Using Game Theory to Analyze Wireless Ad Hoc networks Vivek Srivastava March 24 th 2004 Qualifier presentation.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

P: 1 / 24 Situated and Autonomic Communications FET Integrated Project CASCADAS ( Mécanismes de sécurité et de coopération entre.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
Border Games in Cellular Networks Infocom 2007 Márk Félegyházi*, Mario Čagalj†, Diego Dufour*, Jean- Pierre Hubaux* * Ecole Polytechnique Federale de Lausanne.
Game Theory and Computer Networks: a useful combination? Christos Samaras, COMNET Group, DUTH.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
On the Economics of P2P Systems Speaker Coby Fernandess.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
The Capacity of Wireless Ad Hoc Networks
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Competitive Routing in Multi-User Communication Networks Presentation By: Yuval Lifshitz In Seminar: Computational Issues in Game Theory (2002/3) By: Prof.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Pricing What Can Pricing Do In Wireless Networks? Jianning Mai and Lihua Yuan
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Performance Analysis of Reputation-based Mechanisms for Multi-hop Wireless Networks Fabio Milan Dipartimento di Elettronica Politecnico di Torino Turin,
A Game-Theoretic Look at Joint Multi-Access, Power and Rate Control Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Paper Presentation by Jeff Mounzer Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P.R. Kumar Published.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
By: Gang Zhou Computer Science Department University of Virginia 1 A Game-Theoretic Framework for Congestion Control in General Topology Networks SYS793.
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN Architecture and Protocols 2nd MobileMAN.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
Jason Ernst and Mieso Denko
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Wireless Networks Breakout Session Summary September 21, 2012.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
A Game Approach for Multi-Channel Allocation in Multi-Hop Wireless Networks Lin Gao, Xinbing Wang Dept. of Electronic Engineering Shanghai Jiao Tong University.
Maximizing Lifetime of Ad Hoc Networks/WSNs Using Dynamic Broadcast Scheme Guofeng Deng.
Cognitive Radio Networks
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Covilhã, 30 June Atílio Gameiro Page 1 The information in this document is provided as is and no guarantee or warranty is given that the information is.
Converge-Cast: On the Capacity and Delay Tradeoffs Xinbing Wang Luoyi Fu Xiaohua Tian Qiuyu Peng Xiaoying Gan Hui Yu Jing Liu Department of Electronic.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks Márk Félegyházi*, Mario Čagalj†, Shirin Saeedi Bidokhti*, Jean-Pierre Hubaux* * Ecole.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
1 G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science and.
Illinois Center for Wireless Systems Wireless Networks: Algorithms and Optimization R. Srikant ECE/CSL.
Non-Cooperative Behavior in Wireless Networks Márk Félegyházi (EPFL) PhD. public defense July 9, 2007.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
An Efficient Routing Protocol for Green Communications in Vehicular Ad-hoc Networks Jamal Toutouh, Enritue Alba GECCO’ 11, July Presented by 劉美妙.
Overview of Wireless Networks:
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Environment-Aware Reputation Management for Ad Hoc Networks
Cognitive Radio Networks
Hemant Kr Rath1, Anirudha Sahoo2, Abhay Karandikar1
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Vaggelis G. Douros George C. Polyzos Stavros Toumpis
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

Using Game Theory to Analyze Wireless Ad Hoc networks Vivek Srivastava March 24 th 2004 Qualifier presentation

2 Outline Ad-Hoc network Game theory Ad-Hoc + Game theory Social optimal Medium access layer Network layer Transport layer Physical layer Layered approachFuture work

3 Ad Hoc networks What are ad hoc networks Multi-hop communication Reduced need for any infrastructure Dynamic topology Distributed, interactive stations Ease of deployment Potentially more robust to attack Application of ad hoc networks Military application Disaster management Impromptu communication between people

4 Game Theory Game theory – a branch of mathematics used extensively in economics The study of mathematical models of conflict and cooperation between intelligent rational decision makers-Myerson (1991) Basic component: Game – A mathematical representation of an interactive decision situation Important concepts Conflict and cooperation Intelligent rational decision makers

5 Basic component Strategic game – 3 basic components A set of 2 or more players (N = {1,2,….n}) A set of actions for each player ( ) Utility function for every player ( ) Nash equilibrium An action vector is a Nash equilibrium if and An action vector from which no player can benefit by deviating unilaterally A B Confess Not confess ConfessNot confess 5,50,15 15,01,1 NE Prisoner’s dilemma

6 Why game theory? De-centralized nature of nodes Independently adapting its operation based on perceived or measures statistics Interactive decision makers Decision taken by one node affects and influences the other nodes Available Adaptations MANET Component Game Component Action Set Nodes in NetworkPlayer Set Adaptation Algorithm Decision Update Algorithm Valuation Function (Preference Relations) Utility Function Learning Process

7 Steps in application of game theory Develop a game theoretic model Solution of game’s Nash equilibrium yields information about the steady state and convergence of the network Does a steady state exist? Uniqueness of Nash equilibrium Is it optimal? Do nodes converge to it? Is it stable? Does the steady state scale?

8 Optimal equilibrium inducing mechanisms Credit exchange Virtual currency [Buttyan01] —Difficult to implement Reputation [Buchegger02] —Appropriate for denial of service attacks Other schemes Generous Tit-for-tat [Axelrod84] —Node mimics the action of its peers —Slightly generous Watchdog – pathrater mechanism [Marti00] —Specific to prevent malicious/selfish behavior in routing Presence of centralized referee [MacKenzie01] Not a player but an overseer Not a typical game theoretic scenario

9 Physical and Medium access layers Power control Adjust transmit power levels Objective: To achieve a target signal-to-interference-to-noise ratio Waveform adaptations Selection of appropriate waveform to reduce interference Involves the receiver of the signal to feedback the interference characteristics No existing work that uses game theory Medium access Set the probability of packet transmission Objective: To maximize individual throughput

10 Network layer (Research issues) Previous work restricted to analyzing selfish node behavior while forwarding of packets Nodes decide on the proportion of packets/sessions to act as a relay Energy is the main constraint “Selfishness is the only strategy that can naturally arise in a single stage” (Assuming a repeated game) [Urpi03] [Srinivasan03] Use of external incentive mechanisms to induce socially optimal equilibrium Shortcomings Do not consider true ad hoc scenarios where nodes can experience inherent trade-offs Do not consider mobility and influence on entire network Restrict the model to relaying packets

11 Network layer (Current research) Node participation Switch interfaces to a sleep state Affects network operations —Network partition —Network congestion Individual benefits —Increased lifetime of nodes (inversely proportional) —Increase in throughput by participating (directly proportional) Individual losses —Loss of information for an ongoing session —Overhead involved in discovering location of other nodes on waking up —Extra flow of route queries due to frequent topology changes

12 Network layer (Other issues) Malicious node behavior degrades performance of dynamic source routing protocol [Marti00] Classic routing [Orda93] Nodes decide on the amount of data to be sourced on shared paths to minimize the cost involved Use of game theory – infant stage

13 Transport layer Analyze congestion control algorithms for selfish nodes [Shenker03] Objective: Determine the optimal congestion window additive increase and multiplicative decrease parameters Current efforts restricted to traditional TCP congestion control algorithms for wired networks Ad hoc networks Incorporate the characteristics of the wireless medium in the congestion control game

14 Summary Game theory offers a promising set of tools to analytically model ad hoc networks Game theory can be used Analysis of ad hoc networks Design of incentive mechanisms Past research concentrated on wired/cellular networks Design of robust protocols to deal with selfish behavior

15 Future Work Currently developing a model for node participation in an ad hoc network Analyze the model using game theoretic techniques and determine the optimal time a node should stay awake in the ad hoc network Apply the node participation model to a well known routing protocol and study the effect of varying level of node participation Incorporate mobility in the game theoretic model

16 Written response Approach to solve the problem Similar to Cournot oligopoly – strategy is “How much…?” Identical stations with identical benefit and cost functions Simple model –applicable to a Aloha network Basic assumptions – Useful to provide the basic insight Not completely realistic Difficult to obtain social optimum in a distributed environment of rational entities

17 References [Akella02] A. Akella et al., “Selfish behavior and stability of Internet: A game theoretic analysis of TCP,” Proceedings of ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, August 2002, pp [Axelrod84] Robert Axelrod, “The Evolution of Cooperation,” Basic Books, Reprint edition, New York, [Buttyan01] L. Buttyan and J. P. Hubaux, “Nuglets: A virtual currency to stimulate cooperation in self organized mobile ad-hoc networks,” Swiss Federal Institute of Technology, Lausanne, Switzerland, Report no. DSC /2001/001, January [Buchegger02] S. Buchegger and J.Y. Le Boudec, “Performance analysis of the CONFIDANT protocol: cooperation of nodes – fairness in dynamic ad-hoc networks,” Proceedings of ACM MobiHoc, June [Felegyhazi03] M. Felegyhazi, L. Buttyan and J.-P. Hubaux, “Equilibrium analysis of packet forwarding strategies in wireless ad hoc networks – the static case,” Proceedings of IEEE Personal Wireless Communications, September 2003, pp [Orda93] A. Orda, R. Rom and N. Shimkim, “Competitive routing in multi-user communication networks,” IEEE/ACM Transactions in Networking, vol. 1, no. 5, October 1993, pp [MacKenzie01] A. B. MacKenzie and S.B. Wicker, “Selfish users in Aloha: a game theoretic approach,” Proceedings of Vehicular Technology Conference, vol. 3, October 2001, pp

18 References [Marti00] S. Marti et. al, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of Sixth Annual IEEE/ACM Intl. conference on Mobile Computing and Networking, April 2000, pp [Srinivasan03] V. Srinivasan et al., “Cooperation in wireless ad hoc networks,” Proceedings of IEEE Infocom, vol.2, April 2003, pp [Urpi03] A. Urpi, M. Bonuccelli and S. Giordano, “Modeling cooperation in mobile ad hoc networks: a formal description of selfishness,” Proceedings of the Workshop on Modeling and Optimization in Mobile and Wireless Ad Hoc networks, March 2003.