Staff View
Evolutionary games

Descriptive

TitleInfo
Title
Evolutionary games
SubTitle
applications to security and resource allocation in networks
Name (type = personal)
NamePart (type = family)
Alabdel Abass
NamePart (type = given)
Ahmed A.
NamePart (type = date)
1980-
DisplayForm
Ahmed A. Alabdel Abass
Role
RoleTerm (authority = RULIB)
author
Name (type = personal)
NamePart (type = family)
Mandayam
NamePart (type = given)
Narayan B.
DisplayForm
Narayan B. Mandayam
Affiliation
Advisory Committee
Role
RoleTerm (authority = RULIB)
chair
Name (type = corporate)
NamePart
Rutgers University
Role
RoleTerm (authority = RULIB)
degree grantor
Name (type = corporate)
NamePart
School of Graduate Studies
Role
RoleTerm (authority = RULIB)
school
TypeOfResource
Text
Genre (authority = marcgt)
theses
OriginInfo
DateOther (qualifier = exact); (type = degree)
2018-10
CopyrightDate (encoding = w3cdtf); (keyDate = yes)
2018
Place
PlaceTerm (type = code)
xx
DateCreated (encoding = w3cdtf)
2018
Language
LanguageTerm (authority = ISO639-2b); (type = code)
eng
Abstract (type = abstract)
Modern life is getting more complicated and people rely more on the intelligence embedded in their electronic gadgets. It is expected these gadgets will take larger roles in making, at least some simple, decisions instead of us. It is not difficult to see how many gadgets will be needed in an Internet of Things environment, or smart home settings, or any sort of connected devices. Interaction among these devices can be addressed using game theoretical models. However for a large number of devices interacting/playing with each other, the classical game models can be complicated. One way to approach this problem is by using evolutionary game theory (EGT). Evolutionary games deal with large number of players by making assumptions such as some common similarities in the players' interests, payoffs, and bounded rationality. Both of these assumptions seem to fit in modeling the large number of players'/devices' interaction. On the other hand, evolutionary games can model the user behavior in taking decisions when repeatedly played. Meaning that, each time a player does a move, the player observes the payoff and can compare it with the average payoff, and in the next play the player can choose a different move if it gives higher payoff and so on so forth. By using the concept of replicator dynamics, evolutionary games make it possible to observe how the choice dynamics is made. It can be looked at as learning until reaching to a very stable choice which is an evolutionary stable choice.
This thesis first presents the problem of communications under a denial of service attack through a jamming threat. We consider the problem where the players try to communicate with a base station under the threat of jammers who, possible cooperatively, try to block their communications. The users have the option to work cooperatively too. The second problem this thesis deals with a generalized network model known as ephemeral network under the threat of a malicious attack with the absence of any central authority. The only control to the network is a set of rules which are agreed upon before setting a connection. Thirdly, we study the problem of advanced persistent threats (APTs), which is the problem of a powerful and stealthy attacker who wants to infiltrate the system. Evolutionary game theory is used by giving the players, the APT attacker and the system defender, the opportunity to adapt their decisions according to the replicator dynamics to reach to the robust decision,i.e, to choose the defend/attack strategy.
The final part of this work uses evolutionary game theory to model the coexistence between WiFi and LTE-U technologies. We consider a scenario where there are two heterogeneous populations, one population represents the set of LET-U APs and the other one represents the set of WiFi AP. Furthermore, we assume that AP's belong to the same population do not interfere with each other. We study, under a given set of transmission strategies, the stability of the strategies that can appear in such a conflict. We specify the conditions under which, a coexistence with minimal interference can be established.
Subject (authority = RUETD)
Topic
Electrical and Computer Engineering
Subject (authority = LCSH)
Topic
Game theory
RelatedItem (type = host)
TitleInfo
Title
Rutgers University Electronic Theses and Dissertations
Identifier (type = RULIB)
ETD
RelatedItem (type = host)
TitleInfo
Title
School of Graduate Studies Electronic Theses and Dissertations
Identifier (type = local)
rucore10001600001
Identifier
ETD_9035
Identifier (type = doi)
doi:10.7282/T3FF3X0X
PhysicalDescription
Form (authority = gmd)
electronic resource
InternetMediaType
application/pdf
InternetMediaType
text/xml
Extent
1 online resource (xiii, 90 pages : color illustrations)
Note (type = degree)
Ph.D.
Note (type = bibliography)
Includes bibliographical references
Note (type = statement of responsibility)
by Ahmed A. Alabdel Abass
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
NjNbRU
Back to the top

Rights

RightsDeclaration (ID = rulibRdec0006)
The author owns the copyright to this work.
RightsHolder (type = personal)
Name
FamilyName
Alabdel Abass
GivenName
Ahmed A.
Role
Copyright Holder
RightsEvent
Type
Permission or license
DateTime (encoding = w3cdtf); (qualifier = exact); (point = start)
2018-05-09 12:18:31
AssociatedEntity
Name
Ahmed A. Alabdel Abass
Role
Copyright holder
Affiliation
Rutgers University. School of Graduate Studies
AssociatedObject
Type
License
Name
Author Agreement License
Detail
I hereby grant to the Rutgers University Libraries and to my school the non-exclusive right to archive, reproduce and distribute my thesis or dissertation, in whole or in part, and/or my abstract, in whole or in part, in and from an electronic format, subject to the release date subsequently stipulated in this submittal form and approved by my school. I represent and stipulate that the thesis or dissertation and its abstract are my original work, that they do not infringe or violate any rights of others, and that I make these grants as the sole owner of the rights to my thesis or dissertation and its abstract. I represent that I have obtained written permissions, when necessary, from the owner(s) of each third party copyrighted matter to be included in my thesis or dissertation and will supply copies of such upon request by my school. I acknowledge that RU ETD and my school will not distribute my thesis or dissertation or its abstract if, in their reasonable judgment, they believe all such rights have not been secured. I acknowledge that I retain ownership rights to the copyright of my work. I also retain the right to use all or part of this thesis or dissertation in future works, such as articles or books.
Copyright
Status
Copyright protected
Availability
Status
Open
Reason
Permission or license
Back to the top

Technical

RULTechMD (ID = TECHNICAL1)
ContentModel
ETD
OperatingSystem (VERSION = 5.1)
windows xp
CreatingApplication
Version
1.5
DateCreated (point = end); (encoding = w3cdtf); (qualifier = exact)
2018-05-09T16:12:52
DateCreated (point = end); (encoding = w3cdtf); (qualifier = exact)
2018-05-09T16:12:52
ApplicationName
pdfTeX-1.40.18
Back to the top
Version 8.3.10
Rutgers University Libraries - Copyright ©2019