Abstract
Incentive scheme for stimulating service provision in Mobile Ad hoc NETworks (MANET) has been under intensive investigation due to its significance to the operation of MANET. This paper applies distributed algorithmic mechanism design and utilizes Vickrey auction for service allocation in mobile ad hoc networks. We show that our method stimulates service provision and achieves desired system-wide service allocation in spite of each agent’s selfish behavior, while introducing challenges from the inherent shortcomings of Vickrey auction and characteristics of MANET. We discuss the challenges, the existing solutions for wireline networks and propose a system model for service allocation in MANET.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Baudron, O., Stern, J.: Non-interactive private auctions. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, p. 354. Springer, Heidelberg (2002)
Boulkenafed, M., Liu, J., Sacchetti, D., Issarny, V.: Group Management in Mobile Ad Hoc Networks: Design, Implementation and Experiments. INRIA Research Report 5060 (December 2003)
Brandt, F., Weiß, G.: Vicious strategies for Vickrey auctions. In: Proc. of the Fifth Int’l Conf. on Autonomous Agents. ACM Press, New York (2001)
Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8 (2003)
Capra, L., Emmerich, W., Mascolo, C.: CARISMA: Context-Aware REflective mIddleware System for Mobile Applications. IEEE Transactions of Software Engineering (November 2003)
Feigenbaum, J., Shenker, S.: Distributed algorithmic mechanism design: Recent results and future directions. In: Proc. 6th Int. Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. ACM Press, New York (2002)
Franklin, M., Reiter, M.: The design and implementation of a secure auction service. IEEE Transactions on Software Engineering 5, 302–312 (1996)
Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Proc. of the 3rd USENIX Workshop on Electronic Commerce (1998)
Issarny, V., Sacchetti, D., Tartanoglu, F., Sailhan, F., Chibout, R., Levy, N., Talamona, A.: Developing Ambient Intelligence Systems: A Solution based on Web Services. Journal of Automated Software Engineering (to appear, 2004)
Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)
Liu, J., Issarny, V.: QoS-aware service location in mobile ad hoc networks. In: Proc. of 2004 IEEE Int’l Conf. on Mobile Data Management (January 2004)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th ACM International Conf. on Mobile Computing and Networking (August 2000)
McMillan, M.: Selling spectrum rights. Journal of Economic Perspectives (1994)
Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proc. of ACM Conference on Electronic Commerce (1999)
Nisan, N., Ronen, A.: Algorithmic mechanism design. In: 31st ACM Symp. on Theory of Computing, pp. 129–140 (2001)
Obreiter, P., König-Ries, B., Klein, M.: Stimulating cooperative behavior of autonomous devices: An analysis of requirements and existing approaches. In: Proc. of the 2nd Int’l Workshop on Wireless Information Systems (2003)
Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Rothkopf, M.H., Teisberg, T.J., Kahn, E.P.: Why are Vickrey auctions rare? Journal of Political Economy 98, 94–109 (1990)
Sandholm, T.W.: Limitations of the Vickrey auction in computational multiagent systems. In: Proc. of the 2nd Int’l Conf. on Multi-Agent Systems (1996)
Szyperski, C.: Component Technology – What, Where and How? In: Proc. of the 25th Int’l Conf. on Software Engineering ICSE 2003 (2003)
Varian, H.R.: Economic mechanism design for computerized agents. In: Proceedings of the First Usenix Conference on Electronic Commerce (1995)
Vickrey, W.: Counter speculation, auctions, and competitive sealed tenders. Journal of Finance 16, 8–37 (1961)
Vulkan, N., Jennings, N.R.: Efficient mechanisms for the supply of services in multi-agent environments. International Journal of Decision Support Systems (2000)
Wiener, M.J.: Performance comparison of public-key cryptosystems. CryptoBytes, Technical Newsletter of RSA Laboratories 4 (1998)
Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE Infocom (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, J., Issarny, V. (2004). Service Allocation in Selfish Mobile Ad hoc Networks Using Vickrey Auction. In: Lindner, W., Mesiti, M., Türker, C., Tzitzikas, Y., Vakali, A.I. (eds) Current Trends in Database Technology - EDBT 2004 Workshops. EDBT 2004. Lecture Notes in Computer Science, vol 3268. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30192-9_38
Download citation
DOI: https://doi.org/10.1007/978-3-540-30192-9_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23305-3
Online ISBN: 978-3-540-30192-9
eBook Packages: Computer ScienceComputer Science (R0)