653 research outputs found

    Applications of Repeated Games in Wireless Networks: A Survey

    Full text link
    A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference

    Strategic and Secure Interactions in Networks

    Get PDF
    The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining, on networks; and to understand how interactions can be made secure when they are constrained by the network topology. Our works take an interdisciplinary approach by drawing on theories and models from economics, sociology, as well as computer science, and using methodologies that include both theories and behavioral experiments. First, we consider biased voting in networks, which models distributed collective decision making processes where individuals on a network must balance between their private biases or preferences with a collective goal of consensus. Our study of this problem is two-folded. On the theoretical side, we start by introducing a diffusion model called biased voter model, which is a natural extension of the classic voter model. Among other results, we show in the presence of private biases, no matter how small, there exists certain networks where it takes exponential time to converge to a consensus through distributed interaction in networks. This is a stark and interesting contrast to the well-known result that it always takes polynomial time to converge in the voter model, when there are no private biases. On the experimental side, a group human subjects were arranged in various carefully designed virtual networks to solve the biased voting problem. Along with analyses of how collective and individual performance vary with network structure and incentives generally, we find there are well-studied network topologies in which the minority preference consistently wins globally, and that the presence of “extremist” individuals, or the awareness of opposing incentives, reliably improve collective performance Second, we consider bargaining in networks, which has long been studied by economists and sociologists. A basic premise behind the many theoretical study of bargaining in networks is that pure topological differences in agents’ network positions endow them with different bargaining power. As a complementary to these theories, we again conducted a series of highly controlled behavioral experiments, where human subjects were arranged in various carefully designed virtual networks to playing bargaining games. Along with other findings of how individual and collective performance vary with network structures and individual playing styles, we find that the number of neighbors one can negotiate with confers bargaining power, whereas the limit on the number of deals one can close undermines it, and we find that competitions from distant part of the network that are invisible locally also play a significant and subtle role in shaping bargaining powers. And last, we consider the question of how interactions in networks can be made secure. Traditional methods and tools from cryptography, for example secure multi-party computation, can be applied only if each party can talk to everyone else directly; but cannot be directly applied if interactions are distributed over a network without completely eradicating the distributed nature. We develop a general ‘compiler’ that turns each algorithm from a broad class collectively known as message-passing algorithms into a secure one that has exactly the same functionality and communication pattern. And we show a fundamental trade-off between preserving the distributed nature of communication and the level of security one can hope for

    Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    Get PDF
    From its introduction to its quindecennial, network coding has built a strong reputation for enhancing packet recovery and achieving maximum information flow in both wired and wireless networks. Traditional studies focused on optimizing the throughput of the system by proposing elaborate schemes able to reach the network capacity. With the shift toward distributed computing on mobile devices, performance and complexity become both critical factors that affect the efficiency of a coding strategy. Instantly decodable network coding presents itself as a new paradigm in network coding that trades off these two aspects. This paper review instantly decodable network coding schemes by identifying, categorizing, and evaluating various algorithms proposed in the literature. The first part of the manuscript investigates the conventional centralized systems, in which all decisions are carried out by a central unit, e.g., a base-station. In particular, two successful approaches known as the strict and generalized instantly decodable network are compared in terms of reliability, performance, complexity, and packet selection methodology. The second part considers the use of instantly decodable codes in a device-to-device communication network, in which devices speed up the recovery of the missing packets by exchanging network coded packets. Although the performance improvements are directly proportional to the computational complexity increases, numerous successful schemes from both the performance and complexity viewpoints are identified

    Game Theory for Multi-Access Edge Computing:Survey, Use Cases, and Future Trends

    Get PDF
    Game theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming multiaccess edge computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as quality of experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game's usefulness, namely, rational versus evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game's model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse tradeoffs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios

    Game Theory in Communications:a Study of Two Scenarios

    Get PDF
    Multi-user communication theory typically studies the fundamental limits of communication systems, and considers communication schemes that approach or even achieve these limits. The functioning of many such schemes assumes that users always cooperate, even when it is not in their own best interest. In practice, this assumption need not be fulfilled, as rational communication participants are often only interested in maximizing their own communication experience, and may behave in an undesirable manner from the system's point of view. Thus, communication systems may operate differently than intended if the behavior of individual participants is not taken into account. In this thesis, we study how users make decisions in wireless settings, by considering their preferences and how they interact with each other. We investigate whether the outcomes of their decisions are desirable, and, if not, what can be done to improve them. In particular, we focus on two related issues. The first is the decision-making of communication users in the absence of any central authority, which we consider in the context of the Gaussian multiple access channel. The second is the pricing of wireless resources, which we consider in the context of the competition of wireless service providers for users who are not contractually tied to any provider, but free to choose the one offering the best tradeoff of parameters. In the first part of the thesis, we model the interaction of self-interested users in a Gaussian multiple access channel using non-cooperative game theory. We demonstrate that the lack of infrastructure leads to an inefficient outcome for users who interact only once, specifically due to the lack of coordination between users. Using evolutionary game theory, we show that this inefficient outcome would also arise as a result of repeated interaction of many individuals over time. On the other hand, if the users correlate their decoding schedule with the outcome of some publicly observed (pseudo) random variable, the resulting outcome is efficient. This shows that sometimes it takes very little intervention on the part of the system planner to make sure that users choose a desirable operating point. In the second part of the thesis, we consider the competition of wireless service providers for users who are free to choose their service provider based on their channel parameters and the resource price. We model this situation as a two-stage game where the providers announce unit resource prices in the first stage and the users choose how much resource they want to purchase from each provider in the second stage. Under fairly general conditions, we show that the competitive interaction of users and providers results in socially optimal resource allocation. We also provide a decentralized primal-dual algorithm and prove its convergence to the socially optimal outcome

    ATTRIBUTES, COMPLIANCE AND EFFECTIVENESS OF NESTED REGIMESTHE BIOLOGICAL WEAPONS REGIME COMPLEX

    Get PDF
    Are non-proliferation regimes effective? If so, under which circumstances? Existing theoretical and empirical studies fall short of providing consistent indications of the constraining power of security institutions and non-proliferation regimes on state decisions. On the one hand, proponents of regimes highlight the overall capacity of institutions to contain the number of proliferators. On the other hand, detractors maintain that regimes have little or no effect on state decision to pursue specific weapons. The empirical associations between framework conventions and the non-proliferation of the weapons under provision have proved unsatisfactory and weak. Moving from a broader idea of regimes and a graduated notion of effectiveness, this project develops a theoretical argument about the importance of networks of individual institutions (regime complexes) in regime analysis. I argue that regime-complex level data can enhance our capacity to explain actual regime effectiveness, as well as the link between specific institutional features and non-proliferation outcomes. The project does so, interalia, by introducing a new dataset, which gathers information on several institutions that are part of the biological non-proliferation regime complex. The work then illustrates the use of the new dataset by developing measures of state exposure to the regime-complex in terms of overall embeddedness and compliance

    Civil War

    Get PDF
    Most nations have experienced an internal armed conflict since 1960. The past decade has witnessed an explosion of research into the causes and consequences of civil wars, belatedly bringing the topic into the economics mainstream. This article critically reviews this interdisciplinary literature and charts productive paths forward. Formal theory has focused on a central puzzle: why do civil wars occur at all when, given the high costs of war, groups have every incentive to reach an agreement that avoids fighting? Explanations have focused on information asymmetries and the inability to sign binding contracts in the absence of the rule of law. Economic theory has made less progress, however, on the thornier (but equally important) problems of why armed groups form and cohere, and why individuals decide to fight. Likewise, the actual behavior of armed organizations and their leaders is poorly understood. On the empirical side, a vast cross-country econometric literature has aimed to identify the causes of civil war. While most work is plagued by econometric identification problems, low per capita incomes, slow economic growth and geographic conditions favoring insurgency are the factors most robustly linked to civil war. We argue that microlevel analysis and data are needed to truly decipher war's causes, and understand the recruitment, organization, and conduct of armed groups. Recent advances in this area are highlighted. Finally, turning to the economic legacies of war, we frame the literature in terms of neoclassical economic growth theory. Emerging stylized facts include the ability of some economies to experience rapid macroeconomic recoveries, while certain human capital impacts appear more persistent. Yet econometric identification has not been adequately addressed, and there is little consensus on the most effective policies to avert conflicts or promote postwar recovery. The evidence is weakest where it is arguably most important: in understanding civil wars' effects on institutions, technology, and social norms.
    • 

    corecore