Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/941079.941081acmconferencesArticle/Chapter ViewAbstractPublication PagesdialmConference Proceedingsconference-collections
Article

Equilibria in topology control games for ad hoc networks

Published: 19 September 2003 Publication History
  • Get Citation Alerts
  • Abstract

    We study topology control problems in ad hoc networks, where network nodes get to choose their power levels in order to ensure desired connectivity properties. Unlike most other work on this topic, we assume that the network nodes are owned by different entities, whose only goal is to maximize their own utility that they get out of the network without considering the overall performance of the network. Game theory is the appropriate tool to study such selfish nodes: we define several topology control games in which the nodes need to choose power levels in order to connect to other nodes in the network to reach their communication partners while at the same time minimizing their costs. We study Nash equilibria and show that -- among the games we define -- these can only be guaranteed to exist if all network nodes are required to be connected to all other nodes (we call this the Strong Connectivity Game). We give asymptotically tight bounds for the worst case quality of a Nash equilibrium in the Strong Connectivity Game and we improve these bounds for randomly distributed nodes. We then study the computational complexity of finding Nash equilibria and show that a polynomial-time algorithm finds Nash equilibria whose costs are at most a factor 2 off the minimum cost possible; for a variation called Connectivity Game, where each node is only required to be connected (possibly via intermediate nodes) to a given set of nodes, we show that answering the question, if a Nash equilibrium exists, is NP-hard, if the network graph satisfies the triangle inequality. For a second game called Reachability Game, where each node tries to reach as many other nodes as possible, while minimizing its radius, we show that 1+o(1)-approximate Nash equilibria exist for randomly distributed nodes. Our work is a first step towards game-theoretic analyses of ad hoc networks.

    References

    [1]
    L. Anderegg, S. Eidenbenz. Ad hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents. Proceedings of Mobicom, 2003.
    [2]
    E. Ansheleich, A. Dasgupta, E. Tardos, and T. Wexler. Near-optimal network design with selfish agents. Proceedings of the Symposium on Theory of Computing, 2003.
    [3]
    M. Beckmann, C.B. McGuire and C.B. Winsten. Studies in the Economics of transportation. Yale University Press, 1956.
    [4]
    L. Buttyan and J. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks; Accepted for publication in ACM/Kluwer Mobile Networks and Applications MONET), October 2003, Vol. 8 No. 5.
    [5]
    S.C. Dafermos and F.T. Sparrow. The traffic assignment problem for a general network. Journal of Research of the National Bureau of Standards, Series B, 73 B(2), pp 91--118, 1969.
    [6]
    S. Doshi, S. Bhandare, T. Brown. An On-demand minimum energy routing protocol for a wireless ad hoc network; in: ACM Mobile Computing and Communications Review, vol. 6, no. 3, July 2002.
    [7]
    A. Fabrikant, A. Luthra, E. Maneva, S. Papadimitriou, and S. Shenker. On a network creation game.
    [8]
    J. Freebersyer and B. Leiner. A DoD perspective on mobile ad hoc networks. In C. Perkins, ed. Ad Hoc Networking, pp 314--318, 2001.
    [9]
    M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-completeness; Freeman, San Fransisco, 1979.
    [10]
    L. M. Kirousis, E. Kranakis, D. Krizanc, and A. Pelc. Power consumption in packet radio networks, Theoretical Computer Science 243 (2000) pp 289--305.
    [11]
    R. Motwani and P. Raghavan. Randomized Algorithms, Cambridge University Press, 1995.
    [12]
    A. Mas-Collel, W. Whinston, and J. Green. Microeconomic Theory. Oxford University Press, 1994.
    [13]
    C. Perkins. Ad hoc networking: an introduction. In C. Perkins, ed. Ad Hoc Networking, pp 314--318, 2001.
    [14]
    R. Rajaraman. Topology control and routing in ad hoc networks: a survey. SIGACT News 33:60--73, June 2002.
    [15]
    T. Roughgarden. Selfish Routing. Ph.D. Thesis, Cornell University, 2002.
    [16]
    T. Roughgarden. Designing networks for selfish users is hard. In Proceedings of the 42nd Symposium on the Foundations of Computer Science, pp 472--481, 2001.

    Cited By

    View all
    • (2024)Gamu Blue: A Practical Tool for Game Theory Security EquilibriaNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575749(1-6)Online publication date: 6-May-2024
    • (2014)Access point Selection in 802.11 Wireless Networks Guaranteeing Minimum QoSIngeniería y Ciencia10.17230/ingciencia.10.20.810:20(115-137)Online publication date: 2014
    • (2013)Analysis of required resources for a node using queue system in an ad hoc network2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)10.1109/ICCCNT.2013.6726696(1-7)Online publication date: Jul-2013
    • Show More Cited By

    Index Terms

    1. Equilibria in topology control games for ad hoc networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DIALM-POMC '03: Proceedings of the 2003 joint workshop on Foundations of mobile computing
      September 2003
      86 pages
      ISBN:1581137656
      DOI:10.1145/941079
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 September 2003

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. ad hoc networks
      2. game theory
      3. nash equilibrium
      4. topology control

      Qualifiers

      • Article

      Conference

      Dial M - POMC03
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 21 of 68 submissions, 31%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Gamu Blue: A Practical Tool for Game Theory Security EquilibriaNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575749(1-6)Online publication date: 6-May-2024
      • (2014)Access point Selection in 802.11 Wireless Networks Guaranteeing Minimum QoSIngeniería y Ciencia10.17230/ingciencia.10.20.810:20(115-137)Online publication date: 2014
      • (2013)Analysis of required resources for a node using queue system in an ad hoc network2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)10.1109/ICCCNT.2013.6726696(1-7)Online publication date: Jul-2013
      • (2011)FITSIEEE Transactions on Computers10.1109/TC.2010.16260:7(1045-1056)Online publication date: 1-Jul-2011
      • (2011)Topological Implications of Selfish Neighbor Selection in Unstructured Peer-to-Peer NetworksAlgorithmica10.1007/s00453-010-9398-961:2(419-446)Online publication date: 1-Oct-2011
      • (2010)A collusion-resistant routing scheme for noncooperative wireless ad hoc networksIEEE/ACM Transactions on Networking10.1109/TNET.2009.203032518:2(582-595)Online publication date: 1-Apr-2010
      • (2010)A Trust Evaluation Model Based on Resistive NetworkProceedings of the The Fifth Annual ChinaGrid Conference10.1109/ChinaGrid.2010.39(234-239)Online publication date: 16-Jul-2010
      • (2009)Capacity Analysis of Cooperative Relaying Networks with Adaptive Relaying Scheme SelectionIEICE Transactions on Communications10.1587/transcom.E92.B.3744E92-B:12(3744-3752)Online publication date: 2009
      • (2008)Analysis on Decentralized Adaptive Route Selection in Cooperative Relaying NetworksVTC Spring 2008 - IEEE Vehicular Technology Conference10.1109/VETECS.2008.529(2390-2394)Online publication date: May-2008
      • (2008)The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish NodesIEEE Transactions on Mobile Computing10.1109/TMC.2007.10697:1(19-33)Online publication date: 1-Jan-2008
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media