A game-theoretic approach to compute stable topologies in mobile ad hoc networks

被引:0
|
作者
Bulling, Nils [1 ]
Popovici, Matei [2 ]
机构
[1] Tech Univ Clausthal, Inst Informat, D-38678 Clausthal Zellerfeld, Germany
[2] Polytech Univ Bucharest Splaiul, Bucharest 060042, Romania
关键词
Mobile ad hoc networks; stability; game theory; network structure; user constraints; COOPERATION; PROTOCOLS;
D O I
10.1093/logcom/exu021
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc networks are networks that allow (mobile) users to communicate in heterogeneous environments without relying on a fixed infrastructure, examples of which are mobile communication in large urban spaces or in public transportation. Due to their many advantages, such as decentralization, independence of communication infrastructure, flexibility etc., their field of use steadily increases. However, networks of this kind also raise new problems related to, for example, routing and data delivery, security and privacy, trust and usability. In this article, we propose a formal model of mobile ad hoc networks and address questions regarding optimal and stable network topologies. In particular, stability is important to ensure that communication is reliable and that applications designed for such networks are accepted by the users. We analyse stability from a game theoretic point of view, and propose a non-cooperative as well as a cooperative modelling. Moreover, we allow users to express constraints on how their communication should be handled in the network in order to ensure user constraints, e.g. related to privacy and security. For this purpose we use the temporal logic CTL. Finally, we analyse the complexity of associated verification and synthesis problems regarding optimal/stable network topologies.
引用
收藏
页码:639 / 667
页数:29
相关论文
共 50 条
  • [1] Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach
    Wang, Fan
    Younis, Ossama
    Krunz, Marwan
    [J]. AD HOC NETWORKS, 2009, 7 (01) : 98 - 117
  • [2] A game-theoretic intrusion detection model for mobile ad hoc networks
    Otrok, Hadi
    Mohammed, Noman
    Wang, Lingyu
    Debbabi, Mourad
    Bhattacharya, Prabir
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (04) : 708 - 721
  • [3] GMAC: A game-theoretic MAC protocol for mobile ad hoc networks
    Wang, Fan
    Younis, Ossama
    Krunz, Marwan
    [J]. 2006 4TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS, VOLS 1 AND 2, 2006, : 173 - +
  • [4] Power management in MIMO ad hoc networks: A game-theoretic approach
    Liang, Chao
    Dandekar, Kapil R.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (04) : 1164 - 1170
  • [5] Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks
    Li, Ze
    Shen, Haiying
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (08) : 1287 - 1303
  • [6] A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks
    Menon, R.
    MacKenzie, A. B.
    Buehrer, R. M.
    Reed, J. H.
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [7] JAMMING IN MOBILE NETWORKS: A GAME-THEORETIC APPROACH
    Bhattacharya, Sourabh
    Gupta, Abhishek
    Basar, Tamer
    [J]. NUMERICAL ALGEBRA CONTROL AND OPTIMIZATION, 2013, 3 (01): : 1 - 30
  • [8] Asynchronous distributed power and rate control in ad hoc networks:: A game-theoretic approach
    Kucera, Stepan
    Aissa, Sonia
    Yamamoto, Koji
    Yoshida, Susumu
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (07) : 2536 - 2548
  • [9] A Game Theoretic Approach for Securing AODV in Emergency Mobile Ad Hoc Networks
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 985 - 992
  • [10] A game theoretic approach to modeling intrusion detection in mobile ad hoc networks
    Patcha, A
    Park, JM
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 280 - 284