Dishonest reporting in queue-based cross-layer network optimization
dc.creator | Giatsios, D. | en |
dc.creator | Koutsopoulos, I. | en |
dc.creator | Korakis, T. | en |
dc.date.accessioned | 2015-11-23T10:28:19Z | |
dc.date.available | 2015-11-23T10:28:19Z | |
dc.date.issued | 2012 | |
dc.identifier | 10.1109/IWQoS.2012.6245985 | |
dc.identifier.isbn | 9781467312981 | |
dc.identifier.issn | 1548615X | |
dc.identifier.uri | http://hdl.handle.net/11615/27963 | |
dc.description.abstract | Queue-based cross-layer optimization algorithms have recently been a subject of intensive research in wireless networks. Their purpose is to guarantee stable operation and to achieve some form of fairness among users, whenever the traffic demand exceeds network capacity. Despite the plethora of work in this field, the scenario where one or more nodes declare false queue backlog values in order to gain throughput advantage remains unexplored. In this paper we examine this type of selfish misbehavior, concentrating on a specific class of algorithms, the so-called quadratic Lyapunov-function-based algorithms (QLA). In particular, the effect of backlog misreporting on a single-hop access network with contending stations is evaluated through simulations. A simple framework for the detection of misbehaving nodes is proposed, under the assumption that the access-point is aware of the utility functions of the stations. The detection approach exploits the fact that under QLA the throughput of a node must be approximately equal to an expected value, derived from the reported queue backlogs. © 2012 IEEE. | en |
dc.source.uri | http://www.scopus.com/inward/record.url?eid=2-s2.0-84866632845&partnerID=40&md5=ea7acc8aefd2fc7f8f0e15620683a793 | |
dc.subject | Access network | en |
dc.subject | Cross layer optimization | en |
dc.subject | Cross-layer networks | en |
dc.subject | Detection approach | en |
dc.subject | Expected values | en |
dc.subject | Intensive research | en |
dc.subject | Misbehaving nodes | en |
dc.subject | Network Capacity | en |
dc.subject | Selfish misbehavior | en |
dc.subject | Single-hop | en |
dc.subject | Stable operation | en |
dc.subject | Traffic demands | en |
dc.subject | Utility functions | en |
dc.subject | Algorithms | en |
dc.subject | Computer simulation | en |
dc.subject | Quality of service | en |
dc.subject | Queueing theory | en |
dc.subject | Network layers | en |
dc.title | Dishonest reporting in queue-based cross-layer network optimization | en |
dc.type | conferenceItem | en |
Αρχεία σε αυτό το τεκμήριο
Αρχεία | Μέγεθος | Τύπος | Προβολή |
---|---|---|---|
Δεν υπάρχουν αρχεία που να σχετίζονται με αυτό το τεκμήριο. |