Responsive image
博碩士論文 etd-0112114-221249 詳細資訊
Title page for etd-0112114-221249
論文名稱
Title
以賽局理論設計無線多跳網路激勵機制
Incentive Mechanism Using Game Theory for Wireless Multi-hop Networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
127
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2014-01-27
繳交日期
Date of Submission
2014-02-14
關鍵字
Keywords
無線多跳網路、賽局理論、進化賽局理論、鹿兔賽局、機制設計
Wireless multi-hop network, Game Theory, Evolutionary Game Theory, Stag Hunt game, Mechanism Design
統計
Statistics
本論文已被瀏覽 5644 次,被下載 1566
The thesis/dissertation has been browsed 5644 times, has been downloaded 1566 times.
中文摘要
無線多跳網路技術包含Wireless Mesh Networks, Mobile Adhoc Networks, Wireless Sensor Networks等,可以應用在軍事、救難或商用等方面。由於具有低成本,架設容易的特性,近來年吸引了眾多研究者的關注。在無線多跳網路中,需要其他節點協助轉傳封包,才能成功到達目的點。因此節點間的合作是一項很重要的要求。為了促使節點間的合作,本論文根據賽局理論提出了兩個機制。第一個是激勵機制,我們設計了一個獲利矩陣(payoff matrix)的利益分配方法。有別於傳統研究使用囚徒困境的模式,我們則使用更接近實務的鹿兔賽局的模式。我們的方法可使協助轉傳封包越多的節點,獲得越多的利益,也利用了補償閒置時間(idle time)的方法,讓邊界的節點也能獲得合理的收入,以保障邊界節點的存在。由於鹿兔賽局有全部合作及全部不合作兩個均衡點,因此我們提出一個互動策略,稱為適應性的合作者(Adaptive-Cooperator),來促使節點趨向全部合作。這個策略是一個主動的合作者,但是也會針對不合作的節點進行反制及懲罰,使不合作節點無法經由搭便車(free-rider)獲得利益。接著我們以賽局及進化賽局理論來分析這兩個方法的正確性及優越性,並經由模擬的結果,證明我們提出的方法是有效的。把我們的方法應用到無線多跳網路上,將使所有無線節點採取合作策略,且獲得公平及合理利潤,提升無線多跳網路的應用。
Abstract
Due to the low cost, easy deployment, wireless multi-hop networks have attracted many researchers’ attention in recent years. In wireless multi-hop network, the nodes are willing to forward packets for other nodes, so as to packets can successfully reach the destination. Therefore, cooperation between nodes is a critical factor in multi-hop networks. In order to encourage nodes to cooperate in networks, two approaches that refer to game theory are proposed. The first approach is incentive mechanism for packet forwarding. We design a Stag Hunt payoff matrix that is different to traditional Prisoner’s Dilemma model. Our model stimulates nodes to forward more packets to get more profits. It also compensates idle time to increase boarder nodes’ gains to guarantees the existence of boarder nodes. The second approach is an interactive strategy, which is called as Adaptive-Cooperator to refine the two equilibrium points of the Stag Hunt game. This strategy is an active cooperator; however, it may as well punish uncooperative nodes, making them impossible to obtain gains by free-rider. Then, we make some analyses by game and evolutionary game theory to deduct the correctness of our approach. According to the simulation result, the approaches we proposed are proved effective. To apply our model to wireless multi-hop network, all nodes can tend to cooperate and get fair treatment.
