Filters








814 Hits in 5.4 sec

Game Theoretic Approaches in Vehicular Networks: A Survey [article]

Zemin Sun, Yanheng Liu, Jian Wang, Carie Anil, Dongpu Cao
2020 arXiv   pre-print
Game theory, a theoretical framework designed for strategic interactions among rational decision-makers who faced with scarce resources, can be used to model and analyze individual or group behaviors of  ...  Intelligent nodes in VNs can compete or cooperate for limited network resources so that either an individual or group objectives can be achieved.  ...  The offloading decisions are made by a game-theoretic approach.  ... 
arXiv:2006.00992v1 fatcat:lljjlitvlvbvhbg3aot5xszefm

Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach

Tingting Chen, Liehuang Wu, Fan Wu, Sheng Zhong
2011 IEEE Transactions on Vehicular Technology  
Our approach is based on coalitional game theory.  ...  In particular, we propose an incentive scheme for VANETs and rigorously show that with our scheme, faithfully following the routing protocol is in the best interest of each node.  ...  Wu was a student at SUNY Buffalo.  ... 
doi:10.1109/tvt.2010.2093587 fatcat:ge4aril6nvbidjoscxojh66jza

A game theoretic approach to sensor data communications in an opportunistic network

Hjalmar Wennerstrom, David B. Smith
2015 2015 IEEE International Conference on Communications (ICC)  
The game theoretic design is motivated by the absence of any centralized control and focus on the nodes as individual users in the network.  ...  Secondly, the thesis address how nodes in a sensor network can be motivated to exchange data by modeling it as a game.  ...  Paper IV A Game Theoretic Approach to Sensor Data Communications in an Opportunistic Network.  ... 
doi:10.1109/icc.2015.7249329 dblp:conf/icc/WennerstromS15 fatcat:y7rzbf5yj5fm7o4lekggljd5ci

A two-stage game theoretical approach for interference mitigation in Body-to-Body Networks

Amira Meharouech, Jocelyne Elias, Ahmed Mehaoua
2016 Computer Networks  
interference mitigation problem introducing a new game theoretical approach.  ...  To this end, we propose a game theoretical approach to address the problem of Socially-aware Interference Mitigation (SIM) in BBNs, where WBANs are "social" and interact with each other.  ...  Yet, to the best of our knowledge, this paper is the first to propose a game theoretical approach for an interference-aware channel allocation in BBNs.  ... 
doi:10.1016/j.comnet.2015.12.001 fatcat:uhyliofeazauvpdybezxjex3d4

A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks

Behrouz Jedari, Feng Xia, Zhaolong Ning
2018 IEEE Communications Surveys and Tutorials  
node detection and defense systems, and (4) incentive mechanisms.  ...  In this paper, we present an in-depth survey on human-centric communication challenges and solutions in the non-cooperative WRNs that focuses on: (1) an overview of the non-cooperative WRNs and introduction  ...  The authors are grateful to the anonymous reviewers for their constructive comments and suggestions to improve the quality of the article.  ... 
doi:10.1109/comst.2018.2791428 fatcat:2v6odowj4rhx5ico7g2i4pk6ne

A Survey on Routing and Data Dissemination in Opportunistic Mobile Social Networks [article]

Behrouz Jedari, Feng Xia
2014 arXiv   pre-print
Then, a comparative review of state-of-the-art routing and data dissemination algorithms for MSNs is presented, with special attention paid to critical issues like context-awareness and user selfishness  ...  Opportunistic mobile social networks (MSNs) are modern paradigms of delay tolerant networks that consist of mobile users with social characteristics.  ...  [124] propose a game-theoretic approach based on bargaining.  ... 
arXiv:1311.0347v4 fatcat:kdyyz4ibwjfp3f4y7rougndyei

Selfishness in Vehicular Delay-Tolerant Networks: A Review

Ghani-Ur Rehman, Anwar Ghani, Shad Muhammad, Madhusudan Singh, Dhananjay Singh
2020 Sensors  
This is one of the major challenges in VDTNs and incentive mechanisms are used as a major solution. This paper presents a detailed study of the recently proposed incentive schemes for VDTNs.  ...  Furthermore, there are some selfish nodes in the network which may not cooperate to forward the messages, and are inclined to increase their own resources.  ...  Acknowledgments: The authors would like to thanks VESTELLA and COIKOSITY for supporting this work. Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/s20103000 pmid:32466315 pmcid:PMC7285504 fatcat:272xsx2l3jgjlfzw53y7wv5dmq

Survey: secure opportunistic routing protocols in wireless networks

Hanane Saidi, Addaim Adnane, Driss Gretete
2019 International Journal of Information Privacy Security and Integrity  
Opportunistic routing (OR) protocols in wireless network schemes are a rich research field.  ...  In this paper, we are going to give an analysis of OR protocols their classifications as well as an overview on the security approaches available for opportunistic routing protocols.  ...  GISSO The aim of game theoretic incentive scheme for social aware routing (GISSO) is to stimulate social selfish relays to maximise the performance of MSNs networks (Jedari et al., 2017) .  ... 
doi:10.1504/ijipsi.2019.10025219 fatcat:7nb3pirzebcv5eevyy3ehn6b7y

