Applications of Repeated Games in Wireless Networks: A Survey

被引:42
作者
Hoang, Dinh Thai [1 ]
Lu, Xiao [1 ]
Niyato, Dusit [1 ]
Wang, Ping [1 ]
Kim, Dong In [2 ]
Han, Zhu [3 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
[2] Sungkyunkwan Univ SKKU, Sch Informat & Commun Engn, Suwon, South Korea
[3] Univ Houston, Dept Elect & Comp Engn & Comp Sci, Houston, TX 77004 USA
基金
新加坡国家研究基金会;
关键词
Repeated games; wireless networks; game theory; Folk theorem; subgame perfect equilibrium; SPECTRUM SHARING GAME; TIT-FOR-TAT; CHEAT-PROOF; COOPERATION STRATEGIES; THEORETIC APPROACH; PRISONERS-DILEMMA; POWER-CONTROL; FOLK THEOREM; FRAMEWORK; SELFISH;
D O I
10.1109/COMST.2015.2445789
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model interactions among players in only one period, in repeated games, interactions of players repeat for multiple periods. Thus, the players become aware of other players' past behaviors and their future benefits, so as to adapt their strategies accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games in encouraging wireless nodes into cooperations, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions.
引用
收藏
页码:2102 / 2135
页数:34
相关论文
共 182 条
[1]   TOWARD A THEORY OF DISCOUNTED REPEATED GAMES WITH IMPERFECT MONITORING [J].
ABREU, D ;
PEARCE, D ;
STACCHETTI, E .
ECONOMETRICA, 1990, 58 (05) :1041-1063
[2]  
Agah Afrand, 2007, INT J NETWORK SECURI, V5, P145
[3]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[4]   What Will 5G Be? [J].
Andrews, Jeffrey G. ;
Buzzi, Stefano ;
Choi, Wan ;
Hanly, Stephen V. ;
Lozano, Angel ;
Soong, Anthony C. K. ;
Zhang, Jianzhong Charlie .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) :1065-1082
[5]  
[Anonymous], J TELECOMMUN
[6]  
[Anonymous], P INT C COMP NETW CO
[7]  
[Anonymous], 2010, P IOOC ECOC CALG AB
[8]  
[Anonymous], IEEE ACM T NETW
[9]  
[Anonymous], FUTURE NETWORK MOBIL
[10]  
[Anonymous], P IEEE INFOCOM