scholarly journals A Credit-Based System for Traffic Routing in Support of Vehicular Networks

2021 ◽  
Vol 23 (2) ◽  
pp. 1-11
Author(s):  
Ammar Kamel ◽  
Maysaa Husam ◽  
Zaid Shafeeq Bakr ◽  
Ziad M. Abood

Network routing has a great impact on the efficiency and reliability of the traffic network system in a real-world scenario. To date, achieving network-consistent performance is the main goal of many traffic network research studies. In this research, a mixed strategy game-theory model for network routing is proposed that discovers the optimal strategies that can be adopted by network route players in a network graph. This model has been validated by measuring the model outcomes using quantal response equilibrium (QRE) technique, which explores the players' noisy decisions by comparing the utilized optimal strategies with Nash equilibrium. The experimental results demonstrate that there is an equilibrium with a mixed strategy of a given network.

2014 ◽  
Vol 651-653 ◽  
pp. 1868-1874
Author(s):  
Li Zhu ◽  
Lan Bai

VANETs is a rapid developed wireless mobile MANETs network with special challenge nature. It is a distributed and self-organized communication network based on moving vehicle. This network has characteristics like limited bandwidth, strong mobility, strong dynamic network topology, limited node degrees freedom, equipment capacity constraints and weak physical security. These characteristics usually make typical routing protocol in mobile MANET show a low efficiency in mobile VANETs, even fail. MANET routing algorithm is roughly divided into two categories, namely table driven routing protocol and on-demand routing protocol. It is due to the particularity of driving cars on the road. So how to improve network routing protocol in the performance is now a challenging problem. The purpose of this article studies network routing mechanism based on wireless vehicular networks simulation method. On the basis of analyzing the performance of typical routing protocols in MANET, such as DSDV, AODV and DSR, the improved scheme of AODV on-demand routing algorithm is put forward.


2012 ◽  
Vol 8 (2) ◽  
pp. 153-172 ◽  
Author(s):  
Hajar Mousannif ◽  
Ismail Khalil ◽  
Stephan Olariu

The past decade has witnessed the emergence of Vehicular Ad-hoc Networks (VANET), specializing from the well-known Mobile Ad Hoc Networks (MANET) to Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) wireless communications. While the original motivation for Vehicular Networks was to promote traffic safety, recently it has become increasingly obvious that Vehicular Networks open new vistas for Internet access, providing weather or road condition, parking availability, distributed gaming, and advertisement. In previous papers [27,28], we introduced Cooperation as a Service (CaaS); a new service-oriented solution which enables improved and new services for the road users and an optimized use of the road network through vehicle's cooperation and vehicle-to-vehicle communications. The current paper is an extension of the first ones; it describes an improved version of CaaS and provides its full implementation details and simulation results. CaaS structures the network into clusters, and uses Content Based Routing (CBR) for intra-cluster communications and DTN (Delay–and disruption-Tolerant Network) routing for inter-cluster communications. To show the feasibility of our approach, we implemented and tested CaaS using Opnet modeler software package. Simulation results prove the correctness of our protocol and indicate that CaaS achieves higher performance as compared to an Epidemic approach.


2007 ◽  
Vol 18 (11) ◽  
pp. 1775-1782 ◽  
Author(s):  
H. J. SUN ◽  
J. J. WU ◽  
Z. Y. GAO

In this paper, we propose a simple betweenness-driven model to capture the dynamics of traffic routing choice behaviors. By comparing with two other models (degree-driven and cost-driven), it is shown that the cost-driven routing strategy is more complex and sensitive to traffic congestion. Another result indicates that the load distributions are determined by the connectivity distribution and route choice behaviors of the traffic network. The model thus provides useful insight for the design of traffic networks.


PLoS ONE ◽  
2014 ◽  
Vol 9 (8) ◽  
pp. e105391 ◽  
Author(s):  
Qian Zhuang ◽  
Zengru Di ◽  
Jinshan Wu

2015 ◽  
Vol 17 (01) ◽  
pp. 1540008 ◽  
Author(s):  
B. K. Mohanty ◽  
Mahima Gupta

This paper introduces a methodology based on fuzzy game theory to determine the buyer's priority of the attributes and select a product in the e-business system. The game theory model developed in our paper considers the prioritization of attributes as strategies for the player (player 1) in one side and selection of the products for the opponent player (player 2). The fuzzy probabilities of the strategies in the game theory are obtained by using the concepts of similarities between the fuzzy numbers. The e-business system devises strategies for the player 1 by attaching appropriate priority levels to product attributes for maximum gain. On the other hand the opponent player 2 select the products as the strategies accordingly. The payoffs obtained in the game theory model as fuzzy numbers are subsequently converted to their equivalent probabilistic mean intervals. This process leads to transform the game theory model into a linear programming problem (LPP) with interval coefficients. The solution to LPP gives us the optimal strategies. These probability of strategies are considered as attributes' weights to determine ranking of the products in e-business system. The methodology is illustrated with the help of a numerical example.


2011 ◽  
Vol 62 (2) ◽  
Author(s):  
Uwe Vollmer ◽  
Michael Diemer

SummaryBased on the model of Cordella and Yeyati (2003) this paper compares the effect of several bailout strategies of a „lender of last resort“ (LoLR) on a bank’s risk behaviour. We show that both „constructed ambiguity“, defined as a properly mixed strategy, and a pure strategy where a LoLR rescues always or never are not the optimal strategies. The LoLR should rather apply a contingent rule which means that he should announce and commit ex ante to a bailout policy depending on a verifiable state of nature. For this reason the optimal bailout policy should not be case by case, but follow an ex ante defined rule. Consequently, there is no contradiction between incentive efficiency and transparency of an efficient LoLR-policy.


2018 ◽  
Vol 36 (5) ◽  
pp. 585-600 ◽  
Author(s):  
Hashim Zameer ◽  
Ying Wang ◽  
Humaira Yasmeen ◽  
Amirhossein Akhavan Mofrad ◽  
Rashid Saeed

Purpose The purpose of this paper is to design a game theory based model that not only provide theoretical basis to control brand counterfeiting, but it also provide a mechanism to enhance brand revenue. Design/methodology/approach This study used the dynamic game theory of incomplete information to understand and encounter the brand counterfeiting issues. The study analyzed the economic relationship of legitimate brand, counterfeiter and consumers using mixed strategy of the dynamic game theory of incomplete information. Findings The results have indicated that brands those take countermeasures to reduce counterfeiting earn maximum revenue, even when the legitimate brands and consumers are unaware from the actions of counterfeiting firms, the legitimate brands should take countermeasures to reduce counterfeiting to earn maximum revenue, and there exists optimal anti-counterfeiting cost for the legitimate brand. Further, this study provides theoretical basis where brand managers can decide to adopt or not to adopt anti-counterfeiting strategy, and also indicate the consequences of each decision. Practical implications Based upon the findings, the study put forward valuable managerial implications. The study revealed that the legitimate brand must emphasize on the significance of taking countermeasures against counterfeiter and also, brand managers should focus on making product traceable, empowering the consumer and ensuring coordination with government officials to control the counterfeiting issues. Originality/value This paper incorporates the role of legitimate brand, counterfeiter and a consumer to establish the dynamic game theory model using mixed strategy to understand and address the counterfeiting issues in the global market.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Shigen Shen ◽  
Keli Hu ◽  
Longjun Huang ◽  
Hongjie Li ◽  
Risheng Han ◽  
...  

This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to guarantee security of Wireless Sensor Networks (WSNs) is computationally costly for sensor nodes due to their limited resources. For this aim, we obtain optimal strategies to save IDS agents’ power, through Quantal Response Equilibrium (QRE) that is more realistic than Nash Equilibrium. A stage Intrusion Detection Game (IDG) is formulated to describe interactions between the Attacker and IDS agents. The preference structures of different strategy profiles are analyzed. Upon these structures, the payoff matrix is obtained. As the Attacker and IDS agents interact continually, the stage IDG is extended to a repeated IDG and its payoffs are correspondingly defined. The optimal strategies based on QRE are then obtained. These optimal strategies considering bounded rationality make IDS agents not always be inDefend. Sensor nodes’ power consumed in performing intrusion analyses can thus be saved. Experiment results show that the probabilities of the actions adopted by the Attacker can be predicted and thus the IDS can respond correspondingly to protect WSNs.


Sign in / Sign up

Export Citation Format

Share Document