© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in.

Slides:



Advertisements
Similar presentations
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Advertisements

Advanced Piloting Cruise Plot.
1 Vorlesung Informatik 2 Algorithmen und Datenstrukturen (Parallel Algorithms) Robin Pomplun.
Generative Design in Civil Engineering Using Cellular Automata Rafal Kicinger June 16, 2006.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 11 Ethernet Evolution: Fast and Gigabit Ethernet.
Chapter 1 The Study of Body Function Image PowerPoint
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 10 User.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
Document #07-2I RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) (mod 7/25 & clean-up 8/20) Customer Supplier.
Scalable Routing In Delay Tolerant Networks
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
Designing Multi-User MIMO for Energy Efficiency
Solve Multi-step Equations
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
MIMO Broadcast Scheduling with Limited Feedback Student: ( ) Director: 2008/10/2 1 Communication Signal Processing Lab.
Mohamed Hauter CMPE 259 – Sensor Networks UCSC 1.
Randomized Algorithms Randomized Algorithms CS648 1.
Data Structures Using C++
College of Engineering Capacity Allocation in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control Robert.
Copyright © Chang Gung University. Permission required for reproduction or display. On Femto Deployment Architecture and Macrocell Offloading Benefits.
P: 1 / 24 Situated and Autonomic Communications FET Integrated Project CASCADAS ( Mécanismes de sécurité et de coopération entre.
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
2 |SharePoint Saturday New York City
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
© 2012 National Heart Foundation of Australia. Slide 2.
Universität Kaiserslautern Institut für Technologie und Arbeit / Institute of Technology and Work 1 Q16) Willingness to participate in a follow-up case.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Chapter 5 Test Review Sections 5-1 through 5-4.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Januar MDMDFSSMDMDFSSS
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet.
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
Energy Generation in Mitochondria and Chlorplasts
CpSc 3220 Designing a Database
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Border Games in Cellular Networks Infocom 2007 Márk Félegyházi*, Mario Čagalj†, Diego Dufour*, Jean- Pierre Hubaux* * Ecole Polytechnique Federale de Lausanne.
1 Cooperation in Multi-Domain Sensor Networks Márk Félegyházi Levente Buttyán Jean-Pierre Hubaux {mark.felegyhazi, EPFL, Switzerland.
Presentation transcript:

© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum multi-domain sensor networks; border games in cellular networks;

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 2/33 Chapter outline 11.1 Multi-domain sensor networks 11.2 Border games in cellular networks

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 3/33  Typical cooperation: help in packet forwarding  Can cooperation emerge spontaneously in multi-domain sensor networks based solely on the self-interest of the sensor operators? Multi-domain sensor networks 11.1 Multi-domain sensor networks

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 4/33 Simplified model  C: Cooperation D: Defection  4 possible moves:  CC – the sensor asks for help (cost 1) and helps if asked (cost 1)  CD – the sensor asks for help (cost 1) and does not help (cost 0)  DC – the sensor sends directly (cost 2  ) and helps if asked (cost 1)  DD – the sensor sends directly (cost 2  ) and does not help (cost 0) 2α2α Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 5/33 Example : CC – CD (1/6) CC – the sensor tries to get help from the other sensor and helps if the other sensor requests it CD – the sensor tries to get help but it refuses to help CCCD 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 6/33 Example : CC – CD (2/6) CC – the sensor tries to get help from the other sensor and helps if the other sensor requests it CD – the sensor tries to get help but it refuses to help CCD 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 7/33 Example : CC – CD (3/6) C failure CDCD CC – the sensor tries to get help from the other sensor and helps if the other sensor requests it CD – the sensor tries to get help but it refuses to help 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 8/33 Example : CC – CD (4/6) CCCDCD CC – the sensor tries to get help from the other sensor and helps if the other sensor requests it CD – the sensor tries to get help but it refuses to help 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 9/33 Example : CC – CD (5/6) CCD success 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 10/33 Example : CC – CD (6/6) CCCD Black player Cost: 2 1 for asking 1 for helping Benefit: 0 (packet dropped) Gray player Cost: 1 1 for asking Benefit: 1 (packet arrived) 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 11/33 2α2α 11 Cost for black Cost for grey Outcome for black (0 = failure) Outcome for grey (1 = success) The simplified model in strategic form 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 12/33 Reception threshold time success / failure of packet reception Sliding window of history Success (= 1) Failure (= 0) Reception threshold ρ Average of the packet reception Risk of going below threshold  adapt strategy (move to the constrained state: only DC or DD are eligible)  Reception threshold: computed and stored at each sensor node  The battery (B) level of the sensors decreases with the moves  If the battery is empty, the sensor dies 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 13/33 Game Theoretic Approach  The mentioned concepts describe a game  Players: network operators  Moves (unconstrained state): CC, CD, DC, DD  Moves (constrained state): DC, DD  Information sets: histories  Strategy: function that assigns a move to every possible history considering the weight threshold  Payoff = lifetime  We are searching for Nash equilibria with the highest lifetimes 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 14/33 Two-step Strategies B – initial battery ρ – reception threshold  – path loss exponent (  2) ε 1,2 – payoff of transient states Cooperative Nash equilibrium Non-cooperative Nash equilibrium If ρ > 1/3, then (CC/DD, CC/DD) is more desirable 11.1 Multi-domain sensor networks Simplified model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 15/33 Generalized Model 11.1 Multi-domain sensor networks Generalized model Simplified model with the following extensions: –many sensors, random placing –minimum energy path routing –common sink / separate sink scenarios –classification of equilibria Class 0: no cooperation (no packet is relayed) Class 1: semi cooperation (some packets are relayed) Class 2: full cooperation (all packets are relayed)

