+ All Categories
Home > Documents > ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID:...

ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID:...

Date post: 06-Nov-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
18
ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Computer Networks xxx (2015) xxx–xxx Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet Road-side units operators in competition: A game-theoretical approach Vladimir Fux a , Patrick Maillé a , Matteo Cesana b,Q1 a Institut Mines-Telecom/Telecom Bretagne, Rennes, France b Dip. di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy article info Article history: Received 19 December 2014 Revised 15 June 2015 Accepted 16 June 2015 Available online xxx Keywords: Vehicular networks Game theory Pricing Competition abstract We study the interactions among Internet providers in vehicular networks which offer access to commuters via road side units (RSUs). Namely, we propose a game-theoretical framework to model the competition on prices between vehicular Internet providers to capture the largest amount of users, thus selfishly maximizing the revenues. The equilibria of the aforementioned game are characterized under different mobile traffic conditions, RSU capabilities and users requirements and expectations. In particular, we also consider in the analysis the case where mobile users modify the price they accept to pay for the access as the likeliness of finding an access solution decreases. Our game-theoretical analysis gives insights on the outcomes of the competition between vehicular Internet providers, further highlighting some counter-intuitive behaviors; as an ex- ample, comparing with the case when users have constant price valuation over time, having users inclined to increasing their “acceptable” price may force vehicle Internet providers to charge lower prices due to competition. © 2015 Elsevier B.V. All rights reserved. 1. Introduction 1 Vehicular Ad-hoc NETworks (VANETs) recently attracted 2 much interest from the research community as a core net- 3 working component to build up intelligent transportation 4 systems (ITS) to improve road safety, optimize the humans 5 and goods mobility, and disseminate real-time context infor- 6 mation on traffic loads, congestion and hazardous situations. 7 The applications enabled by VANETs are not only limited to 8 safety-oriented ones, but also extend to leisure applications 9 related to Internet access and entertainment along the road. 10 A comprehensive classification of VANETs applications can 11 be found in [12]. 12 Corresponding author. Tel.: +39 223993695; fax: +39 223993413. E-mail address: [email protected], [email protected], [email protected] (M. Cesana). The design of VANET architectures to support leisure ap- 13 plications has attracted the attention of recent work and re- 14 searchers; as an example, the Drive-thru Internet [22] project 15 targets the provision of affordable Internet connections to 16 vehicular users through road side Wireless LAN infrastruc- 17 ture. The scope of the research covers network access, roam- 18 ing, handover, authentication, etc., and the achieved results 19 show that despite a number of technical challenges to be ad- 20 dressed, providing Internet for highly mobile vehicular users 21 is possible [21–23,25]. The CABERNET [7] and Infostations 22 [28] projects propose architectures similar to Drive-Thru In- 23 ternet. Motivated by these works, we expect that the provi- 24 sion of Internet connectivity via road side infrastructure will 25 be a flourishing market in the next future attracting Internet 26 providers which may possibly compete among themselves. 27 This competition may have a valuable impact on customers 28 welfare, as well as influence the quality and cost of all afore- 29 mentioned features about road safety. 30 http://dx.doi.org/10.1016/j.comnet.2015.06.008 1389-1286/© 2015 Elsevier B.V. All rights reserved. Please cite this article as: V. Fux et al., Road-side units operators in competition: A game-theoretical approach, Computer Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008
Transcript
Page 1: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

Computer Networks xxx (2015) xxx–xxx

Contents lists available at ScienceDirect

Computer Networks

journal homepage: www.elsevier.com/locate/comnet

Road-side units operators in competition: A game-theoretical

approach

Vladimir Fux a, Patrick Maillé a, Matteo Cesana b,∗Q1

a Institut Mines-Telecom/Telecom Bretagne, Rennes, Franceb Dip. di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy

a r t i c l e i n f o

Article history:

Received 19 December 2014

Revised 15 June 2015

Accepted 16 June 2015

Available online xxx

Keywords:

Vehicular networks

Game theory

Pricing

Competition

a b s t r a c t

We study the interactions among Internet providers in vehicular networks which offer access

to commuters via road side units (RSUs). Namely, we propose a game-theoretical framework

to model the competition on prices between vehicular Internet providers to capture the largest

amount of users, thus selfishly maximizing the revenues. The equilibria of the aforementioned

game are characterized under different mobile traffic conditions, RSU capabilities and users

requirements and expectations. In particular, we also consider in the analysis the case where

mobile users modify the price they accept to pay for the access as the likeliness of finding an

access solution decreases.

Our game-theoretical analysis gives insights on the outcomes of the competition between

vehicular Internet providers, further highlighting some counter-intuitive behaviors; as an ex-

ample, comparing with the case when users have constant price valuation over time, having

users inclined to increasing their “acceptable” price may force vehicle Internet providers to

charge lower prices due to competition.

© 2015 Elsevier B.V. All rights reserved.

1. Introduction1

Vehicular Ad-hoc NETworks (VANETs) recently attracted2

much interest from the research community as a core net-3

working component to build up intelligent transportation4

systems (ITS) to improve road safety, optimize the humans5

and goods mobility, and disseminate real-time context infor-6

mation on traffic loads, congestion and hazardous situations.7

The applications enabled by VANETs are not only limited to8

safety-oriented ones, but also extend to leisure applications9

related to Internet access and entertainment along the road.10

A comprehensive classification of VANETs applications can11

be found in [12].12

∗ Corresponding author. Tel.: +39 223993695; fax: +39 223993413.

E-mail address: [email protected], [email protected],

[email protected] (M. Cesana).

The design of VANET architectures to support leisure ap- 13

plications has attracted the attention of recent work and re- 14

searchers; as an example, the Drive-thru Internet [22] project 15

targets the provision of affordable Internet connections to 16

vehicular users through road side Wireless LAN infrastruc- 17

ture. The scope of the research covers network access, roam- 18

ing, handover, authentication, etc., and the achieved results 19

show that despite a number of technical challenges to be ad- 20

dressed, providing Internet for highly mobile vehicular users 21

is possible [21–23,25]. The CABERNET [7] and Infostations 22

[28] projects propose architectures similar to Drive-Thru In- 23

ternet. Motivated by these works, we expect that the provi- 24

sion of Internet connectivity via road side infrastructure will 25

be a flourishing market in the next future attracting Internet 26

providers which may possibly compete among themselves. 27

This competition may have a valuable impact on customers 28

welfare, as well as influence the quality and cost of all afore- 29

mentioned features about road safety. 30

http://dx.doi.org/10.1016/j.comnet.2015.06.008

1389-1286/© 2015 Elsevier B.V. All rights reserved.

Please cite this article as: V. Fux et al., Road-side units operators in competition: A game-theoretical approach, Computer

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

Page 2: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

2 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

The scientific literature already counts a number of stud-31

ies of competition between classical Internet access providers32

(see, e.g., [1,15] or [16, Chapter 5]). In many cases, the in-33

teractions among users (through congestion) are also con-34

sidered, and taken into account by access providers [9,10].35

However, to the best of our knowledge the case of provider36

competition in vehicular networks has not been deeply in-37

vestigated, although it has some important specificities; in-38

deed customers are mobile and move in a limited speed39

range and, more importantly, in constrained directions. In40

this work we want to fill this gap by providing a study of41

duopoly competition, between providers owning one road42

side unit (RSU) each, along a stretch of road. These road43

side units are able (besides all other features) to provide44

Internet access to mobile users, whose cars are equipped45

with a device called on-board unit (OBU). We study how46

providers strategically set their price for providing Internet47

connectivity in response to the competitor’s pricing strat-48

egy with the selfish objective of revenue maximization; ve-49

hicular users may decide to get Internet connectivity from50

one operator or the other depending on the corresponding51

price and the current network conditions. This manuscript52

builds on our preliminary work in [11], further extending the53

network scenario by considering that users can change their54

acceptance/refusal strategy (or equivalently, their price pref-55

erences) while they travel along the stretch of road. We in-56

vestigate how this variation influences the pricing strategies57

of providers. Such a question is linked to the specificities of58

vehicular networks, and to the best of our knowledge has59

not been studied in the scientific literature. Among the unex-60

pected results, we observed that users increasing their price61

acceptance threshold between the two RSUs, if anticipated62

by providers, strongly impacts the competition among them63

and can lead to lower prices and lower provider revenues64

(with respect to the case when users have fixed price accep-65

tance thresholds).66

The manuscript is organized as follows: Section 2 gives67

an overview of the related work further commenting on68

the main novelties and contributions of the present work;69

70

e71

r72

-73

t74

r75

-76

77

78

79

80

81

82

83

84

85

86

87

88

The suitability of WLAN hotspots for providing Internet 89

access in vehicular scenario is studied in [7,22,28]. In [22], 90

mobile users exploit temporary WLAN connections during 91

their road trip to download/upload contents form/to the In- 92

ternet; the main challenge addressed in this work is to main- 93

tain a seamless connectivity even if the physical connec- 94

tion with a road side access point may get lost temporarily. 95

Along the same lines, automatic access point association/de- 96

association procedures are studied in [24,26] in the very 97

same vehicular network architecture. Besides a purely theo- 98

retical studies, special equipments for highly mobile scenar- 99

ios are in development, among which a router with 3G and 100

WLAN interfaces is designed to ensure seamless handovers, 101

proposed by NEC Corporation in 2005. In [25], the authors 102

discuss the requirements for such a router and test their own 103

prototype of modular access gateway. 104

Another research area related to this work deals with the 105

optimal design of vehicular networks, where the problem 106

mainly scales down to efficiently deploying RSU to maxi- 107

mize the “quality” perceived by the mobile user in terms of 108

download/upload throughput, and/or latency to retrieve con- 109

tents form the Internet through the deployed RSUs. Trullols 110

et al. [30] consider different formulations for the deployment 111

problem and introduce heuristics based on local-search and 112

greedy approaches to get suboptimal solutions. A solution 113

based on genetic algorithms is studied by Cavalcante et al. 114

[4]. Yan et al. [32] study the optimal RSU deployment prob- 115

lem, where candidate places for RSU location are crossroads. 116

A comprehensive description of the general problem of op- 117

timal RSU deployment by a single entity can be found in [2] 118

and [36]. A different scenario, where several providers de- 119

ploy their RSUs in a competitive manner is studied in [8], 120

and the same problem but for general wireless networks is 121

considered in [1]. 122

Researchers often use game theory to study competition 123

between providers. In [19] the authors survey various game- 124

theoretic models for evaluating the competition between 125

agents in vehicular networks. The mobile users competition 126

is studied in [20], where users share the same RSU. In [18] 127

128

- 129

- 130

. 131

132

133

- 134

135

- 136

s 137

e 138

e 139

Section 3 introduces the reference scenario and the related

modeling assumptions; in Section 4, we analyze the cas

where the pricing policy of one vehicular Internet provide

is fixed and the competitor best-responds to it. Section 5 an

alyzes the non-cooperative game between vehicular Interne

providers, focusing on the consequences in terms of provide

revenues and user welfare. Further comments on the mod

eling assumptions and concluding remarks are reported in

Section 6.

2. Related work

Though vehicular networks are far from being widely

deployed, the research community already started to ex-

tensively study different problems and challenges likely to

arise in the future. Many articles are devoted to the def-

inition/adaptation of communication protocols for the ve-

hicular context (like in [3,14,33–35]), studying the suit-

ability of already existing technologies and proposing new

approaches. The main challenge here is to develop a reliable

protocol for V2V communications.

l 140

s 141

, 142

- 143

- 144

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

a hierarchical game is proposed to analyze the competition

between OBUs and RSUs. Differently, in [27] a coalition for

mation game among RSU is analyzed, with the aim of bet

ter exploiting V2V communications for data dissemination

More generally, good surveys on game theory applications in

wireless networks are [5] and [29].

In this paper, unlike in the previously described refer

ences we ignore V2V communications and focus only on

users which aim to establish Internet connection. In that con

text, we consider price competition between Internet acces

providers in the case of vehicular networks, which is, to th

best of our knowledge, a novel issue. The scientific literatur

contains several analyses of provider competition in genera

wireless networks (e.g., [6,17,31]), but, even if V2I network

bear some similarities with generic wireless access networks

they have specific features which make the pricing prob

lem worth analyzing. Indeed, in generic wireless access net

works, the network operator competition is generally over 145

the “common” users, that is, those users which fall in the 146

coverage area of the competing network providers. In other 147

words, competition between providers arise only if the cover- 148

age areas of the networks (partially) overlap as in [17]. Users 149

rs in competition: A game-theoretical approach, Computer

Page 3: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

V. Fux et al. / Computer Networks xxx (2015) xxx–xxx 3

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

th150

so151

w152

th153

a154

ra155

o156

se157

w158

159

In160

cu161

b162

a163

co164

h165

a166

ifi167

la168

li169

p170

3171

172

a173

fo174

d175

e176

te177

g178

2179

ce180

fr181

fu182

183

m184

ca185

w186

p187

tw188

h189

F190

th191

to192

m193

g194

th195

te196

te197

p198

n199

fe200

p201

ly202

b203

204

R205

p206

in207

o208

v 209

c 210

a 211

si 212

th 213

m 214

e 215

a 216

a 217

218

d 219

u 220

w 221

ta 222

j 223

th 224

c 225

fu 226

re 227

228

fo 229

c 230

in 231

p 232

fi 233

p 234

w 235

it 236

m 237

a 238

th 239

fu 240

3 241

242

T 243

244

245

246

247

248

249

250

251

c 252

253

c 254

e 255

it 256

fu 257

to 258

a 259

260

261

262

263

264

265

P

N

emselves tend to select an access point which maximizes

me quality measure as in [9]. On the other hand, in V2I net-

orks competition may arise due to vehicles mobility even if

e coverage areas of competing RSUs do not overlap, since if

n RSU does not serve a moving vehicle in its own coverage

nge, the very same user can be served later by competing

perators; in this case users do not really make a network

lection decision, rather they answer the binary question of

hether or not to connect to the currently observed network.

In contrast to [11], where we analyze competition among

ternet access providers, in the current study we also fo-

s on customers and their welfare. We assume that mo-

ile users may deviate from their original pricing preferences

fter receiving additional information about the connection

st. More specifically, we consider that the users are some-

ow risk-averse and can modify their connection budget

fter passing an access point without being served. This mod-

cation, if it is a common feature/strategy of users popu-

tion, may lead to several interesting outcomes and pecu-

arities, such as connection prices drops and, sequentially,

roviders revenue losses.

. Reference scenario and modeling assumptions

We consider a stretch of a highway where two Internet

ccess providers coexist. However, our model is applicable

r scenarios where the number of RSUs at each provider’s

isposal is arbitrary, even with non-overlapping coverage ar-

as, with the constraint that available providers are not al-

rnating along the road, that is, users may cross several re-

ions covered by Provider 1, then several covered by Provider

(or vice-versa). This model represents the case of local ac-

ss providers along a freeway for example; the case of RSUs

om alternating providers is not covered here, and is left for

ture work.

Note that in this article we do not treat the cases when

ore than two Internet access providers compete. In such

ses the RSU location would be of high importance, which

e highlight here by briefly evoking a scenario with three

roviders. The provider whose RSU is located between the

o others is obviously in a disadvantageous position, since

e can only serve users who were unserved by competitors.

or example, in the case of low user flows (no congestion),

e “middle” provider only sees users with low willingness-

-pay (since they refused the offer of the first provider they

et) and should therefore set relatively low prices. In the

eneral case, this “middle” provider would absorb some of

e unserved traffic of the two others, hence reducing the in-

ractions between the extremity providers. Since those in-

ractions are the focus of this paper, we believe the two-

rovider case highlights better the specificities of vehicular

etworks (with users arriving from both directions and af-

cting the relationships among providers). Finally, the two-

rovider case is sufficiently simple to allow us to reach ana-

tical results, while considering more providers is likely to

e treatable only through numerical studies.

For the sake of easing up presentation, we assume that

SUs are totally identical and have the same individual good-

ut (or capacity) c. It is worth pointing out that the model-

g framework can be extended to the case where the RSUs

wned by the different providers have different capacity

lease cite this article as: V. Fux et al., Road-side units operators

etworks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

alues. The providers’ RSU locations differ, and thus vehi-

les taking the road in one direction first enter the coverage

rea of Provider 1’s RSU, while those traveling in the oppo-

te direction first see Provider 2. We denote by λj, j = 1, 2

e average number of commuters per time unit that first

eet Provider j’s RSU; they will cross the competitor’s cov-

rage area afterwards. Note that we will treat those average

rrivals number as constant, i.e., we reason as if there are ex-

ctly λj commuters per time unit seeing Provider j first.

Each user wants to establish an Internet connection to

ownload data files. The average volume of these files per

ser is normalized to 1 without loss of generality, and we

ill also treat the file volume as a constant. Hence the to-

l demand (in term of data volume) of users seeing Provider

first is also λj. We assume that the RSUs coverage area and

e vehicles’ speed do not constrain file transfers: if a RSU’s

apacity exceeds its (average) load, all requests are success-

lly served, otherwise some requests (taken randomly) are

jected.

Each provider j = 1, 2 set a (flat-rate) price pj to charge

r the connection service. However not all users will ac-

ept this price. We model users price preferences by assum-

g that only a proportion w(p) of users accept to pay a unit

rice p for the service. If Provider j charges price pj, users who

rst enter Provider j’s service area generate a demand (again,

er time unit, and treated as static) of w(pj)λj. The function

(·) is called willingness-to-pay function, and we assume

to be non-increasing: each user can be seen as having a

aximum price below which he/she accepts the service, and

bove which he/she refuses to connect, the function w( · )

en represents the complementary cumulative distribution

nction of those acceptance prices among users.

.1. Demand flows

Fig. 1 summarizes the scenario in terms of demand flows.

he total flow λj from users seeing first Provider j consists of:

1. users accepting the price pj and being served by

Provider j;

2. users accepting the price pj and being rejected due to

the RSU capacity limit (forming a spillover flow λspj

heading to the competitor’s RSU);

3. and users refusing the price pj (forming a flow λrefj

heading to the competitor’s RSU).

The two latter flows then enter the coverage area of the

ompeting provider, where they can be served or not.

We consider here that users may change their price ac-

eptance threshold after meeting one provider and having

ither refused its price or been rejected due to capacity lim-

s. In the following, we analyze both cases in which re-

sed/rejected users increase and decrease their willingness

pay as they go by. It is worth noting that these behaviors

re well representative of realistic situations:

• willingness-to-pay increases, if the user’s request was re-

jected due to congestion, this signal of resource scarcity

may increase the user’s willingness-to-pay; alternatively,

users may know that there are several RSUs on the high-

way they are using, and hence may “take a bet” for the

first RSU they meet, by being more demanding than they

in competition: A game-theoretical approach, Computer

Page 4: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

4 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

seeing P t

ll users u e

r users fl

y266

e267

e268

-269

270

s271

a272

y273

-274

-275

276

-Q2

277

278

279

t280

e281

-282

s283

284

e285

286

e287

288

s289

290

291

- 292

rQ3

293

y 294

. 295

- 296

g 297

298

y 299

, 300

301

e 302

303

e 304

- 305

306

e 307

f 308

s 309

310

r 311

312

- 313

314

) 315

e 316

Fig. 1. Flows involved in the model: among the total potential demand λj

not served by this provider), λrefj

(demand from users refusing to pay pj). A

the same flows, indexed by k, for users traveling in the opposite direction.

Fig. 2. How willingness to pay fo

could really afford. The logic in this case is that probabl

the next RSUs are cheaper. As more RSUs are crossed, th

risk raises to find no other RSU (or only more expensiv

ones) before some delay limit, hence a higher price ac

ceptance threshold after passing each RSU;

• willingness-to-pay decreases, if the content the user i

requesting is time-sensitive, that is, the user wants

specific content at a specific time, the additional dela

on content retrieval the user experiences for being re

jected/refused may lead the user to value less the con

tent/connectivity.

This change in willingness-to-pay impacts two compo

nents of the total available demand at a provider–refused

and spilled-over users from the competitor-, making them

more (or less) valuable for the provider (who may extrac

more or less revenue from those users). Note that this can b

easily extended to a scenario when each provider owns sev

eral (consecutive) RSUs; there, each user would change hi

willingness-to-pay when changing provider, not RSUs.

In this paper, we consider a simple multiplicative chang

of the acceptance threshold:

• if a user refused to pay the price of the first RSU he/sh

met, his price acceptance threshold is multiplied by α;

• if a user accepted the price of an RSU but his request wa

rejected due to congestion, his price acceptance threshold

is multiplied by β .

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

rovider j first, we distinguish λspj

(demand from users agreeing to pay pj , bu

nserved after passing Provider j increase their willingness-to-pay. We defin

ow changes after passing e.g. RSU 2.

To simplify a bit the analysis, we assume in the follow

ing that α = β, i.e., users that are not served modify thei

acceptance threshold price by the same factor, whether the

had accepted or refused the price of the first RSU they met

Such an assumption is realistic, if the price variation is inter

preted as a response to the decreasing likelihood of findin

another (cheap) RSU.

It is worth pointing out that if all users simultaneousl

accept to pay a price α times larger (smaller) than before

then the proportion of users accepting to pay p is changed

from w(p) to w( pα ). Fig. 2 shows an example of how th

willingness-to-pay function changes after users have passed

RSU 2, when no congestion occurs at RSU 2. Some of th

users seeing Provider 2 first (a proportion w(p2) of them) ac

cepted to pay the price of Provider 2 and were served, and

thus do not need a connection anymore. The others increas

the maximum price they can afford by α: the proportion o

users seeing Provider 2 first and accepting to pay price p1 i

then w(p1/α) − w(p2).

We now decompose formally the components of the use

flows reaching Provider j and accepting to pay his price pj:

1. those seeing Provider j first, thus issuing a total de

mand (since they accept to pay pj)

w(pj)λ j;2. those seeing Provider k �= j (the competing provider

first, who refused to pay p but would accept the pric

k

rs in competition: A game-theoretical approach, Computer

Page 5: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

V. Fux et al. / Computer Networks xxx (2015) xxx–xxx 5

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

pj (possibly due to the acceptance threshold increase),317

forming a total demand level (smaller than λrefk

, and318

null when pk ≤ pj/α)319

λk[w(pj/α) − w(pk)]+,

where x+ := max (0, x) for x ∈ R;320

3. and those seeing Provider k first, who agreed to pay321

pk but were rejected because of Provider k’s limited322

capacity, and who also agree to pay pj, for a total de-323

mand324

min

(1,

w(pj/α)

w(pk)

)λsp

k,

where λsp

kis the part of the demand w(pk)λk that is325

spilled-over by Provider k.326

The total demand λTj(p j, pk) for Provider j then equals the327

sum of the aforementioned components:328

λTj (pj, pk) := w(pj)λ j + λk[w(pj/α) − w(pk)]+

+ min

(1,

w(pj/α)

w(pk)

)λsp

k

3.2. Rejected users and uniqueness of flows329

When the total demand at an RSU exceeds its capacity,330

some requests are rejected: we assume that the RSU serves331

users up to its capacity, and that rejected requests are se-332

lected randomly among all arrived requests. Thus each re-333

quest submitted to Provider j has an identical probability of334

success Pj, that is simply given by335

P

(c

)

so336

A337

T338

R

339

P340

a341

a342

λ

R343

e344

Pj

345

sh346 ⎧⎪⎨⎪⎩

We obtain similar equations when p1 < p2/α and p1 < p2α, 347

by switching the roles of Providers 1 and 2. Further, if p2/α ≤ 348

p1 ≤ p2α then 349⎧⎪⎨⎪⎩

P1 = min

(1,

c

w(p1)λ1 + w(p1/α)λ2 − w(p2)λ2P2

)P2 = min

(1,

c

w(p2)λ2 + w(p2/α)λ1 − w(p1)λ1P1

).

(5)

Finally, if p2/α ≥ p1 ≥ p2α (which can be the case for 350

α < 1) 351⎧⎪⎨⎪⎩

P1 = min

(1,

c

w(p1)λ1 + w(p2)λ2 − w(p2)λ2P2

)P2 = min

(1,

c

w(p2)λ2 + w(p1)λ1 − w(p1)λ1P1

).

(6)

Proposition 1. For any price vector (p1, p2), the systems of 352

equations defined in (4), (5) and (6) have a unique solution. 353

Proof. See Appendix A. � 354

4. Single provider best response 355

In this section, we study the situation when provider k 356

has fixed his price pk, and provider j wants to maximize his 357

revenue by setting appropriately his price pj. 358

In our analysis, we will use the monotonicity of the de- 359

mand function of a provider while its capacity remains un- 360

saturated, which we establish now. 361

Lemma 1. The total demand λTj

of provider j is a continu- 362

ous function of his price pj; that function is in addition non- 363

increasing while provider j is not saturated (i.e., while λTj< c). 364

P 365

366

p 367

e 368

p 369

D 370

p

371

w 372

373

p 374

375

p 376⎧⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎩

377

P

N

j = min 1,λT

j

(1)

that the served traffic at RSU j equals λTjPj = min (c, λT

j).

gain, the probability Pj depends on the price vector (pi, pk).

he corresponding revenue of provider j is then

j = pj min[c, λTj (pj, pk)]. (2)

The traffic λspj

, that is the part of λj spilled over by

rovider j (and that will then enter the competitor’s coverage

rea) also depends on both prices through the probability Pj,

nd equals

spj

= w(pj)λ j(1 − Pj). (3)

egrouping all components of λTj, the success probability

quals

= min

(1,

c

w(pj)λ j +[w(pj/α)−w(pk)]+λk + min[1,w(pj/α)

w(pk)]λsp

k

).

If p1 > p2α and p1 > p2/α, then those success probabilities

ould satisfy

P1 = min

(1,

c

w(p1)λ1 + w(p1/α)λ2 − w(p1/α)λ2P2

)P2 = min

(1,

c

w(p2)λ2 + w(p2/α)λ1 − w(p1)λ1P1

).

(4) p 378

lease cite this article as: V. Fux et al., Road-side units operators

etworks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

roof. See Appendix B. �

For further analysis, we define the capacity saturation

rice of a provider as the price for which the total demand

quals his capacity. Remark that this price depends on the

rice of his competitor.

efinition 1. The capacity saturation price of Provider j is

cj(pk) := inf{p ∈ [0, pmax] : λT

j (p, pk) < c}.Since λT

j(pmax, pk) = 0, for all pk we know that pc

j(pk) al-

ays exists. In addition we have pcj(pk) < pmax.

Lemma 1 implies that if pcj> 0, then λT

j(pc

j, pk) = c and

j ≤ pcj⇒ λT

j≥ c.

When λTj(0, pk) ≥ c, λT

j(pc

j) = c, hence pc

jis the minimum

rice such that

w(pcj)λ j + λk[w(pc

j/α) − w(pk)]+

+ min

(1,

w(pcj/α)

w(pk)

)λsp

k= c,

λsp

k= w(pk)λk

[[w(pk/α)−w(pc

j)]+λ j + w(pk)λk−c

[w(pk/α) − w(pcj)]+λ j + w(pk)λk

]+.

(7)

Solving this system then yields the capacity saturation

rice pc . From Proposition 1, the demand of Provider j is

j

in competition: A game-theoretical approach, Computer

Page 6: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

6 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

4

2b

P

ifferent

4

2b &

P

vider j w

t379

,380

381

e382

-383

384

385

,386

s387

388

389

e390

391

f 392

393

t 394

395

396

- 397

398

399

400

e 401

402

0 20

2

4

6

8

10

1

3a

Pri

cepk

pck(pj)

pcj(pk)

Fig. 3. Capacity saturation prices and the d

0 2

0

10

20

30

Pro

vid

erj

satu

rate

d

1

Rev

enueR

j

Fig. 4. Revenue of pro

a continuous function of his price. Since we assumed tha

λTj(0, pk) ≥ c, and for p j = pmax the demand equals zero

then the system (7) has a solution.

We now provide a piece-wise expression of the revenu

function: the revenue function of each provider j is continu

ous in his price (from the continuity of λTj

and of Pj), and can

be expressed analytically on different segments.

1. When λTj(p j) ≥ c (or p j ≤ pc

j(pk) when pc

j(pk) > 0)

the RSU capacity of provider j is saturated, and thu

his total load is simply

λTj = c,

the revenue then equals

Rj = pjc.

The corresponding segment of the revenue curve is th

linear part as shown in Fig. 4, and corresponds in Fig. 3

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

6 8 10

pj�α

>pk

pj�α

<pk

p jα>p k

p jα<p k

3b4b

4a

rice pj

price areas they form for α = 1.3 and pk = 4.

6 8 10

pj

=αpk

Pro

vid

erk

satu

rate

d3b 4b 4a

rice pj

hen α = 1.3 and pk = 4.

to prices on the left of the capacity saturation curve o

provider j.

2. If pj < pk/α and pj < pkα, then provider k cannot attrac

users having refused the price of provider j:

λTj = w(pj)λ j + w(pj/α)λk − w(pk)λk + λsp

k,

with

λsp

k= [w(pk)λk − c]+.

(a) If pk < pck, then the capacity of provider k is sat

urated and

Rj = pj(w(pj)λ j + w(pj/α)λk − c),

(b) Otherwise, provider k is not saturated and

Rj = pj(w(pj)λ j + w(pj/α)λk − w(pk)λk).

Only case 2b occurs on the example of Figs. 3 and 4.

3. If pk/α ≤ pj ≤ pkα, then both providers are able to serv

the refused traffic of each other:

λTj = w(pj)λ j + w(pj/α)λk − w(pk)λk + λsp

k,

rs in competition: A game-theoretical approach, Computer

Page 7: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

V. Fux et al. / Computer Networks xxx (2015) xxx–xxx 7

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

with403

λsp

k=

[w(pk)λk

w(pk)λk + w(pk/α)λ j − w(pj)λ j − c

w(pk)λk + w(pk/α)λ j − w(pj)λ j

]+

(a) If pk < pck, then the capacity of provider k is saturated404

and he gains405

Rj = pj

(w(pj)λ j + w(pj/α)λk

− c

w(pk)λk + w(pk/α)λ j − w(pj)λ j

),

(b) Otherwise, provider k is not saturated and his revenue406

is407

Rj = pj

(w(pj)λ j + w(pj/α)λk − w(pk)λk

).

Figs. 3 and 4 illustrate both cases, with the only remark408

that in Fig. 4, cases 2b and 3b constitute one segment409

of the revenue curve (indeed, the expressions of the410

revenue function are identical in both cases).411

4. If pk/α ≥ pj ≥ pkα, then both providers do not serve the412

refused traffic:413

λTj = w(pj)λ j + λsp

k,

with414

λsp

k= [w(pk)λk − c]+

(a) If pk < pck, then the capacity of provider k is satu-415

rated and he gains416

Rj = pj(w(pj)λ j + w(pk)λk − c),

(b) Otherwise, provider k is not saturated and the rev-417

enue is418

Rj = pjw(pj)λ j.

5. If pj > pkα and pj > pk/α, then the total load of provider419

j is420

λTj = w(pj)λ j + w(pj/α)

w(pk)λsp

k,

where421

λsp

k=

[w(pk)λk

w(pk)λk + w(pk/α)λ j−w(pj)λ j−c

w(pk)λk + w(pk/α)λ j − w(pj)λ j

]+.

