透過您的圖書館登入
IP:3.144.35.148
  • 學位論文

合作與安全傳輸於不可信任之點對點系統

Cooperative and Secure Transmission in Unreliable Peer-to-Peer System

指導教授 : 蕭旭峯

摘要


點對點系統技術的發展趨勢已漸漸走向合作網路(cooperative network),並讓合作網路中的使用者分享資源,包含資料儲存空間、電腦計算資源…等。而在合作網路中常常會出現免費使用者(free-rider),該使用者使用了系統中的資源卻僅分享少量資源或不分享資源,此種行為使得使用者之間的合作意願下降。在這篇論文中,我們提出一個新的賽局(game)來促進使用者之間的合作。一開始我們先從兩人資訊完全賽局(two-player complete information game)來分析賽局之平衡點(Nash equilibrium),然後到資訊不完全賽局(incomplete information game),最後擴展到多人資訊不完全賽局,並且在賽局當中考慮惡意使用者與詐欺使用者(cheating peer)的影響。最後,我們將以多人資訊不完全賽局之不同使用者的獲利做為客觀的分析比較。

關鍵字

賽局理論 點對點系統 安全

並列摘要


Cooperative network has become one of the main trends of the research of peer-to-peer system. A peer in the cooperative network shares its resource including the storage of information, CPU, memory…etc. However, free-riders usually appears in the systems. Free-riders obtain the resources from the system and do not share any resource. The behavior of free-riders decreases the incentives for sharing resources. In this thesis, we propose a novel game to encourage the cooperation between peers. At first, we analyze the Nash equilibrium for two-player complete information game, incomplete information game, and multi-player incomplete information game respectively. And then we consider the impacts of malicious peers and cheating peers. Finally, we will compare objectively with each rewards of each kind of peers in the multi-player incomplete information game.

並列關鍵字

Game theory Peer-to-Peer system Security

參考文獻


[2]. R. Koetter and M. Medard, “An algebraic Approach to Network Coding,” IEEE/ACM Transaction on Networking, vol. 11, no. 5, pp.782-795, 2003
[4]. C. Gkantsidis and P. Rodriguez, “Network Coding for Large Scale Content Distribution,” in Proc. of IEEE INFOCOM 2005
[5]. C. Gkantsidis and P. Rodriguez, “Cooperative Security for Network Coding File Distribution,” in Proc. of IEEE INFOCOM 2006
[7]. Z. Yu, Y. Wei, B. Ramkumar and Y. Guan, “An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks,” in Proc. of IEEE INFOCOM 2008
[8]. E. Kehdi, B. Li, “Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding,” in Proc. of IEEE INFOCOM 2009

延伸閱讀