Truthful routing for wireless hybrid networks

Yu Wang, Weizhao Wang, Teresa A. Dahlberg

Research output: Chapter in Book/Entry/PoemConference contribution

7 Scopus citations


Wireless hybrid networks combine the characteristics of both cellular and mobile ad hoc networks. In wireless hybrid networks, it is often assumed that each individual mobile node will faithfully follow the prescribed protocols without any deviation. However, these mobile devices, when owned by individual users, will likely do what is the most beneficial to their owners, i.e., act "selfishly". Therefore, an algorithm or protocol intended for selfish wireless devices must be designed. In this paper, we specifically study how to design routing protocols in wireless hybrid networks with selfish nodes. We first present a VCG-based routing protocol for hybrid networks, and show it is truthful but could be expensive. Then we modify the VCG-based routing protocol to make it more efficient for hybrid networks in term of total payment. However, we prove that nodes could lie up their costs in the modified method. Moreover, we propose a novel routing protocol based on first-price path auctions [1], which can achieve a Nash equilibrium with low total payment.

Original languageEnglish (US)
Title of host publicationGLOBECOM'05
Subtitle of host publicationIEEE Global Telecommunications Conference, 2005
Number of pages5
StatePublished - 2005
Externally publishedYes
EventGLOBECOM'05: IEEE Global Telecommunications Conference, 2005 - St. Louis, MO, United States
Duration: Nov 28 2005Dec 2 2005

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference


OtherGLOBECOM'05: IEEE Global Telecommunications Conference, 2005
Country/TerritoryUnited States
CitySt. Louis, MO


  • Game theory
  • Non-cooperative computing
  • Payment
  • Strategyproof
  • Truthful routing
  • Wireless hybrid networks

ASJC Scopus subject areas

  • General Engineering


Dive into the research topics of 'Truthful routing for wireless hybrid networks'. Together they form a unique fingerprint.

Cite this