skip to main content
10.1145/1023720.1023745acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Truthful multicast routing in selfish wireless networks

Published:26 September 2004Publication History

ABSTRACT

In wireless networks, it is often assumed that each individual wireless terminal will faithfully follow the prescribed protocols without any deviation-- except, perhaps, for a few faulty or malicious ones. Wireless terminals, when owned by individual users, will likely do what is the most beneficial to their owners, i.e., act "selfishly". Therefore, an algorithm or protocol intended for selfish wireless networks must be designed.In this paper, we specifically study how to conduct efficient multicast routing in selfish wireless networks. We assume that each wireless terminal or communication link will incur a cost when it transits some data. Traditionally, the VCG mechanism has been the only method to design protocols so that each selfish agent will follow the protocols for its own interest to maximize its benefit. The main contributions of this paper are two-folds. First, for each of the widely used multicast structures, we show that the VCG based mechanism does not guarantee that the selfish terminals will follow the protocol. Second, we design the first multicast protocols without using VCG mechanism such that each agent maximizes its profit when it truthfully reports its cost.Extensive simulations are conducted to study the practical performances of the proposed protocols regarding the actual network cost and total payment.

References

  1. Anderegg, L., and Eidenbenz, S. Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the 9th annual international conference on Mobile computing and networking (2003), ACM Press, pp. 245--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Archer, A., and l. Tardos. Frugal path mechanisms. In SODA (2002), pp. 991--998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J. P., and Boudec, J. Y. L. Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine 39, 6 (June 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Buttyan, L., and Hubaux, J. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 5, 8 (October 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Buttyan, L., and Hubaux, J. P. Enforcing service availability in mobile ad-hoc wans. In Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing (2000), pp. 87--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Clarke, E. H. Multipart pricing of public goods. Public Choice (1971), 17--33.Google ScholarGoogle Scholar
  7. Feigenbaum, J., Papadimitriou, C., Sami, R., and Shenker, S. A BGP-based mechanism for lowest-cost routing. In Proceedings of the 2002 ACM Symposium on Principles of Distributed Computing. (2002), pp. 173--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Feigenbaum, J., Papadimitriou, C. H., and Shenker, S. Sharing the cost of multicast transmissions. Journal of Computer and System Sciences 63, 1 (2001), 21--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Green, J., and Laffont, J. J. Characterization of satisfactory mechanisms for the revelation of preferences for public goods. Econometrica (1977), 427--438.Google ScholarGoogle Scholar
  10. Groves, T. Incentives in teams. Econometrica (1973), 617--631.Google ScholarGoogle Scholar
  11. Guha, S., and Khuller, S. Improved methods for approximating node weighted steiner trees and connected dominating sets. In Foundations of Software Technology and Theoretical Computer Science (1998), pp. 54--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jakobsson, M., Hubaux, J.-P., and Buttyan, L. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of Financial Cryptography (2003).Google ScholarGoogle ScholarCross RefCross Ref
  13. Klein, P., and Ravi, R. A nearly best-possible approximation algorithm for node-weighted steiner trees. Tech. Rep. CS-92-54, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Marti, S., Giuli, T. J., Lai, K., and Baker, M. Mitigating routing misbe-havior in mobile ad hoc networks. In Proc. of MobiCom (2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Nisan, N., and Ronen, A. Algorithmic mechanism design. In Proc. 31st Annual Symposium on Theory of Computing (STOC99) (1999), pp. 129--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Nisan, N., and Ronen, A. Computationally feasible VCG mechanisms. In ACM Conference on Electronic Commerce (2000), pp. 242--252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Robins, G., and Zelikovsky, A. Improved steiner tree approximation in graphs. In Symposium on Discrete Algorithms (2000), pp. 770--779. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Srinivasan, V., Nuggehalli, P., Chiasserini, C. F., and Rao, R. R. Energy efficiency of ad hoc wireless networks with selfish users. In European Wireless Conference 2002 (EW2002) (2002).Google ScholarGoogle Scholar
  19. Srinivasan, V., Nuggehalli, P., Chiasserini, C. F., and Rao, R. R. Cooperation in wireless ad hoc wireless networks. In IEEE Infocom (2003).Google ScholarGoogle Scholar
  20. Takahashi, H., and Matsuyama, A. An approximate solution for the steiner problem in graphs. Math .Jap. 24 (1980), 573--577.Google ScholarGoogle Scholar
  21. Vickrey, W. Counterspeculation, auctions and competitive sealed tenders. Journal of Finance (1961), 8--37.Google ScholarGoogle ScholarCross RefCross Ref
  22. Wang, W., and Li, X.-Y. Truthful low-cost unicast in selfish wireless networks. In 4th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN) of IPDPS 2004 (2004).Google ScholarGoogle Scholar
  23. Wang, W., Li, X.-Y., and Sun, Z. Design multicast protocols for non-cooperative networks, 2004. Submitted for publication.Google ScholarGoogle Scholar
  24. Zhong, S., Li, L., Liu, Y., and Yang, Y. R. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks --- an integrated approach using game theoretical and cryptographic techniques. Tech. Rep. YALEU/DCS/TR-1286, Yale University, Computer Science Department, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Truthful multicast routing in selfish wireless networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking
            September 2004
            384 pages
            ISBN:1581138687
            DOI:10.1145/1023720

            Copyright © 2004 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 26 September 2004

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate440of2,972submissions,15%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader