首页> 外文期刊>Communications Letters, IEEE >Assessing the vulnerability of DTN data relaying schemes to node selfishness
【24h】

Assessing the vulnerability of DTN data relaying schemes to node selfishness

机译:评估DTN数据中继方案对节点自私的脆弱性

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Delay tolerant networks rely on the mobility of their nodes and sequences of their contacts to transfer data. Proposed data forwarding mechanisms represent different trade offs between data transfer speed and network resource consumption, most of them assuming perfect cooperation among network nodes. Nevertheless, nodes may exhibit selfish behavior, in particular when they are constrained with respect to energy, computational power, and/or storage space. In this paper, we analytically assess the performance of two popular data relaying alternatives, the unrestricted and two-hop relay schemes, when nodes behave selfishly while forwarding data. Our results suggest that the performance advantage of unrestricted relaying over two-hop relaying decreases both with the number of selfish nodes and the intensity of their selfishness, irrespective of whether nodes defer from relaying deterministically or probabilistically. We use our model to quantify the vulnerability of the two relaying schemes to node selfishness but also drive remediation actions against it.
机译:时延容忍网络依赖于其节点的移动性及其联系顺序来传输数据。提出的数据转发机制代表了数据传输速度和网络资源消耗之间的不同权衡,其中大多数假设网络节点之间的完美协作。然而,节点可能表现出自私的行为,特别是在节点受到能量,计算能力和/或存储空间的约束时。在本文中,当节点在转发数据时表现自私时,我们分析性地评估了两种流行的数据中继备选方案(无限制和两跳中继方案)的性能。我们的结果表明,无限制中继优于两跳中继的性能优势随自私节点的数量及其自私程度的增加而降低,而不管节点是确定性地还是概率性地进行中继。我们使用我们的模型来量化这两种中继方案对节点自私的脆弱性,同时也针对它采取驱使措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号