Game theoretic approaches to cooperation in wireless networks

181 169 0
Game theoretic approaches to cooperation in wireless networks

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

GAME THEORETIC APPROACHES TO COOPERATION IN WIRELESS NETWORKS AI XIN NATIONAL UNIVERSITY OF SINGAPORE 2010 GAME THEORETIC APPROACHES TO COOPERATION IN WIRELESS NETWORKS AI XIN (B.Eng, Xi’dian University) A THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING NATIONAL UNIVERSITY OF SINGAPORE 2010 Acknowledgements I would like to give my heartfelt thanks to my supervisor, Dr. Vikram Srinivasan and Prof. Tham Chen Khong, for their guidance, support and encouragement throughout my study. I would also like to thank my parents and my husband. They always give me their unconditional love and support. Last, but not least, I want to thank my friends and colleagues in CNDS lab for their kind assistance and suggestions on research and other issues. The interesting discussion during lunch and coffee time is so enjoyable. Contents Acknowledgements ii Summary vi List of Figures viii List of Tables x List of symbols xi Abbreviations xiii Introduction 1.1 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.5 Thesis overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Game Theory 2.1 Strategic Game Model and Nash Equilibrium 20 . . . . . . . . . . . . . 21 2.2 Optimality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 2.3 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Coverage Game in Wireless Sensor Networks 33 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 3.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 3.3 Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3.4 Algorithm Description . . . . . . . . . . . . . . . . . . . . . . . . . . 44 3.5 Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 3.6 Simulation and Discussion . . . . . . . . . . . . . . . . . . . . . . . . 64 3.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 WiFi Sharing Game in Wireless Community Networks 77 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 4.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 4.3 System Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 4.4 System Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 4.5 User and System Behavior . . . . . . . . . . . . . . . . . . . . . . . . 97 4.6 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 4.7 Experiments with Real Data . . . . . . . . . . . . . . . . . . . . . . . 105 4.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 iv WiFi Sharing Game with Priority Pricing 115 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 5.2 System Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 5.3 System Modelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 5.4 User Behaviors and System Convergence . . . . . . . . . . . . . . . . 133 5.5 Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 5.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Conclusion and Future Work 6.1 145 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Bibliography 150 List of Publications 163 v Summary In this thesis, we use game theoretical approaches to study several cooperation issues in wireless networks. Firstly, we investigate the coverage problem in wireless sensor networks. We assume that nodes are randomly scattered in a field and the goal is to partition these nodes into K sets. At any given time, nodes belonging to only one of these sets actively sense the field. A key challenge is to achieve this partition in a distributed manner with purely local information and yet provide near optimal coverage. We formulate this coverage problem as a coverage game and prove that the optimal solution is a pure Nash equilibrium. We then design synchronous and asynchronous algorithms, which converge to the pure Nash equilibrium. Moreover, we analyze the optimality and complexity of the pure Nash equilibrium in the coverage game, and validate the theoretical results through extensive simulations. Next, we investigate the WiFi sharing problem in wireless community networks (WCNs). WCNs, where users share wireless bandwidth, has attracted tremendous interest from academia and industry. Companies such as FON have been successful in attracting large communities of users. However, solutions such as FON either require users to buy specialized FON routers or implement firmware modifications to existing routers. We propose a solution which does not require such sophisticated hardware and only requires users to install a client software in their PCs. While this solution appears simple, it raises several issues of incentivizing users to share their bandwidth and also issues of preventing users from cheating behaviors which give them an unfair advantage. By making simple but plausible assumptions about user behavior, we show via analysis and extensive simulations that the system converges to a Pareto Optimal Nash equilibrium. We further validate our system model, by running trace-driven simulations on real world data. Finally, we study the fairness problem in credit-based WiFi sharing community. Under credit system, users obtain no more service than they share. Some users, located in unpopular areas accumulate few credits and are unable to access other networks when they roam. Meanwhile, other users located in hot-spots, accumulate extra credits, which they have no way to spend. A priority pricing based WiFi sharing solution (“PP-WiSh”), which is also a pure client software solution, is provided to solve this problem. PP-WiSh allows users located in popular areas to spend the excess credits they accumulate for better service and also helps users located in unpopular areas to accumulate extra credits which they can utilize when roaming. We formulate the priority pricing WiFi sharing problem as a distributed optimization problem and theoretically analyze the equilibrium pricing solution of users in the community. Moreover, we prove that all the users with rational and intelligent behaviors will converge to this equilibrium and we demonstrate the convergence and performance improvements through experiments using real world trace data. vii we did some experiments using the real world WiFi trace data, however, this data only addresses the users’ network access patterns. Regarding the other more complex user behaviors, e.g. cooperation and competition, cheating and punishment, etc., for now we only analyze them in a theoretical way, and make some simply assumptions in our experiment. The future researchers can consider to the experiments in a real WiFi sharing community networks (e.g. FON), so that they can have the real world users’ cooperation and competition behaviors in WiFi sharing, and thus further improve our WiFi sharing design to improve the whole community performance. In summary, in this thesis, we investigated several aspects of wireless networking to which game theoretical methods can be beneficially applied, and obtained several interesting results. We hope this work can serve as a useful guide of this field to other researchers and inspire them to further investigate this field. 149 Bibliography [1] C. H. Papadimitriou, “Algorithms, games and the internet,” the 33rd ACM Symposium on Theory of Computing, pp. 749–753, 2001. [2] V. Srivastava, J. Neel, A. B. MacKenzie, R. Menon, L. A. DaSilva, J. E. Hicks, J. H. Reed, and R. P. Gilles, “Using game theory to analyze wireless ad hoc networks,” IEEE Communication Surveys and Tutorials, 2005. [3] E. Altman, T. Boulogne, R. E. Azouzi, T. Jimenez, and L. Wynter, “A survey on networking games in telecommunications,” Computers and Operations Research, vol. 33, no. 2, pp. 286–311, Feb. 2006. [4] A. B. MacKenzie, L. Dasilva, and W. Tranter, “Game theory for wireless engineers,” Morgan and Claypool Publishers, 2006. [5] H. Ji and C.-Y. Huang, “Non-cooperative uplink power control in cellular radio systems,” Wireless Networks, vol. 4, no. 3, pp. 233–240, 1998. [6] D. Goodman and N. Mandayam, “Power control for wireless data,” IEEE Pers. Communications Magazine, vol. 7, no. 2, pp. 48–54,, 2000. [7] C. U. Saraydar, N. B. Mandayam, and D. J. Goodman, “Efficient power control via pricing in wireless data networks,” IEEE Trans. Communications, vol. 50, no. 2, pp. 291–303,, 2002. 150 [8] T. Heikkinen, “Distributed scheduling via pricing in a communication network,” Networking. Springer-Verlag, May 2002. [9] T. Alpcan, T. Basar, R. Srikant, and E. Altman, “CDMA uplink power control as a noncooperative game,” IEEE Conference on Decision and Control, pp. 197–202., 2001. [10] M. Xiao, N. Schroff, and E. Chong, “Utility based power control in cellular radio systems,” IEEE INFOCOM, Anchorage, Alaska, 2001. [11] Z. Chenglin and G. Yan, “A novel distributed power control algorithm based on game theory,” in WiCOM’09: Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing. Piscataway, NJ, USA: IEEE Press, 2009, pp. 1971–1974. [12] S. Koskie and Z. Gajic, “A nash game algorithm for sir-based power control in 3g wireless cdma networks,” IEEE/ACM Trans. Netw., vol. 13, no. 5, pp. 1017–1026, 2005. [13] M. Bloem, T. Alpcan, and T. Ba¸sar, “A stackelberg game for power control and channel allocation in cognitive radio networks,” in ValueTools ’07: Proceedings of the 2nd international conference on Performance evaluation methodologies and tools. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2007, pp. 1–9. [14] T. Alpcan, X. Fan, T. Basar, M. Arcak, and J. T. Wen, “Power control for multicell cdma wireless networks: a team optimization approach,” Wirel. Netw., 151 vol. 14, no. 5, pp. 647–657, 2008. [15] A. Economides and J. Silvester, “Multi-objective routing in integrated services networks: A game theory approach,” IEEE INFOCOM, vol. 3, pp. 1220–1227, 1991. [16] Y. Korilis, A. Lazar, and A. Orda, “Achieving network optima using stackelberg routing strategies,” IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 161–173, February 1997. [17] R. J. La and V. Anantharam, “Optimal routing control: Game theoretic approach,” the 36th IEEE Conference on Decision and Control, vol. 3, pp. 2910– 2915, 1997. [18] T. Roughgarden and E. Tardos, “How bad is selfish routing?” Journal of the ACM, vol. 49, no. 2, pp. 236–259, 2002. [19] T. Lucking, M. Mavronicolas, B. Monien, and M. Rode, “A new model for selfish routing,” Theoretical Computer Science, vol. 406, no. 3, pp. 187 – 206, 2008. [20] D. Fotakis, S. Kontogiannis, E. Koutsoupias, M. Mavronicolas, and P. Spirakis, “The structure and complexity of nash equilibria for a selfish routing game,” Theoretical Computer Science, vol. 410, no. 36, pp. 3305 – 3326, 2009, graphs, Games and Computation: Dedicated to Professor Burkhard Monien on the Occasion of his 65th Birthday. [21] T. Roughgarden, “Algorithmic game theory,” Commun. ACM, vol. 53, no. 7, pp. 78–86, 2010. 152 [22] M.Felegyhazi, J.-P. Hubaux, and L. Buttyan, “Nash equilibria of packet forwarding strategies in wireless ad hoc networks,” IEEE transactions on Mobile Computing, May 2006. [23] A.Urpi, M.Bonuccelli, and S. Giordano, “Modeling cooperation in mobile ad hoc networks: a formal description of selfishness,” WiOpt, 2003. [24] L.Buttyan and J.-P. Hubaux, “Stimulating cooperation in self-organizing mobile ad hoc networks,” ACM/MONET, 2002. [25] M. Hauspie, “Cooperation in ad hoc networks: Enhancing the virtual currency based models,” InterSense, 2006. [26] W. C.-W. Tan and S. K. Bose, “Throughput and lifetime performance of costcredit-based routing protocols for power constrained ad hoc networks,” Comput. Commun., vol. 31, no. 17, pp. 3964–3977, 2008. [27] S.Zhong, Y.R.Yang, and J.Chen, “Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks,” IEEE INFOCOM, vol. 3, pp. 1987–1997, 2003. [28] J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modeling incentives for collaboration in mobile ad hoc networks,” the 1st Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2003. [29] S. Eidenbenz, G. Resta, and P. Santi, “COMMIT: A sender-centric truthful and energy-efficient routing protocol for ad hoc networks with selfish nodes,” IEEE Intl. Parallel and Distributed Processing Symposium Workshop, vol. 13, no. 13, 2005. 153 [30] L. Anderegg and S. Eidenbenz, “Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents,” the 9th Annual Intl. Conf. on Mobile Computing and Networking (MobiCom 2003), pp. 245– 259, 2003. [31] H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. S. Fallah, “A secure creditbased cooperation stimulating mechanism for manets using hash chains,” Future Gener. Comput. Syst., vol. 25, no. 8, pp. 926–934, 2009. [32] P. Marbach and Y. Qiu, “Cooperation in wireless ad hoc networks: A marketbased approach,” IEEE/ACM transactions on networking, 2005. [33] P. Michiardi and R. Molva, “Analysis of coalition formation and cooperation strategies in mobile ad hoc networks,” Journal of Ad Hoc Networks, vol. 3, no. 2, pp. 193–219, 2005. [34] S.Marti, T.J.Giuli, K. Lai, and M.Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” 6th Annual IEEE/ACM Intl. Conf. on Mobile Computing and Networking, pp. 255–265, 2000. [35] S. Buchegger and J. L. Boudec, “Performance analysis of the confidant protocol: cooperation of nodes fairness in dynamic ad-hoc networks,” the 3rd ACM Intl. Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), 2002. [36] M. Refaei, V. Srivastava, L. A. DaSilva, and M. Eltoweissy, “A reputation-based mechanism for isolating selfish nodes in ad hoc networks,” the 2nd Annual Intl. Conf. on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005. 154 [37] S. Bansal and M. Baker, “Observation-based cooperation enforcement in ad hoc networks,” technical report, Computer Science Department, Stanford University, 2003. [38] J. J. Jaramillo and R. Srikant, “A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks,” Ad Hoc Netw., vol. 8, no. 4, pp. 416–429, 2010. [39] W. Zhou, Z. Wei, M. Kang, P. Nixon, and L. Jia, “A credit-based incentive mechanism for recommendation acquisition in multihop mobile ad hoc networks,” Emerging Security Information, Systems, and Technologies, The International Conference on, vol. 0, pp. 306–311, 2009. [40] V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, “Cooperation in wireless ad hoc networks,” IEEE INFOCOM, 2003. [41] R. J. Lipton, V. V. Vazirani, M. Mihail, C. Tovey, and E. Vigoda, “Algorithmic game theory,” 2007. [42] R. Bruno, M. Conti, and E. Gregori, “Mesh networks: Commodity multihop ad hoc networks,” IEEE Communication Magazine, 2005. [43] R. Karrer, A. Sabharwal, and E. Knightly, “Enabling largescale wireless broadband: The case for taps,” ACM SIGCOMM Comp. Commun. Rev., vol. 34, no. 1, pp. 27–34, 2004. [44] “Seattle wireless.” [Online]. Available: http://seattlewireless.net/ [45] “Champaign-urbana community wireless network (cuwin).” [Online]. Available: 155 http://www.cuwireless.net/ [46] “San francisco bawug,.” [Online]. Available: http://www.bawug.org/about/ [47] J. Bicket, D. Aguayo, S. Biswas, and R. Morris, “Architecture and evaluation of an unplanned 802.11b mesh network,” Mobicom, 2005. [48] “FON WiFi sharing community.” [Online]. Available: http://www.fon.com/en/ [49] “Whisher WiFi sharing community.” [Online]. Available: http://www.whisher. com/ [50] J. von Neumann and O. Morgenstern, “Theory of games and economic behavior,” Princeton University Press, 1944. [51] J. Nash, “Equilibrium points in n-person games,” Proceedings of the National Academy of Sciences, vol. 36, no. 1, pp. 48–49, 1950. [52] ——, “Noncooperative games,” Annals of Mathmatics, vol. 54, no. 2, pp. 289– 295, September 1951. [53] M. Flood and M. Dresher, “Some experimental games,” Research memorandum RM-789. RAND Corporation, Santa Monica, CA, 1952. [54] E. Koutsoupias and C. H. Papadimitriou, “Worst-case equilibria,” Proceedings 16th Annual Symposium on Theoretical Aspects of Computer Science, pp. 404– 413. [55] A. Czumaj and B. V¨ocking, “Tight bounds for worst-case equilibria,” the 13th Annual Symposium on Discrete Algorithms, 2002. [56] B. Awerbuch, Y. Azar, and A. Epstein, “The price of routing unsplittable flow,” 156 the thirty-seventh annual ACM