-
Whittle Index Based User Association in Dense Millimeter Wave Networks
Authors:
Mandar R. Nalavade,
Gaurav S. Kasbekar,
Vivek S. Borkar
Abstract:
We address the problem of user association in a dense millimeter wave (mmWave) network, in which each arriving user brings a file containing a random number of packets and each time slot is divided into multiple mini-slots. This problem is an instance of the restless multi-armed bandit problem, and is provably hard to solve. Using a technique introduced by Whittle, we relax the hard per-stage cons…
▽ More
We address the problem of user association in a dense millimeter wave (mmWave) network, in which each arriving user brings a file containing a random number of packets and each time slot is divided into multiple mini-slots. This problem is an instance of the restless multi-armed bandit problem, and is provably hard to solve. Using a technique introduced by Whittle, we relax the hard per-stage constraint that each arriving user must be associated with exactly one mmWave base station (mBS) to a long-term constraint and then use the Lagrangian multiplier technique to convert the problem into an unconstrained problem. This decouples the process governing the system into separate Markov Decision Processes at different mBSs. We prove that the problem is Whittle indexable, present a scheme for computing the Whittle indices of different mBSs, and propose an association scheme under which, each arriving user is associated with the mBS with the smallest value of the Whittle index. Using extensive simulations, we show that the proposed Whittle index based scheme outperforms several user association schemes proposed in prior work in terms of various performance metrics such as average cost, delay, throughput, and Jain's fairness index.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
Node Cardinality Estimation in the Internet of Things Using Privileged Feature Distillation
Authors:
Pranav S. Page,
Anand S. Siyote,
Vivek S. Borkar,
Gaurav S. Kasbekar
Abstract:
The Internet of Things (IoT) is emerging as a critical technology to connect resource-constrained devices such as sensors and actuators as well as appliances to the Internet. In this paper, we propose a novel methodology for node cardinality estimation in wireless networks such as the IoT and Radio-Frequency IDentification (RFID) systems, which uses the privileged feature distillation (PFD) techni…
▽ More
The Internet of Things (IoT) is emerging as a critical technology to connect resource-constrained devices such as sensors and actuators as well as appliances to the Internet. In this paper, we propose a novel methodology for node cardinality estimation in wireless networks such as the IoT and Radio-Frequency IDentification (RFID) systems, which uses the privileged feature distillation (PFD) technique and works using a neural network with a teacher-student model. The teacher is trained using both privileged and regular features, and the student is trained with predictions from the teacher and regular features. We propose node cardinality estimation algorithms based on the PFD technique for homogeneous as well as heterogeneous wireless networks. We show via extensive simulations that the proposed PFD based algorithms for homogeneous as well as heterogeneous networks achieve much lower mean squared errors in the computed node cardinality estimates than state-of-the-art protocols proposed in prior work, while taking the same number of time slots for executing the node cardinality estimation process as the latter protocols.
△ Less
Submitted 28 October, 2023;
originally announced October 2023.
-
Node Cardinality Estimation in a Heterogeneous Wireless Network Deployed Over a Large Region Using a Mobile Base Station
Authors:
Sachin Kadam,
Kaustubh S. Bhargao,
Gaurav S. Kasbekar
Abstract:
We consider the problem of estimation of the node cardinality of each node type in a heterogeneous wireless network with $T$ types of nodes deployed over a large region, where $T \ge 2$ is an integer. A mobile base station (MBS), such as that mounted on an unmanned aerial vehicle, is used in such cases since a single static base station is not sufficient to cover such a large region. The MBS moves…
▽ More
We consider the problem of estimation of the node cardinality of each node type in a heterogeneous wireless network with $T$ types of nodes deployed over a large region, where $T \ge 2$ is an integer. A mobile base station (MBS), such as that mounted on an unmanned aerial vehicle, is used in such cases since a single static base station is not sufficient to cover such a large region. The MBS moves around in the region and makes multiple stops, and at the last stop, it is able to estimate the node cardinalities for the entire region. In this paper, two schemes, viz., HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. Both schemes have two phases, and they are performed at each stop. We prove that the node cardinality estimates computed using our proposed schemes are equal to, and hence as accurate as, the estimates that would have been obtained if a well-known estimation protocol designed for homogeneous networks in prior work were separately executed $T$ times. Closed-form expressions for the expected number of slots required by HSRC-M1 to execute and the expected energy consumption of a node under HSRC-M1 are computed. The problem of finding the optimal tour of the MBS around the region, which covers all the nodes and minimizes the travel cost of the MBS, is formulated and shown to be NP-complete, and a greedy algorithm is provided to solve it. Using simulations, it is shown that the numbers of slots required by the proposed schemes, HSRC-M1 and HSRC-M2, for computing node cardinality estimates are significantly less than the number of slots required for $T$ separate executions of the above estimation protocol for homogeneous networks.
