 11 to calculate business demand node s to FSsThe indirect credit value IDT of interior jointsj, and the direct credit value DT of integrating step 3 gainedsjBring formula 13 into and calculate business demand node s to FSsThe comprehensive credit value T of interior jointsj
Step 5: after the comprehensive credit value of node updates, business demand node s calls topological structure excitation algorithm and completes self topology adjustment.
A kind of topological structure motivational techniques based on the credit value above embodiment of the present invention provided are described in detail, for one of ordinary skill in the art, thought according to the embodiment of the present invention, all will change in specific embodiments and applications, in sum, this specification content should not be construed as limitation of the present invention.

Claims (6)

1. the topological structure motivational techniques based on credit value, it is characterised in that described method setting wireless Ubiquitous Network communication scenes, it is assumed that there is the business demand node s in the A of congested network region, ambient idle network area collection Κ={ k in this scene1,k2,…knAnd Κ in via node collection Γ={ R corresponding to each dormant network region1,R2,…Rn, comprise the steps:
Step 1: business demand node s selects performance-optimal network region k according to network capacity c and offered load l two indices from set Κ*And correspondence via node collection R*
Step 2: business demand node s with broadcast mode to R*In via node send service request and consider remaining power energy e, node load l' according to principle of optimality from R*The optimum via node r of middle selection*As service providing node, business demand node s records via node interactive information, and 1 represents acceptance request and elected as service providing node by business demand node s, and 0 represents reject the service request;
Step 3: when the topological structure cycle arrives, according to history mutual information between node, τ calculates credit value in each time period at timed intervalsUse weighting function w (t) weighting decayed in timeObtain the direct credit value of node;
Step 4: on direct credit value basis, each recommended node recommendation reputation value of utilization behavior similarity Weight also utilizes the indirect credit value of normalization factor computing node, calculate the direct credit value of gained and the indirect credit value of this step gained according to step 3, calculate comprehensive credit value Tsj
Step 5: after the comprehensive credit value of node updates, business demand node s calls topological structure excitation algorithm and completes self topology adjustment.
2. a kind of topological structure motivational techniques based on credit value according to claim 1, it is characterised in that the described direct credit value computational methods of method step 3 interior joint include:
First, its recorded node history mutual information is divided in different time sections by business demand node s τ at timed intervals, then calculates the credit value in each time period, and computing formula is as follows:
DT s j t ( n ) = min 1 , DT s j t ( n - 1 ) + a * &kappa; g ; a c c e p t f o r w a r d i n g max 0 , DT s j t ( n - 1 ) - m 2 * &kappa; m ; r e f u s e f o r w a r d i n g
WhereinRepresenting the t time period interior nodes s credit rating value (its initial value is 0.5 within each time period) to node j, n represents the interactive information article number in the t time period, and a is that node j provides the number of times forwarding service, κ continuously for sgIt is excitation factor, a* κgOn the basis of upper once credit rating, cooperative nodes being encouraged in a linear fashion, m is that node j refuses to provide the number of times forwarding service, κ for s continuouslymIt is penalty factor, m2mBy square in the way of on the basis of upper once credit rating, selfish node is punished, the seriality of a was refused to provide for s to forward service to calculate for initiateing with j the last time, m is in like manner, the feature decayed to characterize the importance of node historical transactional information in time remote, utilize the characteristic of quadratic function to describe the weight w (t) of directly credit value in different time sections, it is shown below, it may be assumed that
w ( t ) = ( t S T L - 1 ) 2 , ( t = 0 , 1 , 2 , ... , S T L )
Wherein w (t) is with the t function successively decreased, STL (storetimelimit) is the reputation information storage time limit of default, reputation information record more than STL is no longer participate in calculating, and is weighted on average obtaining the node s direct credit value to j to credit value in different time sections with w (t):
DT s j = 1 S T L &Sigma; t = 1 S T L ( DT s j t * w ( t ) ) .
3. a kind of topological structure motivational techniques based on credit value according to claim 1, it is characterised in that the described indirect credit value computational methods of method step 4 interior joint include:
In single recommended node situation, the direct credit value of recommended node i is μ by node s, it is recommended that the direct credit value of objective appraisal node j is β by node i, then the indirect credit value of objective appraisal node j is μ β by node s;In many recommended nodes situation, in order to ensure the verity of recommendation behavior, by behavior similarity Weight recommendation reputation value, the credit rating behavior similarity Sim of s and i (i, s) is shown below, it may be assumed that
S i m ( i , s ) = &Sigma; v &Element; C Z ( s , i ) &mu; s v &mu; i v &Sigma; v &Element; C Z ( s , i ) &mu; s v 2 &Sigma; v &Element; C Z ( s , i ) &mu; i v 2
Wherein C Ζ (s, i) represent with s and i had mutual node set, as weight, behavior similarity is described the node s indirect credit value to objective appraisal node j is:
IDT s j = 1 &mu; s 1 + &mu; s 2 + ... + &mu; s n &Sigma; m = 1 n &mu; s m 2 * S i m ( m , s ) * &beta; m j
Wherein μsmRepresent node s to recommended node m ∈ 1,2 ..., the direct credit value of n}, βmjRepresent the recommended node m direct credit value to objective appraisal node j;For direct credit value DTsjWith indirect credit value IDTsjDistributing different weight preferences, obtain the node s comprehensive credit value to objective appraisal node j, expression formula is as follows, it may be assumed that
Tsj=α * DTsj+(1-α)*IDTsj
Wherein α ∈ [0,1].
4. a kind of topological structure motivational techniques based on credit value according to claim 1, it is characterized in that, in described method step 5, topological structure excitation algorithm is divided into node link control algolithm (i.e. LCA, and node connection request verification algorithm (i.e. CVA, Connectionrequestverificationalgorithm) Linkcontrolalgorithm);LCA is responsible for deleting and the linking and to high credit value node initiation connection request, and set node self maintained three set of low credit value node, including:
(1) it is familiar with node set FSs, represent there was mutual node set with node s, when the topological structure cycle each time arrives, node s calculates the direct credit value of all nodes and indirect credit value in this set, then obtains comprehensive credit value and updates FSs, FSs=i | whohascooperatedwiths};
(2) high credit value node set HTSs, represent credit value TsiMore than minimum prestige threshold value TminNode set, HTSs=i | Tsi> Tmin, HTSs∈FSs
(3) neighbor node set NSs, expression and node s have the existing node set of annexation;NSsThree parameter respectively τmin: NSsIn minimum nodes, τmax: the NS set according to node self computing capabilitysIn maximum nodes, τmax> τmin, τbase: the credit value that topological structure process interior joint makes great efforts to safeguard is higher than TminNodes, τmin< τbase< τmax, node s is from HTSsIn choose the node updates NS of high credit values, reach at NSsInterior joint number is not less than τbaseBasis on optimization NSsThe purpose of interior joint credit value, NSs=i | whoconnectswiths}, NSs∈FSs;CVA is responsible for the credit value of the node of assessment initiation connection request and chooses whether to be attached with it according to the interstitial content in self neighbor node set.
5. a kind of topological structure motivational techniques based on credit value according to claim 1, it is characterized in that, described method is to utilize network performance index to select optimum dormant network region, based on history mutual information, the direct credit value to Node evaluation and indirect credit value is calculated by building effective mathematical model, thus obtaining the comprehensive credit value of egress, then pass through periodic topological structure excitation algorithm and adjust the topological structure that node connects so that cooperative nodes is connected with each other and selfish node is ostracised network edge.
6. a kind of topological structure motivational techniques based on credit value according to claim 1, it is characterised in that described method be applied to wireless general in the environment.
CN201610033427.0A 2016-01-19 2016-01-19 Topological structure motivational techniques based on credit value Active CN105722149B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610033427.0A CN105722149B (en) 2016-01-19 2016-01-19 Topological structure motivational techniques based on credit value

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610033427.0A CN105722149B (en) 2016-01-19 2016-01-19 Topological structure motivational techniques based on credit value

Publications (2)

Publication Number Publication Date
CN105722149A true CN105722149A (en) 2016-06-29
CN105722149B CN105722149B (en) 2019-03-05

Family

ID=56147706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610033427.0A Active CN105722149B (en) 2016-01-19 2016-01-19 Topological structure motivational techniques based on credit value

Country Status (1)

Country Link
CN (1) CN105722149B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108880863A (en) * 2018-05-26 2018-11-23 江西理工大学 A kind of smart grid equipment safety diagnostic service system based on block chain technology
CN109041065A (en) * 2018-09-19 2018-12-18 北京计算机技术及应用研究所 A kind of node trust management method towards the more copy ad hoc network of double bounce
CN109379739A (en) * 2018-09-28 2019-02-22 嘉兴学院 A kind of credible cooperating service method of sea wireless Mesh netword
CN109561150A (en) * 2018-12-04 2019-04-02 挖财网络技术有限公司 A kind of credit value settlement method
CN111510502A (en) * 2020-04-28 2020-08-07 吉林科创电力有限公司 PBFT consensus propagation optimization method based on dynamic reputation value
CN114143104A (en) * 2021-12-06 2022-03-04 昆明理工大学 DPoS (distributed denial of service) consensus mechanism node reputation value measurement method based on dynamic trust model
CN114285748A (en) * 2021-12-28 2022-04-05 福州物联网开放实验室有限公司 Reputation evaluation method and reputation evaluation system based on Internet of things

