Game Theory for Cooperation in Multi-Access Edge Computing

Game Theory for Cooperation in Multi-Access Edge Computing

Jose Moura, Rui Neto Marinheiro, Joao Carlos Silva
ISBN13: 9781668457009|ISBN10: 1668457008|EISBN13: 9781668457016
DOI: 10.4018/978-1-6684-5700-9.ch012
Cite Chapter Cite Chapter

MLA

Moura, Jose, et al. "Game Theory for Cooperation in Multi-Access Edge Computing." Research Anthology on Edge Computing Protocols, Applications, and Integration, edited by Information Resources Management Association, IGI Global, 2022, pp. 229-279. https://doi.org/10.4018/978-1-6684-5700-9.ch012

APA

Moura, J., Marinheiro, R. N., & Silva, J. C. (2022). Game Theory for Cooperation in Multi-Access Edge Computing. In I. Management Association (Ed.), Research Anthology on Edge Computing Protocols, Applications, and Integration (pp. 229-279). IGI Global. https://doi.org/10.4018/978-1-6684-5700-9.ch012

Chicago

Moura, Jose, Rui Neto Marinheiro, and Joao Carlos Silva. "Game Theory for Cooperation in Multi-Access Edge Computing." In Research Anthology on Edge Computing Protocols, Applications, and Integration, edited by Information Resources Management Association, 229-279. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-5700-9.ch012

Export Reference

Mendeley
Favorite

Abstract

Cooperative strategies amongst network players can improve network performance and spectrum utilization in future networking environments. Game Theory is very suitable for these emerging scenarios, since it models high-complex interactions among distributed decision makers. It also finds the more convenient management policies for the diverse players (e.g., content providers, cloud providers, edge providers, brokers, network providers, or users). These management policies optimize the performance of the overall network infrastructure with a fair utilization of their resources. This chapter discusses relevant theoretical models that enable cooperation amongst the players in distinct ways through, namely, pricing or reputation. In addition, the authors highlight open problems, such as the lack of proper models for dynamic and incomplete information scenarios. These upcoming scenarios are associated to computing and storage at the network edge, as well as, the deployment of large-scale IoT systems. The chapter finalizes by discussing a business model for future networks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.