(a) If p < pc , then the capacity of provider k is saturated422

423

424

425

426

427

428

429

430

D431

th432

le433

ly434

n435

5. Providers pricing game 436

In this section we consider a non-cooperative game, 437

where providers – the players – simultaneously choose their 438

prices, trying to maximize their individual payoffs given by 439

(2). Our aim is to find a Nash equilibrium (NE) of this game: 440

a pair of prices (p1, p2), such that no player can increase his 441

payoff by unilaterally changing his price. The underlying as- 442

sumption is that each provider knows in real time the current 443

price of its competitor and is able to instantly adapt to it; but 444

even if it is not the case, the providers can use the Nash equi- 445

librium outcome as a prediction of their perfect information 446

competition, and simultaneously charge equilibrium prices. 447

Further, we investigate the situation where providers would 448

decide to cooperate, trying to maximize the sum of their in- 449

dividual revenues (as a monopolist would do). We analyze 450

how much the providers may lose in terms of total revenue 451

by refusing to cooperate. 452

We first formally define the pricing game. 453

Definition 2. The providers pricing game is the 3-tuple 454

G = (N, P, R),

where N = {1, 2} is the set of players (the two providers), P = 455

(P1, P2) = (0, pmax]2 is the space of players strategies and R = 456

(R1, R2) is players payoffs or revenues given in (2). 457

We are interested in finding the Nash equilibrium of that 458

pricing game. 459

Definition 3. A pair of prices (p1, p2) is a Nash equilibrium 460

for the pricing game if 461{R1(p1, p2) ≥ R1(p1, p2) for all p1 ∈ (0, pmax],

R2(p1, p2) ≥ R2(p1, p2) for all p2 ∈ (0, pmax].

Nash equilibria can be interpreted as predictions for the 462

outcome of the competition between selfish entities, as- 463

sumed rational and taking decisions simultaneously. For sim- 464

plicity in this section we use the linear willingness-to-pay 465

function, however the analogical results can be obtained for 466

any other convex non-increasing function numerically. 467

5 468

469

p 470

ti 471

a 472

473

o 474

li 475

F 476

P 477

p 478

n 479{

480

if 481

P

N

k k

and his revenue is

Rj = pj

(w(pj)λ j + w(pj/α)λk

× w(pk)λk + w(pk/α)λ j − w(pj)λ j − c

w(pk)λk + w(pk/α)λ j − w(pj)λ j

),

(b) Otherwise, provider k is not saturated and his revenue

is simply

Rj = pjw(pj)λ j .

We can observe both cases in Figs. 3 and 4, where

the plots are for a linear willingness-to-pay function

w(p) = [1 − p/10]+, c = 10 and λ1 = λ2 = 11. Unless

stated otherwise, the same parameters are taken for

all plots in the rest of the article.

ue to the complex form of the revenue function, computing

e optimal price as a response to the price of the opponent

ads to considering many subcases and hence appears ana-

tically intractable. However, it is quite easy to compute it

umerically on each segment and select the best one.

lease cite this article as: V. Fux et al., Road-side units operators

etworks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

.1. Large capacities regime

In the remainder of this paper, we assume that RSU ca-

acities exceed the total user flow (i.e., c ≥ λ j + λk). In par-

cular, for any price profile RSU capacities are not saturated,

nd there is no spillover traffic.

This assumption is not necessarily restrictive; indeed in

ur previous study [11] we have established that at an equi-

brium (if any) of the pricing game, no provider is saturated.

ormally:

roposition 2 ([11]). If (p j, pk) is an equilibrium in the

roviders pricing game in the homogeneous flows case, then

ecessarily

p j > pcj(pk),

pk > pck(p j).

For homogeneous user flows (i.e., λ1 = λ2), we claim that

there is an equilibrium in the general capacities case, it is

in competition: A game-theoretical approach, Computer

Page 8: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

8 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

-482

-483

e484

485

486

s487

488

,

.

s489

,490

491

492

e493

e494

e495

-496

497

j498

499

500

-501

502

503

e504

505

506

507

o508

e509

510

511

512

513

.514

515

516

517

k 518

519

520

a 521

, 522

523

, 524

525

)

, 526

527

)

, 528

, 529

530

)

- 531

532

533

534

535

536

537

- 538

539

540

identical to the one with large capacities. Thus, the large ca

pacity case contains all the equilibria we may have with ar

bitrary capacities; however those price profiles may not b

equilibria in the general case.

5.2. Providers competition

The revenue expressions are again defined by segment

(only two now, because of the large-capacity assumption):

Rj ={

pj

(w(pj)λ j + w

(pj

α

)λk−w(pk)λk

)if pj ≤ pkα

pjw(pj)λ j otherwise

In the rest of this section, we derive analytical expression

for the particular case of a linear willingness-to-pay function

of the form w(p) = [1 − p/pmax]+ for some constant pmax .

We are interested in obtaining the best response function

BRj(pk) of each provider j, that is the function indicating th

optimal price to set as a response to the competitor’s pric

pk. For the best response function of provider j we isolat

only two candidate values from the revenue piecewise ex

pressions above:

1. On the segment [0, pkα], the best response of Provider

is

BRaj = min

(pkα,

pmaxλ j + pkλk

2λ j + 2λk/α

).

which is strictly below pkα if pk >pmaxλ j

2λ jα+λk.

2. On the segment [pkα, ∞), Provider j maximizes his rev

enue with

BRbj = max (pkα, pmax/2),

which is strictly larger than pkα if pk <pmax2α .

Now remark thatpmaxλ j

2λ jα+λk<

pmax2α , hence because of th

continuity of the revenue function:

• if pk <pmaxλ j

2λ jα+λkthe best response is BR j = pmax/2;

• if pk >pmax2α the best response is BR j = pmaxλ j+pkλk

2λ j+2λk/α;

• forpmaxλ j

2λ jα+λk≤ pk ≤ pmax

2α , we have to compare the tw

best-response candidates above, which we do now in th

case of symmetric flows.

Proposition 3. Assume user flows are homogeneous, i.e., λ1 =λ2 = λ, and consider a linear willingness-to-pay function

w(p) = [1 − p/pmax]+. Then the best-response of Provider j is

BR j =

⎧⎪⎨⎪⎩

pmax + pk

2 + 2/αif pk ≥ pmax

(√1 + 1

α− 1

)pmax

2otherwise.

Proof. Let us focus on the region wherepmaxλ j

2λ jα+λk≤ pk ≤ pmax

In that region,

Rj(BRbj) = pmax

and

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

Rj(BRaj) = pmax + pk

2 + 2/αλ[

1 −1 + pk

pmax

2 + 2/α−

1 + pk

pmax

2α + 2+ pk

pmax

]= pmax + pk

α(2 + 2/α)2λ[α + 1 + α

pk

pmax+ pk

pmax

].

The difference R j(BRaj) − R j(BRb

j) has the same sign as

p2k

1

pmax+ 2pk − pmax

α,

which is positive iff pk ≥ pmax(√

1 + 1α − 1). Finally we chec

that for all α,

1/(2α + 1) <

√1 + 1

α− 1 < 1/(2α),

which concludes the proof. �

At a Nash equilibrium (p∗1, p∗

2), each provider is playing

best-response to the price set by the competitor. As a result

three types of equilibrium can occur:

• a symmetric Nash equilibrium, of the form (BRa1, BRa

2)leading to

p∗1 = p∗

2 =pmax

(2

λ2j

α + λ2k

+ 2λkλ j

)4

(λk + λ j

α

)(λ j + λk

α

)− λ jλk

; (8

• a symmetric Nash equilibrium, of the form (BRb1, BRb

2)leading to

p∗1 = p∗

2 = pmax

2; (9

• an asymmetric Nash equilibrium, with one provider (say

Provider j) playing BRaj and the other one playing BRb

k

leading to{p∗

j= pmax(λ j+λk/2)

2λ j+2λk/α

p∗k

= pmax/2(10

Considering again the homogeneous flow case, we deter

mine the conditions on α for those price profiles to be Nash

equilibria.

1. From Proposition 3, the symmetric equilibrium described

in (8) exists only when

p∗1 ≥ pmax

(√1 + 1

α− 1

),

i.e. when 2/α+3

4(1+1/α)2−1≥

√1 + 1

α − 1, which holds if and

only if α ≥√

43 .

2. For the symmetric equilibrium described in (9), the con

dition of existence is:{pmax/2 ≤ pmax

(√1 + 1

α− 1

),

which is equivalent to α ≤ 0.8.

rs in competition: A game-theoretical approach, Computer

Page 9: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

V. Fux et al. / Computer Networks xxx (2015) xxx–xxx 9

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

3541

542

543

544

545

p546

W547

a548

in549

in550

p551

se552

in553

w554

to555

la556

cr557

558

h 559

p 560

th 561

b 562

g 563

564

se 565

th 566

567

d 568

ri 569

a 570

u 571

a 572

in 573

p 574

w 575

m 576

o 577

w 578

ti 579

th 580

581

α 582

th 583

m 584

re 585

fl 586

p 587

th 588

589

p 590

b 591

o 592

e 593

e 594

b 595

si 596

4

tric NE

1

1

43

43

es curv

P

N

Table 1

Nash equilibria of the pricing game, with homogeneous flows and a

linear willingness-to-pay function.

Case Equilibrium prices

α ≤ 0.8 1 equilibrium p∗1 = p∗

2 = pmax/2

α ∈ [0.8, s] 2 equilibria

{p∗

1 = 3pmax/(4 + 4/α)

p∗2 = pmax/2

and{p∗

1 = pmax/2

p∗2 = 3pmax/(4 + 4/α)

α ∈ (s,√

43) No equilibrium

α ≥√

43

1 equilibrium p∗1 = p∗

2 = pmax2/α+3

4(1+1/α)2−1

. For the asymmetric equilibrium described in (10), the

conditions of existence are:⎧⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎩

pmax/2 ≥ pmax

(√1 + 1

α− 1

),

3pmax/2

2 + 2/α≤ pmax

(√1 + 1

α− 1

).

The first condition is equivalent to α ≥ 0.8, while the sec-

ond one holds if and only if α ≤ s, where s ≈ 1.0766.

Table 1 summarizes the equilibrium outcomes we can ex-

ect from the pricing game, depending on the value of α.

hen α ≤ 0.8 both providers do not serve refused traffic

nd set prices as if there was no competitor. When α = 1,

the case of large capacities we have two similar equilibria,

which one provider charges a higher price than his com-

etitor (and thus serves only users seeing him first) while the

cond provider serves traffic from both directions. When αcreases, at those equilibria the low price increases: users

ho refused to pay the high price increase their willingness-

-pay before meeting the low-price provider, allowing the

tter to make more revenue through a (moderate) price in-

ease.

0 2

0

2

4

6

8

10

Symme

pk

BRk↪ α =

BRj ↪ α =

BRk↪ α =

BRj ↪ α =

Fig. 5. Best respons

lease cite this article as: V. Fux et al., Road-side units operators

etworks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

But at some α = s, this lower equilibrium price becomes

igh enough to encourage the opponent to decrease his own

rice, in order to also serve some users who refused to pay

e price of the opponent (those users become more valuable

ecause of the large α). This is the situation when the pricing

ame between providers has no equilibrium.

Finally, when α becomes high enough, each provider

rves some users who refused the price of his competitor;

e corresponding equilibrium is symmetric.

Two sets of best responses curves are shown in Fig. 5, for

ifferent α values illustrating the different types of equilib-

a. We observe that the prices in the symmetric equilibrium

re lower than prices in asymmetric ones, which means that

sers accepting to pay more (through a larger α) may lead to

situation where providers charge lower prices, a counter-

tuitive phenomenon. At the symmetric equilibrium, both

roviders serve some refused flows of each other due to the

illingness-to-pay variation (when α > 1), while in asym-

etric equilibria only one provider can serve the refused flow

f its competitor; the former provider being then the one

ith the higher revenue. Note that the best response func-

ons are discontinuous, implying that for some values of α,

ere may be no Nash equilibrium.

The price decrease of the provider who had originally (for

= 1) the lowest price can be explained as follows: when

e opponent decreases his price (that is lower at the sym-

etric equilibrium than at the original one) the refused flow

duces, and the influence of α is only on users from that

ow who later accept to pay the proposed price. Thus, the

rovider is interested in lowering the price to attract more of

ose users.

Fig. 6 shows the corresponding equilibrium prices de-

ending on α and Fig. 7 plots the equilibrium revenue of

oth providers. These figures confirm that for some values

f α, providers decrease their prices with respect to the ref-

rence case α = 1, resulting in a decrease of their total rev-

nue. Surprisingly, for α approximately between 1.17 and 1.2,

oth providers set lower prices than when α = 1. When con-

dering the average price per served used, the decrease (still

6 8 10

2 asymmetric NE

pj

es for various α.

in competition: A game-theoretical approach, Computer

Page 10: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

10 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

1

4.5

5

pri

Pri

ce

m. Note e

with p

with 3

ic equi

l reven

597

598

599

600

601

602

603

604

605

606

607

608

0.8

3.5

4

Fig. 6. Prices payed and their average values among all users at equilibriu

charged by providers.

35

40

Rev

enue

Revenue

Revenue

Symmetr

Individua

0.8 1

30

Fig. 7. Providers revenue in the cooperativ

when compared to the case α = 1) occurs when α ∈ [1.17,

1.52], approximately.

Now looking at the case α < 1, we notice that when α <

0.8 both providers charge the same price, which is the one

they would have set had they been alone. This holds because

for low α, the users who refused the price of the first RSU

they met would only accept very low prices for the second

RSU, hence being of poor interest for the latter RSU owners.

Providers are then better off focusing on their own direction

flows.

Fig. 6 also illustrates that for approximately 1.075 ≤α ≤ 1.17, the game has no Nash equilibrium. This sit-

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

1.2 1.4 1.6

av. price decreased

ces decreased

α

Higher price (asym. eq.)

Lower price (asym. eq.)

Average price (asym. eq.)

Common price (sym. eq.)

that for the symmetric equilibrium the average price is the (common) pric

max/2 (asym. eq.)

pmax/(4 + 4/α) (asym. eq.)

librium revenue

ue with cooperation

1.2 1.4

α

e and competitive equilibrium cases.

uation arises when the refused flows at both sides be- 609

come more important: due to the willingness-to-pay in- 610

crease (when α > 1),users seeing the other provider first 611

become a higher source of revenue and have more influ- 612

ence on each provider’s pricing decision. For the evoked 613

range of values for α, this leads each provider to set a 614

price below its competitor’s until a point where focus- 615

ing on one’s flow–by setting large prices–is better, so that 616

best-response curves do not intersect. Predicting the prices 617

that are then chosen is difficult, since for any profile of 618

prices at least one provider could do better by changing his 619

price. 620

rs in competition: A game-theoretical approach, Computer

Page 11: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

V. Fux et al. / Computer Networks xxx (2015) xxx–xxx 11

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

5.3. Cooperation among providers621

For comparison purposes we consider the situation where622

both providers cooperate when setting their prices, that is,623

the operators are no longer selfish, but rather have the com-624

mon objective of maximizing the sum of their revenues. This625

implies that the operators share all the information about626

their pricing policies and act as a single entity.627

We again assume homogeneous user flows, i.e., λ1 = λ2 =628

λ. Without loss of generality we assume that the optimal629

prices are such that pj ≤ pk.630

To find such optimal prices, we again consider the two631

price zones where the revenue expressions differ:632

1. First, if p j ≤ pkα and pj ≤ pkα, the total revenue is633

RT = pj

(w(pj)λ + w

(pj

α

)λ − w(pk)λ

)+ pkw(pk)λ.

For a linear willingness-to-pay function, taking the634

partial derivatives yields635

∂RT

∂ pj

= λ(

1 − pj

pmax(2 + 2/α) + pk

pmax

)= 0,

∂RT

∂ pk

= λ(

1 + pj

pmax− 2pk

pmax

)= 0,

leading to the optimal price values636 ⎧⎪⎨⎪⎩

p j = 3pmax

3 + 4/α,

pk = (3 + 2/α)pmax

3 + 4/α,

for α ≤ 0.5 +√

11/12. The corresponding total rev-637

enue is then638

R′T = pmaxλ(9α + 15 + 4/α)

α(3 + 4/α)2.

2. Ifpkα < p j( < pkα), the total revenue is:639

RT = pj

(w(pj)λ + w

(pj

α

)λ − w(pk)λ

)+ pk

(w(pk)λ + w

(pk

α

)λ − w(pj)λ

).

Again, partial derivatives give:640

∂RT

∂ pj

= λ(

1 − pj

pmax(2 + 2/α) + 2pk

pmax

)= 0,

∂RT

= λ(

1 − pk (2 + 2/α) + 2pj)

= 0,

641

642

643

Again, partial derivatives give: 644

∂RT

∂ pj

= λ(

1 − 2pj

pmax

)= 0,

∂RT

∂ pk

= λ(

1 − 2pk

pmax

)= 0,

and the optimal prices are 645

p j = pk = pmax

2,

yielding a total revenue 646

R′′′T = pmaxλ

4.

Now we derive the conditions to have R′T ≥ R′′T : 647

pmaxλ(9α + 15 + 4/α)

α(3 + 4/α)2

≥ pmaxαλ

2⇔ 9α3 + 6α2 − 14α − 8 < 0,

and we have only one positive root α ≈ 1.215 < 0.5 + 648√11/12. We have to compare R′′′T and R′T . It appears that R′T 649

is always greater than R′′′T for positive α values. 650

Therefore, 651⎧⎨⎩α ∈ [1, α] RT = pmaxλ(9α + 15 + 4/α)

α(3 + 4/α)2,

α > α RT = pmaxαλ

2.

Fig. 7 plots the individual revenues of both providers in 652

the competition and cooperation cases assuming an equal 653

share of cooperative revenue among providers for the lat- 654

ter, a reasonable assumption under homogeneous conditions 655

(symmetric traffic flows, equal capacity, same willingness- 656

to-pay function for users traveling in both directions). It ap- 657

pears that cooperation would improve the revenue of both 658

providers, even the one that had the most favorable position 659

in the asymmetric equilibrium. 660

5.4. The impact on user surplus 661

In this section we consider the equilibria of the pricing 662

game from the point of view of users. Note that our model 663

does not define a measure for individual customer efficiency: 664

each customer is either fully served–getting a utility equal to 665

his willingness-to-pay–or not served at all–getting zero util- 666

ity; in case of congestion at an RSU, the unserved users are 667

chosen uniformly among those accepting the proposed price. 668

Thus, instead of efficiency we use user surplus, that is the dif- 669

fe 670

tu 671

th 672

si 673

α 674

a 675

th 676

677

p 678

th 679

su 680

P

N

∂ pk pmax pmax

and the optimal prices are

p j = pk = pmaxα

2,

yielding a total revenue

R′′T = pmaxαλ

2.

3. If pkα < p j <pkα , the total revenue is:

T

R = pjw(pj)λ + pkw(pk)λ. U

lease cite this article as: V. Fux et al., Road-side units operators

etworks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

rence between what users wanted to pay and what they ac-

ally payed. We focus here on the large capacity case. Recall

at user willingness-to-pay varies in our scenario: we con-

der the initial willingness-to-pay as the reference: when

> 1, users served by the second provider met may actu-

lly pay more than they originally wanted to pay; in this case

eir surplus will be considered negative.

If we consider just one flow direction λj and denote by

j the price of the first provider this flow meets, and by pk

e price of the second one, then the positive part of users

rplus is as follows:

+∫ pmax

∫ pj +

Sj

=pj

w(p)λdp +pk

[w(p) − w(pj)] λdp,

in competition: A game-theoretical approach, Computer

Page 12: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

12 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

e

n

e

n

e681

682

e683

e684

685

686

f687

688

y689

690

Q4691

692

,

693

694

r 695

e 696

- 697

s 698

e 699

700

701

702

e 703

- 704

o 705

706

e 707

708

g 709

710

r 711

g 712

713

r 714

e 715

716

717

718

719

720

721

e 722

a 723

s 724

- 725

, 726

727

728

s 729

- 730

s 731

y 732

- 733

- 734

g 735

s 736

737

738

s 739

s 740

λ

0 P

w(p1)λ1

p1

w(p2α )λ1

p2α

w(p2)λ1

p2

λ1

pmax

Fig. 8. Users surplus of λ1 flow when p1 > p2. (For interpretation of th

references to colour in this figure, the reader is referred to the web versio

of this article).

λ

0 Pp2

w(p2α )λ1

p2α

w(p1)λ1

p1

λ1

pmax

Fig. 9. Users surplus of λ1 flow when p2 > p1. (For interpretation of th

references to colour in this figure, the reader is referred to the web versio

of this article).

which includes surplus from users served by j, and by k. Th

negative part of users surplus is:

US−j

= [w(pk/α) − max (w(pj), w(pk))]+(pk − pk/α)λ

−∫ min (pj ,pk)

pk/α[w(p) − max (w(pj), w(pk))]+λdp,

which includes users refusing price pj and accepting a pric

pk higher than their original willingness-to-pay. Note that th

expression of US−j

is general enough to cover both cases pj >

pk and pj < pk.

Figs. 8 and 9 illustrate the logic behind the computation o

user surplus when p1 > p2 and p1 < p2, respectively. The red

surface is the negative part of user surplus (when they pa

more than initially willing to), and yellow zones correspond

to the positive part of users surplus.

With a linear willingness-to-pay function, we have

US+j

= (pmax − pj)w(pj)λ + (w(pk)− w(pj))[pj − pk]+ λ

2 2

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

and

US−j

= λ

2(w(pk/α) − w(pk))(pk − pk/α)

− λ

2(w(pj) − w(pk))[pk − pj]

+

and the total user surplus is

US = US+j

+ US+k

− US−j

− US−k.

Fig. 10 shows total users surplus for different α values fo

large capacities, in the similar settings as before. We can se

that it is consistent with what we observed about the aver

age price payed by user: for a whole range of α values, user

surplus increases, which means that accepting to pay mor

led to the situation when (overall) users pay less.

5.5. Numerical analysis for different willingness-to-pay

functions

Because of the complexity of the model, it is hard to prov

analytically that for any function w there is a range of α val

ues such that a willingness-to-pay increases between the tw

providers met (by a factor α) actually leads to a decrease in

the prices set by providers. Note that it is possible to prov

the existence of at least one symmetric equilibrium when αis large in the large-capacity case, but we cannot say anythin

about its quality.

In this section, we carry out a numerical analysis fo

some willingness-to-pay function examples, not restrictin

ourselves to linear ones. We are in particular interested in

finding a minimum willingness-to-pay variation value α fo

which a symmetric equilibrium appears, and compare th

prices in this equilibrium with those for the case α = 1.

We consider the following functions:

• Linear: w(p) = 1 − ppmax

• Square: w(p) = (1 − ppmax

)2

• Power Law (C, n): w(p) = CC+pn

• Exponential: w(p) = 1ep

Table 2 shows provider prices at equilibrium, when ther

is no variation (α = 1) and when the variation leads to

symmetric equilibrium. For the willingness-to-pay function

considered, which follow our convexity and monotonicity as

sumptions, we still observe a price decrease after some αillustrating that this phenomenon does not only occur with

linear w functions.

We also consider in Appendix C the case where user

moving in different directions modify their willingness-to

pay differently (i.e., one value of α for each direction). Thi

scenario can correspond to situation when the highwa

stretch under consideration is close to a city area; users head

ing toward the city can anticipate to have several other con

nection opportunities (hence a low α), while those leavin

the city face a higher risk of not finding other (cheap) way

to connect (hence a higher α).

6. Discussion and perspectives

This work studies competition between Internet acces

providers in vehicular networks in scenarios where user

rs in competition: A game-theoretical approach, Computer

Page 13: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

V. Fux et al. / Computer Networks xxx (2015) xxx–xxx 13

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

0.8 1

34

36

38

40

42

44

Use

rssu

rplu

s

Sym. eq. pmax/2

Asym. eq.

Sym. eq.

Fig. 10. Users surplus in equilib

Table 2

Equilibrium prices decrease for different willingne

w(p) Equilibrium prices, α = 1

Linear (3.75, 5.0)

Square (2.35, 3.33)

Power law (5, 2.2) (1.35, 1.92)

Exponential (0.65, 1.0)

may change their pricing preferences as they travel, since741

they are less and less likely to be offered another connection742

possibility. We analyzed the optimal behavior of a provider,743

given the opponent’s price fixed. This allowed us to charac-744

terize the outcomes (equilibria) of the competition among745

revenue-interested providers playing on prices.746

Our finding is that the changes of users willingness-747

to-pay drastically impact the provider competition: users748

increasing their willingness-to-pay as they travel (a priori749

giving providers more latitude to make more revenues by in-750

creasing prices) can lead to counterintuitive situations where751

p752

re753

w754

fu755

756

a757

h758

ic759

sa760

p761

α762

th763

b764

p765

su766

p767

g768

p769

a770

w771

n 772

th 773

to 774

u 775

o 776

a 777

c 778

e 779

780

p 781

li 782

w 783

784

785

786

787

788

789

790

791

792

793

794

795

796

797

798

799

800

801

802

P

N

roviders lower their prices and make fewer revenues, while

ducing the average price payed by users. That phenomenon

as observed for different types of willingness-to-pay

nctions.

The proposed modeling framework involves simplifying

ssumptions, which stems from the usual tension between

aving a realistic and insightful model and keeping it analyt-

ally tractable. First, we assume that all users undergo the

me relative change in their price acceptance threshold (the

rice they accept to pay) between the two RSUs, i.e., the same

. In a more detailed model, we may expect α to vary with

e application involved, with the specific user (α would then

e modeled as a random variable), and/or with the initial

rice acceptance threshold value. Also, besides classical as-

mptions allowing to apply game theory (player rationality,

erfect information about flow levels and opponent strate-

ies), we assume that providers know users’ willingness-to-

ay and how it varies. Such an assumption can be justified

s vehicular Internet providers may get to know the users’

illingness-to-pay function through dynamic learning tech-

lease cite this article as: V. Fux et al., Road-side units operators

etworks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

1.2 1.4

surplus increase

α

rium for various α.

ss-to-pay functions.

Equilibrium prices, α = α α

(3.68, 3.68) 1.16

(2.27, 2.27) 1.2

(1.32, 1.32) 1.17

(0.59, 0.59) 1.25

iques and/or statistical inference. Then, a provider knowing

e price of the opponent can estimate how the willingness-

-pay varies over time (the parameter α): the fraction of

sers accepting to pay some price after refusing the price

f the opponent indeed corresponds to a conditional prob-

bility that depends on both prices and on α; the provider

an thus vary his price and observe the demand level to

stimate α.

Despite the assumptions made, we believe that the pro-

osed model provides insights on interesting phenomena,

ke the appearance of a symmetric equilibrium while there

as not any when α equals 1.

Natural follow ups for this work include:

• the analysis of larger network scenarios where each In-

ternet provider owns a whole infrastructure of access

points, spread (evenly or not) over the road, forming sev-

eral connectivity islands; the analysis developed in this

work for the case of 2-providers competition can be lever-

aged as a building block to address “larger” networks with

higher number of providers and different network ge-

ometry. One possible approach could be to reduce such

more complex scenarios to multiple 2-providers games.

It is worth pointing out that including generic geome-

tries for the deployment of RSUs may lead the competi-

tion outcomes to differ significantly, since relative posi-

tion of providers’ RSU have a drastic impact;

• the analysis of network scenarios where some a priori in-

formation is available on the providers’ pricing strategies

and/or the users become ”strategic”, that is, they become

active players by properly setting their willingness-to-pay

threshold (or entire function); this new setting, though,

in competition: A game-theoretical approach, Computer

Page 14: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

14 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

completely changes the structure of the competition and803

would call for a brand new modeling approach.804

• the analysis of scenarios with consolidated incumbent805

providers and new providers willing to enter the market;806

this framework would call for changing the modeling ap-807

proach resorting to leader-follower game representations.808

• the analysis of network scenarios where the position of809

the RSUs is not pre-fixed, but rather each provider, be-810

sides setting the price for the service, may also decide811

where to deploy the network infrastructure. This set-812

ting requires ample modifications of the game theoretic813

framework.814

Acknowledgment815

This work has been partially funded by the Bretagne Re-Q5816

gion, through the ARED program, and by the Fondation Tele-817

com through the “Futur&Ruptures” program. We also would818

like to thank the anonymous reviewers for their valuable and819

helpful feedback.820

Appendix A. Proof of Proposition 1821

We first assume that p1 > p2α and p1 > p2/α. Since the822

right-hand sides of the equations in (4) are continuous in (P1,823

P2) and fall in the interval [0, 1], Brouwer’s fixed-point theo-824

rem [13] guarantees the existence of a solution to the system.825

To establish uniqueness, remark that P2 is uniquely de-826

fined by P1 through the second equation in (4), so (P1, P2)827

is unique if P1 is unique. But P1 is a solution in [0, 1] of the828

829

830

-831

e832

e833

,834

835

x836

837

-838

839

)

.840

-841

842

843

t844

t845

846

-847

s848

e849

850

By symmetry, we have the same kind of results when 851

p2/α ≥ p1. 852

Then, we can also prove existence and uniqueness of a so- 853

lution of system (5), when p2/α ≤ p1 ≤ p2α. Here we have 854

g(x) := min

(1,

1

a + b − d min(1, 1

d+a+ε−ax

))

,

where a = w(p1)λ1c , b = w(p1/α)λ2

c , d = w(p2)λ2c and ε = 855

w(p2/α)λ1−w(p1)λ1c are all positive constants; we again assume 856

a > 0 and b > 0 otherwise the problem is trivial. 857

Differentiating g at x, we get 858

g′(x) = x2ad

(a + d + ε − ax)2≤ x2a

(a + d + ε − ax),

and the rest is similar to the case when p1/α ≥ p2. 859

Finally, we consider the case when p2/α ≥ p1 ≥ p2α. We 860

have: 861

g(x) := min

(1,

1

a + b − b min(1, 1

b+a−ax

))

,

where a = w(p1)λ1c , b = w(p2)λ2

c . The rest is similar to the first 862

case. 863

864

865

866

867

y 868

s 869

870

r 871

872

873

874

, 875

876

fixed-point equation x = g(x) with

g(x) := min

(1,

1

a + b − b min(1, 1

a+b+ε−ax

))

,

where a = w(p1)λ1c , b = w(p1/α)λ2

c , and ε =(w(p2/α)−w(p1))λ1+(w(p2)−w(p1/α))λ2

c are all positive con

stants; we also assume a > 0 and b > 0 otherwise th

problem is trivial. As a combination of two functions for th

form x �→ min (1, 1K1−K2x ), g is continuous, nondecreasing

strictly increasing only on an interval [0, x] (if any) – it is in

addition convex on that interval –, and constant for x ≥(note we can have x = 0 or x ≥ 1).

Assume g(x) = x has a solution x ∈ (0, x]. Then g is left

differentiable at x, and

g′(x) = x2ab

(a + b + ε − ax)2≤ x2a

(a + b + ε − ax)(A.1

where we used the fact that x ≤ 1 (as a fixed point of g)

Moreover, since x is in the domain where g is strictly increas

ing we have η := 1a+b+ε−ax

≤ 1 on one hand, and x = 1a+b−bη

on the other side. Their combination yields x ≤ 1a and finally

g′(x) ≤ x ≤ 1.

Remark also that g′(x) < 1 if x < 1. We finally use the fac

that g(0) > 0 to conclude that the curve y = g(x) cannot mee

the diagonal y = x more than once: assume two intersection

points x1 < x2, then g′(x1) < 1 thus the curves cross at x1, an

other intersection point x would imply g′(x2) > 1 (recall g i

convex when strictly increasing), a contradiction. Hence th

uniqueness of the fixed point and of the solution to (4). 877

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

Appendix B. Proof of Lemma 1

Recall that

λTj (pj, pk) = w(pj)λ j + λk[w(pj/α) − w(pk)]+

+ min(w(pk), w(pj/α)

)λk(1 − Pk).

The components of the first line are trivially continuous and

non-increasing in pj with our assumptions on w( · ).

The continuity of λTj(p j, pk) follows from the continuit

of Pk in the price vector (pj, pk), established in the previou

section.

To establish the monotonicity result, we distinguish fou

cases.

• If pk < pj/α and pk < pjα, then we have

λTj (pj, pk) = w(pj)λ j + w(pj/α)λk(1 − Pk).

When λTk

< c, then Pk = 1 and λTj

is non-increasing in pj.

Now if λTk

> c then from System (4) (this time with k = 2

j = 1), we have w(pk)λk + w(pk/α)λ j − w(p j)λ jPj > c and

λTj (pj, pk) = w(pj)λ j + w(pj/α)λk − w(pj/α)

×λk

c

w(pk)λk + w(pk/α)λ j − w(pj)λ jPj

.

Assuming that provider j is not saturated, P = 1. Then

j

rs in competition: A game-theoretical approach, Computer

Page 15: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

V. Fux et al. / Computer Networks xxx (2015) xxx–xxx 15

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

w878

o879

880

881

882

883

884

885

886

887

888

889

890

891

892

W893

d894

g895

896

m897

so898

A 899

900

ch 901

fo 902

m 903

a 904

m 905

th 906

n 907

908

fl 909

se 910

P 911

912

d 913

914

915

916

917

918

919

920

921

922

923

P

N

λ′Tj (pj, pk) = w′(pj)λ j + w′(pj/α)λk

α− w′(pj/α)λk

α

− c

w(pk)λk + w(pk/α)λ j − w(pj)λ j

+ w(pj/α)λk

cw′(pj)λ j

(w(pk)λk + w(pk/α)λ j − w(pj)λ j)2

< w′(pj)λ j + w′(pj/α)λk

α− w′(pj/α)λk

α

+ w(pj/α)λk

cw′(pj)λ j

(w(pk)λk + w(pk/α)λ j − w(pj)λ j)2

≤ 0,

here the last inequality comes from the nonincreasingness

f w( · ).

• If pj/α ≤ pk ≤ pjα then

λTj = w(pj)λ j + w(pj/α)λk

− cw(pk)λk

w(pk)λk + w(pk/α)λ j − w(pj)λ jPj

Assuming that provider j is not saturated and then Pj = 1

we can differentiate in pj:

dλTj

dpj

= w′(pj)λ j + w′(pj/α)λk

α

+ cw(pk)w′(pj)λ jλk

(w(pk)λk + w(pk/α)λ j − w(pj)λ j)2≤ 0,

where w′ is the derivative of w, and the last inequality

comes from the fact that w′( · ) ≤ 0.

• If pj/α ≥ pk ≥ pjα (for α < 1) then

λTj = w(pj)λ j + w(pk)λk

− cw(pk)λk

w(pk)λk + w(pj)λ j − w(pj)λ jPj

.

Assuming that provider j is not saturated and then Pj =1:

dλTj

dpj

= w′(pj)λ j ≤ 0.

• If pk > pjα and pk > pj/α, we show that the success prob-

ability Pk is non-decreasing in pj: applying System (4)

(with k = 1, j = 2) we get that Pk is the solution of thefixed-point equation x = g(x), where the function g canbe written as

g(x) = min

⎛⎜⎜⎜⎝1,

c

w(pk)λk +w(pk/α)λ j

[1− c

w(p j)λ j+w(p j/α)λk−w(pk)λkx

]+

⎞⎟⎟⎟⎠.

e then remark that, all else being equal, g(x) is non-

ecreasing in pj, so the solution Pk of the fixed-point equation

(x) = x is also non-decreasing in pj.

As a result, when pk ≥ pj/α the component

in (w(pk), w(p j/α))λk(1 − Pk) decreases with pj, and

does λT.

j

lease cite this article as: V. Fux et al., Road-side units operators

etworks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

ppendix C. Heterogeneous willingness-to-pay variations

In this section we assume that user pricing preferences

ange differently for both flow directions. Some users may

r example move toward a city and thus expect to meet

ore APs, while the users moving in the opposite direction

re risking not to meet any APs in the nearest future. The for-

er may not increase much their willingness-to-pay, while

e latter have higher risks to fail to establish Internet con-

ection, and thus are more flexible in price perception.

Let us consider that the α values are different for two

ows and that without loss of generality α1 value for users

eing Provider 1 first is bigger than for those, seeing first

rovider 2, i.e., α1 = hα2 = hα, for some h ≥ 1.

Similarly to the case when α was common to both flow

irections, we consider three cases:

1. If p1 <p2α , then{

R1 = p1

(w(p1)λ1 + w

(p1

αh

)λ2 − w(p2)λ2

),

R2 = p2w(p2)λ2

and for a linear w(p)⎧⎨⎩BRa

1 = pmaxλ1 + p2λ2

2λ1 + 2λ2

αh

,

BRb2 = pmax/2.

and

BRa1(BRb

2) = pmax(λ1 + 1/2λ2)

2λ1 + 2λ2

αh

.

This is valid for

α ≤ λ1 +√

λ12 + 4λ2/h(λ1 + 1/2λ2)

2λ1 + λ2

,

which in the homogeneous case is equivalent to

α ≤ 1 +√

1 + 6/h

3.

2. Ifp2α ≤ p1 ≤ p2αh, then⎧⎪⎨

⎪⎩R1 = p1

(w(p1)λ1 + w( p1

αh)λ2 − w(p2)λ2

),

R2 = p2

(w(p2)λ2 + w( p2

α )λ1 − w(p1)λ1

)and for a linear w(p)⎧⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎩

BRa1 = pmaxλ1 + p2λ2

2λ1 + 2λ2

αh

,

BRa2 = pmaxλ2 + p1λ1

2λ2 + 2λ1

α

, .

and⎧⎪⎪⎪⎨⎪⎪⎪⎩

BRa1(BRa

2) = pmax(2λ1λ2 + 2λ21

α + λ22)

(2λ1 + 2λ2

αh)(2λ2 + 2λ1

α ) − λ1λ2

,

BRa2(BRa

1) = pmax(2λ1λ2 + 2λ22

αh+ λ2

1)

(2λ2 + 2λ1

α )(2λ1 + 2λ2

αh) − λ1λ2

.

For this equilibrium the conditionp2α ≤ p1 ≤ p2αh

holds only if

in competition: A game-theoretical approach, Computer

Page 16: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

16 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

abov

below

below

ers seei e

924

925

926

927

928

929

e 930

) 931

s 932

933

934

935

936

r 937

- 938

e 939

940

1 1.5

1

1.05

1.1

1.15

Tre

shold

αvalu

e

α

α

α

Fig. C.1. The different types of Nash equilibria in the pricing game when us

α > 1 (resp. hα) after seeing that provider.

⎧⎪⎪⎪⎨⎪⎪⎪⎩

α ≥ −λ1(λ1 − 2λ2) +√

λ12(λ1 − 2λ2)2 + 8λ2

3/h(λ2 + 2λ1)

2λ2(λ2 + 2λ1),

α ≥ −λ2(λ2 − 2λ1) +√

λ22(λ2 − 2λ1)2 + 8λ1

3h(λ1 + 2λ2)

2hλ1(λ1 + 2λ2),

or in the homogeneous flows case:

α ≥ 1 +√

1 + 24/h

6.

3. If p1 > p2αh, then{R1 = p1w(p1)λ1,

R2 = p2

(w(p2)λ2 + w( p2

α )λ1 − w(p1)λ1

)and for a linear w(p)⎧⎨⎩

BRb1 = pmax/2,

BRa2 = pmaxλ2 + p1λ1

2λ2 + 2λ1

α

, .

and

BRb2(BRa

1) = pmax(λ2 + 1/2λ1)

2λ2 + 2λ1

α

,

with the following condition on α to have p1 > p2αh:

α <λ2 +

√λ2

2 + 4λ1h(λ2 + 1/2λ1)

2˜h(λ2 + 1/2λ1),

or in the homogeneous flows case

α <1 + √

1 + 6h

3h.

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

2 2.5 3

h

e which (BRa1 ↪BRa

2) exists

which (BRb1↪BRa

2) exists

which (BRa1 ↪BRb

2) exists

ng Provider 2 (resp. 1) first increase their price acceptance by a multiplicativ

What is different in this new scenario is that we hav

three types of equilibrium now (BRa1, BRb

2), and (BRa1, BRb

2

are not symmetric anymore. With homogeneous users flow

we have the following conditions:

1. (BRa1, BRb

2) is an equilibrium when

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

BRa1(BRb

2) < pmax

(√1 + 1

αh− 1

),

BRb2(BRa

1) ≥ pmax

(√1 + 1

α− 1

),

α <1 +

√1 + 6/h

3.

or α < min{s/h,1+

√1+6/h3 }.

2. (BRa1, BRa

2) is an equilibrium when

⎧⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎩

BRa1(BRa

2) ≥ pmax

(√1 + 1

αh− 1

),

BRa2(BRa

1) ≥ pmax

(√1 + 1

α − 1

),

α ≥ 1 +√

1 + 24/h

6.

