Abstract
Cooperative communication is shown to be a promising technology to significantly increase the capacity of wireless networks. Due to the competition among multiple source-destination pairs for the same relay node set in the relay assignment problem, each pair may cheat others to achieve a more individual revenue. However, the cheating behavior may decrease the overall performance of the network greatly. Thus, there is a challenge for designing a truthful protocol that maximizes a pair's payoff only when this pair reveals its true individual information. In this paper, we propose a relay assignment protocol (RA-VCG) for cooperative communication to maximize the total social value (i.e., the total true value of all pairs) while guaranteeing truthfulness in an auction-theoretic sense by charging each pair an extra payment. Specially, RA-VCG implements a variation of the well-known VCG mechanism for the truthful relay assignment problem in the network with selfish source-destination pairs. Then, we prove the validity of this protocol and also show several surprising properties (such as no positive transfer and individual rationality) associated with this protocol. The simulation results show that the total social value achieved when each node takes untruthfully is about 23.3% less than that achieved when nodes behave truthfully.
1. Introduction
In recent years, there are growing interests in the idea of employing cooperative communication (CC) [1–4] to improve the performance of wireless networks. Spatial diversity has been shown to be very effective in copping fading in wireless channel by employing multiple transceiver antennas on a wireless node (i.e., MIMO). However, it may be infeasible for equipping multiple antennas on a wireless node in practice, as the footprint of multiple antennas may not fit on a wireless node, especially the wireless small-size device [5, 6]. In order to achieve spatial diversity without multiple antennas on the same node, the CC has been proposed in [1] by using distributed single antenna nodes. Under CC, each node is equipped with only a single antenna and can use the antennas on other (relay) nodes to achieve the spatial diversity.
There are two categories of CC modes: amplify-and-forward (AF) and decode-and-forward (DF) [1]. In AF mode, the relay node only performs a linear operation on the signal received from the source node, and then forwards it to the destination node. In DF mode, the relay node firstly decodes the signal received from the source node, and then forwards the reencoded signal to the destination node. Regardless of AF and DF, the choice of a relay node will affect the performance of CC greatly [3–5]. As shown in Section 3, an improperly relay node may make the performance of CC for a source-destination pair be worse than that of direct transmission (DT).
The previous works [2, 4–9] mainly studied the relay assignment problem for CC in the network where multiple source-destination pairs compete for the same pool of relay nodes without any cheating. However, for a source-destination pair, employing different relay nodes will achieve a different performance and the difference is very apparent. Moreover, the physical limitations of many transceivers prohibit them from transmitting data on multiple channels at the same time, so that each relay node can serve for at most one pair. These features promote the competition among all pairs, where each pair will cheat the others to get a better relay node so that it can achieve a more individual revenue. However, these selfish source-destination pairs may make the total social value (i.e., the total true value of all pairs and the true value of each pair will be defined in Section 3) very low because of cheating.
Next, we illustrate the harm caused by cheating in a network example. As shown in Figure 1, the number in each triangle denotes the true value (which will be defined in Section 3) of CC for the source-destination pair employing the corresponding relay node. For example, if pair

