iDEAL: Incentivized Dynamic Cellular Offloading via Auctions

The explosive growth of cellular traffic and its highly dynamic nature often make it increasingly expensive for a cellular service provider to provision enough cellular resources to support the peak traffic demands. In this paper, we propose iDEAL, a novel auction-based incentive framework that allows a cellular service provider to leverage resources from third-party resource owners on demand by buying capacity whenever needed through reverse auctions. iDEAL has several distinctive features: 1) iDEAL explicitly accounts for the diverse spatial coverage of different resources and can effectively foster competition among third-party resource owners in different regions, resulting in significant savings to the cellular service provider. 2) iDEAL provides revenue incentives for third-party resource owners to participate in the reverse auction and be truthful in the bidding process. 3) iDEAL is provably efficient. 4) iDEAL effectively guards against collusion. 5) iDEAL effectively copes with the dynamic nature of traffic demands. In addition, iDEAL has useful extensions that address important practical issues. Extensive evaluation based on real traces from a large US cellular service provider clearly demonstrates the effectiveness of our approach. We further demonstrate the feasibility of iDEAL using a prototype implementation.

[1]  Bo Han,et al.  Cellular Traffic Offloading through WiFi Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[2]  Vijay Krishna,et al.  Efficient Mechanism Design , 1998 .

[3]  Françoise Forges,et al.  Core-Stable Rings in Auctions with Independent Private Values , 2010, Games Econ. Behav..

[4]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[5]  Guohong Cao,et al.  Win-Coupon: An incentive framework for 3G traffic offloading , 2011, 2011 19th IEEE International Conference on Network Protocols.

[6]  Kyunghan Lee,et al.  Mobile Data Offloading: How Much Can WiFi Deliver? , 2013, IEEE/ACM Transactions on Networking.

[7]  Mikkel Thorup,et al.  Traffic engineering with estimated traffic matrices , 2003, IMC '03.

[8]  Sung-Jea Ko,et al.  Selective Channel Scanning for Fast Handoff in Wireless LAN Using Neighbor Graph , 2004, PWC.

[9]  Tzi-cker Chiueh,et al.  Omnicon:a mobile ip-based vertical handoff system for wireless LAN and GPRS links , 2004, Workshops on Mobile and Wireless Networking/High Performance Scientific, Engineering Computing/Network Design and Architecture/Optical Networks Control and Management/Ad Hoc and Sensor Networks/Compil.

[10]  Jean-Marie Bonnin,et al.  Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks , 2005, WMuNeP '05.

[11]  Arun Venkataramani,et al.  Augmenting mobile 3G using WiFi , 2010, MobiSys '10.

[12]  Peter Cramton,et al.  Competitive bidding behavior in uniform-price auction markets , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[13]  Tzi-cker Chiueh,et al.  OmniCon: a Mobile IP‐based vertical handoff system for wireless LAN and GPRS links , 2007, Softw. Pract. Exp..

[14]  E. Maasland,et al.  Auction Theory , 2021, Springer Texts in Business and Economics.

[15]  A. Liu,et al.  Characterizing and modeling internet traffic dynamics of cellular devices , 2011, PERV.

[16]  Yanjiao Chen,et al.  A reverse auction framework for access permission transaction to promote hybrid access in femtocell network , 2012, 2012 Proceedings IEEE INFOCOM.

[17]  J. Bezdek Numerical taxonomy with fuzzy sets , 1974 .

[18]  Lawrence M. Ausubel,et al.  The Lovely but Lonely Vickrey Auction , 2004 .

[19]  Éva Tardos,et al.  An approximation algorithm for the generalized assignment problem , 1993, Math. Program..

[20]  Yoram Bachrach,et al.  Honor among thieves: collusion in multi-unit auctions , 2010, AAMAS.

[21]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[22]  Guohong Cao,et al.  Characterizing Data Services in a 3G Network: Usage, Mobility and Access Issues , 2011, 2011 IEEE International Conference on Communications (ICC).

[23]  Romain Kuntz,et al.  Versatile IPv6 mobility deployment with dual stack mobile IPv6 , 2008, MobiArch '08.

[24]  Seungjoon Lee,et al.  3G Meets the Internet: Understanding the performance of hierarchical routing in 3G networks , 2011, 2011 23rd International Teletraffic Congress (ITC).

[25]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[26]  Yin Zhang,et al.  On selfish routing in Internet-like environments , 2003, IEEE/ACM Transactions on Networking.

[27]  Mikkel Thorup,et al.  Traffic engineering with traditional IP routing protocols , 2002, IEEE Commun. Mag..

[28]  M. Hata,et al.  Empirical formula for propagation loss in land mobile radio services , 1980, IEEE Transactions on Vehicular Technology.

[29]  Ratul Mahajan,et al.  Wi-Fi Networks are Underutilized , 2009 .

[30]  Coldwell Daniel,et al.  What are sunk costs? , 1997 .