Truthful Computing in Wireless Networks
نویسندگان
چکیده
3 Incentive Based Method 7 3.1 Mechanism Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.2 Truthful Mechanism Design . . . . . . . . . . . . . . . . . . . . . . . 8 3.3 VCG Based Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4 Network Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.5 Unicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.5.1 Statement of Problem . . . . . . . . . . . . . . . . . . . . . . 10 3.5.2 Pricing for Unicasting . . . . . . . . . . . . . . . . . . . . . . 11 3.5.3 The Distributed Algorithm . . . . . . . . . . . . . . . . . . . 12 3.5.4 Truthful Implementation . . . . . . . . . . . . . . . . . . . . 13 3.5.5 Collusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.5.6 Over Payment . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.6 Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.6.1 Statement of problem and related works . . . . . . . . . . . . 19
منابع مشابه
Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملImproving Bandwidth-power Efficiency of Homogeneous Wireless Networks Using On-meet Threshold Strategy (RESEARCH NOTE)
Over two decades, a problem of location dependent has been focused for improving the communication Bandwidth-Power Efficiency of homogeneous networks. The efficiencies of communication links are weakened by the Hidden Terminal Problem. Thus we propose a Fine – Tune Strategy for analyzing the On-Off communication region. We were observed that the proposed technique had been able to track and mo...
متن کاملA Fuzzy Based Approach for Rate Control in Wireless Multimedia Sensor Networks
Wireless Multimedia Sensor Networks (WMSNs) undergo congestion when a link (or a node) becomes overpopulated in terms of incoming packets. In WMSNs this happens especially in upstream nodes where all incoming packets meet and directed to the sink node. Congestion in networks, if not handled properly, might lead to congestion collapse which deteriorates the quality of service (QoS). Therefore, i...
متن کاملEnergy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms
We consider the range assignment problem in ad-hoc wireless networks in the context of selfish agents: a network manager aims in assigning transmission ranges to the stations so to achieve the strong connectivity of the network with a minimal overall energy; stations are not directly controlled by the manager and may refuse to transmit with a certain transmission range because this results in a...
متن کاملTRADE: A truthful online combinatorial auction for spectrum allocation in cognitive radio networks
Auctions have been shown to be able to tackle the problem of spectrum scarcity effectively, but most of existing works only focus on static scenarios. They cannot deal with the requests of spectrum users as they arrive and leave dynamically. Bidders can either cheat by bidding untruthfully or cheat about the arrival and departure time. In this paper, we model the radio spectrum allocation probl...
متن کامل