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 16/33 Main simulation parameters ParameterValue Number of sensors per domain20 Area size100 x 100 m Reception threshold ρ 0.6 History length5 Path loss exponent2–3–4 (3) 11.1 Multi-domain sensor networks Generalized model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 17/33 Impact of the path loss exponent Percentage of simulationsEquilibrium classes ( 0 – no cooperation, 1 – semi cooperation, 2 – full cooperation) Value of the path loss exponent – 2 – 3 – Multi-domain sensor networks Generalized model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 18/33 Conclusion on multi-domain sensor networks  We examined whether cooperation is possible without the usage of incentives in multi-domain sensor networks  In the simplified model, the best Nash equilibria consist of cooperative strategies  In the generalized model, the best Nash equilibria belong to the cooperative classes in most of the cases 11.1 Multi-domain sensor networks

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 19/33 Chapter outline 11.1 Multi-domain sensor networks 11.2 Border games in cellular networks

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 20/33 Motivating example 11.2 Border games in cellular networks

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 21/33 Introduction  spectrum licenses do not regulate access over national borders  adjust pilot power to attract more users Is there an incentive for operators to apply competitive pilot power control? 11.2 Border games in cellular networks

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 22/33 System model (1/2) Network:  cellular networks using CDMA –channels defined by orthogonal codes  two operators: A and B  one base station each  pilot signal power control Users:  roaming users  users uniformly distributed  select the best quality BS  selection based signal-to- interference-plus-noise ratio (SINR) 11.2 Border games in cellular networks Model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 23/33 System model (2/2) A B v PAPA PBPB T Av T Bw T Aw pilot signal SINR: traffic signal SINR: P i – pilot power of i – processing gain for the pilot signal – noise energy per symbol – channel gain between BS i and user v – available bandwidth – own-cell interference affecting the pilot signal – own-cell interference factor – traffic power between BS i and user v – other-to-own-cell interference factor – set of users attached to BS i 11.2 Border games in cellular networks Model

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 24/33 Game-theoretic model  Power Control Game, G PC –players → networks operators (BSs), A and B –strategy → pilot signal power, 0W < P i < 10W, i = {A, B} –standard power, P S = 2W –payoff → profit, where is the expected income serving user v –normalized payoff difference: 11.2 Border games in cellular networks Power control game

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 25/33 Simulation settings 11.2 Border games in cellular networks Power control game

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 26/33 Is there a game?  only A is strategic (B uses P B = P S )  10 data users  path loss exponent, α = 2 ΔiΔi 11.2 Border games in cellular networks Power control game

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 27/33 When both operators are strategic  10 data users  path loss exponent, α = Border games in cellular networks Power control game

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 28/33 Nash equilibria 10 data users100 data users 11.2 Border games in cellular networks Power control game

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 29/33 Efficiency (1/2)  10 data users 11.2 Border games in cellular networks Power control game

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 30/33 Efficiency (2/2)  100 data users 11.2 Border games in cellular networks Power control game

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 31/33  convergence based on better-response dynamics  convergence step: 2 W Convergence to NE (1/2) P A = 6.5 W 11.2 Border games in cellular networks Convergence to a Nash Equilibrium

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 32/33 Convergence to NE (2/2)  convergence step: 0.1 W 11.2 Border games in cellular networks Convergence to a Nash Equilibrium

Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in shared spectrum 33/33 Conclusion on border games  not only individual nodes may exhibit selfish behavior, but operators can be selfish too  example: adjusting pilot power to attract more users at national borders  the problem can be modeled as a game between the operators –the game has an efficient Nash equilibrium –there’s a simple convergence algorithm that drives the system into the Nash equilibrium 11.2 Border games in cellular networks