1,600 research outputs found
Applications of Repeated Games in Wireless Networks: A Survey
A repeated game is an effective tool to model interactions and conflicts for
players aiming to achieve their objectives in a long-term basis. Contrary to
static noncooperative games that model an interaction among players in only one
period, in repeated games, interactions of players repeat for multiple periods;
and thus the players become aware of other players' past behaviors and their
future benefits, and will adapt their behavior accordingly. In wireless
networks, conflicts among wireless nodes can lead to selfish behaviors,
resulting in poor network performances and detrimental individual payoffs. In
this paper, we survey the applications of repeated games in different wireless
networks. The main goal is to demonstrate the use of repeated games to
encourage wireless nodes to cooperate, thereby improving network performances
and avoiding network disruption due to selfish behaviors. Furthermore, various
problems in wireless networks and variations of repeated game models together
with the corresponding solutions are discussed in this survey. Finally, we
outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference
Individual Security and Network Design with Malicious Nodes
Networks are beneficial to those being connected but can also be used as
carriers of contagious hostile attacks. These attacks are often facilitated by
exploiting corrupt network users. To protect against the attacks, users can
resort to costly defense. The decentralized nature of such protection is known
to be inefficient but the inefficiencies can be mitigated by a careful network
design. Is network design still effective when not all users can be trusted? We
propose a model of network design and defense with byzantine nodes to address
this question. We study the optimal defended networks in the case of
centralized defense and, for the case of decentralized defense, we show that
the inefficiencies due to decentralization can be fully mitigated, despite the
presence of the byzantine nodes.Comment: 19 pages, 3 figure
- …