△ Less
Submitted 25 October, 2023; v1 submitted 15 June, 2023;
originally announced June 2023.
-
Distributed Probabilistic Congestion Control in LEO Satellite Networks
Authors:
Pranav S. Page,
Kaustubh S. Bhargao,
Hrishikesh V. Baviskar,
Gaurav S. Kasbekar
Abstract:
In a dense Low Earth Orbit (LEO) satellite constellation, using a centralized algorithm for minimum-delay routing would incur significant signaling and computational overhead. In this work, we exploit the deterministic topology of the constellation to calculate the minimum-delay path between any two nodes in a satellite network. We propose a distributed probabilistic congestion control scheme to m…
▽ More
In a dense Low Earth Orbit (LEO) satellite constellation, using a centralized algorithm for minimum-delay routing would incur significant signaling and computational overhead. In this work, we exploit the deterministic topology of the constellation to calculate the minimum-delay path between any two nodes in a satellite network. We propose a distributed probabilistic congestion control scheme to minimize end-to-end delay, which is built on top of the existing Datagram Routing Algorithm (DRA). The decision to route packets is taken based on the latest traffic information received from neighbours. We provide an analysis of the congestion caused by a simplified DRA on a uniform infinite mesh of nodes. We compare the proposed congestion control mechanism with the existing congestion control used by the DRA via simulations, and show improvements over the latter.
△ Less
Submitted 6 December, 2022; v1 submitted 18 September, 2022;
originally announced September 2022.
-
Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers
Authors:
M. Surendra Kumar,
Gaurav S. Kasbekar,
Arnab Maity
Abstract:
The vulnerability of the Global Positioning System (GPS) against spoofing is known for quite some time. Also, the positioning and navigation of most semi-autonomous and autonomous drones are dependent on Global Navigation Satellite System (GNSS) signals. In prior work, simplistic or asynchronous GPS spoofing was found to be a simple, efficient, and effective cyber attack against L1 GPS or GNSS dep…
▽ More
The vulnerability of the Global Positioning System (GPS) against spoofing is known for quite some time. Also, the positioning and navigation of most semi-autonomous and autonomous drones are dependent on Global Navigation Satellite System (GNSS) signals. In prior work, simplistic or asynchronous GPS spoofing was found to be a simple, efficient, and effective cyber attack against L1 GPS or GNSS dependent commercial drones. In this paper, first we make some important observations on asynchronous GPS spoofing attacks on drones presented in prior research literature. Then, we design an asynchronous GPS spoofing attack plan. Next, we test the effectiveness of this attack against GNSS receivers (high volume consumer devices based on Android mobile phones) of different capabilities and a commercial drone (DJI Mavic 2 Pro) under various conditions. Finally, we present several novel insights based on the results of the tests.
△ Less
Submitted 18 June, 2022;
originally announced June 2022.
