• 제목/요약/키워드: selfish users

검색결과 17건 처리시간 0.021초

Resource Allocation for Cooperative Relay based Wireless D2D Networks with Selfish Users

  • Niu, Jinxin;Guo, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권6호
    • /
    • pp.1996-2013
    • /
    • 2015
  • This paper considers a scenario that more D2D users exist in the cell, they compete for cellular resources to increase their own data rates, which may cause transmission interference to cellular users (CU) and the unfairness of resource allocation. We design a resource allocation scheme for selfish D2D users assisted by cooperative relay technique which is used to further enhance the users' transmission rates, meanwhile guarantee the QoS requirement of the CUs. Two transmission modes are considered for D2D users: direct transmission mode and cooperative relay transmission mode, both of which reuses the cellular uplink frequency resources. To ensure the fairness of resource distribution, Nash bargaining theory is used to determine the transmission mode and solve the bandwidth allocation problem for D2D users choosing cooperative relay transmission mode, and coalition formation game theory is used to solve the uplink frequency sharing problem between D2D users and CUs through a new defined "Selfish order". Through theoretical analysis, we obtain the closed Nash bargaining solution under CUs' rate constraints, and prove the stability of the formatted coalition. Simulation results show that the proposed resource allocation approach achieves better performance on resource allocation fairness, with only little sacrifice on the system sum rates.

Game-Theoretic Analysis of Selfish Secondary Users in Cognitive Radio Networks

  • Kahsay, Halefom;Jembre, Yalew Zelalem;Choi, Young-June
    • Journal of Communications and Networks
    • /
    • 제17권4호
    • /
    • pp.440-448
    • /
    • 2015
  • In this paper, we study the problem of selfish behavior of secondary users (SUs) based on cognitive radio (CR) with the presence of primary users (PUs). SUs are assumed to contend on a channel using the carrier sense multiple access with collision avoidance (CSMA/CA) and PUs do not consider transmission of SUs, where CSMA/CA protocols rely on the random deference of packets. SUs are vulnerable to selfish attacks by which selfish users could pick short random deference to obtain a larger share of the available bandwidth at the expense of other SUs. In this paper, game theory is used to study the systematic cheating of SUs in the presence of PUs in multichannel CR networks. We study two cases: A single cheater and multiple cheaters acting without any restraint. We identify the Pareto-optimal point of operation of a network with multiple cheaters and also derive the Nash equilibrium of the network. We use cooperative game theory to drive the Pareto optimality of selfish SUs without interfering with the activity of PUs. We show the influence of the activity of PUs in the equilibrium of the whole network.

Stability of Slotted Aloha with Selfish Users under Delay Constraint

  • Chin, Chang-Ho;Kim, Jeong-Geun;Lee, Deok-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권3호
    • /
    • pp.542-559
    • /
    • 2011
  • Most game-theoretic works of Aloha have emphasized investigating Nash equilibria according to the system state represented by the number of network users and their decisions. In contrast, we focus on the possible change of nodes' utility state represented by delay constraint and decreasing utility over time. These foregone changes of nodes' state are more likely to instigate selfish behaviors in networking environments. For such environment, in this paper, we propose a repeated Bayesian slotted Aloha game model to analyze the selfish behavior of impatient users. We prove the existence of Nash equilibrium mathematically and empirically. The proposed model enables any type of transmission probability sequence to achieve Nash equilibrium without degrading its optimal throughput. Those Nash equilibria can be used as a solution concept to thwart the selfish behaviors of nodes and ensure the system stability.

Estimating the Price of Anarchy Using Load Balancing Measure

  • Kim, Jae-Hoon
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.148-151
    • /
    • 2009
  • We consider the problem of optimizing the performance of a system with resources shared by non-cooperative users. The worst-cast ratio between the cost of a Nash equilibrium and the optimal cost, called Price of Anarchy, is investigated. It measures the performance degradation due to the users' selfish behavior. As the objective function of the optimization problem, we are concerned in a load balancing measure, which is different from that used in the previous works. Also we consider the Stackelberg scheduling which can assign a fraction of the users to resources while the remaining users are free to act in a selfish manner.