symposium on Theory of Computing (STOC), pp. 57–66, 2005. [57] D. Monderer and L. Shapley, “Potential games,” GAMES AND ECONOMIC BEHAVIOR, pp. 124–143, 1996. [58] G. Christodoulou and E. Koutsoupias, “The price of anarchy of finite congestion games,” the thrity-seventh annual ACM symposium on Theory of Computing (STOC), pp. 67–73, 2005. [59] A. Vetta, “Nash equilibria in competitive societies, with applications to facility location, traffic routing and auctions,” Annual IEEE Symposium on Foundations of Computer Science, pp. 416–425. [60] M. X. Goemans, E. L. Li, V. S. Mirrokni, and M. Thottan, “Market sharing games applied to content distribution in ad hoc networks,” MobiHoc, pp. 55–66, 2004. [61] L. Fliescher, M. X. Goemans, V. S. Mirrokni, and M. Sviridenko, “Tight approximation algorithms for maximum general assignment problems,” SODA, pp. 611–620, 2006. [62] X. Ai, V. Srinivasan, and C.-K. Tham, “Optimality and complexity of pure nash equilibria in the coverage game,” IEEE Journal on Selected Areas in Communications (JSAC), Special issue on Game Theory in Communication Systems, September 2008. [63] L. Walras, “Elements d’economique politique pure,” Corbaz, Lausanne, Switzerland, 1877. 157 [64] C. Courcoubetis and R. Weber, “Pricing communication networks: economics, technology, and modeling,” Wiley-Interscience series in systems and optimization, pp. 127–128, 2003. [65] H. Scarf and T. Hansen, “Computation of economic equilibria,” Yale University Press, New Haven, Connecticut, 1973. [66] K. Arrow, “The role of securities in the optimal allocation of risk bearing,” As translated and reprinted in 1964, Review of Financial Studies, vol. 31, pp. 91–96, 1953. [67] G.Debreu, “Theory of value: An axiomatic analysis of economic equilibrium,” Yale University Press, New Haven, 1959. [68] C. Papadimitriou, “Computational complexity,” Addison Wesley, 1994. [69] N. Megiddo and C. Papadimitriou, “On total functions, existence theorems and computational complexity,” Theoretical Computer Science, vol. 81, no. 2, pp. 317–324, 1991. [70] C. Papadimitriou, “On the complexity of the parity argument and other inefficient proofs of existence,” Journal of Computer and System Science, vol. 48, no. 3, pp. 498–532, 1994. [71] C. H. Papadimitriou, “How easy is local search?” Journal of computer and system sciences, vol. 37, pp. 79–100, 1988. [72] C. Daskalakis, P.W.Goldberg, and C. Papadimitriou, “Computing a nash equilibrium is ppad-complete,” to appear in SIAM Journal on Computing. 158 [73] M. Kearns, M. L. Littman, and S. Singh, “Graphical models for game theory,” PCUAI, 2001. [74] A. Fabrikant, C. H. Papadimitriou, and K. Talwar, “The complexity of pure nash equilibria,” STOC, 2004. [75] M. Cardei, M. T.Thai, Y. Li, and W. Wu, “Energy-efficient target coverage in wireless sensor networks,” IEEE INFOCOM, 2005. [76] S. Slijepcevic and M. Potkonjak, “Power efficient organization of wireless sensor networks,” ICC, 2001. [77] H. Zhang and J. C. Hou, “Maximizing α-lifetime for wireless sensor networks,,” SenMetrics, 2005. [78] Z. Abrams, A. Goel, and S. Plotkin, “Set K-cover algorithms for energy efficient monitoring in wireless sensor networks,” Information Processing In Sensor Networks (IPSN), 2004. [79] D. Vickrey and D. Koller, “Multi-agent algorithm for solving graphical games,” AAAI, 2002. [80] H. Zhang and J. C. Hou, “On the upper bound of α-lifetime for large sensor network,” ACM Transactions on Sensor Networks, 2005. [81] D.Fudenberg and J.Tirole, “Game theory,” MIT Press, 1991. [82] X. Ai, V. Srinivasan, and C.-K. Tham, “Coverage game in wireless sensor networks,” IEEE ICON, 2006. [83] H. Zhang and J. Hou, “Maintaining sensing coverage and connectivity in sensor 159 networks,” Ad Hoc & Sensor Wireless Networks, vol. 1, pp. 89–124, 2005. [84] X. Ai, V. Srinivasan, and C.-K. Tham, “DRACo: Distributed, robust and asynchronous coverage in wireless sensor networks,” IEEE SECON, 2007. [85] B.Vocking and R. Aachen, “Congestion games: optimization in competition,” ACiD, 2006. [86] M.W.Krentel, “Structure in locally optimal solutions,” IEEE FOCS, 1989. [87] A. A. Schaffer and M. Yannakakis, “Simple local search problems that are hard to solve,” SIAM (Society for Industrial and Applied Mathematics) journal of computing, vol. 20, no. 1, pp. 56–87, 1991. [88] E. C. Efstathiou, P. A. Frangoudis, and G. C. Polyzos, “Stimulating participation in wireless community networks,” IEEE INFOCOM, 2006. [89] N. Sastry, J. Crowcroft, and K. Sollins, “Architecting citywide ubiquitous WiFi access,” ACM Hotnets, 2007. [90] N. Thompson, G. He, and H. Luo, “Flow scheduling for end-host multihoming,” IEEE INFOCOM, 2006. [91] “Mushroom networks.” [Online]. Available: http://mushroomnetworks.com/ [92] M. H. Manshaei, J. Freudiger, M. Felegyhazi, P. Marbach, and J.-P. Hubaux, “On wireless social community networks,” IEEE INFOCOM, 2008. [93] R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, “Sustaining cooperation in multi-hop wireless networks,” NSDI: Symposium on Networked Systems Design & Implementation, May 2005. 160 [94] N.B.Salem, L. Buttyan, J.-P. Hubaux, and M. Jakobsson, “Node cooperation in hybrid ad hoc networks,” IEEE Mobicom, 2006. [95] R. Ma, S. Lee, J. Lui, and D. Yau, “Incentive and service differentiation in P2P networks: A game theoretic approach.” [96] A. Mawji and H. Hassanein, “A utility-based incentive scheme for P2P file sharing in mobile ad hoc networks,” IEEE ICC, 2008. [97] R. Ma, S. Lee, J. Lui, and D. Yau, “An incentive mechanism for P2P networks,” IEEE, Distributed Computing Systems, 2004. [98] S. Agarwal, M. Laifenfeld, A. Trachtenberg, and M. Alanyali, “Fast data access over asymmetric channels using fair and secure bandwidth sharing,” IEEE ICDCS, 2006. [99] M. Kandori, G. J. Mailath, and R. Rob, “Learning, mutation, and long run equilibria in games,” Econometrica, Jan. 1993. [100] D. Foster and P. Yong, “Stochastic evolutionary game dynamics,” Theoretical Population Biology, 1990. [101] “CRAWDAD, a community resource for archiving wireless data at Dartmouth.” [Online]. Available: http://crawdad.cs.dartmouth.edu/index.php [102] D. P. Bertsekas and R. Gallager, Data Networks. Prentice Hall, 1992, ch. 3, p. 204. [103] K. Jain, M. Mahdian, and A. Saberi, “Approximating market equilibria,” Proc. APPROX, 2003. 161 [104] “OMNeT++, discrete event simulation system.” [Online]. Available: http: //www.omnetpp.org/ 162 List of Publications Journals • Xin Ai, Vikram Srinivasan, Chen-Khong Tham,Optimality and Complexity of Pure Nash equilibria in the Coverage Game, IEEE JSAC (Journal on Selected Areas in Communications), Special Issue on Game Theory in Communication Systems, Vol. 26, No. 7, Sep. 2008 • Xin Ai, Vikram Srinivasan, Chen-Khong Tham, Fair-WiSh: A Simple, Robust, Fair and Credit Based Wi-Fi Community Network, submitted to IEEE Transactions on Mobile Computing Conferences • Xin Ai, Vikram Srinivasan, Chen-Khong Tham, Wi-Sh: A Simple, Robust and Credit Based Wi-Fi Community Network, in Poceedings of IEEE INFOCOM 2009 • Xin Ai, Vikram Srinivasan, Chen-Khong Tham, DRACo: Distributed, Robust an Asynchronous Coverage in Wireless Sensor Networks, in Proceedings of IEEE SECON 2007 • Xin Ai, Vikram Srinivasan, Chen-Khong Tham,Coverage Game in Wireless Sensor Networks, in proceedings of IEEE ICON 2006 164 [...]... the local information and interactions with the neighboring nodes Therefore, game theory, a study of interactions between autonomous agents, is applied in the wireless networks to analyze the interactive decision-making processes of the distributed wireless nodes, and design effective schemes to incentivize the cooperation among wireless nodes and achieve the network wide objectives A lot of interests... 