Resource allocation and pricing mechanisms for wireless networks with malicious users

نویسنده

  • Anil Kumar Chorppath
چکیده

In this thesis, we propose a framework for designing decentralized pricing and centralized auction mechanisms in the presence and absence of malicious users. First, we design pricing mechanism for efficient power allocation in the uplink of a single cell Multi Carrier Code Division Multiple Access (MC-CDMA) system with strategic and price taking users. The mechanism is extended to sum power constraint over the users and carriers. Additionally, prices are designed for different designer objectives such as revenue maximization and energy minimization. We also consider multihop heterogeneous wireless networks and design appropriate pricing mechanisms for efficient joint power and rate allocation. An iterative algorithm for pricing mechanism is proposed and its convergence is proven. We use the pricing mechanism framework to design a location privacy mechanism for mobile commerce with entropy utility functions and a budget constraint. A regression learning method is used by the designer to learn the utility functions of users from their actions. This is in contrast to direct mechanisms where the designer asks the users to report their utility functions. Next, a centralized auction mechanism for networks with interference coupled utilities and price anticipating users is proposed and its efficiency is proven. A new modeling of malicious user utility function is proposed and a metric Price of Malice (PoM) for quantifying the effect of malicious users is defined. The PoM and related metrics for pricing and auction mechanisms are obtained. Then both the pricing and auction mechanisms are extended for countering the malicious users using differentiated pricing. Next, we relax the assumption that the users and the designer know the nature of users and design Bayesian mechanisms. By comparing to the complete information case, the conditions under which the uncertainty about the nature of the users is beneficial for the regular users and the designer, are obtained. The probability of a user being malicious is constructed using learning methods and the differentiated pricing is implemented using this probabilistic information. Then pricing mechanisms with malicious users are extended to a case where each user submits a Quality of Service(QoS) requirement.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Role of Regulatory in Price Control and Spectrum Allocation to Competing Wireless Access Networks

With the rapid growth of wireless access networks, various providers offer their services using different technologies such as Wi-Fi, Wimax, 3G, 4G and so on. These networks compete for the scarce wireless spectrum. The spectrum is considered to be a scarce resource moderated by the spectrum allocation regulatory (“regulatory” for short) which is the governance body aiming to maximize the socia...

متن کامل

Asymptotic Close to Optimal Resource Allocation in Centralized Multi-band Wireless Networks

This paper concerns sub-channel allocation in multi-user wireless networks with a view to increasing the network throughput. It is assumed there are some sub-channels to be equally divided among active links, such that the total sum rate increases, where it is assumed each link is subject to a maximum transmit power constraint. This problem is found to be a non-convex optimization problem and i...

متن کامل

Decentralized Routing and Power Allocation in FDMA Wireless Networks based on H∞ Fuzzy Control Strategy

Simultaneous routing and resource allocation has been considered in wireless networks for its performance improvement. In this paper we propose a cross-layer optimization framework for worst-case queue length minimization in some type of FDMA based wireless networks, in which the the data routing and the power allocation problem are jointly optimized with Fuzzy distributed H∞ control strategy ....

متن کامل

Trust Based Node Replication Attack Detection Protocol for Wireless Sensor Networks

The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method R...

متن کامل

طراحی لایه- متقاطع برای کنترل ازدحام، مسیریابی و زمان‌بندی در شبکه‌های بی‌سیم ad-hocبا در نظر‌گرفتن توان الکتریکی گره‌ها

Abstract Ad hoc Wireless Networks, are networks formed by a collection of nodes through radio. In wireless networking environment, formidable challenges are presented. One important challenge is connection maintenance mechanism for power consumption. In this paper, a multi-objective optimal design is considered for ad-hoc networks which address the electrical power of nodes effects on cross-l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015