5 research outputs found

    Applications of Repeated Games in Wireless Networks: A Survey

    Full text link
    A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Public Law and Economics

    Get PDF
    This comprehensive textbook applies economic analysis to public law. The economic analysis of law has revolutionized legal scholarship and teaching in the last half-century, but it has focused mostly on private law, business law, and criminal law. This book extends the analysis to fundamental topics in public law, such as the separation of government powers, regulation by agencies, constitutional rights, and elections. Every public law involves six fundamental processes of government: bargaining, voting, entrenching, delegating, adjudicating, and enforcing. The book devotes two chapters to each process, beginning with the economic theory and then applying the theory to a wide range of puzzles and problems in law. Each chapter concentrates on cases and legal doctrine, showing the relevance of economics to the work of lawyers and judges. Featuring lucid, accessible writing and engaging examples, the book addresses enduring topics in public law as well as modern controversies, including gerrymandering, voter identification laws, and qualified immunity for police

    Public Law and Economics

    Get PDF
    This comprehensive textbook applies economic analysis to public law. The economic analysis of law has revolutionized legal scholarship and teaching in the last half-century, but it has focused mostly on private law, business law, and criminal law. This book extends the analysis to fundamental topics in public law, such as the separation of government powers, regulation by agencies, constitutional rights, and elections. Every public law involves six fundamental processes of government: bargaining, voting, entrenching, delegating, adjudicating, and enforcing. The book devotes two chapters to each process, beginning with the economic theory and then applying the theory to a wide range of puzzles and problems in law. Each chapter concentrates on cases and legal doctrine, showing the relevance of economics to the work of lawyers and judges. Featuring lucid, accessible writing and engaging examples, the book addresses enduring topics in public law as well as modern controversies, including gerrymandering, voter identification laws, and qualified immunity for police
    corecore