11, 12, 13, 14] In the power control game, the players are the cellular telephone users in the cell Each player’s action is to choose the power level The player’s utility is modeled as an increasing function of SINR and a decreasing function of power By increasing power, the user can increase her SINR, however, it may require others to increase their own power to maintain the desired SINR Thus, once... convergence problem we studied in the wireless networks 13 1.3.3 Incentivizing Cooperation Previously many researchers studied the cooperation incentivizing mechanisms in ad hoc networks and obtained a lot of interesting results, however,until now few results have been turned into the commodities, or have the real impacts on our way of using wireless network today The possible reasons may come from both... Figure 1.1: The inefficient result caused by distributed behaviors the conflicts in decision making, even if all the nodes in the network share the same objective We use a simple coverage problem in wireless sensor networks (WSNs) to illustrate this point In WSNs, a large number of energy constrained sensor nodes are randomly deployed in a target field to monitor some activities in this area Since all the... quite interesting to study the interactions between the distributed nodes in the network using game theory In addition, we would like to mention that with the technology growth, the selfish behaviors in the network is gradually decreasing, since many human roles now can be replaced by the intelligent devices, e.g., sensor nodes, robot, etc These intelligent devices can be totally controlled by the engineers... assumed to be continuous and nondecreasing in the edge congestion, the total latency of the routes chosen by unregulated selfish network users is no more than twice of the total latency incurred by optimally routing 6 1.2.3 Cooperation in Ad Hoc Networks In ad hoc networks, each node acts not only as source/destination for traffic, but also as a router to forward packets for its neighbors What are the incentives... them, accessing to the internet are much more interesting In this case, users are looking for multipurpose networking platforms in which cost is an issue, Internet is a must and high bandwidth is preferred So recently a more practical “opportunistic ad hoc networking” is provided in [43], known as “Mesh Networks Mesh networks are built on a mix of fixed access points (e.g., WiFi access points) and mobile... interest in adopting it Recently the single hop mesh network, 14 so-called wireless community networks (WCNs), have already shown great potential in the wireless market WCNs are built mainly on 802.11 technology (WiFi) and aim at providing Internet access to a community of users that can share the same Internet access link Some examples of this are Seattle Wireless [44], ChampaignUrbana Community Wireless. .. very challenging task to execute it well Second scenario is the “engineering” scenario, where all the nodes in the system are programmed by the engineers, thus the engineers can choose whatever utility function they desire The challenge in this scenario lies in explaining why a particular utility function has been chosen and why game theory is being employed at all In addition, although game theory... configurations they like to benefit themselves the most Therefore, the cooperation incentivizing mechanism is indeed required in WCNs Moreover, this scheme should address the different features of WCNs, compared with the one in ad hoc networks For example, in WCNs there is only one intermediate relaying node (the WLAN AP), which is also connected to a fixed power supply and to the Internet; and in WCNs the functions . GAME THEORETIC APPROACHES TO COOPERATION IN WIRELESS NETWORKS AI XIN NATIONAL UNIVERSITY OF SINGAPORE 2010 GAME THEORETIC APPROACHES TO COOPERATION IN WIRELESS NETWORKS AI XIN (B.Eng,. 163 v Summary In this thesis, we use game theoretical approaches to study several coope ration issues in wireless networks. Firstly, we investigate the coverage problem in wireless sensor networks. . local information and interactions with the neighboring nodes. Therefore, game theory, a study of interactions between autonomous agents, is applied in the wireless networks to analyze the interactive

Ngày đăng: 15/09/2015, 22:30

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan