TY - JOUR
T1 - Detecting misbehavior in distributed wireless interference networks
AU - Boche, Holger
AU - Naik, Siddharth
AU - Jorswieck, Eduard
N1 - Funding Information:
F’11) received the Dipl.-Ing. and Dr.-Ing. degrees in electri- cal engineering from the Tech- nische Universität Dresden, Dresden, Germany, in 1990 and 1994, respectively. He gradu- ated in mathematics from the Technische Universität Dresden in 1992. From 1994 to 1997, he did postgraduate studies in mathematics at the Friedrich- Schiller Universität Jena, Jena, Germany. He received his Dr. rer. nat. degree in pure mathe matics from the Technische Universität Berlin, Berlin, Germany, in 1998. In 1997, he joined the Heinrich-Hertz-Institut (HHI) für Nachrichtentechnik Berlin, Berlin, Germany. Starting in 2002, he was a Full Professor for mobile communication networks with the Institute for Communications Systems, Technische Universität Berlin. In 2003, he became Director of the Fraunhofer German-Sino Lab for Mobile Communications, Berlin, Germany, and in 2004 he became the Director of the Fraunhofer Institute for Telecommunications (HHI), Berlin, Germany. Since October 2010 he has been with the Institute of Theoretical Information Technology and Full Professor at the Tech-nische Universität München, Munich, Germany. He was a Visiting Professor with the ETH Zurich, Zurich, Switzerland, during the 2004 and 2006 Winter terms, and with KTH Stockholm, Stockholm, Sweden, during the 2005 Summer term. Prof. Boche is a Member of IEEE Signal Processing Society SPCOM and SPTM Technical Committee. He was elected a Member of the German Academy of Sciences (Leopoldina) in 2008 and of the Berlin Brandenburg Academy of Sciences and Humanities in 2009. He received the Research Award ‘‘Technische Kommunikation’’ from the Alcatel SEL Foundation in October 2003, the ‘‘Innovation Award’’ from the Vodafone Foundation in June 2006, and the Gottfried Wilhelm Leibniz Prize from the Deutsche Forschungsgemeinschaft (German Research Foundation) in 2008. He was co-recipient of the 2006 IEEE Signal Processing Society Best Paper Award and recipient of the 2007 IEEE Signal Processing Society Best Paper Award.
PY - 2013/7
Y1 - 2013/7
N2 - The paper analyzes the case of K distributed interference coupled point-to-point links, which utilize a general power update algorithm, which converges monotonically. The channels are constant for the duration of the algorithm. In such a system we allow a set of links to have the ability to misrepresent their utilities, i.e. the receiver sends a misrepresented utility to its transmitter. It is shown that the system, i.e., the set of correctly behaving links, has the ability to detect such a behavior, if and only if G Restricted is irreducible. Here GRestricted is the restricted global dependency matrix, which captures the effect of interference coupling in the system. We then analyze the special case of the Foschini-Miljanic power update algorithm. After at most K - 1 steps, all links are able to detect the misbehavior. Example interference networks are discussed to illustrate the results. Finally the applicability of the results to the practically relevant cases of concave, convex and log-convex interference functions is displayed.
AB - The paper analyzes the case of K distributed interference coupled point-to-point links, which utilize a general power update algorithm, which converges monotonically. The channels are constant for the duration of the algorithm. In such a system we allow a set of links to have the ability to misrepresent their utilities, i.e. the receiver sends a misrepresented utility to its transmitter. It is shown that the system, i.e., the set of correctly behaving links, has the ability to detect such a behavior, if and only if G Restricted is irreducible. Here GRestricted is the restricted global dependency matrix, which captures the effect of interference coupling in the system. We then analyze the special case of the Foschini-Miljanic power update algorithm. After at most K - 1 steps, all links are able to detect the misbehavior. Example interference networks are discussed to illustrate the results. Finally the applicability of the results to the practically relevant cases of concave, convex and log-convex interference functions is displayed.
KW - Detection of misbehavoir
KW - Resource allocation
KW - Self-organizing networks
KW - Wireless interference networks
UR - http://www.scopus.com/inward/record.url?scp=84879798903&partnerID=8YFLogxK
U2 - 10.1007/s11276-012-0502-8
DO - 10.1007/s11276-012-0502-8
M3 - Article
AN - SCOPUS:84879798903
SN - 1022-0038
VL - 19
SP - 799
EP - 810
JO - Wireless Networks
JF - Wireless Networks
IS - 5
ER -