33
007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ Chapter 11: Wireless operators in shared spectrum multi-domain sensor networks; border games in cellular networks;

© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in

Embed Size (px)

Citation preview

Page 1: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

© 2007 Levente Buttyán and Jean-Pierre Hubaux

Security and Cooperation in Wireless Networks

http://secowinet.epfl.ch/

Chapter 11: Wireless operators in shared spectrum

multi-domain sensor networks;border games in cellular networks;

Page 2: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

2/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Chapter outline

11.1 Multi-domain sensor networks11.2 Border games in cellular networks

Page 3: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

3/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Typical cooperation: help in packet forwarding Can cooperation emerge spontaneously in multi-

domain sensor networks based solely on the self-interest of the sensor operators?

Multi-domain sensor networks

11.1 Multi-domain sensor networks

Page 4: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

4/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Simplified model

C: Cooperation D: Defection

4 possible moves: CC – the sensor asks for help (cost 1) and helps if asked (cost 1) CD – the sensor asks for help (cost 1) and does not help (cost 0) DC – the sensor sends directly (cost 2) and helps if asked (cost 1) DD – the sensor sends directly (cost 2) and does not help (cost 0)

11

1 1 1

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 5: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

5/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Example : CC – CD (1/6)

CC – the sensor tries to get help from the other sensor and helps if the other sensor requests it

CD – the sensor tries to get help but it refuses to help

CC CD

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 6: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

6/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Example : CC – CD (2/6)

CC – the sensor tries to get help from the other sensor and helps if the other sensor requests it

CD – the sensor tries to get help but it refuses to help

CC CD

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 7: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

7/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Example : CC – CD (3/6)

CCfailure

CD

CC – the sensor tries to get help from the other sensor and helps if the other sensor requests it

CD – the sensor tries to get help but it refuses to help

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 8: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

8/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Example : CC – CD (4/6)

CC CD

CC – the sensor tries to get help from the other sensor and helps if the other sensor requests it

CD – the sensor tries to get help but it refuses to help

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 9: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

9/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Example : CC – CD (5/6)

CC CDsuccess

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 10: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

10/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Example : CC – CD (6/6)

CC CD

Black player

Cost: 2

• 1 for asking

• 1 for helping

Benefit: 0

(packet dropped)

Gray player

Cost: 1

• 1 for asking

Benefit: 1

(packet arrived)

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 11: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

11/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

11

Cost for black Cost for grey

Outcome for black (0 = failure)

Outcome for grey (1 = success)

The simplified model in strategic form

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 12: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

12/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Reception threshold

time

success / failure of packet reception

Sliding window of history

Success(= 1)

Failure(= 0)

Receptionthreshold ρ

Average of the packet reception

Risk of going below threshold adapt strategy (move to theconstrained state: only DC or DDare eligible)

Reception threshold: computed and stored at each sensor node The battery (B) level of the sensors decreases with the moves If the battery is empty, the sensor dies

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 13: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

13/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Game Theoretic Approach

The mentioned concepts describe a game Players: network operators Moves (unconstrained state): CC, CD, DC, DD Moves (constrained state): DC, DD Information sets: histories Strategy: function that assigns a move to every

possible history considering the weight threshold Payoff = lifetime We are searching for Nash equilibria with the highest

lifetimes

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 14: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

14/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Two-step Strategies

B – initial battery

ρ – reception threshold

– path loss exponent (2)

ε1,2 – payoff of transient states

Cooperative Nash equilibrium

Non-cooperative Nash equilibrium

If ρ > 1/3, then (CC/DD, CC/DD) is more desirable

11.1 Multi-domain sensor networks11.1.1 Simplified model

Page 15: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

15/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Generalized Model

11.1 Multi-domain sensor networks11.1.2 Generalized model

Simplified model with the following extensions:– many sensors, random placing– minimum energy path routing– common sink / separate sink scenarios– classification of equilibria

• Class 0: no cooperation (no packet is relayed)• Class 1: semi cooperation (some packets are relayed)• Class 2: full cooperation (all packets are relayed)

Page 16: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

16/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Main simulation parameters

Parameter Value

Number of sensors per domain 20

Area size 100 x 100 m

Reception threshold ρ 0.6

History length 5

Path loss exponent 2–3–4 (3)

11.1 Multi-domain sensor networks11.1.2 Generalized model

Page 17: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

17/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Impact of the path loss exponentPerc

enta

ge o

f si

mula

tion

s

Equilibrium classes ( 0 – no cooperation, 1 – semi cooperation, 2 – full cooperation)

Value of the path loss exponent

– 2

– 3

– 4

11.1 Multi-domain sensor networks11.1.2 Generalized model

Page 18: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

18/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Conclusion on multi-domain sensor networks

We examined whether cooperation is possible without the usage of incentives in multi-domain sensor networks

In the simplified model, the best Nash equilibria consist of cooperative strategies

In the generalized model, the best Nash equilibria belong to the cooperative classes in most of the cases

11.1 Multi-domain sensor networks

Page 19: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

19/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Chapter outline

11.1 Multi-domain sensor networks11.2 Border games in cellular networks

Page 20: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

20/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Motivating example

11.2 Border games in cellular networks

Page 21: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

21/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Introduction

spectrum licenses do not regulate access over national borders

adjust pilot power to attract more users

Is there an incentive for operators to apply competitive pilot power control?

11.2 Border games in cellular networks

Page 22: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

22/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

System model (1/2)

Network: cellular networks using CDMA

– channels defined by orthogonal codes

two operators: A and B one base station each pilot signal power control

Users: roaming users users uniformly distributed select the best quality BS selection based signal-to-

interference-plus-noise ratio (SINR)

11.2 Border games in cellular networks11.2.1 Model

Page 23: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

23/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

System model (2/2)

0

pilotp i ivpilot

iv pilot pilotown other

G P gSINR

N I I

W

i

pilotown iv iw

w

I g T

M

i

pilotother jv j iw

j i w

I g P T

M

A Bv

PAPB

TAv

TBw

TAw

0

trp iv ivtr

iv tr trown other

G T gSINR

N I I

W

, i

pilotown iv i iw

w v w

I g P T

M

tr pilotother otherI I

pilot signal SINR:

traffic signal SINR:

Pi – pilot power of i

– processing gain for the pilot signalpilotpG

ivg

0N – noise energy per symbol

W

ivT

pilotownI

– channel gain between BS i and user v

– available bandwidth

– own-cell interference affecting the pilot signal

– own-cell interference factor

– traffic power between BS i and user v

– other-to-own-cell interference factor

iM – set of users attached to BS i

11.2 Border games in cellular networks11.2.1 Model

Page 24: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

24/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Game-theoretic model

Power Control Game, GPC

– players → networks operators (BSs), A and B

– strategy → pilot signal power, 0W < Pi < 10W, i = {A, B}

– standard power, PS = 2W– payoff → profit, where is the expected

income serving user v – normalized payoff difference:

i

i vv

u

M

v

max , ,

,i

S S Si i i

si S S

i

u s P u P P

u P P

11.2 Border games in cellular networks11.2.2 Power control game

Page 25: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

25/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Simulation settings

11.2 Border games in cellular networks11.2.2 Power control game

Page 26: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

26/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Is there a game?

only A is strategic (B uses PB = PS) 10 data users path loss exponent, α = 2

Δi

11.2 Border games in cellular networks11.2.2 Power control game

Page 27: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

27/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

When both operators are strategic

10 data users path loss exponent, α = 4

11.2 Border games in cellular networks11.2.2 Power control game

Page 28: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

28/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Nash equilibria

10 data users 100 data users

11.2 Border games in cellular networks11.2.2 Power control game

Page 29: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

29/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Efficiency (1/2)

10 data users

11.2 Border games in cellular networks11.2.2 Power control game

Page 30: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

30/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Efficiency (2/2)

100 data users

11.2 Border games in cellular networks11.2.2 Power control game

Page 31: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

31/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

convergence based on better-response dynamics convergence step: 2 W

Convergence to NE (1/2)

PA = 6.5 W

11.2 Border games in cellular networks11.2.3 Convergence to a Nash Equilibrium

Page 32: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

32/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Convergence to NE (2/2)

convergence step: 0.1 W

11.2 Border games in cellular networks11.2.3 Convergence to a Nash Equilibrium

Page 33: © 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks  Chapter 11: Wireless operators in

33/33Security and Cooperation in Wireless NetworksChapter 11: Wireless operators in shared spectrum

Conclusion on border games

not only individual nodes may exhibit selfish behavior, but operators can be selfish too

example: adjusting pilot power to attract more users at national borders

the problem can be modeled as a game between the operators– the game has an efficient Nash equilibrium– there’s a simple convergence algorithm that drives the

system into the Nash equilibrium

11.2 Border games in cellular networks