Minimizing Queue Length Regret Under Adversarial Network Models

Stochastic models have been dominant in network optimization theory for over two decades, due to their analytical tractability. However, these models fail to capture non-stationary or even adversarial network dynamics which are of increasing importance for modeling the behavior of networks under malicious attacks or characterizing short-term transient behavior. In this paper, we focus on minimizing queue length regret under adversarial network models, which measures the finite-time queue length difference between a causal policy and an "oracle" that knows the future. Two adversarial network models are developed to characterize the adversary's behavior. We provide lower bounds on queue length regret under these adversary models and analyze the performance of two control policies (i.e., the MaxWeight policy and the Tracking Algorithm). We further characterize the stability region under adversarial network models, and show that both the MaxWeight policy and the Tracking Algorithm are throughput-optimal even in adversarial settings.

[1]  Kyomin Jung,et al.  Stability of the Max-Weight protocol in adversarial wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[2]  Kyomin Jung,et al.  Stability of the max-weight routing and scheduling protocol in dynamic networks and at critical loads , 2007, STOC '07.

[3]  Rene L. Cruz,et al.  A calculus for network delay, Part I: Network elements in isolation , 1991, IEEE Trans. Inf. Theory.

[4]  Michael J. Neely,et al.  Universal scheduling for networks with arbitrary traffic, channels, and mobility , 2010, 49th IEEE Conference on Decision and Control (CDC).

[5]  Nick McKeown,et al.  A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch , 1999 .

[6]  Baruch Awerbuch,et al.  Universal-stability results and performance bounds for greedy contention-resolution protocols , 2001, JACM.

[7]  Vicent Cholvi,et al.  Stability of FIFO networks under adversarial models: State of the art , 2007, Comput. Networks.

[8]  Qingkai Liang,et al.  Minimizing Queue Length Regret Under Adversarial Network Models , 2018, Proc. ACM Meas. Anal. Comput. Syst..

[9]  Leandros Tassiulas,et al.  Sustainability of Service Provisioning Systems Under Stealth DoS Attacks , 2017, IEEE Transactions on Control of Network Systems.

[10]  Sanjay Shakkottai,et al.  Regret of Queueing Bandits , 2016, NIPS.

[11]  Leandros Tassiulas,et al.  Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks , 1992 .

[12]  Allan Borodin,et al.  Adversarial queuing theory , 2001, JACM.

[13]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[14]  Hao Yu,et al.  Online Convex Optimization with Time-Varying Constraints , 2017, 1702.04783.

[15]  Lisa Zhang,et al.  Scheduling over a time-varying user-dependent channel with applications to high-speed wireless data , 2005, JACM.