Skip to main content

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

With the 4th generation technology (4G), only being deployed for a few years, 5G technology is slowly emerging to support the Internet of things (IoT), where millions of sensors and mobile devices will be deployed in order to provide data for smart homes, smart buildings and smart cities. 5G networks will have to handle data (collection, storage, mining, analysis, etc.) gathered from a very diverse set of sources like traffic, weather, security incidents, crowds, etc. Data analytics and network management are thus necessary for 5G deployment. IoT includes sensors and mobile devices that gather data and perform data mining on data to anticipate certain circumstances, including human behaviour. Some issues that may arise from the deployment of 5G and IoT include new security issues because of the IoT deployment, and additional issues surfacing due to the increasing use of wearable devices. Since any communication network, such as IoT, is a multi-entity system, decisions are taken by different system entities. Such decision-making entities are the “things” in IoT, i.e. the sensors comprising the sensor networks that offer the capability to create smart spaces and applications, the users of the IoT, the content and service providers using the IoT as their infrastructure, etc. All entities are motivated to make decisions that maximize their own potential benefit, whether this is experience, profit, minimal resource usage or any other factor that may result in high utility measurements or high satisfaction for these entities. The book will explore specific interactions using a game theoretic framework and offer the equilibriums that maximize the payoffs of the interacting entities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The text in Sect. 1.5.1 is based on [18].

  2. 2.

    The text in Sect. 1.5.2 is based on [19].

  3. 3.

    This approach was proposed by John C. Harsanyi in [15].

References

  1. Antoniou, J., Koukoutsidis, I., Pitsillides, A., Stavrakakis, I.: Access network synthesis in next generation networks. Comput. Netw. 53(15), 2716–2726 (2009)

    Article  Google Scholar 

  2. Aumann, R.J.: Acceptable points in games of perfect information. Pac. J. Math. 10, 381–417 (1960)

    Article  MathSciNet  Google Scholar 

  3. Aumann, R.J.: Game Theory in the Talmud. Jewish Law and Economics Research Bulletin Series (2003)

    Google Scholar 

  4. Axelrod, R.M.: The Evolution of Cooperation. Basic Books, New York (1984)

    MATH  Google Scholar 

  5. Cesana, M., Malanchini, I., Capone, A.: Modelling network selection and resource allocation in wireless access networks with non-cooperative games. In: Proceedings of the 5th IEEE Mobile Ad-Hoc and Sensor Systems (2008)

    Google Scholar 

  6. Cesana, M., Gatti, N., Malanchini, I.: Game theoretic analysis of wireless access network selection: models, inefficiency bounds, and algorithms. In: Proceedings of the 2nd International Workshop on Game Theory in Communication Networks (2008)

    Google Scholar 

  7. Crawford, V.P.: Equilibrium without independence. J. Econ. Theory 50(1), 127–154 (1990)

    Article  MathSciNet  Google Scholar 

  8. Darwin, C.: The Descent of Man and Selection in Relation to Sex, vol. 1. John Murray, London (1871)

    Book  Google Scholar 

  9. Dixit, A., Skeath, S.: Games of Strategy. W.W. Norton & Company, New York (1999)

    Google Scholar 

  10. Dyer, J.S., Fishburn, P.C., Estever, R., Wallenius, J., Zionts, S.: Multiple-criteria decision-making: multiattribute utility theory - the next ten years. Manage. Sci. 38(5), 645–653 (1992)

    Article  Google Scholar 

  11. Elayoubi, S.E., Chahed, T., Hebuterne, G.: Admission control in UMTS in the presence of shared channels. Comput. Commun. 27(11), 1115–1126 (2004)

    Article  Google Scholar 

  12. Fitzek, F.H.P., Katz, F.H.P.: Cooperation in Wireless Networks: Principles and Applications. Springer, Berlin (2006)

    Book  Google Scholar 

  13. Gao, D., Cai, J., Ngan, K.N.: Admission control in IEEE 802.11e wireless LANs. IEEE Netw. 19(4), 6–13 (2005)

    Google Scholar 

  14. Gintis, H.: Game Theory Evolving: A Problem-Centered Introduction to Modeling Strategic Interaction. Princeton University Press, Princeton (2000)

    MATH  Google Scholar 

  15. Harsanyi, J.C.: Games with incomplete information played by Bayesian players. Behav. Sci. 14, 159–182 (1967)

    MathSciNet  MATH  Google Scholar 

  16. Iera, A., Molinaro, A., Campolo, C., Amadeo, M.: An access network selection algorithm dynamically adapted to user needs and preferences. In: Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’06) (2006)

    Google Scholar 

  17. Kar, K., Sarkar, S., Tassiulas, L.: A simple rate control algorithm for maximizing total user utility. In: Proceedings of the Twentieth Annual Joint Conference of the IEEE and Communications Societies, INFOCOM (2001)

    Google Scholar 

  18. Kendall, G., Yao, X.: The Iterated Prisoner’s Dilemma: 20 Years On. Advances in Natural Computation Book Series, vol. 4. World Scientific Publishing, Singapore (2009)

    Google Scholar 

  19. Muthoo, A.: Bargaining Theory with Applications. Cambridge University Press, Cambridge (2002)

    MATH  Google Scholar 

  20. Nash J.F.: The bargaining problem. Econometrica 18(2), 155–162 (1950)

    Article  MathSciNet  Google Scholar 

  21. Nisan, N., Ronen, A.: Algorithmic mechanism design. Games Econom. Behav. 35(1–2), 166–196 (2001)

    Article  MathSciNet  Google Scholar 

  22. Niyato, D., Hossain, E.: A cooperative game framework for bandwidth allocation in 4G heterogeneous wireless networks. In: Proceedings of the IEEE International Conference on Communications 2006 (ICC ’06), pp. 4375–4362 (2006)

    Google Scholar 

  23. Noam, E.: Interconnecting the Network of Networks. The MIT Press, Cambridge (2001)

    Book  Google Scholar 

  24. Rubinstein, A.: Perfect equilibrium in a bargaining model. Econometrica 98(1), 97–109 (1982)

    Article  MathSciNet  Google Scholar 

  25. Schelling, T.C.: The Strategy of Conflict. Harvard University Press, Cambridge (1960)

    MATH  Google Scholar 

  26. Selten, R.: Reexamination of the perfectness concept for equilibrium points in extensive games. Int. J. Game Theory 4, 25–55 (1975)

    Article  MathSciNet  Google Scholar 

  27. von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Antoniou, J. (2020). Game Theory and Networking. In: Game Theory, the Internet of Things and 5G Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-16844-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16844-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16843-8

  • Online ISBN: 978-3-030-16844-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics