Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/938985.939011acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents

Published: 14 September 2003 Publication History
  • Get Citation Alerts
  • Abstract

    We introduce a game-theoretic setting for routing in a mobile ad hoc network that consists of greedy, selfish agents who accept payments for forwarding data for other agents if the payments cover their individual costs incurred by forwarding data. In this setting, we propose Ad hoc-VCG, a reactive routing protocol that achieves the design objectives of truthfulness (i.e., it is in the agents' best interest to reveal their true costs for forwarding data) and cost-efficiency (i.e., it guarantees that routing is done along the most cost-efficient path) in a game-theoretic sense by paying to the intermediate nodes a premium over their actual costs for forwarding data packets. We show that the total overpayment (i.e., the sum of all premiums paid) is relatively small by giving a theoretical upper bound and by providing experimental evidence. Our routing protocol implements a variation of the well-known mechanism by Vickrey, Clarke, and Groves in a mobile network setting. Finally, we analyze a very natural routing protocol that is an adaptation of the Packet Purse Model [8] with auctions in our setting and show that, unfortunately, it does not achieve cost-efficiency or truthfulness.

    References

    [1]
    A. Akella, S. Seshan, R. Karp, S. Shenker, C. Papadimitriou; Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP; in: Proceedings of SIGCOMM'02, 2002.
    [2]
    A. Archer and E. Tardos; Frugal Path Mechanism; in: Proceedings of 13th Symposium on Discrete Algorithms, ACM Press/SIAM, New York/Philadelphia, pp. 991--999, 2002.
    [3]
    M. Baker, E. Fratkin, D. Guitierrez, T. Li, Y.Liu, V. Vijayaraghavan; Ad hoc Participation Economy; May 2001.
    [4]
    S. Buchegger, J. Le Boudec; Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness; in: Lecture Notes on Informatics, Mobile Internet Workshop, Informatik 2002, Dortmund, Germany, October 2002.
    [5]
    S. Buchegger, J. Le Boudec; Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks; in: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp. 403 - 410, IEEE Computer Society, 2002.
    [6]
    S. Buchegger, J. Le Boudec; Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes -- Fairness in Dynamic Ad-hoc NeTworks; in: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne Switzerland, 2002.
    [7]
    L. Buttyan and J. Hubaux; Enforcing Service Availability in Mobile Ad-Hoc WANs; in: Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networkind and Computing (MobiHOC), Boston, August 2000.
    [8]
    L. Buttyan and J. Hubaux; Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks; in: Technical Report EPFL, DSC, 2001.
    [9]
    L. Buttyan and J. Hubaux; Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks; ACM/Kluwer Mobile Networks and Applications, Vol. 8 No. 5, October 2003.
    [10]
    P. Bergamo, A. Giovanardi, A. Travasoni, D. Maniezzo, G. Mazzini, M. Zorzi; Distributed Power Control for Energy Efficient Routing in Ad Hoc Networks; Accepted for publication in WINET.
    [11]
    E. Clarke; Multipart Pricing of Public Goods; in: Public Choice 11, pp. 17--33, 1971.
    [12]
    S. Doshi, S. Bhandare, T. Brown; An On-demand minimum energy routing protocol for a wireless ad hoc network; in: ACM Mobile Computing and Communications Review, vol. 6, no. 3, July 2002.
    [13]
    S. Eidenbenz, V.S.A. Kumar, S. Zust; Equilibria in Topology Control Games for Ad Hoc Networks; in: Proceedings of DIALM-POMC'03, 2003.
    [14]
    J. Feigenbaum, Ch. Papadimitriou, R. Sami, S. Shenker; A BGP-based Mechanism for Lowest-Cost Routing; in: Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC), pp. 173--182, July 2002.
    [15]
    J. Feigenbaum, S. Shenker; Distributed Algorithmic Mechanism Design: Recent Results and Future Directions; in: Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communication (Dial-M'02), ACM Press, New York, pp. 1--13, 2002.
    [16]
    J. Green and J. Laffont; Incentives in Public Decision Making; in: Studies in Public Economies, vol. 1, North Holland, Amsterdam, pp. 65--78, 1979.
    [17]
    T. Groves; Incentives in Teams; in: Econometrica 41, pp.617--663, 1973.
    [18]
    R. Garg, V. Kumar, A. Rudra, A. Verma; Coalitional games on graphs: core structure, substitutes and frugality; Poster session ACM Conference on E-commerce 2003, pp. 248--249, June 2003.
    [19]
    M. Jakobsson, J.P. Hubaux, L. Buttyan; A micro-payment scheme encouraging collaboration in multi-hop cellular networks; In: Proceedings of Financial Crypto 2003, La Guadeloupe, January 2003.
    [20]
    S. Lindsey, K. Sivalingam, C. Raghavendra; Power Optimization in Routing Protocols for Wireless and Mobile Networks; in: Handbook of Wireless Networks and Mobile Computing, I. Stojmenovic (ed.), John, Wiley and Sons, Inc., New York, pp. 407--423, 2002.
    [21]
    S. Marti, T. Giuli, K. Lai, M. Baker; Mitigating routing misbehavior in mobile ad hoc networks; in: Proceedings of The Sixth International Conference on Mobile Computing and Networking 2000, Boston, MA, Aug. 2000.
    [22]
    A. Mas-Colell, M. Whinston, J. Green; Microeconomic Theory; Oxford University Press, New York, 1995.
    [23]
    P. Michiardi, R. Molva; Game theoretic analysis of security in mobile ad hoc networks; Research Report No. RR-02-070, Institut Eurecom, 2002.
    [24]
    P. Michiardi, R. Molva; CORE: A Collaborative Repudiation Mechanism to enforce node cooperation in Mobile Ad hoc Networks; in: Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia, 2002.
    [25]
    D. Monderer, M. Tennenholtz; Distributed Games: From Mechanisms to Protocols; in: Proceedings of the 16th National Conference on Artificial Intelligence, pp. 32--37, 1999.
    [26]
    N. Nisan, A. Ronen; Algorithmic mechanism design; in: Games and Economic Behavior 35, pp. 166--196, 2001.
    [27]
    T. Rappaport; Wireless Communications: Principles and Practice; Prentice Hall, 2002.
    [28]
    T. Roughgarden, E. Tardos; How Bad is Selfish Routing?; in: Journal of the ACM, 49(2), pp. 236--259, March 2002.
    [29]
    T. Roughgarden; How unfair is optimal routing?; in: Proceedings of the 13th annual ACM-SIAM symposium on Discrete algorithms (SODA), pp. 203--204, San Francisco, 2002.
    [30]
    J. Shneidman, D.C. Parkes, M. Seltzer; Overcoming Rational Manipulations in Distributed Mechanism Implementations; Harvard Technical Report TR-12-03, 2003.
    [31]
    V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, R.R. Rao; Energy Efficiency of Ad Hoc Wireless Networks with Selfish Users; in: European Wireless conference, EW 2002.
    [32]
    K. Talwar; The Price of Truth: Frugality in Truthful Mechanisms; in: Proceedings of the 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), pp.608--619, Berlin, 2003.
    [33]
    Y. Tseng, W. Liao, S. Wu; Mobile Ad Hoc Networks and Routing Protocols; in: Handbook of Wireless Networks and Mobile Computing, I. Stojmenovic (ed.), John, Wiley and Sons, Inc., New York, pp. 195 -- 218, 2002.
    [34]
    W. Vickrey; Counterspeculation, auctions, and competitive sealed tenders; in: Journal of Finance 16, pp. 8--37, 1961.
    [35]
    S. Zhong, Yang Richard Yang, J. Chen; Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-hoc Networks; in: Proceedings of INFOCOM 2003, pp. 1987--1997, March 2003.