-
Scheduling in Wireless Networks using Whittle Index Theory
Authors:
Karthik GVB,
Vivek S. Borkar,
Gaurav S. Kasbekar
Abstract:
We consider the problem of scheduling packet transmissions in a wireless network of users while minimizing the energy consumed and the transmission delay. A challenge is that transmissions of users that are close to each other mutually interfere, while users that are far apart can transmit simultaneously without much interference. Each user has a queue of packets that are transmitted on a single c…
▽ More
We consider the problem of scheduling packet transmissions in a wireless network of users while minimizing the energy consumed and the transmission delay. A challenge is that transmissions of users that are close to each other mutually interfere, while users that are far apart can transmit simultaneously without much interference. Each user has a queue of packets that are transmitted on a single channel and mutually non interfering users reuse the spectrum. Using the theory of Whittle index for cost minimizing restless bandits, we design four index-based policies and compare their performance with that of the well-known policies: Slotted ALOHA, maximum weight scheduling, quadratic Lyapunov drift, Cella and Cesa Bianchi algorithm, and two Whittle index based policies from a recently published paper. We make the code used to perform our simulations publicly available, so that it can be used for future work by the research community at large.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm
Authors:
Nitesh Kumar,
Gaurav S. Kasbekar,
D. Manjunath
Abstract:
Traditionally, security systems for enterprises have implicit access based on strong cryptography, authentication and key sharing, wherein access control is based on Role Based Access Control (RBAC), in which roles such as manager, accountant and so on provide a way of deciding a subject's authority. However, years of post-attack analysis on enterprise networks has shown that a majority of times,…
▽ More
Traditionally, security systems for enterprises have implicit access based on strong cryptography, authentication and key sharing, wherein access control is based on Role Based Access Control (RBAC), in which roles such as manager, accountant and so on provide a way of deciding a subject's authority. However, years of post-attack analysis on enterprise networks has shown that a majority of times, security breaches occur intentionally or accidently due to implicitly trusted people of an enterprise itself. Zero Trust Architecture works on the principle of never granting trust implicitly, but rather continuously evaluating the trust parameters for each resource access request and has a strict, but not rigid, set of protocols for access control of a subject to resources. Endpoint Detection and Response (EDR) systems are tools that collect a large number of attributes in and around machines within an enterprise network to have close visibility into sophisticated intrusion. In our work, we seek to deploy EDR systems and build trust algorithms using tactical provenance analysis, threshold cryptography and reputation management to continuously record data, evaluate trust of a subject, and simultaneously analyze them against a database of known threat vectors to provide conditional access control. However, EDR tools generate a high volume of data that leads to false alarms, misdetections and correspondingly a high backlog of tasks that makes it infeasible, which is addressed using tactical provenance analysis and information theory.
△ Less
Submitted 17 March, 2022;
originally announced March 2022.
-
A Wireless Intrusion Detection System for 802.11 WPA3 Networks
Authors:
Neil Dalal,
Nadeem Akhtar,
Anubhav Gupta,
Nikhil Karamchandani,
Gaurav S. Kasbekar,
Jatin Parekh
Abstract:
Wi-Fi (802.11) networks have become an essential part of our daily lives; hence, their security is of utmost importance. However, Wi-Fi Protected Access 3 (WPA3), the latest security certification for 802.11 standards, has recently been shown to be vulnerable to several attacks. In this paper, we first describe the attacks on WPA3 networks that have been reported in prior work; additionally, we sh…
▽ More
Wi-Fi (802.11) networks have become an essential part of our daily lives; hence, their security is of utmost importance. However, Wi-Fi Protected Access 3 (WPA3), the latest security certification for 802.11 standards, has recently been shown to be vulnerable to several attacks. In this paper, we first describe the attacks on WPA3 networks that have been reported in prior work; additionally, we show that a deauthentication attack and a beacon flood attack, known to be possible on a WPA2 network, are still possible with WPA3. We launch and test all the above (a total of nine) attacks using a testbed that contains an enterprise Access Point (AP) and Intrusion Detection System (IDS). Our experimental results show that the AP is vulnerable to eight out of the nine attacks and the IDS is unable to detect any of them. We propose a design for a signature-based IDS, which incorporates techniques to detect all the above attacks. Also, we implement these techniques on our testbed and verify that our IDS is able to successfully detect all the above attacks. We provide schemes for mitigating the impact of the above attacks once they are detected. We make the code to perform the above attacks as well as that of our IDS publicly available, so that it can be used for future work by the research community at large.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
User Association in Dense mmWave Networks as Restless Bandits
Authors:
S. K. Singh,
V. S. Borkar,
G. S. Kasbekar
Abstract:
We study the problem of user association, i.e., determining which base station (BS) a user should associate with, in a dense millimeter wave (mmWave) network. In our system model, in each time slot, a user arrives with some probability in a region with a relatively small geographical area served by a dense mmWave network. Our goal is to devise an association policy under which, in each time slot i…
▽ More
We study the problem of user association, i.e., determining which base station (BS) a user should associate with, in a dense millimeter wave (mmWave) network. In our system model, in each time slot, a user arrives with some probability in a region with a relatively small geographical area served by a dense mmWave network. Our goal is to devise an association policy under which, in each time slot in which a user arrives, it is assigned to exactly one BS so as to minimize the weighted average amount of time that users spend in the system. The above problem is a restless multi-armed bandit problem and is provably hard to solve. We prove that the problem is Whittle indexable, and based on this result, propose an association policy under which an arriving user is associated with the BS having the smallest Whittle index. Using simulations, we show that our proposed policy outperforms several user association policies proposed in prior work.
