Dishonest reporting in queue-based cross-layer network optimization

Queue-based cross-layer optimization algorithms have recently been a subject of intensive research in wireless networks. Their purpose is to guarantee stable operation and to achieve some form of fairness among users, whenever the traffic demand exceeds network capacity. Despite the plethora of work in this field, the scenario where one or more nodes declare false queue backlog values in order to gain throughput advantage remains unexplored. In this paper we examine this type of selfish misbehavior, concentrating on a specific class of algorithms, the so-called quadratic Lyapunov-function-based algorithms (QLA). In particular, the effect of backlog misreporting on a single-hop access network with contending stations is evaluated through simulations. A simple framework for the detection of misbehaving nodes is proposed, under the assumption that the access-point is aware of the utility functions of the stations. The detection approach exploits the fact that under QLA the throughput of a node must be approximately equal to an “expected” value, derived from the reported queue backlogs.

[1]  E. H. Clarke Multipart pricing of public goods , 1971 .

[2]  Nitin H. Vaidya,et al.  Selfish misbehavior in scheduling algorithms of wireless networks , 2010, International Performance Computing and Communications Conference.

[3]  Leandros Tassiulas,et al.  Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks , 1990, 29th IEEE Conference on Decision and Control.

[4]  Theodore Groves,et al.  Incentives in Teams , 1973 .

[5]  Eytan Modiano,et al.  Fairness and Optimal Stochastic Control for Heterogeneous Networks , 2005, IEEE/ACM Transactions on Networking.

[6]  John N. Tsitsiklis,et al.  Efficiency loss in a network resource allocation game: the case of elastic supply , 2005, IEEE Trans. Autom. Control..

[7]  Frank Kelly,et al.  Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..

[8]  John S. Baras,et al.  A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.

[9]  Ralf Steinmetz,et al.  Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[10]  Longbo Huang,et al.  Delay reduction via Lagrange multipliers in stochastic network optimization , 2011, IEEE Trans. Autom. Control..

[11]  Leandros Tassiulas,et al.  Dynamic server allocation to parallel queues with randomly varying connectivity , 1993, IEEE Trans. Inf. Theory.

[12]  Leandros Tassiulas,et al.  Resource Allocation and Cross-Layer Control in Wireless Networks , 2006, Found. Trends Netw..

[13]  ModianoEytan,et al.  Fairness and optimal stochastic control for heterogeneous networks , 2008 .

[14]  Leandros Tassiulas,et al.  Resource Allocation and Cross Layer Control in Wireless Networks (Foundations and Trends in Networking, V. 1, No. 1) , 2006 .