Abstract
A performance of a network based on Wireless Physical Layer Network Coding (WPLNC) crucially depends on local mapping functions selected by every individual relay. As a whole the mappings must enable the destination to recover desired source data but they must also be reasonable from relays’ point of view. This is important especially in distributed and decentralised networks where the relays’ mappings are not given in advance but they emerge from interaction among relays.
In this paper we focus on a toy example of relay network where a sequential selection of the WPLNC mappings takes place. We assume that the first relay may suffer from low battery level which may affect its selection of WPLNC mappings and that the second relay can deduce the battery state from observed actions and alter its behaviour to cope with the situation. For this scenario we discuss and evaluate an existence of game equilibria.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhang, S., Liew, S.C., Lam, P.P.: Hot topic: physical-layer network coding. In: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, MobiCom 2006, New York, NY, USA, pp. 358–365. ACM (2006)
Ahlswede, R., Cai, N., Li, S.-Y., Yeung, R.: Network information flow. IEEE Transactions on Information Theory 46(4), 1204–1216 (2000)
Rankov, B., Wittneben, A.: Achievable rate regions for the two-way relay channel. In: Proc. IEEE Int. Symposium on Information Theory (ISIT), July 2006. http://www.nari.ee.ethz.ch/wireless/pubs/p/isit2006
Katti, S., Gollakota, S., Katabi, D.: Embracing wireless interference: Analog network coding. SIGCOMM Comput. Commun. Rev. 37(4), 397–408 (2007)
Nazer, B., Gastpar, M.: Compute-and-forward: Harnessing interference through structured codes. IEEE Transactions on Information Theory 57(10), 6463–6486 (2011)
Popovski, P., Yomo, H.: Bi-directional amplification of throughput in a wireless multi-hop network. In: IEEE 63rd Vehicular Technology Conference, VTC 2006-Spring, vol. 2, pp. 588–593, May 2006
Katti, S., Rahul, H., Hu, W., Katabi, D., Medard, M., Crowcroft, J.: XORs in the air: Practical wireless network coding. IEEE/ACM Transactions on Networking 16(3), 497–510 (2008)
Sykora, J., Burr, A.: Layered design of hierarchical exclusive codebook and its capacity regions for HDF strategy in parametric wireless 2-WRC. IEEE Transactions on Vehicular Technology 60(7), 3241–3252 (2011)
Wang, W., Chatterjee, M., Kwiat, K.: Coexistence with malicious nodes: a game theoretic approach. In: International Conference on Game Theory for Networks, GameNets 2009, pp. 277–286, May 2009
Dehnie, S., Sencar, H., Memon, N.: Detecting malicious behavior in cooperative diversity. In: 41st Annual Conference on Information Sciences and Systems, CISS 2007, pp. 895–899, March 2007
Chen, M.-H., Lin, S.-C., Hong, Y.-W.: A game theoretic approach for the cooperative network with the presence of malicious relays. In: 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5, December 2011
Fudenberg, D., Tirole, J.: Game Theory. MIT Press (1991)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Hynek, T., Sykora, J. (2015). Sequential Incomplete Information Game in Relay Networks Based on Wireless Physical Layer Network Coding. In: Jonsson, M., Vinel, A., Bellalta, B., Tirkkonen, O. (eds) Multiple Access Communications. MACOM 2015. Lecture Notes in Computer Science(), vol 9305. Springer, Cham. https://doi.org/10.1007/978-3-319-23440-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-23440-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23439-7
Online ISBN: 978-3-319-23440-3
eBook Packages: Computer ScienceComputer Science (R0)