△ Less
Submitted 28 April, 2022; v1 submitted 16 July, 2021;
originally announced July 2021.
-
Secure, Anonymity-Preserving and Lightweight Mutual Authentication and Key Agreement Protocol for Home Automation IoT Networks
Authors:
Akash Gupta,
Gaurav S. Kasbekar
Abstract:
Home automation Internet of Things (IoT) systems have recently become a target for several types of attacks. In this paper, we present an authentication and key agreement protocol for a home automation network based on the ZigBee standard, which connects together a central controller and several end devices. Our scheme performs mutual authentication between end devices and the controller, which is…
▽ More
Home automation Internet of Things (IoT) systems have recently become a target for several types of attacks. In this paper, we present an authentication and key agreement protocol for a home automation network based on the ZigBee standard, which connects together a central controller and several end devices. Our scheme performs mutual authentication between end devices and the controller, which is followed by device-to-device communication. The scheme achieves confidentiality, message integrity, anonymity, unlinkability, forward and backward secrecy, and availability. Our scheme uses only simple hash and XOR computations and symmetric key encryption, and hence is resource-efficient. We show using a detailed security analysis and numerical results that our proposed scheme provides better security and anonymity, and is more efficient in terms of computation time, communication cost, and storage cost than schemes proposed in prior works.
△ Less
Submitted 27 July, 2021; v1 submitted 20 May, 2021;
originally announced May 2021.
-
Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings
Authors:
Adhirath Kabra,
Sumit Kumar,
Gaurav S. Kasbekar
Abstract:
Many Internet of Things (IoT) scenarios require communication to and data acquisition from multiple devices with similar functionalities. For such scenarios, group communication in the form of multicasting and broadcasting has proven to be effective. Group Key Management (GKM) involves the handling, revocation, updation and distribution of cryptographic keys to members of various groups. Classical…
▽ More
Many Internet of Things (IoT) scenarios require communication to and data acquisition from multiple devices with similar functionalities. For such scenarios, group communication in the form of multicasting and broadcasting has proven to be effective. Group Key Management (GKM) involves the handling, revocation, updation and distribution of cryptographic keys to members of various groups. Classical GKM schemes perform inefficiently in dynamic IoT environments, which are those wherein nodes frequently leave or join a network or migrate from one group to another over time. Recently, the `GroupIt' scheme has been proposed for GKM in dynamic IoT environments. However, this scheme has several limitations such as vulnerability to collusion attacks, the use of computationally expensive asymmetric encryption and threats to the backward secrecy of the system. In this paper, we present a highly efficient and secure GKM protocol for dynamic IoT settings, which maintains forward and backward secrecy at all times. Our proposed protocol uses only symmetric encryption, and is completely resistant to collusion attacks. Also, our protocol is highly flexible and can handle several new scenarios in which device or user dynamics may take place, e.g., allowing a device group to join or leave the network or creation or dissolution of a user group, which are not handled by schemes proposed in prior literature. We evaluate the performance of the proposed protocol via extensive mathematical analysis and numerical computations, and show that it outperforms the GroupIt scheme in terms of the communication and computation costs incurred by users and devices.
△ Less
Submitted 16 August, 2020;
originally announced August 2020.