目次 Table of Contents
Chapter 1 Introduction 1
1.1 The application of wireless multi-hop networks 2
1.2 Motivation 7
1.3 Research objective 14
1.4 Contribution and organization 15
Chapter 2 Related work 17
2.1 The schemes for enforcing cooperation 17
2.1.1 Reputation-based Scheme 17
2.1.2 Credit- exchange-based Scheme 22
2.1.3 Game theory-based Scheme 25
2.2 Introduction to game theory 29
2.2.1 History of game theory 30
2.2.2 Overview of game theory 33
2.2.3 Nash equilibrium 36
2.2.4 Prisoner’s Dilemma 38
2.2.5 One-stage packet forwarding game 40
2.2.6 Repeated game 42
2.2.7 Strategies Descriptions 43
2.2.8 Cooperative game 50
2.2.9 Evolutionary Game Theory (EGT) 52
Chapter 3 Incentive mechanism using game theory 55
3.1 Problems of the existing solution 55
3.2 Incentive-based Approach for multi-hop wireless networks 59
3.2.1 System model 60
3.2.2 Design concept 61
3.2.3 Game model 63
3.2.4 Incentive mechanism for packet forwarding 64
3.2.5 Interacting strategy 67
3.2.6 Strategy Discussion 71
3.3 Investigate our model with game theory 74
3.3.1 One-stage game and repeated game for our model 74
3.3.2 Why use evolutionary game theory 76
3.3.3 Use ESS to analyze our model 78
3.3.4 Use replicator dynamics to analyze our model 81
Chapter 4 Simulation and discussion 86
4.1 Strategy simulation 86
4.2 Numerical evaluation 94
4.3 Discussion 101
Chapter 5 Conclusion 104
Appendix A Estate distribution from Talmud 106
References 109
參考文獻 References
[11] M. Mahmoud and X. Shen, "Stimulating Cooperation in Multi-Hop Wireless Networks Using Cheating Detection System," in Proc. IEEE INFOCOM, pp. 776-785, 2009.
[12] Charles Kamhoua, Niki Pissinou, "Mitigating Selfish Misbehavior in Autonomous Wireless Multi-hop Networks Using Stochastic Game Theory," in Proceedings of the 35th Annual IEEE Conference on Local Computer Networks (LCN 2010), pp. 236-239, Oct. 2010.
[13] P. Michiardi, R. Molva, "Simulation-based Analysis of Security Exposure,” in Mobile Ad-hoc Networks," in Proc. of European Wireless Conference, 2002.
[14] Diman Zad Tootaghaj, Farshid Farhat, Mohammad-Reza Pakravan, Mohammad-Reza Aref, “Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks,” Consumer Communications and Networking Conference (CCNC) IEEE, pp. 163-165, 2011.
[15] Jeng-Farn Lee and Wen-Hsing Kuo, “Fairness Provisioning in Multi-hop Wireless Backhaul Networks: Challenges and Solutions,” Computer Communications, 2010.
[16] WK Lai, ML Weng, YH Lin, “Improving MANET performance by a hop-aware and energy-based buffer management scheme,” Wireless Communications and Mobile Computing (To appear).
[17]Lakshmi Santhanam, Bin Xie, and Dharma P. Agrawal, “Selfishness in mesh networks: wired multihop MANETs,” IEEE Wireless Communications, vol: 15 Issue: 4, pp.16-23, Aug. 2008.
[18] Charles Kamhoua, N. Pissinou, J. Miller, S. K. Makki, "Mitigating Selfish Misbehavior in Autonomous Wireless Multi-hop Network Using Evolutionary Game Theory," in Proceedings of IEEE Globecom, 2010.
[19]Wei Kuang Lai, Mu-Lung Weng, Yuh-Chung Lin,and Chin-Shiuh Shieh, "An incentive mechanism using game theory for wireless mesh networks," Applied Mechanics and Materials, vol. 284-287, pp. 2694-2698, Jan. 2013.
[20] S. Marti et al., “Mitigating Router Misbehavior in Mobile MANETs,” in Proc. Mobi-Com, 2000.
[21] RFC 4728, “The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4”.
[22] Younghwan Yoo and Dharma P. Agrawal, “Why does it pays to be selfish in MANETs?,” IEEE Wireless Communications Magazine, vol. 13, no. 6, pp 87-97, Dec. 2006.
[23] S. Buchegger and J.-Y. Le Boudec., “Performance Analysis of the CONFIDANT
Protocol,” in Proceedings of MobiHoc 2002, Jun. 2002.
[24] Ross Anderson and Frank Stajano,”The resurrecting duckling. Lecture Notes in Computer Science,” Springer-Verlag, 1999.
[25] P. Zimmerman, “PGP user's guide,” PGP, 1993.
[26] P. Michiardi, R. Molva, “CORE: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks,” Communication and Multimedia Security, Sep. 2002.
[27] C. A. Kamhoua, N. Pissinou, S. K. Makki, “Game Theoretic Analysis of Cooperation in Autonomous Multi-hop Networks: The Consequences of Unequal Traffic Load,” in Proceedings of IEEE Globecom 2010. Miami, Florida, USA. Dec. 2010.
[28] S. Bansal, and M. Baker, “Observation-Based Cooperation Enforcement in Ad-Hoc Networks,” Technical Report, Computer Science Department, Stanford University, Jul. 2003.
[29] J. J. Jaramillo and R. Srikant, “DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad-Hoc Networks,” in Proc. 13th MobiCom ‘07, 2007.
[30] R. Boyd, “Mistakes allow evolutionary stability in the repeated Prisoner’s Dilemma game,” Journal of Theoretical Biology, 136(1), pp. 47–56, Jan. 1989.
[31] L. Buttyan, J-P. Hubaux “Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks,” Technical Report DSC/2001/001, Swiss Federal Institute of Technology-Lausanne, Department of communication systems, Jan. 2001.
[32] L. Buttyán and J.-P, “Hubaux, Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications (MONET), vol. 8 no. 5, Oct. 2003.
[33] S. Zhong, J. Chen, Y. Yang “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” IEEE INFOCOM, 2003.
[34] Y. Yoo, S. Ahn, and D. P. Agrawal, “A Credit-Payment Scheme for Packet Forwarding Fairness in Mobile MANETs,” in Proc. IEEE ICC, 2005.
[35] Rekha Kaushik, Jyoti Singhai, “MODSPIRITE: A Credit Based Solution to Enforce Node Cooperation in an Ad-hoc Network,” IJCSI, May. 2011.
[36] R. Myerson, Game theory: analysis of conflict, Harvard University Press, 1997.
[37] Nuggehalli P, Srinivasan V., and Rao R.R., “Cooperation in Wireless MANETs,” Proc. IEEE INFOCOM, 2003.
[38] M. Felegyhazi, J-P. Hubeaux, L Buttyan, “Nash Equilibria of Packet Forwarding
Strategies in Wireless Ad Hoc Networks,” IEEE Transaction on Mobile Computing,
vol.5, no.5, May. 2006.
[39] Lee, W. Liao, M.C. Chen, “An incentive-based fairness mechanism for multihop wireless backhaul networks with selfish nodes,” IEEE Transactions on Wireless Communications 7 (2), 2008.
[40] Ze Li, Haiying Shen, “Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 11, no. 8, Aug. 2012.
[41] G. Crosby, N. Pissinou, “Evolution of Cooperation in Multi-Class Wireless Sensor Networks,” 32nd IEEE Conference on Local Computer Networks, 2007.
[42] K. Komathy, P. Narayanasamy, “Trust-based evolutionary game model assisting AODV routing against selfishness,” Journal of Network and Computer Applications, 2008.
[43] M. J. Osborne and A. Rubinstein, A course in game theory, MIT Press, 1994.
[44] Sally Hassan A., Muhammad Rafie M.A., “A Survey of Game Theory Using Evolutionary Algorithms,” Information Technology (ITSim), 2010 International Symposium in , vol 3, Jun. 2010.
[45]Robert Axelrod, The Evolution of Cooperation, Basic Books, New York, 1984.
[46] M. Nowak and K. Sigmund, “A strategy of win-stay, lose-shift that outperforms tit-for-tat in the Prisoner’s Dilemma game,” Nature, vol. 364, pp. 56-58, 1993.
[47] R. B. Myerson, Game Theory: Analysis of Conflict, Harvard University Press, 1991.
[48] Christian Sachse, http://www.unil.ch/webdav/site/philo/shared/enseignement/support_de_cours/Seminaires-Sachse-09-10/epfl/09-theorie-jeux.pdf.
[49] R. Trestian, O. Ormond, and G. Muntean,"Game Theory-Based Network Selection: Solutions and Challenges," IEEE Communications Surveys and Tutorials, pp.1212-1231, 2012,
[50] Yongkang Xiao,Xiuming Shan,Yong Ren;"Game theory models for IEEE 802.11 DCF in wireless Ad Hoc networks," Communications Magazine, IEEE, vol 43,Issue 3,pp.S22-S26, Mar. 2005.
