A game theoretical model for collaborative protocols in selfish, tariff free, multi hop wireless networks

143 1K 0
A game theoretical model for collaborative protocols in selfish, tariff free, multi hop wireless networks

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

A GAME THEORETICAL MODEL FOR COLLABORATIVE PROTOCOLS IN SELFISH, TARIFF-FREE, MULTI-HOP WIRELESS NETWORKS BY NG SEE KEE A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING NATIONAL UNIVERSITY OF SINGAPORE (2005) Acknowledgments I would like to thank my supervisor, Dr Winston K.G Seah, for his assistance in many ways Table of Contents Introduction 1.1 Mobile Ad Hoc Networks 1.1.1 Network Routing 1.1.2 Medium Access Control 1.1.3 Quality of Service Provisioning 1.2 Game Theory 1.2.1 Strategic Games .10 1.2.2 Extensive Games 13 1.3 Our Contributions 15 Wireless Network Availability 19 2.1 Introduction 19 2.2 Incentive-Based Mechanisms 21 2.3 Punishment-Based Mechanisms .24 2.4 Summary 25 Punishments in Repeated Games 27 3.1 Introduction 27 3.2 Finitely Repeated Games 29 3.3 Infinitely Repeated Games 30 3.3.1 Repeated Prisoner's Dilemma 32 3.3.2 Folk Theorems .35 3.3.2.1 Nash folk theorem 36 3.3.2.2 Perfect folk theorem 36 3.4 Session-based Generous Tit-for-Tat (GTFT) 38 3.5 Do ut des strategy 40 3.6 Topology Dependent Analysis 40 3.7 Punishment, parole and rehabilitation 42 3.8 Self-Learning Repeated Game 42 3.9 Summary 44 Private Monitoring 47 4.1 Introduction 47 4.2 Aoyagi's Game for Dynamic Bertrand Oligopoly 48 4.2.1 Game Model 50 4.3 Summary 56 The Wireless Multi-hop Game 58 5.1 Introduction 58 5.2 Modelling Multi-hop Characteristics 61 5.3 Periodic Punishment Approach 65 5.4 Condition for Efficient Collusion 69 5.5 Summary 75 Playing in the Wireless Environment 78 6.1 Introduction 78 6.2 Modelling Private Observations 79 6.3 The Reporting Strategy 82 6.4 Proof of Assumption 1: Correlated Packet Arrival Signal 90 6.5 Proof of Assumption 2: Highest Unanimity at Collusion 93 6.6 Summary 101 The SRRR Protocol Framework 103 7.1 Introduction 103 7.2 Protocol Description .104 7.3 Secrets and Lies 108 7.4 Simulation Results 113 7.5 Summary 119 Conclusion 120 Bibliography 126 Summary Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability With technological maturity and widespread technical know-how, a different set of network problems has emerged - clever users that alter network behavior in a way to benefit themselves at the expense of others The problem would be more pronounced in mobile ad hoc networks (MANET) where network ownership can be shared among different entities Node misbehavior can occur in various degrees At the extreme end, a malicious node may eavesdrop on sensitive data or deliberately inject fabricated, replayed or tampered packets into the network to disrupt network operations The solution is, generally, to enable network encryption and authentication This thesis, on the other hand, focuses on misbehaviors caused by selfish but rational users while keeping in mind the dangers posed by malicious ones In contrast to a malicious node, a rational node acts only to obtain the outcome that he most prefers In such a case, cooperation can still be achievable if the outcome of cooperation is to the best interest of the node MANETs, which are typically made up of wireless, battery-powered devices, will find cooperation hard to maintain because it requires the consumption of scarce resources such as bandwidth, computational power and battery power The objective of this thesis is to apply game theory to achieve collusive networking behavior in the MANET operational environment The scenarios for such behaviour to occur lies in the emerging 4th generation networks where communications over multihop wireless links, across nodes that may subscribe to different providers, are envisaged to occur Research in this area is still in its infancy and existing solutions lack technical feasibility and theoretical consistency These solutions fall into the category of pricing or punishment The pricing solution either requires a tamper-proof counter as a reliable storage of a node's wealth, or an occasional connection to a central authority where payments can be coordinated Punishment methods are often designed based on the well-established Repeated Game model and promiscuous listening may be relied on for the monitoring of other players' actions Promiscuous listening is, nevertheless, unreliable and computationally demanding In addition, the Repeated Game model (perfect and public) fails to account for imperfection in the wireless monitoring device (whether it is public or private) and proposed solutions also overlooked the need for coordinated punishment Most unforgivably, mass punishment of nodes creates a vulnerability for Denial-of-Service (DoS) attacks, threatening even the feasibility of the punishment mechanism as a solution for sustaining cooperation in MANETs The complexity of modeling MANETs and the suitability of available game models poses a significant challenge to the realization of a theoretical model for collusive MANETs protocols In this work, pricing, promiscuous listening and mass punishments are avoided altogether Our model relies on a recent work in the field of Economics on the theory of imperfect private monitoring for the dynamic Bertrand oligopoly, and adapts it to the wireless multi-hop network The model derives conditions for collusive packet forwarding, truthful routing broadcasts and packet acknowledgments under a lossy, wireless, multi-hop environment, thus capturing many important characteristics of the network layer and link layer in one integrated analysis that has not been achieved in previous works We provided a proof of the viability of the model under a theoretical wireless environment Based on the model, we proposed an SRRR protocol for demonstrating the application of our model to protocol design Finally, we proof by simulation that the SRRR protocol is resilient against selfish users under a several deception scenarios Tables Table Prisoners' Dilemma 11 Table Battle of the Sexes 12 Table Strategic form of the extensive game 14 Table Modified Prisoner's Dilemma 30 Table Control Slot Information 106 Table Example Control Slot Information During Bandwidth Reservation 109 Table Cooperative Scenario without Packet Dropping 109 Table Simple Packet Dropping 110 Table Secret Packet Dropping with Acknowledgment Lies 111 Table 10 Secret Packet Dropping with Bandwidth Lies 112 Table 11 Honest Packet Dropping 112 1.210 1.010 1 0.000 normalized punishment rate 0.001 0.002 0.003 1 1 1 0.004 0.005 0.006 0.007 0.008 0.009 0.810 0.610 0.410 0.210 0.010 % bandwidth deviation 0.00010 (no secret packet dropping), 0.00012, 0.00014, 0.00016 and 0.00018 loss rates Figure 11: Downstream Punishment for Secret Packet Dropping with Bandwidth Lies 5.000 normalized punishment rate 4.500 4.000 3.500 3.000 2.500 2.000 1.500 1.000 0.500 1.092879257 1.179566563 1.26006192 1.334365325 0.000 0.000 0.001 0.002 0.003 0.004 0.005 0.006 0.007 0.008 0.009 % bandwidth deviation 0.0001 loss rate (no secret packet dropping) 0.00012 loss rate 0.00014 loss rate 0.00016 loss rate 0.00018 loss rate Figure 12: Upstream Punishment for Secret Packet Dropping with Bandwidth Lies Finally, we simulated source rate deviations at the traffic generator As the deviations increase, the punishment rates decrease even for selfish nodes, both on the downstream, Figure 13, and the upstream, Figure 14 Hence deviation by the source undermines the ability to enforce punishment and therefore a rational source reveals its required bandwidth truthfully On the other hand, the result also 117 implies that our initial protocol setup phase, whereby no packets is transmitted, will not be subjected to unnecessary punishments 1.2 normalized punishment rate 0.8 0.6 0.4 0.2 0.00000 0.10000 0.20000 0.30000 0.40000 % source deviation 0.00010 (no secret dropping), 0.00012, 0.00014, 0.00016 and 0.00018 loss rates Figure 13: Downstream Punishment for Source Deviations normalized punishment rate 12 10 0.00000 0.10000 0.20000 0.30000 % source deviation 0.00010 loss rate (no secret packet dropping) 0.00012 loss rate 0.00014 loss rate 0.00016 loss rate 0.00018 loss rate Figure 14: Upstream Punishment for Source Deviations 118 0.40000 7.5 Summary This chapter serves to demonstrate the application of the Wireless Multi-hop Game model in protocol design We proposed a Selfish Resilient Resource Reservation (SRRR) protocol but is intentionally left general so that optimization issues can be left for future work It is also not the only solution possible for the Wireless Multi-hop Game model and other approaches are possible We have made several assumptions in SRRR Firstly, we assume a TDMA MAC which will require time synchronization that is hard to achieve in wireless multihop network Nevertheless, research in this area has progressed significantly Secondly, we assumed that the transmission of control information is reliable because the Wireless Multi-hop game model does not account for report losses and corruptions Error correction mechanisms may be used for rectification Thirdly, our model assures truthful QoS sharing within its neighborhood only Truthful relaying of routing information beyond the first hop is not accounted for and hence we need to assume the knowledge of a route before a flow begins To prove that our protocol encourages cooperation, we simulated against a variety of selfish scenarios including secret packet dropping, acknowledgment lies and bandwidth reservation lies, to obtain the resultant punishment rates Our simulation results have shown that truthful nodes are subjected to fewer punishments which makes truthfulness a favorable strategy 119 Conclusion Mobile Ad Hoc Networks (MANET) has made significant progresses throughout years of research efforts However, the utility of such networks still falls mainly in the