
Game Theory, the Internet of Things and 5G Networks: Utilizing Game Theoretic Models to Characterize Challenging Scenarios (EAI/Springer Innovations in Communication and Computing)
by: Josephina Antoniou (Author)
Publisher: Springer
Edition: 1st ed. 2020
Publication Date: 2019/5/23
Language: English
Print Length: 117 pages
ISBN-10: 3030168433
ISBN-13: 9783030168438
Book Description
This book shows how to model selected communication scenarios using game theory. The book helps researchers specifically dealing with scenarios motivated by the increasing use of the Internet of Things (IoT) and 5G Communications by using game theory to approach the study of such challenging scenarios. The author explains how game theory acts as a mathematical tool that models decision making in terms of strategies and mechanisms that can result in optimal payoffs for a number of interacting entities, offering often antagonistic behaviors. The book explores new technologies in terms of design, development and management from a theoretical perspective, using game theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book identifies and explores several significant applications/uses/situations that arise from the vast deployment of the IoT. The presentation of the technological scenarios is followed in each of the first four chaptersby a step-by-step theoretical model often followed by equilibrium proof, and numerical simulation results, that are explained in a tutorial-like manner. The four chapters tackle challenging IoT and 5G related issues, including: new security threats that IoT brings, e.g. botnets, ad hoc vehicular networks and the need for trust in vehicular communications, content repetition by offloading traffic onto mobile users, as well as issues due to new wearable devices that enable data collection to become more intrusive.
About the Author
This book shows how to model selected communication scenarios using game theory. The book helps researchers specifically dealing with scenarios motivated by the increasing use of the Internet of Things (IoT) and 5G Communications by using game theory to approach the study of such challenging scenarios. The author explains how game theory acts as a mathematical tool that models decision making in terms of strategies and mechanisms that can result in optimal payoffs for a number of interacting entities, offering often antagonistic behaviors. The book explores new technologies in terms of design, development and management from a theoretical perspective, using game theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book identifies and explores several significant applications/uses/situations that arise from the vast deployment of the IoT. The presentation of the technological scenarios is followed in each of the first four chaptersby a step-by-step theoretical model often followed by equilibrium proof, and numerical simulation results, that are explained in a tutorial-like manner. The four chapters tackle challenging IoT and 5G related issues, including: new security threats that IoT brings, e.g. botnets, ad hoc vehicular networks and the need for trust in vehicular communications, content repetition by offloading traffic onto mobile users, as well as issues due to new wearable devices that enable data collection to become more intrusive. Read more
Game Theory, the Internet of Things and 5G Networks: Utilizing Game Theoretic Models to Characterize Challenging Scenarios (EAI/Springer Innovations in Communication and Computing)
未经允许不得转载:电子书百科大全 » Game Theory, the Internet of Things and 5G Networks: Utilizing Game Theoretic Models to Characterize Challenging Scenarios (EAI/Springer Innovations in Communication and Computing)
相关推荐
Regular Expressions Machinery: The Illustrated Guide
Getting Started with Cryptocurrency: An introduction to digital assets and blockchain (BCS User Guides)
Image Analysis: 22nd Scandinavian Conference, SCIA 2023, Sirkka, Finland, April 18–21, 2023, Proceedings, Part II (Lecture Notes in Computer Science)
NGINX HTTP Server - Fifth Edition: Harness the power of NGINX with a series of detailed tutorials and real-life examples
2D Metals: Fundamentals, Emerging Applications, and Challenges
Real-Time Embedded Components and Systems with Linux and RTOS
Evasive Malware: Understanding Deceptive and Self-Defending Threats
Smittestopp − A Case Study on Digital Contact Tracing (Simula SpringerBriefs on Computing)
电子书百科大全
评论前必须登录!
立即登录 注册