Selfish Service Installation in Networks
نویسندگان
چکیده
We consider a scenario of distributed service installation in privately owned networks. Our model is a non-cooperative vertex cover game for k players. Each player owns a set of edges in a graph G and strives to cover each edge by an incident vertex. Vertices have costs and must be purchased to be available for the cover. Vertex costs can be shared arbitrarily by players. Once a vertex is bought, it can be used by any player to fulfill the covering requirement of her incident edges. Despite its simplicity, the model exhibits a surprisingly rich set of properties. We present a cumulative set of results including tight characterizations for prices of anarchy and stability, NP-hardness of equilibrium existence, and polynomial time solvability for important subclasses of the game. In addition, we consider the task of finding approximate Nash equilibria purchasing an approximation to the optimum social cost, in which each player can improve her contribution by selfish defection only by at most a certain factor. A variation of the primal-dual algorithm for minimum weighted vertex cover yields a guarantee of 2, which is
منابع مشابه
Selfish Attacks in Two-hop IEEE 802.11 Relay Networks: Impact and Countermeasures
In IEEE 802.11 networks, selfish stations can pursue a better quality of service (QoS) through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Twohop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicabi...
متن کاملService Allocation in Selfish Mobile Ad Hoc Networks Using Vickrey Auction
Incentive scheme for stimulating service provision in Mobile Ad hoc NETworks (MANET) has been under intensive investigation due to its significance to the operation of MANET. This paper applies distributed algorithmic mechanism design and utilizes Vickrey auction for service allocation in mobile ad hoc networks. We show that our method stimulates service provision and achieves desired system-wi...
متن کاملImproving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach
Selfish users are known to be a severe security threat for wireless ad-hoc networks. In particular, they can exploit mechanisms designed to assure QoS in the network. In this paper the problem of backoff misbehavior in IEEE 802.11 EDCA networks is studied using a game-theoretic approach. First, it is shown how this selfish behavior can disrupt traffic differentiation. Then, a solution is propos...
متن کاملApplication of Fuzzy Sets for Isolating Selfish nodes by Trust Evaluation during Auto-configuration and Service Establishment in MANETs
Mobile Ad-hoc networks (MANETs) are infrastructure-less wireless networks. These networks are easily deployable and are used during disaster recovery, emergency situation and in areas with poor infrastructure. Each node in the MANET has to be assigned with an IP address to start communication and receive services. These IP addresses are configured using Stateless Auto-configuration or Stateful ...
متن کاملDetecting Selfish Secondary User for Improving the Performance of Cognitive Radio Network by Using Sad Method
Cognitive radio (CR) is an opportunistic communication technology which is designed to utilize the maximum available licensed bandwidth for unlicensed users. In CR, when the spectrum is not used by primary user, it is accessed by the unlicensed users/secondary users. . In CRN a selfish SU (secondary user) broadcasts faked channel allocation information to other neighboring SUs in order to occup...
متن کامل