domain of privately owned networks belonging to the military or governmental organizations When the market matures sufficiently for MANET to be in demand in the public domains, it will be exposed to a new strain of users They are identified as the malicious and the selfish users and their behaviors affect the availability of such networks Each will require a different approach for a solution because they arise from different causes Malicious users create network problems and these malicious activities can be protected mainly with authentication and encryption Selfish users, on the other hand, are users of the network, but are constrained by resources which make them less likely to cooperate They would require incentives or punishments to encourage cooperation and participation in network operations 120 The research presented in this thesis focuses on the selfish users and the search for a sustainable network behavior in such an environment Current MANET protocols rely heavily on mutual cooperation to support multi-hop communication These activities, for example, are the distributed arbitration of shared medium access, link reliability, route sharing and packet forwarding MANET nodes are generally assumed to be wireless nodes that draw power from a battery that has a limited lifetime until the next charge The wireless medium is also a limited resource because nodes need to share transmission time The heavy reliance on cooperation in MANET protocols and the scarcity of node resources to support cooperative functions justify the importance of this research As part of the contribution of this thesis, we provided critical analysis of the current state of development Existing incentive solutions are not practical as they rely on a tamper-proof counter or a temporal connection to a central bank for currency accounting; a tamper-proof counter is expensive and not a fool-proof solution; a connection to a central bank may not be realistic for a distributed network and wireless environment where connectivity is not assured A tariff-free MANET is, nevertheless, extremely attractive to us Preliminary investigations on punishment mechanisms, on the other hand, lack structure and persuasion in their analysis Subsequent works rely on game theory (largely repeated games with public and perfect observations) but lack consistency with the theory itself It is thus questionable whether these solutions will behave as predicted by the game theory they subscribed to Other shortcomings are the dependency on promiscuous listening which is imperfect and overloads the processor, the fragmented analysis of the routing layer (commonly limited only to the packet forwarding function) 121 where deviations at other protocol units remained a threat, and mass, networkwide, uncoordinated punishments which opens a hole for DoS attacks With so many problems, it is therefore questionable as to whether MANETs can offer a solution in a selfish environment at all The lack of a convincing solution is traceable to the lack of a systematic approach rooted to the lack of a suitable game model for the wireless, multi-hop network As the problem is fundamental, we took a distinctly different approach compared to other works In this thesis, we embarked on the mathematical formulation of a game model for MANETs as a foundation for protocol designs Through mathematics, we can provide a more complete and convincing solution as compared to simulation whereby coverage of scenarios is limited Nonetheless, a simulation is also provided for conviction and demonstration purposes Game theory is a relatively new field of mathematics In addition, the theory of imperfect private monitoring in repeated games only started to emerge over the last seven years The theory is exploited in this thesis to model an integrated analysis of transmission losses, buffer overflows, packet acknowledgments, packet forwarding and route sharing, which are all important characteristics of the wireless networks Such modeling was unachievable with earlier game theories that existing works depended on They typically miniaturize the problem by focusing only on either the packet forwarding function of the routing layer or the medium access function of the link layer Specifically, we applied Aoyagi's game of imperfect private monitoring with communication and adapted it to the wireless environment This class of game is extremely complex to analyze because of the heavy dependence on statistical inference 122 Nevertheless, our thesis provides a significant breakthrough by showing that under certain assumptions, punishment is viable, and can be coordinated based on reports generated by nodes along a packet flow path These reports are in fact packet acknowledgments which we have proven to be truthful The model requires the network to establish a commitment on the collusive bandwidth and packet loss probability, which could be a combination of transmission losses and buffer overflows, prior to the transmission of a flow The negotiation of bandwidth and link reliability can be achieved via a resource reservation mechanism The required QoS parameter sharing is also proven to be truthful within one-hop Thus, we can see that our model accounts for many important wireless characteristics such as transmission losses and buffer overflows but also ensures truthfulness in key protocol features such as route sharing, forwarding, and link reliability Our model also has a close resemblance to current MANET protocols implying that it is optimistic for us to expect current protocol designs to support collaborative behavior if small enhancements and modifications are made in accordance to the model Such features are for example the addition of a periodic reporting mechanism and a coordinated punishment scheme In contrast to previous works, we have avoided a large number of pitfalls We relied on punishments instead of a tamper-proof hardware or a connection to a central bank The punishments that we administered are coordinated by reports so that the game has well defined phases of cooperation and punishment Previous works that employ an ad hoc and uncoordinated punishment strategy will fail because punishments and deviations become indistinguishable We not rely on promiscuous listening for observing deviations but instead rely on local 123 measurements of the arriving flows and listening to periodic reports made by neighbors Non-unanimous reports in the neighborhood trigger punishments within a region thus confining DoS attacks Our analysis also integrates a large number of routing and link layer features, thus accounting for complex deviation strategies that are related to the interactions between protocol entities We tested our model in a theoretical wireless environment In this environment, well accepted models of packet generation and packet errors are used We proved by mathematical derivations and analysis that assumptions made in the Wireless Multi-hop Game model are satisfied in this environment We have also derived a collusive reporting threshold thereby making the model realizable In all, we have proven that the Wireless Multi-hop Game model will function in the theoretical wireless environment as predicted by the model Finally, we proposed an SRRR protocol for demonstrating the application of our game model in protocol design It is a resource reservation protocol that is made resilient against selfish users We further simulated the protocol against various scenarios, including secret packet dropping, acknowledgment lies and bandwidth lies, to prove that deviations are unfavorable in a simulation environment There are nevertheless limitations to our model Firstly, synchronized reporting is required although we have relaxed the requirement and applied it to a TDMA system Secondly, reports are to be reliably broadcast – a mechanism that is hard to achieve in wireless networks Thirdly, truthful route sharing is limited to 1-hop neighborhood Finally, the choice of a collaborative packet relay has been left for 124 future study In conclusion, our contribution in this thesis is to make significant improvements to the modeling of wireless network environment using recent developments in game theory The solution provided is theoretically consistent with game theory and technically practical for a distributed, wireless network We have further proven that the assumptions made for the model are true under a commonly accepted wireless environment A list of pitfalls is avoided and the model fits nicely into existing MANET protocols, requiring little overheads and modifications We hope that through this work, we have pioneered the field of game theory in collaborative tariff-free multi-hop networking which is still fuzzy at the moment, and that this thesis will provide a useful tool for future researchers who want to build wireless protocols for the selfish environment 125 Bibliography A Chandra, V Gummalla and John O Limb, “Wireless Medium Access Control Protocol,” IEEE Communications Surveys, Second Quarter, 2000 A Urpi, M Bonuccelli and S Giordano, “Modeling cooperation in mobile ad hoc networks: a formal description of selfishness,” Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WIOPT 2003), March 2003, Sophia-Antipolis, France, pp 3-5 A.B MacKenzie and S.B Wicker, “Selfish Users in Aloha: A GameTheoretic Approach,” IEEE VTS 54th Vehicular Technology Conference (VTC 2001), October 2001, Atlantic City, NJ, pp 1354-1357 A.B MacKenzie and S.B Wicker, “Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information,” Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), March 2003, San Franscisco, USA, pp 1583-1590 A.D Myers and S Basagni, “Wireless Medium Access Control Protocol,” Handbook of wireless networks and mobile computing, pp 199-143, Wiley, 2000 A.T Rextin, Z Irfan and Z.A Uzmi, “Games Networks Play A Game Theoretic Approach to