Frugal flouting on wireless ad-hoc networks

被引:0
|
作者
Ercal, Gunes [1 ]
Lzhak-Ratzin, Rafit [1 ]
Majun-Idar, Rupak [1 ]
Meyerson, Adam [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study game-theoretic mechanisms for routing in ad-hoc networks. Came-theoretic mechanisms capture the non-cooperative and selfish behavior of nodes in a resource-constrained environment. There have been some recent proposals to use incentive-based mechanisms (in particular, VCG) for routing in wireless ad-hoc networks, and some frugality bounds are known when the connectivity graph is essentially complete. We show frugality bounds for random geometric graphs, a well-known model for ad-hoc wireless connectivity. Our main result demonstrates that VCG-based routing in ad-hoc networks exhibits small frugality ratio (i.e., overpayment) with high probability. In addition, we study a more realistic generalization where sets of agents can form communities to maximize total profit. We also analyze the performance of VCG under such a community model and show similar bounds. While some recent truthful protocols for the traditional (individual) agent model have improved upon the frugality of VCG by selecting paths to minimize not only the cost but the overpayment, we show that extending such protocols to the community model requires solving NP-complete problems which are provably hard to approximate.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [1] Wireless ad-hoc control networks
    Bu, SR
    Naghdy, F
    [J]. 2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 839 - 844
  • [2] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    [J]. INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [3] Ad-hoc filesystem: A novel network Filesystem for ad-hoc wireless networks
    Yasuda, K
    Hagino, T
    [J]. NETWORKING - ICN 2001, PART II, PROCEEDINGS, 2001, 2094 : 177 - 185
  • [4] Coverage in wireless ad-hoc sensor networks
    Li, XY
    Wan, PJ
    Frieder, O
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 3174 - 3178
  • [5] Modeling Trust in Wireless Ad-Hoc Networks
    Ghosh, Tirthankar
    Xu, Hui
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 217 - 221
  • [6] Security in wireless ad-hoc networks - A survey
    Di Pietro, R.
    Guarino, S.
    Verde, N. V.
    Domingo-Ferrer, J.
    [J]. COMPUTER COMMUNICATIONS, 2014, 51 : 1 - 20
  • [7] Controlled flooding in wireless ad-hoc networks
    Rahman, A
    Olesinski, W
    Gburzynski, P
    [J]. 2004 INTERNATIONAL WORKSHOP ON WIRELESS AD-HOC NETWORKS, 2005, : 73 - 78
  • [8] IP traceback for wireless ad-hoc networks
    Thing, VLL
    Lee, HCJ
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3286 - 3290
  • [9] Optimal design of wireless ad-hoc networks
    Wu, SY
    Anandialingam, G
    [J]. TELECOMMUNICATIONS NETWORK DESIGN AND MANAGEMENT, 2003, 23 : 47 - 64
  • [10] Evaluating connectivity in wireless ad-hoc networks
    Vargas-Rosales, C
    Lopez, A
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3613 - 3617