[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1161089.1161134acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

OURS: optimal unicast routing systems in non-cooperative wireless networks

Published: 29 September 2006 Publication History

Abstract

We propose novel solutions for unicast routing in wireless networks consisted of selfish terminals: in order to alleviate the inevitable over-payment problem (and thus economic inefficiency) of the VCG (Vickrey-Clark-Groves) mechanism, we design a mechanism that results in Nash equilibria rather than the traditional strate-gyproofness (using weakly dominant strategy). In addition, we systematically study the unicast routing system in which both the relay terminals and the service requestor (either the source or the destination nodes or both) could be selfish. To the best of our knowledge, this is the first paper that presents social efficient unicast routing systems with proved performance guarantee. Thus, we call the proposed systems: Optimal Unicast Routing Systems (OURS).Our main contributions of OURS are as follows. (1) For the principal model where the service requestor is not selfish, we propose a mechanism that provably creates incentives for intermediate terminals to cooperate in forwarding packets for others. Our mechanism substantially reduces the overpayment by using Nash equilibrium solutions as opposed to strategyproof solutions. We then study a more realistic case where the service requestor can act selfishly. (2) We first show that if we insist on the requirement of strategyproofness for the relay terminals, then no system can guarantee that the central authority can retrieve at least 1overn of the total payment. (3) We then present a strategyproof unicast system that collects 1over2n of the total payment, which is thus asymptotically optimum. (4) By only requiring Nash Equilibrium solutions, we propose a system that creates incentives for the service requestor and intermediate terminals to correctly follow the prescribed protocol. More importantly, the central authority can retrieve at least half the total payment. We verify the economic efficiency of our systems through simulations that are based on very realistic terminal distributions.

References

[1]
ANDEREGG, L., AND EIDENBENZ, S. Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In 9th ACM Mobicom, 2003.
[2]
ARCHER, A., AND TARDOS, E. Frugal path mechanisms. In 13th ACM-SIAM Symposium on Discrete algorithms, 2002.
[3]
BLAZEVIC, L., BUTTYAN, L., CAPKUN, S., GIORDANO, S., HUBAUX, J. P., AND BOUDEC, J. Y. L. Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine 39, 6 (June 2001).
[4]
BUTTYAN, L., AND HUBAUX, J. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 5, 8 (Oct. 2003).
[5]
BUTTYAN, L., AND HUBAUX, J. P. Enforcing service availability in mobile ad-hoc wans. In ACM Mobihoc, 2000.
[6]
CLARKE, E. H. Multipart pricing of public goods. Public Choice (1971), 17--33.
[7]
COUTO, D. S. J. D., AGUAYO, D., BICKET, J., AND MORRIS, R. A high-throughput path metric for multi-hop wireless routing. In Proc. of 9th ACM Mobicom, 2003.
[8]
EIDENBENZ, S., RESTA, G., AND SANTI, P. Commit: A sender-centric truthful and energy-efficient routing protocol for ad hoc networks with selfish nodes. In Proc. of 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc & Sensor Networks, IPDPS, 2005.
[9]
GREEN, J., AND LAFFONT, J. J. Characterization of satisfactory mechanisms for the revelation of preferences for public goods. Econometrica (1977), 427--438.
[10]
GROVES, T. Incentives in teams. Econometrica (1973), 617--631.
[11]
IMMORLICA, N., KARGER, D., NIKOLOVA, E., AND SAMI, R. First-price path auctions. In Proceedings of 6th ACM Conf. on Electronic Commerce, 2005.
[12]
JAKOBSSON, M., HUBAUX, J.-P., AND BUTTYAN, L.A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of Financial Cryptography (2003).
[13]
JOHNSON, D., MALTZ, D., AND BROCH, J. The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In Ad Hoc Networking, by C.E. Perkins (Edt), 139--172. Addison-Wesley, 2001.
[14]
KAO, M.-Y., LI, X.-Y., AND WANG, W. Towards truthful mechanisms for binary demand games: A general framework. In Proceedings of 6th ACM Conf. on Electronic Commerce (2005).
[15]
KARLIN, A., KEMPE, D., AND TAMIR, T. Beyond vcg: Frugality of truthful mechanisms. In Proc. of IEEE FOCS (2005).
[16]
LEHMANN, D., OCALLAGHAN, L.I., AND SHOHAM, Y. Truth revelation in approximately efficient combinatorial auctions. Journal of ACM 49, 5 (2002), 577--602.
[17]
MU'ALEM, A., AND NISAN, N. Truthful approximation mechanisms for restricted combinatorial auctions: extended abstract. In Proceedings of 18th National Conference on Artificial Intelligence 2002.
[18]
NISAN, N., AND RONEN, A. Algorithmic mechanism design. In 31st ACM Symp. on Theory of Computing, 1999.
[19]
P. SANTI, AND BLOUGH, D. The critical transmitting range for connectivity in sparse wireless ad hoc networks. IEEE Transcations on Mobile Computing 2, 1 (2003), 25--39.
[20]
SRINIVASAN, V., NUGGEHALLI, P., CHIASSERINI, C. F., AND RAO, R. R. Cooperation in wireless ad hoc wireless networks. In Proc. of IEEE Infocom (2003).
[21]
VICKREY, W. Counterspeculation, auctions and competitive sealed tenders. Journal of Finance (1961), 8--37.
[22]
WANG, W., LI, X. -Y., AND WANG, Y. Truthful multicast in selfish wireless networks. In 10th ACM Mobicom (2004).
[23]
WANG, W., LI, X.-Y., AND CHU, X.-W. Nash Equilibria, Dominant Strateies in Routing. In Workshop for Internet and Network Economics (2005).
[24]
ZHAO, J., AND GOVINDAN, R. Understanding packet delivery performance in dense wireless sensor networks. In Proc. of ACM SenSys (2003).
[25]
ZHONG, S., LI, L., LIU, Y.G., AND YANG, Y. R. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks. In Proc. of ACM Mobicom (2005).

Cited By

View all
  • (2022)Interference Moral Hazard in Large Multihop NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2022.3186234(1-15)Online publication date: 2022
  • (2019)On Designing Distributed Auction Mechanisms for Wireless Spectrum AllocationIEEE Transactions on Mobile Computing10.1109/TMC.2018.286986318:9(2129-2146)Online publication date: 1-Sep-2019
  • (2017)From Social Group Utility Maximization to Personalized Location Privacy in Mobile NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2017.265310225:3(1703-1716)Online publication date: 1-Jun-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '06: Proceedings of the 12th annual international conference on Mobile computing and networking
September 2006
428 pages
ISBN:1595932860
DOI:10.1145/1161089
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 September 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dominant strategy
  2. frugality ratio
  3. game theory
  4. mechanism design
  5. nash equilibrium
  6. non-cooperative
  7. wireless networks

Qualifiers

  • Article

Conference

MobiCom06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Interference Moral Hazard in Large Multihop NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2022.3186234(1-15)Online publication date: 2022
  • (2019)On Designing Distributed Auction Mechanisms for Wireless Spectrum AllocationIEEE Transactions on Mobile Computing10.1109/TMC.2018.286986318:9(2129-2146)Online publication date: 1-Sep-2019
  • (2017)From Social Group Utility Maximization to Personalized Location Privacy in Mobile NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2017.265310225:3(1703-1716)Online publication date: 1-Jun-2017
  • (2015)Modeling and Stimulating Node Cooperation in Wireless Ad Hoc NetworksETRI Journal10.4218/etrij.15.0113.137137:1(77-87)Online publication date: 1-Feb-2015
  • (2015)A hierarchical account-aided reputation management system for MANETsIEEE/ACM Transactions on Networking10.1109/TNET.2013.229073123:1(70-84)Online publication date: 1-Feb-2015
  • (2015)Resisting three-dimensional manipulations in distributed wireless spectrum auctions2015 IEEE Conference on Computer Communications (INFOCOM)10.1109/INFOCOM.2015.7218590(2056-2064)Online publication date: Apr-2015
  • (2014)SOSInternational Journal of Ad Hoc and Ubiquitous Computing10.1504/IJAHUC.2014.06434616:2(113-124)Online publication date: 1-Aug-2014
  • (2014)A Game-Based Mechanism of Relay Selection for Wireless Network Security2014 IEEE 79th Vehicular Technology Conference (VTC Spring)10.1109/VTCSpring.2014.7022778(1-5)Online publication date: May-2014
  • (2014)Multi-Path Routing and Forwarding in Non-Cooperative Wireless NetworksIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2013.20025:10(2638-2647)Online publication date: Oct-2014
  • (2014)A game theoretic approach to detect and co-exist with malicious nodes in wireless networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2014.06.00871(63-83)Online publication date: 1-Oct-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media