Illustration of attractive cheating.
Thus, there is a challenge for designing a truthful protocol that maximizes a source-destination pair's payoff (utility) only when this pair reveals its true individual value. So, we study the truthful relay assignment problem for CC in wireless networks where multiple selfish source-destination pairs compete for the same pool of relay nodes. Specially, our goal is to design a protocol that maximizes the total social value of all pairs while guaranteeing truthfulness.
The main contributions of this paper are the following.
We point out that there are cheating behaviors among some pairs, and we also give several main cheating possibilities for each pair in relay assignment problem. So, we defined a truthful relay assignment problem in this paper where each source-destination pair is selfish and it can cheat each other to get a more individual revenue.
We design a protocol for truthful relay assignment problem called RA-VCG to maximize the total social value of all pairs while guaranteeing truthfulness. This protocol implements a variation of the well-known VCG mechanism. In order to guarantee truthfulness, RA-VCG will charge each pair a payment such that a source-destination pair's payoff will be maximized only when this pair reveals its true individual value.
We also prove that our protocol can achieve the maximum total social value for all source-destination pairs while guaranteeing truthfulness. Moreover, there are several another nice properties (such as no positive transfer and individually rationality) associated with RA-VCG.
The simulation results show that the total social value achieved when each node takes untruthful behaviors is about 23.3% less than that achieved when nodes behave truthfully in RA-VCG.
The rest of this paper is organized as follows. We review the literature work in Section 2. Section 3 describes the system model and problem definition. In Section 4, we present RA-VCG protocol in detail. In Section 5, we prove the correctness of this protocol in terms of maximizing total social value and truthfulness. The simulation results are presented in Section 6. Section 7 concludes this paper.
2. Related Work
It is possible for a source-destination pair to employ multiple relay nodes to use CC, but the benefit of this approach is limited. In [3], Zhao et al. showed that it is sufficient to choose the “best” relay node to achieve full diversity order than to employ multiple relay nodes for a pair. Therefore, it paved the way for research on assigning at most one relay node to a pair and we will adopt this setting in this paper. However, this work [3] is limited to a single pair and cannot be easily extended to multiple source-destination pairs’ situation.
Then, we will review the related works on the relay assignment problem with multiple source-destination pairs for CC. In [2], Ng and Yu gave a utility maximization problem for the joint optimization of relay assignment, resource allocation, and CC modes selection in a cellular network. Then, Kadloor and Adve [7] formulated a related convex optimization problem for the relay selection and power allocation problem. However, these two works assume that each relay node has infinite number of channels so as to help multiple pairs, but this setting will not always hold in practice where the number of a relay node's channels is limited.
There are also some works studied the relay assignment problem with the setting that each relay node can be assigned to at most one pair. Zhang et al. [8] investigate the relay assignment problem in the wireless network where the number of relays equals or exceeds the number of source-destination pairs. However, this assumption may not always hold in practice where the number of relay nodes is less than that of source-destination pairs. In [4], Cai et al. studied the joint relay node selection and power allocation for AF mode so as to maximize the network throughput both for the network environment with a single pair and multiple pairs. Shi et al. [5, 6] proposed an optimal algorithm for the relay node assignment problem to maximize the minimum capacity among all pairs. In [9], the authors studied the joint relay assignment and power allocation problem aiming to minimize the total power consumption for all nodes. However, all the above works did not consider the selfishness of the source-destination pairs, and the selfishness can greatly decrease the network performance.
Specially, Li et al. [10] studied the relay assignment problem in cooperative wireless networks with self-interested nodes. They modeled the cooperative relationship among the nodes as an exchange market game where nodes trade transmission power between each other to get diversity gain. However, this market mechanism faces significant challenges due to the fear of market manipulation. Moreover, the authors in [10] assumed that there is no difference between any assisted nodes (relay nodes) from the point of each node (source-destination pair). But in fact the performance of each pair by employing different relay nodes will be different in practice. This feature causes the competition among multiple pairs, and each pair will cheat the others so as to get its favorite relay node.
The works about scheme design in [11–15] are most related to our work. Shastry and Adve [13] proposed a pricing-based system to stimulate the cooperation via payment, in order to ensure both the access point and the relay nodes benefit from cooperation. Wang et al. [14] employed a buyer/seller Stackelberg game, where a buyer announced its selection of relays and the required transmission power, then the relays asked proper prices to maximize their profits. In [15], Huang et al. proposed two repeated games. In each game, each user iteratively updated its bid to maximize its own utility function with the knowledge of others previous bids. However, all the above schemes cannot guarantee the optimal total social value. In [12], Yang et al. proposed a truthful auction scheme for cooperative communications. This scheme satisfies truthfulness, individual rationality, and budget balance properties in the same time. Similarly, this scheme also cannot guarantee the optimal total social value. Moreover, in this scheme, the authors assumed that all pairs knew the capacity of other pairs in the network so as to get an initial relay assignment solution, but each pair might cheat the others about its capacity to get its favorite relay node in practice. In [11], Yang et al. proposed a robust scheme to prevent selfish behavior of source nodes and cheating behavior of relay nodes while guaranteeing the social optimal system capacity. However, this paper assumed that the information of each source node was known by all other source nodes, and thus did not consider the truthfulness of source nodes. In fact, each source node might cheat the others to get its favorite relay node.
Since VCG mechanism is effective in preventing cheating, there are many works to use VCG mechanism in wireless networks to guarantee truthfulness. Such as Anderegg and Eidenbenz [16] proposed a routing protocol which implemented a variation of VCG mechanism so as to find the most cost-efficient path. In [17], the authors investigated how to use VCG mechanism to allocate and price spectrum resource. Shu and Varaiya [18] proposed a VCG mechanism-based access control mechanism for packet traffic. Therefore, in order to prevent the cheating among some pairs, we implement a variation of VCG mechanism to guarantee truthfulness in this paper. Specially, we study the truthful relay assignment problem for CC in wireless networks where multiple selfish source-destination pairs compete for the same pool of relay nodes.
3. System Model
3.1. Cooperative Communication Model
The essence of CC can be shown by a simple example in Figure 2, where source node s potentially transmits to the destination node d with the help of relay node r. This transmission is done on a frame-by-frame basis and there are two time slots in a frame [1, 5, 6]. In the first time slot, source node s transmits a signal to destination node d, and this signal is also overheard by the relay node r. In the second time slot, the relay node r forwards the signal received in the first time slot to the destination node d. Now, node d can use a diversity combining technique on two copies of the data from two different paths to increase the capacity gain.