-
Achieving Arbitrary Throughput-Fairness Trade-offs in the Inter Cell Interference Coordination with Fixed Transmit Power Problem
Authors:
Vaibhav Kumar Gupta,
Gaurav S. Kasbekar
Abstract:
We study the problem of inter cell interference coordination (ICIC) with fixed transmit power in OFDMA-based cellular networks, in which each base station (BS) needs to decide as to which subchannel, if any, to allocate to each of its associated mobile stations (MS) for data transmission. In general, there exists a trade-off between the total throughput (sum of throughputs of all the MSs) and fair…
▽ More
We study the problem of inter cell interference coordination (ICIC) with fixed transmit power in OFDMA-based cellular networks, in which each base station (BS) needs to decide as to which subchannel, if any, to allocate to each of its associated mobile stations (MS) for data transmission. In general, there exists a trade-off between the total throughput (sum of throughputs of all the MSs) and fairness under the allocations found by resource allocation schemes. We introduce the concept of $τ-α-$fairness by modifying the concept of $α-$fairness, which was earlier proposed in the context of designing fair end-to-end window-based congestion control protocols for packet-switched networks. The concept of $τ-α-$fairness allows us to achieve arbitrary trade-offs between the total throughput and degree of fairness by selecting an appropriate value of $α$ in $[0,\infty)$. We show that for every $α\in [0,\infty)$ and every $τ> 0$, the problem of finding a $τ-α-$fair allocation is NP-Complete. Further, we show that for every $α\in [0, \infty)$, there exist thresholds such that if the potential interference levels experienced by each MS on every subchannel are above the threshold values, then the problem can be optimally solved in polynomial time by reducing it to the bipartite graph matching problem. Also, we propose a simple, distributed subchannel allocation algorithm for the ICIC problem, which is flexible, requires a small amount of time to operate, and requires information exchange among only neighboring BSs. We investigate via simulations as to how the algorithm parameters should be selected so as to achieve any desired trade-off between the total throughput and fairness.
△ Less
Submitted 27 December, 2019;
originally announced December 2019.
-
Coalitional Game Framework for Content Distribution Using Device-to-device Communication
Authors:
Aditya MVS,
Chitrarth Shrivastava,
Gaurav S. Kasbekar
Abstract:
We consider a set of cellular users associated with a base station (BS) in a cellular network that employs Device-to-device (D2D) communication. A subset of the users request for some files from the BS. Now, some of the users can potentially act as relays and forward the requested files, or partitions of files, from the BS to some of the requesting users (destination nodes) over D2D links. However…
▽ More
We consider a set of cellular users associated with a base station (BS) in a cellular network that employs Device-to-device (D2D) communication. A subset of the users request for some files from the BS. Now, some of the users can potentially act as relays and forward the requested files, or partitions of files, from the BS to some of the requesting users (destination nodes) over D2D links. However, this requires cooperation among the cellular users. In this paper, we seek conditions under which users have an incentive to cooperate with each other. We model the above scenario using the frameworks of cooperative game theory and stable partitions in coalitional games. We consider two different models for file transfer within a coalition: (i) Model A, in which the BS can split a file into multiple partitions and send these partitions to different relays, which multicast the partitions to the destination nodes of the coalition, and (ii) Model B, in which for each file, the BS sends the entire file to a single relay, which multicasts it to the destination nodes of the coalition. First, we explore the question of whether it is beneficial for all the cellular users to cooperate, i.e., whether the grand coalition is stable. For this we use the solution concept of core from cooperative game theory. We show that, in general, the above coalitional game under Model A may have an empty core. Next, we provide conditions under which the core is always non-empty and a D_c-stable partition always exists. Also, we show that under Model B, the problem of assigning relays to destination nodes so as to maximize the sum of utilities of all the users is NP-Complete. Finally, we show via numerical computations that a significant reduction in the energy expenditure of cellular users can be achieved via cooperation.
△ Less
Submitted 14 December, 2019;
originally announced December 2019.