Green Communications and Networking

Jaime Lloret, Liang Zhou, Ford Lumban Gaol
2015 Journal on spesial topics in mobile networks and applications  
After a conscientious review process, we had an acceptance ratio of 26 %. Next we present the papers accepted as October 2015 MONET Special Issue.  ...  In this context, there is a critical need for new ways of reducing energy consumption of communication and networking systems if the current trajectory of traffic growth and supporting anywhere/anytime  ...  The fifth article, "A Game Theoretical Model for Energy-Aware DTN Routing in MANETs with Nodes' Selfishness" from Yuxin Mao, Ping Zhu, the author presented an incentive mechanism for encourage forwarding  ... 
doi:10.1007/s11036-015-0641-0 fatcat:fcdb5ms6kfgr7ixv6qhvfkybeq

Guest editorial: Special issue on crowd sensing networks

Mianxiong Dong, Fen Hou, Peng Cheng, Kyoung-Sook Kim
2016 Peer-to-Peer Networking and Applications  
routing protocol for the networks with energy-constrained nodes.  ...  Compared to existing approaches, the proposed method shows a significant improvement in the network lifetime and energy consumption.  ...  from a game-theoretic perspective.  ... 
doi:10.1007/s12083-016-0452-5 fatcat:sustwz7t5rallmb7m47metokzm

Com-BIS: A Community-Based Barter Incentive Scheme in Socially Aware Networking

Li Liu, Qiuyuan Yang, Xiangjie Kong, Hannan Bin Liaqat, Ahmedin Mohammed Ahmed, Nakema Deonauth, Feng Xia
2015 International Journal of Distributed Sensor Networks  
Socially aware networking (SAN) provides a new paradigm for intermittently connected networks which exploits social properties of mobile users to guide the design of protocols.  ...  To address the selfishness problem, barter-based incentive scheme is a fair approach in which two encounter nodes exchange the same amount of data with one another.  ...  For instance, Wu et al. [25] proposed a game-theoretic approach based on bargaining.  ... 
doi:10.1155/2015/671012 fatcat:gxdpgrtxvzg5nh35lah6nqqmkm

A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions

Muhammad Altaf Khan, Moustafa M. Nasralla, Muhammad Muneer Umar, Zeeshan Iqbal, Ghani Ur Rehman, Muhammad Shahzad Sarfraz, Nikumani Choudhury, Helena Rifà-Pous
2021 Security and Communication Networks  
Various types of routing techniques have been introduced to target different types of ad hoc networks having support for keeping misbehaving or selfish nodes.  ...  Noncooperative or selfish nodes can last for a longer time by preserving their resources for their own operations.  ...  Acknowledgments e authors acknowledge Prince Sultan University and Smart Systems Engineering Lab for their valuable support and provision of research facilities that were essential for completing this  ... 
doi:10.1155/2021/9921826 fatcat:xf7ulr6in5hkfasseht6vtgetu

Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks [article]

Jerzy Konorski, Szymon Szott
2021 arXiv   pre-print
Recognizing the need for providing QoS security, we use a novel network-oriented QoS metric to propose a self-enforcing game-theoretic mitigation approach.  ...  We analyze feasible node strategies and design a distributed signaling mechanism called DISTRESS, under which, given certain conditions, the game produces a desirable outcome: after an upper-bounded play  ...  We have proposed a systematic game-theoretic approach to TRA mitigation.  ... 
arXiv:1902.04561v5 fatcat:vjtd2btsijfxjjcksfzbzv6ewi

RELICS: In-network realization of incentives to combat selfishness in DTNs

Md Yusuf Sarwar Uddin, Brighten Godfrey, Tarek Abdelzaher
2010 The 18th IEEE International Conference on Network Protocols  
We devise a rewarding scheme that provides incentives to nodes in a physically realizable way in that the rewards are reflected into network operation.  ...  A node may be selfish in expending resources, such as energy, on forwarding messages from others, unless offered incentives.  ...  ACKNOWLEDGMENT We thank our shepherd Kevin Almeroth and anonymous reviewers for their thoughtful suggestions.  ... 
doi:10.1109/icnp.2010.5762769 dblp:conf/icnp/UddinGA10 fatcat:x5anxw7yhzbzbh3ys3eez6uwhm

Dynamics of a Localized Reputation-Based Network Protocol

George Karakostas, Raminder Kharaud, Anastasios Viglas
2013 2013 International Conference on Parallel and Distributed Computing, Applications and Technologies  
We consider a type of game theoretic dynamics in a network model where all nodes act selfishly and will forward packets only if it is to their benefit.  ...  where users have full knowledge of the network and can also decide the routing of flow originating from them.  ...  We focused on a recent game theoretic model that established the existence of equilibrium flows that are based on natural incentives for relaying as opposed to payments.  ... 
doi:10.1109/pdcat.2013.30 dblp:conf/pdcat/KarakostasKV13 fatcat:oromd22uz5buxndstxcfnrfzwe
« Previous Showing results 1 — 15 out of 814 results