Networks”, Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks (I-SPAN 2004), May 2004, Hong Kong, pp 451-456 126 Akella, S Seshan, R Karp, S Shenker and C Papadimitriou, “Selfish Behaviour and Stability of the Internet: A Game-Theoretic Analysis of TCP,” Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2002), August 2002, Pittsburgh, Pennsylvania, USA, pp 117-130 B.L Slantchev, “Game Theory: Repeated Games,” Department of Political Science, University of California – San Diego, March 7, 2004 C Castelluccia and G Montenegro, “Protecting AODV against impersonation attacks,” ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol 6, I3, pp 108-109, ACM 10 C Papadimitriou, “Algorithms, Games, and the Internet,” Proceedings of the thirty-third annual ACM Symposium on Theory of computing (STOC 2001), July 2001, Hersonissos, Greece, pp 749-753 11 C Perkins, E Belding-Royer and S Das, “Ad Hoc On Demand Distance Vector (AODV) Routing”, The Internet Engineering Task Force (IETF), RFC3561, July 2003 12 C.A Holt and A.E Roth, “The Nash equilibrium: A perspective,” Proceedings of the National Academy of Sciences of the United States of America (PNAS), Vol.101, I12, pp 3999-4002, National Academy of Sciences 13 C.E Perkins, “Ad Hoc Networking,” Addison-Wesley, 2001 14 C.U Saraydar, N.B Mandayam and D.J Goodman, “Efficient Power Control via Pricing in Wireless Data Networks”, IEEE Transactions on Communications, Vol 50, I2, pp 291 – 303, IEEE 15 D Abreu, D Pearce and E Stacchetti, “Toward a theory of discounted repeated games with imperfect monitoring,” Econometrica, Vol 58, I5, 1041 – 1064, The Econometric Society 16 D Dutta, A Goel and J Heidermann, “Oblivious AQM and Nash Equilibrium”, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), March 2003, San Franscisco, USA, pp 106-113 17 D Fudenberg, D Levine and E Maskin, “The folk theorem with imperfect public information,” Econometrica, Vol 62, I5, pp 997 – 1040, The Econometric Society 18 E Green and R Porter, “Noncooperative collusion under imperfect price information,” Econometrica, Vol 52, I1, pp 87 – 100, The Econometric Society 127 19 E.M Royer and C.K Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,” Personal Communications, Vol 6, I2, pp.46-55, IEEE 20 http://press.nokia.com/PR/200108/829880_5.html 21 I.F Akyildiz, J McNair, L.C Martorell, R Puigjaner and Y Yesha, “Medium access control protocols for multimedia traffic in wireless networks,” Network, Vol 13, I4, pp 39-47, IEEE 22 J P Hubaux, L Buttyan and S Capkun, “The quest for security in mobile ad hoc networks,” Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), October 2001, Long Beach, USA, pp 146-155 23 K Sanzgiri, B Dahill, B.N Levine, C Shields and E.M Belding-Royer, “A secure routing protocol for ad hoc networks,” 10th IEEE International Conference on Network Protocols (ICNP 2002), November 2002, Paris, France, pp 78-87 24 L Anderegg and S Eidenbenz, “Ad hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents”, Proceedings of the 9th annual international conference on Mobile computing and networking (MOBICOM 2003), September 2003, San Diego, USA, pp.245 – 259 25 L Buttyan and J P Hubaux, “Rational Exchange - A Formal Model Based on Game Theory,” Proceedings of the Second International Workshop on Electronic Commerce (CSFW'02), November 2001, Heidelberg, Germany, pp.16-17 26 L Buttyan and J.P Hubaux, “Report on a Working Session on security in wireless ad hoc networks,” ACM Mobile Computing and Communications Review (MC2R), Vol 7, I1, pp 74-94, March 2003, ACM 27 L Buttyan and J.P Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, Vol 8, I5, pp 579-592, Kluwer Academic Publishers 28 L Buttyan and J.P.Haubaux, “Enforcing Service Availability in Mobile AdHoc WANs,” Proceedings of the 1st IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC 2000), August 2000, Boston, Massachusetts, pp 87 - 96 29 L Buttyán, J P Hubaux and Srdjan Capkun, “A Formal Analysis of Syverson's Rational Exchange Protocol,” Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02), June 2002, Cape Breten, Nova, Scotia, Canada, pp 24-26 128 30 L Zhou and Z.J Haas, “Securing ad hoc networks,” Network, Vol 13, I6, pp.24-30, IEEE 31 L Zhou, F B Schneider and R.V Renesse, “COCA: A secure distributed online certification authority,” ACM Transactions on Computer Systems (TOCS), Vol 20, I4, pp 329-368, ACM 32 M Aoyagi, “Collusion in dynamic Bertrand oligopoly with correlated private signals and communication,” Journal of Economic Theory, Vol 102, I1, pp.229 – 248, Elsevier Science (USA) 33 M Felegyhazi, L Buttyan and J.P Hubaux, “Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case”, 8th International Conference on Personal Wireless Communications (PWC 2003), September 2003, Venice, Italy, pp 23-25 34 M Kandori and H Matsushima, “Private observation, communication and collusion,” Econometrica, Vol 66, I3, pp 627 – 652, The Econometric Society 35 M Kandori, “Introduction to Repeated Games with Private