Skip to main content
Erschienen in: Wireless Networks 5/2013

01.07.2013

Detecting misbehavior in distributed wireless interference networks

verfasst von: Holger Boche, Siddharth Naik, Eduard Jorswieck

Erschienen in: Wireless Networks | Ausgabe 5/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper analyzes the case of K distributed interference coupled point-to-point links, which utilize a general power update algorithm, which converges monotonically. The channels are constant for the duration of the algorithm. In such a system we allow a set of links to have the ability to misrepresent their utilities, i.e. the receiver sends a misrepresented utility to its transmitter. It is shown that the system, i.e., the set of correctly behaving links, has the ability to detect such a behavior, if and only if G Restricted is irreducible. Here G Restricted is the restricted global dependency matrix, which captures the effect of interference coupling in the system. We then analyze the special case of the Foschini-Miljanic power update algorithm. After at most K − 1 steps, all links are able to detect the misbehavior. Example interference networks are discussed to illustrate the results. Finally the applicability of the results to the practically relevant cases of concave, convex and log-convex interference functions is displayed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Boche, H., Naik, S., & Alpcan, T. (2010). Characterization of non-manipulable and pareto optimal resource allocation strategies for interference coupled wireless systems. IEEE INFOCOM, San Diego, California, USA, March. Boche, H., Naik, S., & Alpcan, T. (2010). Characterization of non-manipulable and pareto optimal resource allocation strategies for interference coupled wireless systems. IEEE INFOCOM, San Diego, California, USA, March.
2.
Zurück zum Zitat Theodorakopoulos, G., & Baras, J. (2008). Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications, 26, (7). Theodorakopoulos, G., & Baras, J. (2008). Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications, 26, (7).
3.
Zurück zum Zitat Sagduyu, Y. E. , Berry, R., & Ephremides, A.(2009). MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. GameNets. Sagduyu, Y. E. , Berry, R., & Ephremides, A.(2009). MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. GameNets.
4.
Zurück zum Zitat Buttyan, L., Hubaux, J. -P. (2008). Security and cooperation in wireless networks. Cambridge: Cambridge University Press. Buttyan, L., Hubaux, J. -P. (2008). Security and cooperation in wireless networks. Cambridge: Cambridge University Press.
5.
Zurück zum Zitat Shen, F., Jorswieck, E. (2012). Universal cheatproof pricing for multiple access channels without SIC under QoS requirements. IEEE Internation Conference on Communications (ICC), 2012, accepted. Shen, F., Jorswieck, E. (2012). Universal cheatproof pricing for multiple access channels without SIC under QoS requirements. IEEE Internation Conference on Communications (ICC), 2012, accepted.
6.
Zurück zum Zitat Mises, L.V. (1963). Human action: A treatise on economics. Yale: Yale University Press. Mises, L.V. (1963). Human action: A treatise on economics. Yale: Yale University Press.
7.
Zurück zum Zitat Chorppath, A. K., & Alpcan, T. (2011). Adversarial behavior in network mechanism design. Proceedings of GameComm. Chorppath, A. K., & Alpcan, T. (2011). Adversarial behavior in network mechanism design. Proceedings of GameComm.
8.
Zurück zum Zitat Alpcan, T., & Baser, T. (2011). Network security: A decision and game theoretic approach. Cambridge: Cambridge University Press.MATH Alpcan, T., & Baser, T. (2011). Network security: A decision and game theoretic approach. Cambridge: Cambridge University Press.MATH
9.
Zurück zum Zitat Foschini, G.J., & Miljanic, Z. (1993). A simple distributed power control algorithm and its convergence. IEEE Transactions on Vehicular Technology, 641–646. Foschini, G.J., & Miljanic, Z. (1993). A simple distributed power control algorithm and its convergence. IEEE Transactions on Vehicular Technology, 641–646.
10.
Zurück zum Zitat Verdu, S., & Poor, H. (1983). Minimax robust discrete-time matched filters. IEEE Transactions on Communications. Verdu, S., & Poor, H. (1983). Minimax robust discrete-time matched filters. IEEE Transactions on Communications.
11.
Zurück zum Zitat Yates, R. D. (1995). A framework for uplink power control in cellular radio systems. IEEE Journal on Selected Areas in Communication, 13 (7), 1341–1348.MathSciNetCrossRef Yates, R. D. (1995). A framework for uplink power control in cellular radio systems. IEEE Journal on Selected Areas in Communication, 13 (7), 1341–1348.MathSciNetCrossRef
12.
Zurück zum Zitat Huang, C., & Yates, R. (1998). Rate of convergence for minimum power assignment algorithms in cellular radio systems. Baltzer/ACM Wireless Networks 4, 223–231.CrossRef Huang, C., & Yates, R. (1998). Rate of convergence for minimum power assignment algorithms in cellular radio systems. Baltzer/ACM Wireless Networks 4, 223–231.CrossRef
13.
Zurück zum Zitat Leung, K.K, Sung, C.W., Wong, W.S., & Lok, T. (2004). Convergence theorem for a general class of power-control algorithms. IEEE Transactions on Communications 52 (9), 1566-1574.CrossRef Leung, K.K, Sung, C.W., Wong, W.S., & Lok, T. (2004). Convergence theorem for a general class of power-control algorithms. IEEE Transactions on Communications 52 (9), 1566-1574.CrossRef
14.
Zurück zum Zitat Boche, H., & Schubert, M. (2010). A unifying approach to interference modeling for wireless networks. IEEE Transactions on Signal Processing 58 (6), 3282–3297.MathSciNetCrossRef Boche, H., & Schubert, M. (2010). A unifying approach to interference modeling for wireless networks. IEEE Transactions on Signal Processing 58 (6), 3282–3297.MathSciNetCrossRef
15.
Zurück zum Zitat Bambos, N., Chen, S., & Pottie, G. (2000). Channel access algorithms with active link protection for wireless communication networks with power control. IEEE/ACM Transactions on Networking 8(5), 583–597.CrossRef Bambos, N., Chen, S., & Pottie, G. (2000). Channel access algorithms with active link protection for wireless communication networks with power control. IEEE/ACM Transactions on Networking 8(5), 583–597.CrossRef
16.
Zurück zum Zitat Ulukus, S., & Yates, R. (1998). Adaptive power control and MMSE interference suppression. ACM Wireless Networks 4(6), 489–496.CrossRef Ulukus, S., & Yates, R. (1998). Adaptive power control and MMSE interference suppression. ACM Wireless Networks 4(6), 489–496.CrossRef
17.
Zurück zum Zitat Stanczak, S., Wiczanowski, M., & Boche, H. (2006). Resource allocation in wireless networks—theory and algorithmsseries Lecture Notes in Computer Science (LNCS 4000). Berlin: Springer. Stanczak, S., Wiczanowski, M., & Boche, H. (2006). Resource allocation in wireless networks—theory and algorithmsseries Lecture Notes in Computer Science (LNCS 4000). Berlin: Springer.
18.
Zurück zum Zitat Schubert, M., & Boche, H. (2005/2006) QoS-based resource allocation and transceiver optimization Foundations and Trends on Communications and Information Theory 2 (6), 383–529. Schubert, M., & Boche, H. (2005/2006) QoS-based resource allocation and transceiver optimization Foundations and Trends on Communications and Information Theory 2 (6), 383–529.
19.
Zurück zum Zitat Boche, H., Naik, S., & Schubert, M. (2011). Combinatorial characterization of interference coupling in wireless systems. IEEE Transactions on Communications 59(6). Boche, H., Naik, S., & Schubert, M. (2011). Combinatorial characterization of interference coupling in wireless systems. IEEE Transactions on Communications 59(6).
20.
Zurück zum Zitat Brualdi, R. A. (1989). Matrix theory and applications. AMS short course lecture notes, The many facets of combinatorial matrix theory, pp. 1–36. Brualdi, R. A. (1989). Matrix theory and applications. AMS short course lecture notes, The many facets of combinatorial matrix theory, pp. 1–36.
21.
Zurück zum Zitat Boche, H., & Schubert, M. (2008). Concave and convex interference functions—general characterization with application. IEEE Transactions on Signal Processing, 56 (10). Boche, H., & Schubert, M. (2008). Concave and convex interference functions—general characterization with application. IEEE Transactions on Signal Processing, 56 (10).
Metadaten
Titel
Detecting misbehavior in distributed wireless interference networks
verfasst von
Holger Boche
Siddharth Naik
Eduard Jorswieck
Publikationsdatum
01.07.2013
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 5/2013
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-012-0502-8

Weitere Artikel der Ausgabe 5/2013

Wireless Networks 5/2013 Zur Ausgabe

Neuer Inhalt