Skip to main content

Service Allocation in Selfish Mobile Ad hoc Networks Using Vickrey Auction

  • Conference paper
Current Trends in Database Technology - EDBT 2004 Workshops (EDBT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3268))

Included in the following conference series:

Abstract

Incentive scheme for stimulating service provision in Mobile Ad hoc NETworks (MANET) has been under intensive investigation due to its significance to the operation of MANET. This paper applies distributed algorithmic mechanism design and utilizes Vickrey auction for service allocation in mobile ad hoc networks. We show that our method stimulates service provision and achieves desired system-wide service allocation in spite of each agent’s selfish behavior, while introducing challenges from the inherent shortcomings of Vickrey auction and characteristics of MANET. We discuss the challenges, the existing solutions for wireline networks and propose a system model for service allocation in MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baudron, O., Stern, J.: Non-interactive private auctions. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, p. 354. Springer, Heidelberg (2002)

    Google Scholar 

  2. Boulkenafed, M., Liu, J., Sacchetti, D., Issarny, V.: Group Management in Mobile Ad Hoc Networks: Design, Implementation and Experiments. INRIA Research Report 5060 (December 2003)

    Google Scholar 

  3. Brandt, F., Weiß, G.: Vicious strategies for Vickrey auctions. In: Proc. of the Fifth Int’l Conf. on Autonomous Agents. ACM Press, New York (2001)

    Google Scholar 

  4. Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8 (2003)

    Google Scholar 

  5. Capra, L., Emmerich, W., Mascolo, C.: CARISMA: Context-Aware REflective mIddleware System for Mobile Applications. IEEE Transactions of Software Engineering (November 2003)

    Google Scholar 

  6. Feigenbaum, J., Shenker, S.: Distributed algorithmic mechanism design: Recent results and future directions. In: Proc. 6th Int. Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. ACM Press, New York (2002)

    Google Scholar 

  7. Franklin, M., Reiter, M.: The design and implementation of a secure auction service. IEEE Transactions on Software Engineering 5, 302–312 (1996)

    Article  Google Scholar 

  8. Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Proc. of the 3rd USENIX Workshop on Electronic Commerce (1998)

    Google Scholar 

  9. Issarny, V., Sacchetti, D., Tartanoglu, F., Sailhan, F., Chibout, R., Levy, N., Talamona, A.: Developing Ambient Intelligence Systems: A Solution based on Web Services. Journal of Automated Software Engineering (to appear, 2004)

    Google Scholar 

  10. Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Liu, J., Issarny, V.: QoS-aware service location in mobile ad hoc networks. In: Proc. of 2004 IEEE Int’l Conf. on Mobile Data Management (January 2004)

    Google Scholar 

  12. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th ACM International Conf. on Mobile Computing and Networking (August 2000)

    Google Scholar 

  13. McMillan, M.: Selling spectrum rights. Journal of Economic Perspectives (1994)

    Google Scholar 

  14. Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  15. Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proc. of ACM Conference on Electronic Commerce (1999)

    Google Scholar 

  16. Nisan, N., Ronen, A.: Algorithmic mechanism design. In: 31st ACM Symp. on Theory of Computing, pp. 129–140 (2001)

    Google Scholar 

  17. Obreiter, P., König-Ries, B., Klein, M.: Stimulating cooperative behavior of autonomous devices: An analysis of requirements and existing approaches. In: Proc. of the 2nd Int’l Workshop on Wireless Information Systems (2003)

    Google Scholar 

  18. Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  19. Rothkopf, M.H., Teisberg, T.J., Kahn, E.P.: Why are Vickrey auctions rare? Journal of Political Economy 98, 94–109 (1990)

    Article  Google Scholar 

  20. Sandholm, T.W.: Limitations of the Vickrey auction in computational multiagent systems. In: Proc. of the 2nd Int’l Conf. on Multi-Agent Systems (1996)

    Google Scholar 

  21. Szyperski, C.: Component Technology – What, Where and How? In: Proc. of the 25th Int’l Conf. on Software Engineering ICSE 2003 (2003)

    Google Scholar 

  22. Varian, H.R.: Economic mechanism design for computerized agents. In: Proceedings of the First Usenix Conference on Electronic Commerce (1995)

    Google Scholar 

  23. Vickrey, W.: Counter speculation, auctions, and competitive sealed tenders. Journal of Finance 16, 8–37 (1961)

    Article  Google Scholar 

  24. Vulkan, N., Jennings, N.R.: Efficient mechanisms for the supply of services in multi-agent environments. International Journal of Decision Support Systems (2000)

    Google Scholar 

  25. Wiener, M.J.: Performance comparison of public-key cryptosystems. CryptoBytes, Technical Newsletter of RSA Laboratories 4 (1998)

    Google Scholar 

  26. Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE Infocom (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, J., Issarny, V. (2004). Service Allocation in Selfish Mobile Ad hoc Networks Using Vickrey Auction. In: Lindner, W., Mesiti, M., Türker, C., Tzitzikas, Y., Vakali, A.I. (eds) Current Trends in Database Technology - EDBT 2004 Workshops. EDBT 2004. Lecture Notes in Computer Science, vol 3268. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30192-9_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30192-9_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23305-3

  • Online ISBN: 978-3-540-30192-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics