When Users Interfere with Protocols: Prospect Theory in Wireless Networks using Random Access and Data Pricing as an Example

被引:42
作者
Li, Tianming [1 ]
Mandayam, Narayan B. [1 ]
机构
[1] Rutgers State Univ, ECE Dept, WINLAB, New Brunswick, NJ 08902 USA
关键词
Prospect theory; game theory; data pricing; wireless networks; random access; POWER-CONTROL; GAME-THEORY; ALOHA;
D O I
10.1109/TWC.2013.021214.130472
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Game theoretic models have found widespread use in the analysis and engineered system design of radio resource management algorithms for a wide variety of systems such as cellular, ad hoc and sensor networks. The fundamental principle behind such models and much of game theory has been the reliance on Expected Utility Theory (EUT). Motivated by the increasing amount of end-user control afforded in programmable radio devices, we envision a scenario where end-user actions essentially "interfere" with the underlying engineered system design. As an exemplary scenario, we consider in this paper wireless random access where players follow the precepts of Prospect Theory (PT), a theory developed by Kahneman and Tversky to explain real-life decision making that often deviates from the behavior expected under EUT. Specifically, we consider a game where selfish players adjust their transmission probabilities over a random access channel under throughput rewards, delay penalties and energy costs. By analyzing the Nash Equilibrium achieved, we prove under mild conditions that deviations from EUT results in degradation of system throughput while increasing delay and energy consumption. Finally, we consider a data pricing model and study the impact of end-user decision-making (i.e., players service choices) at the NE on wireless network performance.
引用
收藏
页码:1888 / 1907
页数:20
相关论文
共 35 条
[1]   Game Theoretic Approaches for Multiple Access in Wireless Networks: A Survey [J].
Akkarajitsakul, Khajonpong ;
Hossain, Ekram ;
Niyato, Dusit ;
Kim, Dong In .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (03) :372-395
[2]   CDMA uplink power control as a noncooperative game [J].
Alpcan, T ;
Basar, T ;
Srikant, R ;
Altman, T .
WIRELESS NETWORKS, 2002, 8 (06) :659-670
[3]   Slotted Aloha as a game with partial information [J].
Altman, E ;
El Azouzi, R ;
Jiménez, T .
COMPUTER NETWORKS, 2004, 45 (06) :701-713
[4]  
[Anonymous], 1944, THEORY GAMES EC BEHA, DOI DOI 10.1515/9781400829460
[5]  
[Anonymous], 2000, THESIS KTH STOCKHOLM
[6]   Labor supply of New York City cabdrivers: One day at a time [J].
Camerer, C ;
Babcock, L ;
Loewenstein, G ;
Thaler, R .
QUARTERLY JOURNAL OF ECONOMICS, 1997, 112 (02) :407-441
[7]  
Choi S. M., 2003 INT TEL SOC AS
[8]   Tussle in cyberspace: Defining tomorrow's Internet [J].
Clark, DD ;
Wroclawski, J ;
Sollins, KR ;
Braden, R .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2005, 13 (03) :462-475
[9]  
Ileri O., P 2005 IEEE S NEW FR, P194
[10]   Dynamic spectrum access models:: Toward an engineering perspective in the spectrum debate [J].
Ileri, Oemer ;
Mandayam, Narayan B. .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (01) :153-160