Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents

We introduce a game-theoretic setting for routing in a mobile ad hoc network that consists of greedy, selfish agents who accept payments for forwarding data for other agents if the payments cover their individual costs incurred by forwarding data. In this setting, we propose Ad hoc-VCG, a reactive routing protocol that achieves the design objectives of truthfulness (i.e., it is in the agents' best interest to reveal their true costs for forwarding data) and cost-efficiency (i.e., it guarantees that routing is done along the most cost-efficient path) in a game-theoretic sense by paying to the intermediate nodes a premium over their actual costs for forwarding data packets. We show that the total overpayment (i.e., the sum of all premiums paid) is relatively small by giving a theoretical upper bound and by providing experimental evidence. Our routing protocol implements a variation of the well-known mechanism by Vickrey, Clarke, and Groves in a mobile network setting. Finally, we analyze a very natural routing protocol that is an adaptation of the Packet Purse Model [8] with auctions in our setting and show that, unfortunately, it does not achieve cost-efficiency or truthfulness.

[1]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  Éva Tardos,et al.  Frugal path mechanisms , 2002, SODA '02.

[3]  Vijay Kumar,et al.  Coalitional games on graphs: core structure, substitutes and frugality , 2003, EC '03.

[4]  Krishna M. Sivalingam,et al.  Power optimization in routing protocols for wireless and mobile networks , 2002 .

[5]  Stephan Eidenbenz,et al.  Equilibria in Topology Control Games for Ad Hoc Networks , 2003, DIALM-POMC '03.

[6]  Tim Roughgarden,et al.  How unfair is optimal routing? , 2002, SODA '02.

[7]  Srinivasan Seshan,et al.  Selfish behavior and stability of the internet:: a game-theoretic analysis of TCP , 2002, SIGCOMM '02.

[8]  Yu-Chee Tseng,et al.  Mobile ad hoc networks and routing protocols , 2002 .

[9]  Pietro Michiardi,et al.  Game theoretic analysis of security in mobile ad hoc networks , 2002 .

[10]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[11]  E. H. Clarke Multipart pricing of public goods , 1971 .

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[13]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[14]  Moshe Tennenholtz,et al.  Distributed Games: From Mechanisms to Protocols , 1999, AAAI/IAAI.

[15]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[16]  A. Mas-Colell,et al.  Microeconomic Theory , 1995 .

[17]  Joan Feigenbaum,et al.  Distributed algorithmic mechanism design: recent results and future directions , 2002, DIALM '02.

[18]  Theodore Groves,et al.  Incentives in Teams , 1973 .

[19]  Timothy X. Brown,et al.  An on-demand minimum energy routing protocol for a wireless ad hoc network , 2002, MOCO.

[20]  Jerry R. Green,et al.  Incentives in public decision-making , 1979 .

[21]  Markus Jakobsson,et al.  A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.

[22]  Sonja Buchegger,et al.  Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness , 2002, GI Jahrestagung.

[23]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[24]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[25]  Kunal Talwar,et al.  The Price of Truth: Frugality in Truthful Mechanisms , 2003, STACS.

[26]  Carla-Fabiana Chiasserini,et al.  Energy Efficiency of Ad Hoc Wireless Networks with Selfish Users , 2002 .

[27]  Tim Roughgarden,et al.  How bad is selfish routing? , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[28]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[29]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[30]  Michele Zorzi,et al.  Distributed Power Control for Energy Efficient Routing in Ad Hoc Networks , 2004, Wirel. Networks.

[31]  Joan Feigenbaum,et al.  A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.

[32]  Margo I. Seltzer,et al.  Overcoming Rational Manipulation in Distributed Mechanism Implementations , 2003 .

[33]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[34]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.