Monitoring,” Journal of Economic Theory , Vol.102, I1, pp – 15, Elsevier Science 36 M.J Osborne and A Rubenstein, “A Course in Game Theory,” The MIT Press, 1994 37 O Compte, “Communication in repeated games with imperfect private monitoring,” Econometrica, Vol 66, I3, pp 597 – 626, The Econometric Society 38 P Michiardi and R Molva, “CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks,” Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security (CMS 2002), pp 107 – 121, September 2002, Protoroz, Slovenia 39 P Papadimitratos and Z J Haas, “Secure routing for mobile ad hoc networks,” Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002, San Antonio, Texas, USA, pp 27-31 40 R Ogier, T Templin and M Lewis, “Topology Dissemination Based on Reverse-Path Forwarding (TBRPF),” The Internet Engineering Task Force (IETF), RFC3684, February 2004 41 Robert G Role, Ravi Ramaswarmy, “Wide-Area Data Network Performance Engineering,” Artech House, 1955 129 42 S Bandyopadhyay and S Bandyopadhyay, “A Game-Theoretic Analysis on the Conditions of Cooperation in a Wireless Ad Hoc Network,” Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT 2005), April 2005, Riva Del Garda, Italy, pp 54-58 43 S Buchegger and J.Y Le Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks,” Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing (EMPDP 2002), January 2002, Canary Islands, Spain, pp 403 - 410 44 S Buchegger and J.Y Le Boudec, “Performance Analysis of the CONFIDANT Protocol,” Proceedings of the 3rd ACM International symposium on Mobile ad hoc networking and computing (MOBIHOC 2002), June 2002, Lausanne, Switzerland, pp 226 – 236 45 S Chakrabarti and A Mishra, “QoS Issues in Ad Hoc Wireless Networks”, Communications Magazine, Vol 39, I2, pp 142-148, IEEE 46 S Marti, T Giuli, K Lai, and M Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of the 6th annual international conference on Mobile computing and networking (MOBICOM 2000), August 2000, Massachusetts, USA, pp 255-265 47 S Shenker, “Making Greed Work in Networks: A Game Theoretic Analysis of Switch Service Disciplines,” IEEE/ACM Transactions on Networking, Vol 3, I6, pp 819-831, IEEE 48 S Zhong, J Chen and Y.R Yang, “Sprite: A Simple, Cheat-Proof, CreditBased System for Mobile Ad-Hoc Networks,” Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), March 2003, San Franscisco, USA, pp 1987 – 1997 49 S Zhong, L.E Li, Y.G Liu and Y.R Yang, “On Designing IncentiveCompatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks – An Integrated Approach Using Game Theoretical and Cryptographic Techniques,” Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MOBICOM 2005), August 2005, Cologne, Germany, pp 117 – 131 50 T Clausen and P Jacquet, “Optimized Link State Routing Protocol (OLSR),” The Internet Engineering Task Force (IETF), RFC 3626, October 2003 51 T.L Turocy and B Stengel, “Game Theory,” CDAM Research Report, LSECDAM-2001-09, October 8, 2001 52 V Srinivasan, P Nuggehalli and C.F Chiasserini, R.R Rao, “Cooperation in 130 Wireless Ad Hoc Networks,” Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM 2003), March 2003, San Francisco, USA, pp 808 – 817 53 X.Y Hong, K.X Xu and M Gerla, “Scalable Routing Protocols for Mobile Ad Hoc Networks,” Network, Vol 16, I4, pp 11-21, IEEE 54 Y Zhang and W Lee, “Intrusion detection in wireless ad-hoc networks,” Proceedings of the 6th annual international conference on Mobile computing and networking (MOBICOM 2000), August 2000, Boston, Massachusetts, United States, pp 275-283 55 Y Zhang, W Lee and Y Huang, “Intrusion detection techniques for mobile wireless networks,” Wireless Networks, Vol 9, I5, pp 454-556, Kluwer Academic Publishers 56 Y.C Hu, A Perrig and D B Johnson, “Adriadne: a secure on-demand routing protocol for ad hoc networks,” Proceedings of the 8th annual international conference on Mobile computing and networking (MOBICOM 2002), September 2002, Atlanta, Georgia, USA, pp.12-23 57 Y.E Sagduyu and A Ephremides, “Power Control and Rate Adaptation as Stochastic Games for Random Access,” 42nd IEEE Conference on Decision and Control (CDC 2003), December 2003, Hawaii USA, pp 4202-4207 58 Z Han, C Pandana and K.J.R Liu, “A Self-Learning Repeated Game Framework for Optimizing Packet Forwarding Networks,” IEEE Wireless Communications and Networking Conference (WCNC 2005), March 2005, New Orleans, USA, pp 2131-2136 131 ... routing Local state information is maintained at each node and can be assumed to be always available The local state information contains the cost metric of outgoing links, such as queuing delay,... monitoring transforming it into a wireless multi- hop game model that can account for packet errors, buffer overflows, packet forwarding, packet acknowledgments and routing information dissemination... information In the case when the players know all past moves, the game is said to have perfect information, and when only partial information is available it is said to have imperfect information

Ngày đăng: 16/09/2015, 12:42

Từ khóa liên quan

Mục lục

  • 1 Introduction

    • 1.1 Mobile Ad Hoc Networks

      • 1.1.1 Network Routing

      • 1.1.2 Medium Access Control

      • 1.1.3 Quality of Service Provisioning

      • 1.2 Game Theory

        • 1.2.1 Strategic Games

        • 1.2.2 Extensive Games

        • 1.3 Our Contributions

        • 2 Wireless Network Availability

          • 2.1 Introduction

          • 2.2 Incentive-Based Mechanisms

          • 2.3 Punishment-Based Mechanisms

          • 2.4 Summary

          • 3 Punishments in Repeated Games

            • 3.1 Introduction

            • 3.2 Finitely Repeated Games

            • 3.3 Infinitely Repeated Games

              • 3.3.1 Repeated Prisoner's Dilemma

              • 3.3.2 Folk Theorems

                • 3.3.2.1 Nash folk theorem

                • 3.3.2.2 Perfect folk theorem

                • 3.4 Session-based Generous Tit-for-Tat (GTFT)

                • 3.5 Do ut des strategy

                • 3.6 Topology Dependent Analysis

                • 3.7 Punishment, parole and rehabilitation

                • 3.8 Self-Learning Repeated Game

Tài liệu cùng người dùng

Tài liệu liên quan