Skip to main content

A Game Theoretic Approach for Optimal Network Topologies in Opportunistic Networks

  • Conference paper
Computational Logic in Multi-Agent Systems (CLIMA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7486))

Included in the following conference series:

Abstract

Opportunistic networks (ON) are particular types of delay-tolerant networks in which users/network entities participate in order to propagate information. Besides the advantages of these networks (e.g. decentralization, independence of communication infrastructure) they raise new problems regarding for example effectiveness, message routing, message delivery, security issues, and trust. In this paper we introduce a formal description of an ON and of optimal communication topologies, for the non-cooperative and cooperative settings. We follow a game theoretic approach and allow users to express properties about how their messages should be handled in the network by means of a logical language (for instance, message privacy may be achieved by requiring that network nodes with internet access should be avoided on the communication path). We determine the complexity of associated verification and synthesis problems of network topologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Becchetti, L., Clementi, A.E.F., Pasquale, F., Resta, G., Santi, P., Silvestri, R.: Information spreading in opportunistic networks is fast. CoRR abs/1107.5241 (2011)

    Google Scholar 

  2. Clarke, E., Emerson, E.: Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic. In: Engeler, E. (ed.) Logic of Programs 1979. LNCS, vol. 125, pp. 52–71. Springer, Heidelberg (1981)

    Google Scholar 

  3. Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2003, pp. 27–34. ACM, New York (2003), http://doi.acm.org/10.1145/863955.863960

    Chapter  Google Scholar 

  4. Felegyhazi, M., Hubaux, J.P., Buttyan, L.: Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Computing 5(5), 463–476 (2006), http://dx.doi.org/10.1109/TMC.2006.68

    Article  Google Scholar 

  5. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-completeness. W. H. Freeman, San Francisco (1979)

    MATH  Google Scholar 

  6. Gottlob, G., Greco, G., Scarcello, F.: Pure nash equilibria: hard and easy games. Journal of Artificial Intelligence Research, 215–230 (2003)

    Google Scholar 

  7. Han, B., Hui, P., Kumar, V.A., Marathe, M.V., Shao, J., Srinivasan, A.: Mobile data offloading through opportunistic communications and social participation. IEEE Transactions on Mobile Computing 99 (PrePrints) (2011)

    Google Scholar 

  8. Hui, P., Crowcroft, J., Yoneki, E.: Bubble rap: social-based forwarding in delay tolerant networks. In: Proceedings of the 9th ACM International Symposium on Mobile ad Hoc Networking and Computing, MobiHoc 2008, pp. 241–250. ACM, New York (2008), http://doi.acm.org/10.1145/1374618.1374652

    Chapter  Google Scholar 

  9. Jain, S., Demmer, M., Patra, R., Fall, K.: Using redundancy to cope with failures in a delay tolerant network. SIGCOMM Comput. Commun. Rev. 35, 109–120 (2005), http://doi.acm.org/10.1145/1090191.1080106

    Article  Google Scholar 

  10. Lilien, L., Kamal, Z., Bhuse, V., Gupta, A.: The concept of opportunistic networks and their research challenges in privacy and security. In: Makki, S., Reiher, P., Makki, K., Pissinou, N., Makki, S. (eds.) Mobile and Wireless Network Security and Privacy, pp. 85–117. Springer US (2007), http://dx.doi.org/10.1007/978-0-387-71058-7_5

  11. Pal, R., Kosta, S., Hui, P.: Settling for less – a qos compromise mechanism for opportunistic mobile networks. In: Proceeding of the Thirteenth Workshop on MAthematical Performance Modeling and Analysis, MAMA (2011)

    Google Scholar 

  12. Pelusi, L., Passarella, A., Conti, M.: Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks. IEEE Communications Magazine 44(11), 134–141 (2006), http://dx.doi.org/10.1109/MCOM.2006.248176

    Article  Google Scholar 

  13. Zhong, S., Li, L.E., Liu, Y.G., Yang, Y.R.: On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretic and cryptographic techniques. Wirel. Netw. 13(6), 799–816 (2007), http://dx.doi.org/10.1007/s11276-006-9855-1

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bulling, N., Köster, M., Popovici, M. (2012). A Game Theoretic Approach for Optimal Network Topologies in Opportunistic Networks. In: Fisher, M., van der Torre, L., Dastani, M., Governatori, G. (eds) Computational Logic in Multi-Agent Systems. CLIMA 2012. Lecture Notes in Computer Science(), vol 7486. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32897-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32897-8_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32896-1

  • Online ISBN: 978-3-642-32897-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics