2019
DOI: 10.1109/comst.2018.2863030
|View full text |Cite
|
Sign up to set email alerts
|

Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends

Abstract: Game Theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming Multi-Access Edge Computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aimi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
115
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 176 publications
(115 citation statements)
references
References 274 publications
0
115
0
Order By: Relevance
“…Stackelberg games are widely used in the literature to model the interaction among multiple self-interested entities in the field of resource management problems in 5G networks [16]; specific application arena include Heterogenous Networks (HetNets) [17], [18], edge caching [19], edge computing [20], device-to-device communications [21], cognitive networks [22], Cloud Radio Access Networks (C-RANs) [23].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Stackelberg games are widely used in the literature to model the interaction among multiple self-interested entities in the field of resource management problems in 5G networks [16]; specific application arena include Heterogenous Networks (HetNets) [17], [18], edge caching [19], edge computing [20], device-to-device communications [21], cognitive networks [22], Cloud Radio Access Networks (C-RANs) [23].…”
Section: Related Workmentioning
confidence: 99%
“…Let y = {y v } v∈V denote a strategy profile of G V (P). Then, let x vk (P k , y) denote the amount of cell capacity obtained by SP v from InP k at unit price P k given the SP strategy profile y: if v does not select k in y (i.e., y vk = 0) then clearly x vk (P k , y) = 0, otherwise if v selects k in y (i.e., y vk = 1) then x vk (P k , y) is equal to the value of variable x vk in the optimal solution of problem (15)- (20) when the capacity assignment problem is solved by InP k for the set V k = {v ∈ V : y vk = 1}, given 9 The equilibrium(a) of the MLFG are determined by means of the subgame perfect equilibrium solution concept which is an extension of the backward induction solution concept for the original one-leader, one-follower Stackelberg game. The idea behind backward induction is that the leader assumes that the follower is rational and it anticipates the follower's best response to each action of its own.…”
Section: ) Sps' Gamementioning
confidence: 99%
“…Therefore, using these techniques may result in poor resource utilization. Also, the game theoretic approaches often do not incorporate heterogeneity of players as well as dynamic change in the network topology and number of players for resource allocation [25]. • ML for Resource management in smart home environment: Smart home applications are among the most popular IoT applications that involve a combination of heterogeneous and ubiquitous devices such as security cameras, hand-held scanners, tablets, smart appliance, and wireless sensors.…”
Section: Introductionmentioning
confidence: 99%
“…With the increasingly diversified means of network attack, the situation of network security is facing more and more serious challenges [1]. It is urgent to take effective defense to ensure network security.…”
Section: Introductionmentioning
confidence: 99%