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702675A (en) * 2009-11-20 2010-05-05 西安电子科技大学 System for managing P2P network security and trust based on path optimization and finding
CN102395217A (en) * 2011-11-14 2012-03-28 北京邮电大学 Construction method of credit-based differentiated service excitation mechanism in mobile ad hoc network
CN104080140A (en) * 2013-03-29 2014-10-01 南京邮电大学 Cooperative communication method based on trust evaluation for mobile ad hoc network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702675A (en) * 2009-11-20 2010-05-05 西安电子科技大学 System for managing P2P network security and trust based on path optimization and finding
CN102395217A (en) * 2011-11-14 2012-03-28 北京邮电大学 Construction method of credit-based differentiated service excitation mechanism in mobile ad hoc network
CN104080140A (en) * 2013-03-29 2014-10-01 南京邮电大学 Cooperative communication method based on trust evaluation for mobile ad hoc network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘曦: "《中国优秀硕士学位论文全文数据库信息科技辑》", 15 October 2012 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108880863A (en) * 2018-05-26 2018-11-23 江西理工大学 A kind of smart grid equipment safety diagnostic service system based on block chain technology
CN108880863B (en) * 2018-05-26 2021-02-19 江西理工大学 Smart power grid equipment safety diagnosis service system based on block chain technology
CN109041065A (en) * 2018-09-19 2018-12-18 北京计算机技术及应用研究所 A kind of node trust management method towards the more copy ad hoc network of double bounce
CN109379739A (en) * 2018-09-28 2019-02-22 嘉兴学院 A kind of credible cooperating service method of sea wireless Mesh netword
CN109379739B (en) * 2018-09-28 2021-10-15 嘉兴学院 Credible cooperative service method for offshore wireless Mesh network
CN109561150A (en) * 2018-12-04 2019-04-02 挖财网络技术有限公司 A kind of credit value settlement method
CN111510502A (en) * 2020-04-28 2020-08-07 吉林科创电力有限公司 PBFT consensus propagation optimization method based on dynamic reputation value
CN114143104A (en) * 2021-12-06 2022-03-04 昆明理工大学 DPoS (distributed denial of service) consensus mechanism node reputation value measurement method based on dynamic trust model
CN114143104B (en) * 2021-12-06 2022-10-14 昆明理工大学 DPoS (distributed denial of service) consensus mechanism node reputation value measurement method based on dynamic trust model
CN114285748A (en) * 2021-12-28 2022-04-05 福州物联网开放实验室有限公司 Reputation evaluation method and reputation evaluation system based on Internet of things

Also Published As

Publication number Publication date
CN105722149B (en) 2019-03-05

Similar Documents

Publication Publication Date Title
CN105722149A (en) Topology construction excitation method based on reputation value
Piamrat et al. Radio resource management in emerging heterogeneous wireless networks
Huang et al. A services routing based caching scheme for cloud assisted CRNs
Goudarzi et al. ABC-PSO for vertical handover in heterogeneous wireless networks
CN109862610A (en) A kind of D2D subscriber resource distribution method based on deeply study DDPG algorithm
CN101616167B (en) Method for determining multi-network cooperative transmission schemes and data transfer method
CN105979553B (en) A kind of hierarchical network handover decisions method based on fuzzy logic and TOPSIS algorithm
CN112218337A (en) Cache strategy decision method in mobile edge calculation
CN101835235A (en) Routing method for heterogeneous network based on cognition
CN106331083A (en) Heterogeneous network selection method considering content delivery energy consumption
CN102572987B (en) Network selection method orienting to heterogeneous wireless network environment
Xu et al. Fuzzy Q-learning based vertical handoff control for vehicular heterogeneous wireless network
CN115052325B (en) Multi-frequency heterogeneous wireless communication network access selection method suitable for substation service
CN104640141A (en) Multi-relay-node cooperative game motivating method
CN106791887A (en) The distributed caching of video and transmission optimization method in wireless network
CN107018552A (en) A kind of method for selecting heterogeneous network access
CN103002537A (en) Wireless multimedia sensor network node clustering method based on related coefficients
CN103458482A (en) Evolutionary game method for solving access problem of RSU in VANET
Liu et al. Deep dyna-reinforcement learning based on random access control in LEO satellite IoT networks
CN108521640B (en) Content distribution method in cellular network
Wang et al. A multi-objective model-based vertical handoff algorithm for heterogeneous wireless networks
CN105246124A (en) Heterogeneous wireless network joint admission control method
CN107318150A (en) A kind of user of LTE U autonomous systems is resident flow
Zhang et al. Endogenous security-aware resource management for digital twin and 6G edge intelligence integrated smart park
Desogus et al. Remiot: Reputation-based network selection in multimedia iot

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant