Hidden information and actions in multi-hop wireless ad hoc networks

For multi-hop ad hoc networks formed by individually owned nodes, the endpoints can only observe whether or not the end-to-end transaction was successful or not, but not the individual actions of intermediate nodes. Consequently, in the absence of properly designed incentive schemes, rational (i.e., selfish) intermediate nodes may choose to forward data packets at a very low priority or simply drop the packets at all, and it could put the blame on the unreliable wireless channel. Using a principal-agent model, we propose several efficient methods that can eliminate the hidden actions under hidden information in multi-hop wireless networks with high probability. We design several algorithmic mechanisms for a number of routing scenarios such that each selfish agent will maximize its utility (i.e., profit) when it truthfully declares its type (i.e., cost and its actions) and it truthfully follows its declared actions. Our simulations show that the payment by our mechanisms is only slightly larger than the actual cost incurred by all intermediate nodes.

[1]  Éva Tardos,et al.  Frugal path mechanisms , 2002, SODA '02.

[2]  Markus Jakobsson,et al.  A charging and rewarding scheme for packet forwarding in multi-hop cellular networks , 2003, MobiHoc '03.

[3]  Zygmunt J. Haas,et al.  Virtual backbone generation and maintenance in ad hoc network mobility management , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[4]  Archan Misra,et al.  Minimum energy reliable paths using unreliable wireless links , 2005, MobiHoc '05.

[5]  Joan Feigenbaum,et al.  A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.

[6]  Scott Shenker,et al.  Hidden-action in multi-hop routing , 2005, EC '05.

[7]  Noam Nisan,et al.  Algorithmic mechanism design (extended abstract) , 1999, STOC '99.

[8]  Kunal Talwar,et al.  The Price of Truth: Frugality in Truthful Mechanisms , 2003, STACS.

[9]  Ariel Orda,et al.  Virtual path bandwidth allocation in multiuser networks , 1997, TNET.

[10]  Aravind Srinivasan,et al.  Algorithmic aspects of capacity in wireless networks , 2005, SIGMETRICS '05.

[11]  Lili Qiu,et al.  Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.

[12]  Archan Misra,et al.  Minimum energy paths for reliable communication in multi-hop wireless networks , 2002, MobiHoc '02.

[13]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[14]  E. H. Clarke Multipart pricing of public goods , 1971 .

[15]  Nicole Immorlica,et al.  First-price path auctions , 2005, EC '05.

[16]  Carla-Fabiana Chiasserini,et al.  Energy Efficiency of Ad Hoc Wireless Networks with Selfish Users , 2002 .

[17]  Ariel Orda,et al.  Incentive pricing in multi-class communication networks , 1997, Proceedings of INFOCOM '97.

[18]  Xiang-Yang Li,et al.  Nash Equilibria and Dominant Strategies in Routing , 2005, WINE.

[19]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[20]  Ariel Orda,et al.  Competitive routing in multiuser communication networks , 1993, TNET.

[21]  Theodore Groves,et al.  Incentives in Teams , 1973 .

[22]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[23]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[24]  Markus Jakobsson,et al.  A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.

[25]  Subhash Suri,et al.  Vickrey prices and shortest paths: what is an edge worth? , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[26]  Xiang-Yang Li,et al.  Low-cost routing in selfish and rational wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[27]  Yu Wang,et al.  Truthful Multicast in Selfish Wireless Networks , 2004 .

[28]  Peng-Jun Wan,et al.  Probabilistic aspects of wireless ad hoc networks , 2005 .

[29]  Vaduvur Bharghavan,et al.  CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..

[30]  Anna R. Karlin,et al.  Beyond VCG: frugality of truthful mechanisms , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[31]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.

[32]  Xiang-Yang Li,et al.  Truthful multicast routing in selfish wireless networks , 2004, MobiCom '04.

[33]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[34]  Sheng Zhong,et al.  On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques , 2005, MobiCom '05.

[35]  Sheng Zhong,et al.  On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks , 2006, Wirel. Networks.

[36]  Randeep Bhatia,et al.  Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks , 2008, Encyclopedia of Algorithms.

[37]  Noam Nisan,et al.  Algorithmic Mechanism Design , 2001, Games Econ. Behav..

[38]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[39]  Subhash Suri,et al.  Vickrey Pricing in Network Routing: Fast Payment Computation , 2007 .

[40]  Murali S. Kodialam,et al.  Characterizing achievable rates in multi-hop wireless networks: the joint routing and scheduling problem , 2003, MobiCom '03.

[41]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[42]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[43]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[44]  Gruia Calinescu,et al.  Bounding the payment of approximate truthful mechanisms , 2004, Theor. Comput. Sci..

[45]  Yin Zhang,et al.  On selfish routing in internet-like environments , 2006, TNET.

[46]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[47]  Levente Buttyán,et al.  Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case , 2003, PWC.