3,227 research outputs found
Joint Head Selection and Airtime Allocation for Data Dissemination in Mobile Social Networks
Mobile social networks (MSNs) enable people with similar interests to
interact without Internet access. By forming a temporary group, users can
disseminate their data to other interested users in proximity with short-range
communication technologies. However, due to user mobility, airtime available
for users in the same group to disseminate data is limited. In addition, for
practical consideration, a star network topology among users in the group is
expected. For the former, unfair airtime allocation among the users will
undermine their willingness to participate in MSNs. For the latter, a group
head is required to connect other users. These two problems have to be properly
addressed to enable real implementation and adoption of MSNs. To this aim, we
propose a Nash bargaining-based joint head selection and airtime allocation
scheme for data dissemination within the group. Specifically, the bargaining
game of joint head selection and airtime allocation is first formulated. Then,
Nash bargaining solution (NBS) based optimization problems are proposed for a
homogeneous case and a more general heterogeneous case. For both cases, the
existence of solution to the optimization problem is proved, which guarantees
Pareto optimality and proportional fairness. Next, an algorithm, allowing
distributed implementation, for join head selection and airtime allocation is
introduced. Finally, numerical results are presented to evaluate the
performance, validate intuitions and derive insights of the proposed scheme
An LSPI based reinforcement learning approach to enable network cooperation in cognitive wireless sensor networks
The number of wirelessly communicating devices increases every day, along with the number of communication standards and technologies that they use to exchange data. A relatively new form of research is trying to find a way to make all these co-located devices not only capable of detecting each other's presence, but to go one step further - to make them cooperate. One recently proposed way to tackle this problem is to engage into cooperation by activating 'network services' (such as internet sharing, interference avoidance, etc.) that offer benefits for other co-located networks. This approach reduces the problem to the following research topic: how to determine which network services would be beneficial for all the cooperating networks. In this paper we analyze and propose a conceptual solution for this problem using the reinforcement learning technique known as the Least Square Policy Iteration (LSPI). The proposes solution uses a self-learning entity that negotiates between different independent and co-located networks. First, the reasoning entity uses self-learning techniques to determine which service configuration should be used to optimize the network performance of each single network. Afterwards, this performance is used as a reference point and LSPI is used to deduce if cooperating with other co-located networks can lead to even further performance improvements
Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model
© 2018 Elsevier Inc. An effective security strategy for Wireless Sensor Networks (WSNs) is imperative to counteract security threats. Meanwhile, energy consumption directly affects the network lifetime of a wireless sensor. Thus, an attempt to exploit a low-consumption Intrusion Detection System (IDS) to detect malicious attacks makes a lot of sense. Existing Intrusion Detection Systems can only detect specific attacks and their network lifetime is short due to their high energy consumption. For the purpose of reducing energy consumption and ensuring high efficiency, this paper proposes an intrusion detection model based on game theory and an autoregressive model. The paper not only improves the autoregressive theory model into a non-cooperative, complete-information, static game model, but also predicts attack pattern reliably. The proposed approach improves on previous approaches in two main ways: (1) it takes energy consumption of the intrusion detection process into account, and (2) it obtains the optimal defense strategy that balances the system's detection efficiency and energy consumption by analyzing the model's mixed Nash equilibrium solution. In the simulation experiment, the running time of the process is regarded as the main indicator of energy consumption of the system. The simulation results show that our proposed IDS not only effectively predicts the attack time and the next targeted cluster based on the game theory, but also reduces energy consumption
- …