-
Design and Implementation of a Wireless SensorNetwork for Agricultural Applications
Authors:
Jobish John,
Gaurav S Kasbekar,
Dinesh K Sharma,
V. Ramulu,
Maryam Shojaei Baghini
Abstract:
We present the design and implementation of a shortest path tree based, energy efficient data collection wireless sensor network to sense various parameters in an agricultural farm using in-house developed low cost sensors. Nodes follow a synchronized, periodic sleep-wake up schedule to maximize the lifetime of the network. The implemented network consists of 24 sensor nodes in a 3 acre maize farm…
▽ More
We present the design and implementation of a shortest path tree based, energy efficient data collection wireless sensor network to sense various parameters in an agricultural farm using in-house developed low cost sensors. Nodes follow a synchronized, periodic sleep-wake up schedule to maximize the lifetime of the network. The implemented network consists of 24 sensor nodes in a 3 acre maize farm and its performance is captured by 7 snooper nodes for different data collection intervals: 10 minutes, 1 hour and 3 hours. The almost static nature of wireless links in the farm motivated us to use the same tree for a long data collection period(3 days). The imbalance in energy consumption across nodes is observed to be very small and the network architecture uses easy-to-implement protocols to perform different network activities including handling of node failures. We present the results and analysis of extensive tests conducted on our implementation, which provide significant insights.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Maximum Lifetime Convergecast Tree in Wireless Sensor Networks
Authors:
Jobish John,
Gaurav S Kasbekar,
Maryam Shojaei Baghini
Abstract:
We study the problem of building a maximum lifetime data collection tree for periodic convergecast applications in wireless sensor networks. We experimentally observe that if two nodes transmit same number of data packets, the amount of energy consumption of the nodes is approximately the same even if the payload lengths of the transmitted packets are different. This is because the major energy co…
▽ More
We study the problem of building a maximum lifetime data collection tree for periodic convergecast applications in wireless sensor networks. We experimentally observe that if two nodes transmit same number of data packets, the amount of energy consumption of the nodes is approximately the same even if the payload lengths of the transmitted packets are different. This is because the major energy consumption during a packet transmission arises from radio start-up and medium access control overhead. Our formulated lifetime maximization problem captures the energy expenditure due to message transmissions/ receptions in terms of the number of data packets transmitted/ received, in contrast to prior works, which consider the number of data units (amount of sensor data generated by a node) transmitted/ received. Variable transmission power levels of the radio and accounting for the sensor energy consumption are other factors that make our problem formulation different from those in prior work. We prove that this problem is NP-complete and propose an algorithm to solve it. The performance of the proposed algorithm is experimentally evaluated using Jain's fairness index as a metric by implementing it on an actual testbed consisting of 20 sensor nodes and compared with those of the widely used shortest path tree (SPT) and random data collection tree (RDCT) algorithms. The energy consumption of different nodes under the proposed algorithm are shown to be more balanced than under SPT and RDCT algorithms. Also, the performance of the proposed algorithm in large networks is studied through simulations and is compared with those of the state-of-the-art RaSMaLai algorithm, SPT, minimum spanning tree, and RDCT based data collection schemes. Our simulations show that the proposed algorithm provides a significantly higher network lifetime compared to all the other considered data collection approaches.
△ Less
Submitted 8 June, 2020; v1 submitted 22 October, 2019;
originally announced October 2019.
-
Scheduling in Wireless Networks with Spatial Reuse of Spectrum as Restless Bandits
Authors:
Vivek S. Borkar,
Shantanu Choudhary,
Vaibhav Kumar Gupta,
Gaurav S. Kasbekar
Abstract:
We study the problem of scheduling packet transmissions with the aim of minimizing the energy consumption and data transmission delay of users in a wireless network in which spatial reuse of spectrum is employed. We approach this problem using the theory of Whittle index for cost minimizing restless bandits, which has been used to effectively solve problems in a variety of applications. We design…
▽ More
We study the problem of scheduling packet transmissions with the aim of minimizing the energy consumption and data transmission delay of users in a wireless network in which spatial reuse of spectrum is employed. We approach this problem using the theory of Whittle index for cost minimizing restless bandits, which has been used to effectively solve problems in a variety of applications. We design two Whittle index based policies the first by treating the graph representing the network as a clique and the second based on interference constraints derived from the original graph. We evaluate the performance of these two policies via extensive simulations, in terms of average cost and packets dropped, and show that they outperform the well-known Slotted ALOHA and maximum weight scheduling algorithms.
△ Less
Submitted 8 June, 2020; v1 submitted 10 October, 2019;
originally announced October 2019.