    Cited By

    View all
    • (2024)Buyers Collusion in Incentivized Forwarding Networks: A Multi-Agent Reinforcement Learning StudyIEEE Transactions on Machine Learning in Communications and Networking10.1109/TMLCN.2024.33654202(240-260)Online publication date: 2024
    • (2023)Techniques and Applications of Optimal Cluster Head Selection With Trusted Multipath Routing and MANET Intrusion DetectionHandbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications10.4018/978-1-6684-6060-3.ch013(162-182)Online publication date: 3-Jan-2023
    • (2023)Truthful and Optimal Data Preservation in Base Station-less Sensor Networks: An Integrated Game Theory and Network Flow ApproachACM Transactions on Sensor Networks10.1145/360626320:1(1-40)Online publication date: 27-Jun-2023
    • Show More Cited By

    Index Terms

    1. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiCom '03: Proceedings of the 9th annual international conference on Mobile computing and networking
      September 2003
      376 pages
      ISBN:1581137532
      DOI:10.1145/938985
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 14 September 2003

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. VCG mechanism
      2. ad hoc networks
      3. energy efficiency
      4. game theory
      5. mechanism design
      6. routing
      7. selfish agents

      Qualifiers

      • Article

      Conference

      MobiCom03
      Sponsor:

      Acceptance Rates

      MobiCom '03 Paper Acceptance Rate 27 of 281 submissions, 10%;
      Overall Acceptance Rate 440 of 2,972 submissions, 15%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)27
      • Downloads (Last 6 weeks)2
      Reflects downloads up to

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Buyers Collusion in Incentivized Forwarding Networks: A Multi-Agent Reinforcement Learning StudyIEEE Transactions on Machine Learning in Communications and Networking10.1109/TMLCN.2024.33654202(240-260)Online publication date: 2024
      • (2023)Techniques and Applications of Optimal Cluster Head Selection With Trusted Multipath Routing and MANET Intrusion DetectionHandbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications10.4018/978-1-6684-6060-3.ch013(162-182)Online publication date: 3-Jan-2023
      • (2023)Truthful and Optimal Data Preservation in Base Station-less Sensor Networks: An Integrated Game Theory and Network Flow ApproachACM Transactions on Sensor Networks10.1145/360626320:1(1-40)Online publication date: 27-Jun-2023
      • (2022)Game Theory for Cooperation in Multi-Access Edge ComputingResearch Anthology on Edge Computing Protocols, Applications, and Integration10.4018/978-1-6684-5700-9.ch012(229-279)Online publication date: 1-Apr-2022
      • (2021)File Distributed for Improving Data Accessibility in Adhoc NetworksInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-2334(231-234)Online publication date: 31-Dec-2021
      • (2021)A New Cooperation Model for Dynamic NetworksInternational Journal of Business Data Communications and Networking10.4018/IJBDCN.28670417:2(1-15)Online publication date: 10-Dec-2021
      • (2021)An Efficient Selfishness Control Mechanism for Mobile Ad hoc NetworksHandbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies10.4018/978-1-7998-6870-5.ch030(432-449)Online publication date: 2021
      • (2021)cRedit-based and reputation retrieval systemThe Journal of Supercomputing10.1007/s11227-021-03675-x77:9(10184-10225)Online publication date: 1-Sep-2021
      • (2020)An approach for optimal-secure multi-path routing and intrusion detection in MANETEvolutionary Intelligence10.1007/s12065-020-00388-715:2(1313-1327)Online publication date: 26-Mar-2020
      • (2020)On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc NetworksCombating Security Challenges in the Age of Big Data10.1007/978-3-030-35642-2_5(87-104)Online publication date: 27-May-2020
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media