A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks

In wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme called RISC2WIN, whereby a trusted third party (e.g., an access point) can limit selfish behavior and preserve appropriate QoS for both stations.

[1]  E. Kalai,et al.  Rational Learning Leads to Nash Equilibrium , 1993 .

[2]  Jiming Chen,et al.  Promoting Device-to-Device Communication in Cellular Networks by Contract-based Incentive Mechanisms , 2017, IEEE Network.

[3]  Szymon Szott,et al.  Traffic Remapping Attacks in Ad Hoc Networks , 2018, IEEE Communications Magazine.

[4]  Albert Banchs,et al.  Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.

[5]  Pan Li,et al.  MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense , 2015, IEEE Transactions on Mobile Computing.

[6]  Feng Xia,et al.  A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks , 2018, IEEE Communications Surveys & Tutorials.

[7]  Daniel Camps-Mur,et al.  SOLOR: Self-Optimizing WLANs With Legacy-Compatible Opportunistic Relays , 2015, IEEE/ACM Transactions on Networking.

[8]  Kok-Lim Alvin Yau,et al.  QoS in IEEE 802.11-based wireless networks: A contemporary review , 2014, J. Netw. Comput. Appl..

[9]  Daniël Wedema Games And Information An Introduction To Game Theory 3rd Edition , 2011 .

[10]  Yiyang Pei,et al.  Dynamic Contract Design for Cooperative Wireless Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[11]  Szymon Szott Selfish insider attacks in IEEE 802.11s wireless mesh networks , 2014, IEEE Communications Magazine.

[12]  Szymon Szott,et al.  Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures , 2018, IEEE Wireless Communications Letters.

[13]  Xiaoying Gan,et al.  A Contract-Based Incentive Mechanism for Delayed Traffic Offloading in Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[14]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.