속도 함수를 가지는 기계들에 이기적 에이전트 스케줄링 (Scheduling Selfish Agents on Machines with Speed Functions)

  • 김재훈
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제35권9_10호
    • /
    • pp.417-420
    • /
    • 2008
  • 우리는 이기적이고 비협조적인 사용자들이 이용하는 시스템의 성능을 최적화하는 문제를 다룬다. 사용자들이 요구하는 작업들은 각각의 속도함수를 가지고 있는 기계들에 스케줄 된다. 여기서 속도함수는 기계에 할당된 작업량에 반비례한다. 시스템의 성능은 기계들이 할당된 작업들의 수행을 끝내는 완료시간의 최대 값으로 평가한다. 이기적인 사용자들은 자신의 작업이 수행될 기계를 고를 수 있고 현재 가장 빠른 기계를 고른다. 그러나 이러한 스케줄은 시스템의 성능을 최적화하지 못한다. 사용자들의 이기적인 행동으로 발생되는 시스템의 성능 저하를 측정하는 기준으로서 Price of Anarchy(PoA)가 소개되었다. 이것은 내쉬 평형의 비용과 최적의 비용의 비율로 정의된다. 이 논문에서 우리는 위 스케줄링 문제에 대한 PoA를 평가한다.

Social Incentives for Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks

  • Feng, Jingyu;Lu, Guangyue;Min, Xiangcen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권2호
    • /
    • pp.355-370
    • /
    • 2014
  • Cooperative spectrum sensing has been considered as a promising approach to improve the sensing performance in distributed cognitive radio networks. However, there may exist some selfish secondary users (SUs) who are unwilling to cooperate. The presence of selfish SUs could cause catastrophic damage to the performance of cooperative spectrum sensing. Following the social perspective, we propose a Social Tie-based Incentive Scheme (STIS) to deal with the selfish problem for cooperative spectrum sensing in distributed cognitive radio networks. This scheme inspires SUs to contribute sensing information for the SUs who have social tie but not others, and such willingness varies with the strength of social tie value. The evaluation of each SU's social tie derives from its contribution for others. Finally, simulation results validate the effectiveness of the proposed scheme.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

OFDMA 기반 CR 네트워크에서 효율적인 부반송파 할당을 통한 시스템 용량 극대화 방안 (Throughput Maximization by Efficient Subcarrier Allocation in an OFDMA-based CR Network)

  • 박재현;유정민;김덕경
    • 한국통신학회논문지
    • /
    • 제36권2A호
    • /
    • pp.179-187
    • /
    • 2011
  • 최근 주파수 지원의 효율적 사용에 대한 관심이 높아짐에 따라 Cognitive Radio가 활발히 연구되고 있다. 기존에는 Cognitive Radio의 이기적 공생방식과 비이기적 공생방식을 이용하여 시스템 용량을 향상하는 방안이 제안되었다. 이에 본 연구에서는 OFDMA 기반의 CR 네트워크에서 효율적인 부반송파 할당을 통한 시스템 용량 극대화를 제안한다. 또한 하나의 Primary 사용자가 존재하는 네트워크를 다수의 Primary 사용자가 존재하는 네트워크로 확장하여 극대화 방안을 적용하는 방안과 그 영향을 분석한다.

D2D Power Control in the Cellular System: Non Cooperative Game Theoretic Approach

  • Oh, Changyoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권3호
    • /
    • pp.25-31
    • /
    • 2018
  • In this paper, we consider the game theoretic approach to investigate the transmit power optimization problem where D2D users share the uplink of the cellular system. Especially, we formulate the transmit power optimization problem as a non cooperative power control game. In the user wide sense, each user may try to select its transmit power level so as to maximize its utility in a selfish way. In the system wide, the transmit power levels of all users eventually converge to the unique point, called Nash Equilibrium. We first formulate the transmit power optimization problem as a non cooperative power control game. Next, we examine the existence of Nash Equilibrium. Finally, we present the numerical example that shows the convergence to the unique transmit power level.

Non-Cooperative Game Joint Hidden Markov Model for Spectrum Allocation in Cognitive Radio Networks

  • Jiao, Yan
    • International journal of advanced smart convergence
    • /
    • 제7권1호
    • /
    • pp.15-23
    • /
    • 2018
  • Spectrum allocation is a key operation in cognitive radio networks (CRNs), where secondary users (SUs) are usually selfish - to achieve itself utility maximization. In view of this context, much prior lit literature proposed spectrum allocation base on non-cooperative game models. However, the most of them proposed non-cooperative game models based on complete information of CRNs. In practical, primary users (PUs) in a dynamic wireless environment with noise uncertainty, shadowing, and fading is difficult to attain a complete information about them. In this paper, we propose a non-cooperative game joint hidden markov model scheme for spectrum allocation in CRNs. Firstly, we propose a new hidden markov model for SUs to predict the sensing results of competitors. Then, we introduce the proposed hidden markov model into the non-cooperative game. That is, it predicts the sensing results of competitors before the non-cooperative game. The simulation results show that the proposed scheme improves the energy efficiency of networks and utilization of SUs.