DocumentCode :
3343690
Title :
Game-Theoretic Model for Collaborative Protocols in Selfish, Tariff-Free, Multihop Wireless Networks
Author :
See-Kee Ng ; Seah, Winston K. G.
Author_Institution :
Nat. Univ. of Singapore, Singapore
fYear :
2008
fDate :
13-18 April 2008
Abstract :
Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may eavesdrop on sensitive data or deliberately inject packets into the network to disrupt network operations. The solution to this generally lies in encryption and authentication. In contrast, a rational node acts only to achieve an outcome that he desires most. In such a case, cooperation is still achievable if the outcome is to the best interest of the node. The node misbehaviour problem would be more pronounced in multihop wireless networks like mobile ad hoc and sensor networks, which are typically made up of wireless battery-powered devices that must cooperate to forward packets for one another. But, cooperation may be hard to maintain as it consumes scarce resources such as bandwidth, computational power and battery power. This paper applies game theory to achieve collusive networking behavior in such network environments. In this work, pricing, promiscuous listening and mass punishments are avoided altogether. Our model builds on recent work in the field of Economics on the theory of imperfect private monitoring for the dynamic Bertrand oligopoly, and adapts it to the wireless multihop network. The model derives conditions for collusive packet forwarding, truthful routing broadcasts and packet acknowledgments under a lossy, wireless, multi-hop environment, thus capturing many important characteristics of the network layer and link layer in one integrated analysis that has not been achieved previously. Finally, we provide a proof of the viability of the model under a theoretical wireless environment.
Keywords :
cryptography; game theory; message authentication; packet switching; protocols; radio networks; telecommunication network routing; telecommunication security; collaborative protocol; collusive networking behavior; data authentication; dynamic Bertrand oligopoly; encryption; game-theoretic model; malicious user/node; packet forwarding; selfish tariff-free multihop wireless network; sensitive data eavesdrop; truthful routing broadcast; wireless battery-powered device; Authentication; Bandwidth; Batteries; Collaboration; Cryptography; Scalability; Spread spectrum communication; Wireless application protocol; Wireless networks; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE
Conference_Location :
Phoenix, AZ
ISSN :
0743-166X
Print_ISBN :
978-1-4244-2025-4
Type :
conf
DOI :
10.1109/INFOCOM.2008.52
Filename :
4509647
Link To Document :
بازگشت