A simple example for cooperative communication.
Assume source node s sends a data to destination node d with the transmitting power
So, the signal noise ratio (SNR) [5, 6] at the destination d is
where
In AF mode, relay r simply amplifies the signal received from node s in the first time slot and then forwards it to node d in the next slot. The achievable AF capacity is given by [1]
where W is the bandwidth.
In DF mode, relay r decodes and estimates the signal from node s in the first time slot, and then forwards the reencoded estimated signal to node d in the next slot. The DF capacity shown in [1] is
When CC (i.e., relay node r) is not used, node s transmits directly to node d in both two time slots. Thus, the capacity of direct transmissions (DT) is
From the above results, we have three observations.
Comparing
The capacity is a monotonic increasing function of the transmission power under all the communication modes (AF, DF, and DT). Therefore, both source node and relay node should transmit at the maximum power so as to achieve the maximum capacity. So, we let
The capacities for AF and DF have the same form (i.e., a function of
3.2. Truthful Relay Assignment Problem
We consider a wireless network consisting of N nodes, where there are four subsets of nodes: (1) the set of source nodes,

The wireless network in our model.
For clarity, we consider unicast where each source node
More formally, we use
with
We propose to model the true value of a source-destination pair through a parameter: the value-of-capacity parameter
We assume that there is no collusion in the wireless network and that each pair wants to employ its favorite relay so as to maximize its individual revenue. However, the favorite relay node of some pairs may be the same one (e.g., in Figure 3,
Specially, our objective is to design a relay assignment protocol to find a relay assignment result that maximizes the total social value:
and causes all source-destination pairs to act truthfully, that is, to reveal their true values, where
In order to guarantee truthfulness, the assignment node will charge each pair a payment (virtual money) in the protocol such that a source-destination pair's payoff will be maximized only when it reveals its true individual value. The payment determination for each pair will be presented in Section 4.3.
As with other truthful protocols in wireless networks, we assume a payment mechansm [19] that takes charge of accounting and transferring payments between nodes. There is also a tamper-proof hardware [20] which can protect virtual money from modification or other attacks. Note that, conceptually we could also think that the payments can be funded by the entities which own the wireless devices. However, we focus on effective truthful relay assignment problem in this paper. Other issues about the virtual money, securely crediting and transferring money are beyond the scope of this paper.
Note that this network model might correspond to a snapshot of a wireless network. For example, in the context of a Cognitive Radio Network (CRN) which consists of some second users and a primer user, each user also have a source node (device) and a paired destination node (device). When the primer user does not use its own spectrum in a period of time, it will divide its spectrum to some second users so as to maximize total social value. Thus, the assignment node corresponding to the destination node (or source node) of the primer node; the source-destination pairs correspond to the occupied second users that have data to transmit; the available relay nodes corresponding to the unoccupied second users’ source node or destination node which do not have data to transmit. Moreover, every unoccupied second user is willing to participate in cooperative communication, so that the others can help this user when it has data to transmit. Specially, the primer node can also enforce each unoccupied user to participate in CC; otherwise, the primer user does not allow this pair to use its spectrum forever. Note that, in this paper, every node in the network only serve as one role in a period of time and we focus on the relay assignment in this period of time. Moreover, the role of each node may change in the next period of time, and it needs to reexecute the protocol designed in this paper. From above, when a primer user tries to divide its spectrum to some second users so as to maximize total social value in CRN, there are two important issues that need to be solved. One is spectrum allocation, where the primer user decides how to divide and allocate its spectrum. The other is relay assignment, where the primer user decides how to assign relay nodes (unoccupied second user) to source-destination pairs (occupied second users). Specially, in this paper, we focus on relay assignment problem and omit spectrum allocation problem. However, we will jointly consider spectrum allocation and relay assignment problem for cooperative communication in CRN in the future.
4. Truthful Relay Assignment Protocol
In order to achieve truthfulness, we design a truthful relay assignment protocol (RA-VCG) which implements a variation of the well-known VCG mechanism for CC in wireless networks. RA-VCG will charge each pair a payment (virtual money) such that a source-destination pair's payoff will be maximized only when it reveals its true individual value.
4.1. Basic Idea
Figure 4 shows the flow chart of RA-VCG. This protocol consists of the following three phases:
relay discovery,
relay assignment,
data transmission.

The flow chart of RA-VCG protocol.
In relay discovery phase, the assignment node will first broadcast a message to inform all the source nodes to select relay nodes. Then, each source node will send a message to find the corresponding relay node. Next, each relay node will forward the message from the source node to its corresponding destination node. After that, each destination node can compute the true value
Each destination node Assignment node A broadcasts a message START(A).
Broadcast a message RTEST( Determine the received power Send a message RREP( Determine the received power its paired source node Append Push the appended message to queue Compute Append the BID packet by Determine the received power Compute Append the BID packet by Compute Append the BID message by Send the BID message to the assignment node A.
In the relay assignment phase, the assignment node will determine the final relay assignment result according to all the information sent by the destination nodes. After that, the assignment node also decides the payments for each pair to guarantee truthfulness.
In data transmission phase, each pair pays the payment and starts transmitting data. Next, we will present our RA-VCG protocol in detail.
4.2. Relay Discovery
We introduced a trusted node called assignment node to the network, which takes charge of assigning relay nodes and deciding the corresponding payments for each pair. For example, in the CRN, the assignment node corresponds to the primer user who shares his spectrum to some second users so as to maximize the total social value. Specially, if there is not a primer node in the network, we can designate a relay node as the assignment node.
In the beginning, the assignment node will broadcast a message
Each potentially relay node
determine the received power
send a relay reply message RREP(
For each destination node
determine the received power
if
if
Once the destination node
determine the received power
for each message
After the destination node
4.3. Relay Assignment
After the relay discovery phase, all the destination nodes (source-destination pairs) have sent BID messages to the assignment node A that collects all the arriving BID messages. Then the assignment node A will perform an algorithm called truthful relay assignment (TRA) algorithm. In TRA, the assignment node A will first perform an optimal polynomial-time algorithm, called relay assignment (RA) to maximize the total social value by assigning relay nodes to each pair; after that, the VCG-payment of each pair is also determined by the assignment node A to guarantee truthfulness.
The essence of RA algorithm is the maximum matching of weighted bipartite graph. RA algorithm consists of three steps: bipartite graph construction, saturated matching, and relay node assignment, shown in Algorithm 2.
Create the vertex sets X and Y; w( w(
Adopt KM algorithm to find a saturated matching in Graph G; Assume that vertex
result+ = w Return result;
At first, RA algorithm builds up the following weighted bipartite graph
Now, a bipartite graph G has been constructed. Thus, the second step is to adopt the well-known KM algorithm [9, 21] to find out an optimal saturated matching for G, that is, the total weight of all the matched edges is maximized. After the second step, each vertex
RA algorithm is only a subroutine of TRA algorithm which has been shown in Algorithm 3. After performing the RA algorithm, the assignment node has assigned relay nodes for each pair. Then, it will also determine the VCG-payment for each pair to guarantee truthfulness. The VCG-payment for each pair is the harm that it causes to the rest of other pairs and we can formulate it as
where
RA( first = RA( second = RA( pay
In (11) or (12), the first term is the total social value should the corresponding source node
As a result, the assignment node has completed relay assignment and also decides the VCG-payment for each pair after performing TRA algorithm. So, it will broadcast the result by a message
4.4. Data Transmission
When the pair
4.5. Complexity Analysis
Now, we mainly analyze the computational complexity of TRA algorithm and the message complexity of RA-VCG.
First, let us focus on the time complexity of TRA algorithm. In the first step of RA algorithm, there are at most
Next, we will focus on the message complexity of RA-VCG. In the relay discovery phase, the assignment node A sends a START message. Then each source node send a corresponding RTEST message after receiving the START message from assignment node A and so there are
5. Analysis
In this section, we show that RA-VCG meets the design requirements of maximizing the total social value and truthfulness in the presence of selfish source-destination pairs. We also show that our RA-VCG protocol has other nice properties.
Lemma 1.
If all source-destination pairs act truthfully, that is, reveal its true information in BID message, and then RA or TRA algorithm can find out an optimal relay assignment result which maximizes the total social value.
Proof.
The assignment node in RA-VCG collects all BID messages, and then converts the relay assignment problem to an optimal saturated matching problem in weighted bipartite graph based on these messages. If each pair acts truthfully, then the optimal saturated matching found by KM algorithm can also be converted to an optimal relay assignment result that maximizes the total social value. So, the lemma holds.
From Lemma 1, we can see that maximizing the total social value of RA-VCG follows immediately from the description of RA-VCG, if we can guarantee truthfulness of each pair. Thus, now we will show that the RA-VCG can guarantee truthfulness. Specially, showing that RA-VCG is truthful is more involved. Truthfulness is given if and only if it is a dominant strategy for each pair
declare its true value-of-capacity parameter
correctly compute and declare its capacity of DT;
correctly compute and declare its capacity of CC for all relay nodes (including both its desired relay node and undesired relay nodes) in BID message.
We call all these items “cheating possibilities”.
In accordance with the definition of dominant strategies, we assume an adversarial pair to be omniscient: an omniscient pair knows all edge weight of the bipartite graph. Our protocol is truthful only if even such a powerful pair cannot use its knowledge to its own advantage. The reason for using such a strong adversarial model is to prevent some pairs from taking bets based on their partial knowledge of the network.
Lemma 2.
In RA-VCG, each source-destination pair
Proof.
We use
There are only two cases to discuss in the following. Assume that
In the first case, the source-destination pair
In the second case, the source-destination pair
where the definition of parameters in (14) can be seen from (12) in Section 4.3. Note that in (14), the first term is the maximum total social value when
Theorem 3.
RA-VCG is truthful and can maximize the total social value.
Proof.
From Lemma 2, we can see that each pair is truthful about not only the desired relay nodes but also other undesired relay nodes and DT. In other words, each pair is truthful about all the relay nodes and thus declares its true information in its BID message. Thus, RA-VCG is truthful. Since all source-destination pairs act truthfully (see Lemma 2) in RA-VCG, then we can get that RA-VCG (RA or TRA algorithm) can maximize the total social value from Lemma 1. Thus, the theorem holds.
Our RA-VCG also has some other nice properties as follows.
Theorem 4.
If source-destination pair
Proof.
Note that if source-destination pair
Thus, the theorem holds.
Theorem 5.
For each source-destination pair
Proof.
In the first case
In the second case
Thus, the theorem holds.
Theorem 6.
For each source-destination pair
Proof.
The utility of
Thus, the theorem holds.
From Theorems 4 and 5, we can see that RA-VCG has no positive transfer. It means that the assignment node does not need to pay anything to the source-destination pairs. Moreover, RA-VCG is individually rational. It means that the pairs are willing to participate in RA-VCG, that is, no pair is really being forced to participate, because the utility achieved by each pair in participating is not smaller than that achieved by using DT (see Theorem 6).
6. Simulation Results
In this section, we give some simulation results to evaluate the performance of RA-VCG in wireless networks with selfish source-destination pairs. Firstly, we present the simulation settings. Secondly, we will show that RA-VCG is indeed truthful (i.e., it can indeed prevent source-destination pairs from cheating each other). Thirdly, we will observe the total social value achieved by RA-VCG. Moreover, we consider both the AF and DF modes for CC.
6.1. Simulation Settings
We consider a wireless network generated by randomly placing all the nodes in the square area
We assume the bandwidth
6.2. Truthfulness of RA-VCG
We first observe the effect of the number of source-destination pairs on the average utility of each pair for RA-VCG. As shown in Figures 5 and 6, we have 15 available relay nodes in the network, and the number of source-destination pairs changed from 9 to 19. Then, We observe the effect of the number of available relay nodes on the average utility of each pair for RA-VCG. As shown in Figures 7 and 8, we have 15 source-destination pairs in the network, and the number of available relay nodes changes from 5 to 33.

Average utility versus source-destination pair number in case 1.

Average utility versus source-destination pair number in case 2.

Average utility versus available relay node number in case 1.

Average utility versus available relay node number in case 2.
Nevertheless AF and DF, the average utility of each pair by declaring untruthful BID message is less than the average utility obtained when each source-destination pair declares truthful BID message (i.e., see Figures 5–8). These simulation results show that RA-VCG maximizes a source-destination pair's payoff only when this pair reveals its true individual information. Hence, RA-VCG is truthful.
6.3. Impact of Untruthfulness on Total Social Value
Next, we focus on the impact of untruthful behaviors of source-destination pairs on the total social value. As shown in Figures 9 and 10, when the number of source-destination pairs increases, total social value increases for both cases 1 and 2. Moreover, the truthful behavior in AF mode and DF mode can increase 26.5% and 19.6% total social value than untruthful behaviors both in case 1 and case 2. Figures 11 and 12 show that the total social value increases when the number of available relay nodes increases for both AF and DF in case 1 (see Figure 11) and 2 (see Figure 12). This is because with more relay nodes, there are more chances for each pair to employ relay nodes to use CC. However, since the number of source-destination pairs do not change, the total social value of DT is always the same when the number of relay nodes changes both in case 1 (which is 427.7 in Figure 11) and case 2 (which is 1043.7 in Figure 12). Moreover, we can see that AF mode and DF mode with truthful behavior can increase about 27.0% and 19.7% total social value comparing with untruthful behavior both in case 1 and case 2. Thus, from all these simulation results (Figures 9–12), we can see that the total social value achieved when each node takes untruthful behaviors is average of about 23.3% less than that achieved when nodes behave truthfully.

Total social value versus source-destination pair number in case 1.

Total social value versus source-destination pair number in case 2.

Total social value versus available relay node number in case 2.

Payment ratio versus available relay node number in case 2.
7. Conclusion
CC is a novel technology to achieve spatial diversity. Thus, this paper studies the truthful relay assignment problem in wireless network where each source-destination pair may cheat the others to achieve more individual revenue. Therefore, in order to prevent cheating, we propose RA-VCG, a relay assignment protocol for CC to maximize the total social value while guaranteeing truthfulness by charging each pair an extra payment in wireless networks with selfish source-destination pairs. Moreover, we prove the validity of this protocol and also show several surprising properties associated with this protocol. The simulation results show that the total social value achieved when each node takes untruthful behaviors is about 23.3% less than that achieved when nodes behave truthfully.
Footnotes
Acknowledgments
The work of this paper is supported by the National Grand Fundamental Research 973 Program of China under Grant no. 2011CB302-905, the National Science Foundation of China under Grant nos. 61170058, 61272133, and 51274202, National Science and Technology Major Project under Grant no. 2011ZX03005-004-04, the Natural Science Foundation of Jiangsu Province in China (Grant nos. BK2009150 and BK2012632), and Research Fund for the Doctoral Program of Higher Education of China no. 20103402110041.