-
Beyond the VCG Mechanism: Truthful Reverse Auctions for Relay Selection with High Data Rates, High Base Station Utility and Low Interference in D2D Networks
Authors:
Aditya MVS,
Harsh Pancholi,
Priyanka P.,
Gaurav S. Kasbekar
Abstract:
Device-to-Device communication allows a cellular user (relay node) to relay data between the base station (BS) and another cellular user (destination node). We address the problem of designing reverse auctions to assign a relay node to each destination node, when there are multiple potential relay nodes and multiple destination nodes, in the scenarios where the transmission powers of the relay nod…
▽ More
Device-to-Device communication allows a cellular user (relay node) to relay data between the base station (BS) and another cellular user (destination node). We address the problem of designing reverse auctions to assign a relay node to each destination node, when there are multiple potential relay nodes and multiple destination nodes, in the scenarios where the transmission powers of the relay nodes are: 1) fixed, 2) selected to achieve the data rates desired by destination nodes, and 3) selected so as to approximately maximize the BS's utility. We show that auctions based on the widely used Vickrey-Clarke-Groves (VCG) mechanism have several limitations in scenarios 1) and 2); also, in scenario 3), the VCG mechanism is not applicable. Hence, we propose novel reverse auctions for relay selection in each of the above three scenarios. We prove that all the proposed reverse auctions can be truthfully implemented as well as satisfy the individual rationality property. Using numerical computations, we show that in scenarios 1) and 2), our proposed auctions significantly outperform the auctions based on the VCG mechanism in terms of the data rates achieved by destination nodes, utility of the BS and/ or the interference cost incurred to the BS.
△ Less
Submitted 2 June, 2019;
originally announced June 2019.
-
Fast Node Cardinality Estimation and Cognitive MAC Protocol Design for Heterogeneous Machine-to-Machine Networks
Authors:
Sachin Kadam,
Chaitanya S. Raut,
Amandeep Meena,
Gaurav S. Kasbekar
Abstract:
Machine-to-Machine (M2M) networks are an emerging technology with applications in numerous areas including smart grids, smart cities, vehicular telematics, and healthcare. In this paper, we design two estimation protocols for rapidly obtaining separate estimates of the number of active nodes of each traffic type in a heterogeneous M2M network with $T$ types of M2M nodes (e.g., those that send emer…
▽ More
Machine-to-Machine (M2M) networks are an emerging technology with applications in numerous areas including smart grids, smart cities, vehicular telematics, and healthcare. In this paper, we design two estimation protocols for rapidly obtaining separate estimates of the number of active nodes of each traffic type in a heterogeneous M2M network with $T$ types of M2M nodes (e.g., those that send emergency, periodic, normal type data etc), where $T \geq 2$ is an arbitrary integer. One of these protocols, Method I, is a simple scheme, and the other, Method II, is more sophisticated and performs better than Method I. Also, we design a medium access control (MAC) protocol that supports multi-channel operation for a heterogeneous M2M network with an arbitrary number of types of M2M nodes, operating as a secondary network using Cognitive Radio technology. Our Cognitive MAC protocol uses the proposed node cardinality estimation protocols to rapidly estimate the number of active nodes of each type in every time frame; these estimates are used to find the optimal contention probabilities to be used in the MAC protocol. We compute a closed form expression for the expected number of time slots required by Method I to execute as well as a simple upper bound on it. Also, we mathematically analyze the performance of the Cognitive MAC protocol and obtain expressions for the expected number of successful contentions per frame and the expected amount of energy consumed. Finally, we evaluate the performances of our proposed estimation protocols and Cognitive MAC protocol using simulations.
△ Less
Submitted 10 December, 2018;
originally announced December 2018.
-
Distributed Server Allocation for Content Delivery Networks
Authors:
Sarath Pattathil,
Vivek S. Borkar,
Gaurav S. Kasbekar
Abstract:
We propose a dynamic formulation of file-sharing networks in terms of an average cost Markov decision process with constraints. By analyzing a Whittle-like relaxation thereof, we propose an index policy in the spirit of Whittle and compare it by simulations with other natural heuristics.
We propose a dynamic formulation of file-sharing networks in terms of an average cost Markov decision process with constraints. By analyzing a Whittle-like relaxation thereof, we propose an index policy in the spirit of Whittle and compare it by simulations with other natural heuristics.
△ Less
Submitted 9 February, 2019; v1 submitted 28 October, 2017;
originally announced October 2017.