Skip to main content

Fair Allocation of Throughput Under Harsh Operational Conditions

  • Conference paper
  • First Online:
Multiple Access Communications (MACOM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 9305))

Included in the following conference series:

Abstract

Fairness plays an important role in networking as it fundamentally describes how different communication participants access and share network resources. The fair sharing of resources becomes complicated when the network faces harsh operational conditions, which may be associated with mutual interference or adversarial conditions. In this paper, we study the problem of fair allocation of resources in a network facing harsh operational conditions associated with communication transmission. Such a problem is becoming increasingly relevant in wireless system design as multiple wireless technologies are being deployed in shared spectrum, e.g. WiFi and LTE-U, and wireless networks are facing unprecedented levels of malicious activities. To obtain insight into this problem we suggest a simple game theoretical model involving resource allocation. We solve the game explicitly, which allows us to explore the structure of resource allocation strategies, and thereby provide guidance into the integration of fair resource allocation in networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The ATM forum Technical Committee: Traffic management specification (April 1996). http://www.broadband-forum.org/ftp/pub/approved-specs/af-tm-0056.000.pdf (version 4.0)

  2. Kelly, F.P.: Charging and rate control for elastic traffic. European Trans. on Telecom. 8, 33–37 (1998)

    Article  Google Scholar 

  3. Tall, A., Altman, Z., Altman, E.: Virtual sectorization: design and self-optimization. In: 5th International Workshop on Self-Organizing Networks (IWSON) (2015)

    Google Scholar 

  4. Mo, J., Walrand, J.: Fair end-to-end window-based congestion control. IEEE/ACM Trans. on Networking 8, 556–567 (2000)

    Article  Google Scholar 

  5. Jacko, P., Sanso, B.: Optimal anticipative congestion control of flows with time-varying input stream. Performance Evaluation 69, 86–101 (2012)

    Article  Google Scholar 

  6. Altman, E., Avrachenkov, K., Garnaev, A.: Generalized \(\alpha \)-fair resource allocation in wireless networks. In: Proceedings of 47th IEEE Conference on Decision and Control (CDC 2008), pp. 2414–2419 (2008)

    Google Scholar 

  7. Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Performance Evaluation 67, 338–349 (2010)

    Article  Google Scholar 

  8. Huaizhou, S., Prasad, R.V., Onur, E., Niemegeers, I.G.M.M.: Fairness in wireless networks:issues, measures and challenges. IEEE Communications Surveys & Tutorials 16, 5–24 (2014)

    Article  Google Scholar 

  9. Lyamin, N., Vinel, A., Jonsson, M., Loo, J.: Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks. IEEE Communications letters 18, 110–113 (2014)

    Article  Google Scholar 

  10. Park, J.-M., Reed, J.H., Clancy, T.C.: Security and enforcement in spectrum sharing. Proceedings of the IEEE 102 (2014)

    Google Scholar 

  11. Bhattacharjee, S., Sengupta, S., Chatterjee, M.: Vulnerabilities in cognitive radio networks: A survey. Computer Communications 36, 1387–1398 (2013)

    Article  Google Scholar 

  12. El-Hajj, W., Safa, H., Guizani, M.: Survey of security issues in cognitive radio networks. Journal of Internet Technology 12 (2012)

    Google Scholar 

  13. Khare, A., Saxena, M., Thakur, R.S., Chourasia, K.: Attacks and preventions of cognitive radio network-a survey. International Journal of Advanced Research in Computer Engineering and Technology 2 (2013)

    Google Scholar 

  14. Fudenberg, D., Tirole, J.: Game theory. MIT Press, Boston (1991)

    Google Scholar 

  15. Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Computing Survey 45 (2013)

    Google Scholar 

  16. Theodorakopoulos, G., Baras, J.S.: Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications 26, 1317–1327 (2008)

    Article  Google Scholar 

  17. Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: Challenges to applying game theory to the domain of information warfare. In: Proceedings of ISW 2002 (2002)

    Google Scholar 

  18. Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: Incorporating attack-type uncertainty into network protection. IEEE Transactions on Information Forensics and Security 9, 1278–1287 (2014)

    Article  Google Scholar 

  19. Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) Gamenets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  20. Liu, Y., Comaniciu, C., Mani, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceedings of Valuetools 2006 (2006)

    Google Scholar 

  21. Sagduyu, Y.E., Ephremidess, A.: A game-theoretic analysis of denial of service attacks in wireless random access. Journal of Wireless Networks 15, 651–666 (2009)

    Article  Google Scholar 

  22. Garnaev, A., Trappe, W.: Stationary equilibrium strategies for bandwidth scanning. In: Jonsson, M., Vinel, A., Bellalta, B., Marina, N., Dimitrova, D., Fiems, D. (eds.) MACOM 2013. LNCS, vol. 8310, pp. 168–183. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  23. Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: Proceedings of 2012 IEEE Global Communications Conference (GLOBECOM), pp. 1054–1059 (2012)

    Google Scholar 

  24. Nguyen, K.C., Alpcan, T., Basar, T.: Stochastic games for security in networks with interdependent nodes. In: Proceedings of GAMENETS 2009, pp. 697–703 (2009)

    Google Scholar 

  25. Calinescu, G., Kapoor, S., Qiao, K., Shin, J.: Stochastic strategic routing reduces attack effects. In: Proceedings of GLOBECOM 2011, pp. 1–5 (2011)

    Google Scholar 

  26. Garnaev, A., Trappe, W.: One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious. IEEE Transactions on Information Forensics and Security 10, 1064–1075 (2015)

    Article  Google Scholar 

  27. Xiao, L., Liu, J., Li, Y., Mandayam, N.B., Poor, H.V.: Prospect theoretic analysis of anti-jamming communications in cognitive radio networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), pp. 746–751 (2014)

    Google Scholar 

  28. Garnaev, A., Trappe, W.: Secret communication when the eavesdropper might be an active adversary. In: Jonsson, M., Vinel, A., Bellalta, B., Belyaev, E. (eds.) MACOM 2014. LNCS, vol. 8715, pp. 121–136. Springer, Heidelberg (2014)

    Google Scholar 

  29. Garnaev, A., Hayel, Y., Altman, E.: Closed form solutions for symmetric water filling games. In: Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM 2008), pp. 673–681 (2008)

    Google Scholar 

  30. Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112–120. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrey Garnaev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Garnaev, A., Sagari, S., Trappe, W. (2015). Fair Allocation of Throughput Under Harsh Operational Conditions. In: Jonsson, M., Vinel, A., Bellalta, B., Tirkkonen, O. (eds) Multiple Access Communications. MACOM 2015. Lecture Notes in Computer Science(), vol 9305. Springer, Cham. https://doi.org/10.1007/978-3-319-23440-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23440-3_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23439-7

  • Online ISBN: 978-3-319-23440-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics