IEEE INFOCOM 2018 - IEEE Conference on Computer Communications 2018
DOI: 10.1109/infocom.2018.8485973
|View full text |Cite
|
Sign up to set email alerts
|

Network Utility Maximization in Adversarial Environments

Abstract: Stochastic models have been dominant in network optimization theory for over two decades, due to their analytical tractability. However, these models fail to capture non-stationary or even adversarial network dynamics which are of increasing importance for modeling the behavior of networks under malicious attacks or characterizing short-term transient behavior. In this paper, we consider the network utility maximization problem in adversarial network settings.In particular, we focus on the tradeoffs between to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…We investigate network optimization under a generalized partiallycontrollable network model whereas existing works (e.g., [9,20,22]) imposed very stringent assumptions about the behavior of uncontrollable nodes for analytical tractability (e.g., underlay nodes use shortest path routing). In addition, our framework allows for both adversarial environment (e.g., adversarial exogenous packet injections and link states) and adversarial uncontrollable nodes, thus greatly extending previous adversarial network models that do not account for uncontrollable nodes (e.g., [2,10,11,17]). As far as we know, this is the rst work that establishes network optimization results under the generalized adversarial partiallycontrollable network model.…”
Section: Our Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…We investigate network optimization under a generalized partiallycontrollable network model whereas existing works (e.g., [9,20,22]) imposed very stringent assumptions about the behavior of uncontrollable nodes for analytical tractability (e.g., underlay nodes use shortest path routing). In addition, our framework allows for both adversarial environment (e.g., adversarial exogenous packet injections and link states) and adversarial uncontrollable nodes, thus greatly extending previous adversarial network models that do not account for uncontrollable nodes (e.g., [2,10,11,17]). As far as we know, this is the rst work that establishes network optimization results under the generalized adversarial partiallycontrollable network model.…”
Section: Our Contributionsmentioning
confidence: 99%
“…However, these results are limited to very speci c queueing systems and only exogenous tra c injections are adversarial. Recently, Liang and Modiano [10,11] studied various network optimization problems under a generalized adversarial network model that relaxed the window constraints. ey analyzed the worst-case performance of di erent network control algorithms (e.g., MaxWeight [24] and Dri -plus-Penalty [18]) under their proposed adversarial models with respect to the notions of queue length regret and utility regret.…”
Section: Network Optimization In Adversarialmentioning
confidence: 99%
“…The adversarial setting is considered for a MaxWeight model by Liang and Modiano (2018a). Further formulations for wireless networks (Stahlbuhk et al 2019) and for network utility maximization are considered (Liang and Modiano 2018b). A strategic adversarial model of queueing is considered by Gaitonde and Tardos (2020a).…”
Section: Literaturementioning
confidence: 99%
“…This definition naturally enforces network resource constraints as the undelivered jobs in the queues at time 𝑇 are not counted towards the utility. We seek to design a policy with regret sublinear to 𝑇 , where regret [11] is defined as the gap between the expected utility of the policy and that of the optimal policy that has full knowledge of the utility functions in advance. As a first step, we establish that the expected utility achieved by the optimal (dynamic) policy is upper bounded by 𝑇 times the optimal value of a static optimization problem, whose objective is the sum of the (unknown) utility functions and the constraints are implicitly given by the capacity region of the network.…”
Section: Introductionmentioning
confidence: 99%