[51] Shashi Mittal, Kalyanmoy Deb, “Optimal Strategies of the Iterated Prisoner's Dilemma Problem for Multiple Conflicting Objectives,” IEEE Trans. Evolutionary Computation 13(3), pp. 554-565, 2009.
[52] P. K. Dutta, Strategies and Games, MIT Press, 1999.
[53] Lu Yan, Stephen Hailes, Licia Capra, “Analysis of Packet Relaying Models and Incentive Strategies in Wireless Ad Hoc Networks with Game Theory,” AINA, pp. 1062-1069, 2008.
[54]M. Félegyházi, J. P. Hubaux, “Game Theory in Wireless Networks: A Tutorial Technical Report: LCA-REPORT-2006-002,” EPFL, 2006.
[55] D. Fudenberg and E. Maskin, “The Folk theorem in repeated games with discounting or with incomplete information,” Econometrica, vol. 54, no. 3, pp. 533-554, 1986.
[56] M. Zayani and D. Zeghlache,"Cooperation enforcement for packet forwarding optimization in multi-hop ad-hoc networks", in Proc. WCNC, pp.1915-1920, 2012.
[57] Fudenberg, D., Maskin, E., “Evolution and cooperation in noisy repeated games,” Am. Econ. Rev. 80, 274–279,1990.
[58] Imhof LA, Fudenberg D, Nowak MA. “Tit-for-tat or win-stay, lose-shift?,” J Theor Biol. pp. 574–580, 2007.
[59] Simon G. Shep, Game-theoretic Models of Human Behaviour, Heretical Press, Jun. 1998.
[60] P. Tailor, L. Jonker, “Evolutionary Stable Strategies and Game Dynamic,” Mathematical Biosciences, 5:455-484, 1978.
[61] Karl Sigmund, The Calculus of Selfishness, Princeton University Press, 2010.
[62]Georgios Chalkiadakis, Edith Elkind, Michael Wooldridge, “Cooperative Game Theory: Basic Concepts and Computational Challenges,” IEEE Intelligent Systems vol. 27 no. 3, Jun. 2012.
[63] Thomas S. Ferguson, http://www.math.ucla.edu/~tom/Game_Theory/coal.pdf.
[64] Zhu Han, Dusit Niyato, Walid Saad ,Walid Saad, Tamer Başar, Are Hjørungnes , Game Theory in Wireless and Communication Networks, Cambridge University Press, 2012.
[65] Dusit Niyato, Ekram Hossain, “Dynamics of Network Selection in Heterogeneous Wireless Networks: An Evolutionary Game Approach,” IEEE Transactions, vol. 58, no. 4., pp. 2008-2017, May. 2009.
[66] Thomas S. Ferguson, Game Theory, free e-book, 2003.
[67] J. M. Smith, G. R. Price, “The logic of animal conflict,” Nature 246, pp. 15-18, 1973.
[68] Nidhi Patel and Sanjay Srivastava, “Packet Forwarding Strategies for Cooperation Enforcement in Mobile Ad Hoc Wireless Networks,” ICDCIT 2012, LNCS 7154, pp. 200–211, 2012.
[69] Beibei Wang, Yongle Wu, Zhu Ji, K.J. Ray Liu, and T. Charles Clancy, “Game. Theoretical Mechanism Design Methods,” IEEE Signal Processing Magazine [74], Nov. 2008.
[70] Ernst Fehr, Simon Gächter, “Altruistic punishment in humans,” Nature 415, pp. 137-140, Jan. 2002.
[71] Charles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki, “Belief-free equilibrium of packet forwarding game in Ad Hoc networks under imperfect monitoring,” IPCCC, pp.315-324, 2010.
[72] Posts and Telecom press, http://www.ptpress.com.cn/book.aspx?id=18486.
[73] Lucas, Stephen, Jason Rosenhouse, and Andrew Schepler, "The Monty Hall Problem, Reconsidered," Mathematics Magazine 82(5), 2009
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code