This set of inequalities is not solvable for αh, but fo

each specific value of h we can find numerically a con

dition on α for the conditions to hold. This dependenc

is presented on Fig. C.1

rs in competition: A game-theoretical approach, Computer

Page 17: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

V. Fux et al. / Computer Networks xxx (2015) xxx–xxx 17

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

3. (BRb1, BRa

2) is an equilibrium when941 ⎧⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎩

BRb1(BRa

2) ≥ pmax

(√1 + 1

αh− 1

),

BRa2(BRb

1) < pmax

(√1 + 1

α− 1

),

α <1 + √

1 + 6h

3h,

or α < min{s, 1+√1+6h

3h}.942

Fig. C.1 shows threshold α values for different h, showing943

whether there exists a particular type of equilibrium. The fig-944

ure suggests that there is no pair of α and h such that all three945

types of equilibria exist.946

References947

[1] E. Altman, A. Kumar, C. Singh, R. Sundaresan, Spatial SINR games com-948bining base station placement and mobile association, in: Proceedings949of IEEE INFOCOM, 2009, doi:10.1109/INFCOM.2009.5062081.950

[2] J. Barrachina, P. Garrido, M. Fogue, F. Martinez, J.-C. Cano,951C. Calafate, P. Manzoni, Road side unit deployment: a density-952

953954

[955956957958

[959960961

[962963

[964965

[966967968

[969970971

[972973974

[1975976977978

[1979980981982

[1983984985

[1986987

[1988989990991

[1Q6

992993

[1994995

[1996997

[18] D. Niyato, E. Hossain, A unified framework for optimal wire- 998less access for data streaming over vehicle-to-roadside commu- 999nications, IEEE Trans. Veh. Technol. 59 (6) (2010) 3025–3035, 1000doi:10.1109/TVT.2010.2048769. 1001

[19] D. Niyato, E. Hossain, M. Hassan, Game-theoretic models for vehicu- 1002lar networks, in: Y. Zhang, M. Guizani (Eds.), Game Theory for Wire- 1003less Communications and Networking, CRC Press, 2011, pp. 61–98, 1004doi:10.1201/b10975-6. 1005

[20] D. Niyato, E. Hossain, Ping Wang, Competitive wireless ac- 1006cess for data streaming over vehicle-to-roadside communi- 1007cations, in: Proceedings of IEEE GLOBECOM, 2009, pp. 1–6, 1008doi:10.1109/GLOCOM.2009.5425820. 1009

[21] J. Ott, D. Kutscher, The “drive-thru” architecture: WLAN-based internet 1010access on the road, in: Proceedings of IEEE Vehicular Technology Con- 1011ference,VTC, 5, 2004. 1012

[22] J. Ott, D. Kutscher, Drive-thru internet: IEEE 802.11b for “automobile” 1013users, in: Proceedings of IEEE INFOCOM, 2004. 1014

[23] J. Ott, D. Kutscher, A disconnection-tolerant transport for drive-thru in- 1015ternet environments, in: Proceedings of IEEE INFOCOM, 2005. 1016

[24] J. Ott, D. Kutscher, Exploiting regular hot-spots for drive-thru internet, 1017in: Paul Mller, Reinhard Gotzhein, Jens B. Schmitt (Eds.), KiVS, Infor- 1018matik Aktuell, Springer, 2005, pp. 218–229. 1019

[25] J. Ott, D. Kutscher, A modular access gateway for managing intermittent 1020connectivity in vehicular communications., Eur. Trans. Telecommun. 17 1021(2) (2006) 159–174. 1022

[26] J. Ott, D. Kutscher, M. Koch, Towards automated authentication for mo- 1023bile users in WLAN hot-spots, in: In Proceedings of Vehicular Technol- 1024ogy Conference, VTC Fall, 2005. 1025

[27] W. Saad, Zhu Han, A. Hjorungnes, D. Niyato, E. Hossain, Coali- 1026tion formation games for distributed cooperation among road- 1027side units in vehicular networks, IEEE JSAC 29 (1) (2011) 48–60, 1028

1029[2 1030

1031103210331034

[2 Q710351036

[3 1037103810391040

[3 104110421043

[3 104410451046

[3 1047104810491050

[3 1051105210531054

[3 105510561057

[3 10581059

Q81060

106110621063106410651066106710681069107010711072

P

N

based approach, IEEE Intell. Transp. Syst. Mag. 5 (3) (2013) 30–39,

doi:10.1109/MITS.2013.2253159.3] F. Borgonovo, A. Capone, M. Cesana, L. Fratta, ADHOC MAC: new MAC

architecture for ad-hoc networks providing efficient and reliable point-to-point and broadcast services, Wirel. Netw. 10 (4) (2004) 359–366,

doi:10.1023/B:WINE.0000028540.96160.8a.

4] E.S. Cavalcante, A.L.L. Aquino, G.L. Pappa, A.A.F. Loureiro, Roadside unitdeployment for information dissemination in a VANET: an evolution-

ary approach, in: Proceedings of GECCO Companion, 2012.5] D.E. Charilas, A.D. Panagopoulos, A survey on game theory applications

in wireless networks, Comput. Netw. 54 (18) (2010) 3421–3430.6] L.A. DaSilva, Pricing for QoS-enabled networks: a survey, IEEE Commun.

Surv. Tutor. 3 (2) (2000) 2–8.

7] J. Eriksson, H. Balakrishnan, S. Madden, Cabernet: vehicular content de-livery using WiFi, in: Proceedings of ACM MobiCom, New York, NY, USA,

2008, pp. 199–210, doi:10.1145/1409944.1409968.8] I. Filippini, F. Malandrino, G. Dan, M. Cesana, C. Casetti, I. Marsh, Non-

cooperative RSU deployment in vehicular networks, in: Proceedings ofWireless On-demand Network Systems and Services,WONS, 2012.

9] V. Fux, P. Maillé, Incentivizing efficient load repartition in heteroge-

neous wireless networks with selfish delay-sensitive users, in: Pro-ceedings of Internet Charging and QoS Technologies,ICQT, 2013.

0] V. Fux, P. Maillé, J.-M. Bonnin, N. Kaci, Efficiency or fairness: managingapplications with different delay sensitivities in heterogeneous wire-

less networks, in: Proceedings of IEEE World of Wireless Mobile andMultimedia Networks, WoWMoM, 2013.

1] V. Fux, P. Maillé, M. Cesana, Price competition between road side units

operators in vehicular networks, in: Proceedings of IFIP Networking,Trondheim, Norway, 2014. Version with appendices available online:

https://hal.archives-ouvertes.fr/hal-009671102] H. Hartenstein, K.P. Laberteaux, A tutorial survey on vehicular

ad-hoc networks, IEEE Commun. Mag. 46 (6) (2008) 164–171,doi:10.1109/MCOM.2008.4539481.

3] S. Kakutani, A generalization of Brouwer’s fixed point theorem, DukeMath. J. 8 (1941) 457–459.

4] U. Lee, E. Magistretti, M. Gerla, P. Bellavista, A. Corradi, Dis-

semination and harvesting of urban data using vehicular sens-ing platforms, IEEE Trans. Veh. Technol. 58 (2) (2009) 882–901,

doi:10.1109/TVT.2008.928899.5] P. Maillé, B. Tuffin, Competition among providers in loss networks, An-

nals. Oper. Res. 199 (2012).6] P. Maillé, B. Tuffin, Telecommunication Network Economics: From The-

ory to Applications, Cambridge University Press, 2014.

7] D. Niyato, E. Hossain, Competitive pricing in heterogeneous wirelessaccess networks: issues and approaches, IEEE Netw. 22 (6) (2008).

lease cite this article as: V. Fux et al., Road-side units operators

etworks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

doi:10.1109/JSAC.2011.110106.

8] T. Small, Z.J. Haas, The shared wireless infostation model: a newad-hoc networking paradigm (or where there is a whale, there is

a way), in: Proceedings of Annual International Conference on Mo-bile Computing and Networking, ACM MobiHoc, 2003, pp. 233–244,

doi:10.1145/778415.778443. New York, NY, USA.

9] R. Trestian, O. Ormond, G.-M. Muntean, Game theory-based networkselection: solutions and challenges, IEEE Commun. Surv. Tutor. (2012).

0] O. Trullols, M. Fiore, C. Casetti, C.F. Chiasserini, J.M.Barcelo Ordinas,Planning roadside infrastructure for information dissemination in in-

telligent transportation systems, Comput. Commun. 33 (4) (2010) 432–442. http://dx.doi.org/10.1016/j.comcom.2009.11.021.

1] B. Tuffin, Charging the internet without bandwidth reservation: an

overview and bibliography of mathematical approaches, J. Inf. Sci. Eng.19 (2003) 765–786.

2] T. Yan, W. Zhang, G. Wang, Y. Zhang, Access points planning in urbanarea for data dissemination to drivers, IEEE Trans. Veh. Technol. (2013),

doi:10.1109/TVT.2013.2272724.3] K. Yang, S. Ou, H.-H. Chen, J. He, A multihop peer-communication

protocol with fairness guarantee for IEEE 802.16-based vehicu-

lar networks, IEEE Trans. Veh. Technol. 56 (6) (2007) 3358–3370,doi:10.1109/TVT.2007.906875.

4] X. Yang, J. Liu, N.F. Vaidya, F. Zhao, A vehicle-to-vehicle communi-cation protocol for cooperative collision warning, in: Proceedings of

Mobile and Ubiquitous Systems, MOBIQUITOUS, 2004, pp. 114–123,doi:10.1109/MOBIQ.2004.1331717.

5] Y. Zhang, J. Zhao, G. Cao, On scheduling vehicle-roadside data access, in:Proceedings of ACM VANET, ACM, New York, NY, USA, 2007, pp. 9–18,

doi:10.1145/1287748.1287751.

6] Z. Zheng, Z. Lu, P. Sinha, S. Kumar, Ensuring predictable contact oppor-tunity for scalable vehicular internet access on the go, IEEE/ACM Trans.

Netw. (2015), doi:10.1109/TNET.2014.2309991. In Press.

Patrick Maillé graduated from Ecole polytech-

nique and Telecom ParisTech, France. He has beenwith the Network, Security, Multimedia depart-

ment of Telecom Bretagne since 2002, where

he obtained his Ph.D. in applied mathematics in2005. His research interests are in all economic

aspects of telecommunication networks, frompricing schemes at the user level, to auctions for

spectrum and regulatory issues (net neutrality,search neutrality). He recently co-authored the

book “Telecommunication Network Economics”,

published by Cambridge University Press.

in competition: A game-theoretical approach, Computer

Page 18: ARTICLE IN PRESS...4 V. Fux et al./Computer Networks xxx (2015) xxx–xxx ARTICLE IN PRESS JID: COMPNW [m3Gdc;June 27, 2015;11:20] Fig. 1. Flowsinvolvedinthemodel:amongthetotalpotentialdemandλ

18 V. Fux et al. / Computer Networks xxx (2015) xxx–xxx

ARTICLE IN PRESSJID: COMPNW [m3Gdc;June 27, 2015;11:20]

-1073-1074d1075-1076a1077i-1078,1079

y1080d1081-1082-1083

1084

- 1085, 1086

o 1087n 1088. 1089- 1090- 1091o 1092e 1093y 1094h 1095n 1096s 1097- 1098l 1099

1100

Vladimir Fux graduated in 2011 in Applied Math

ematics and Computer Science from the SaintPetersburg State University, Russia, and worke

on sampling algorithms for web graphs as an in

tern at Inria, France. Since 2011 he has beenPh.D. student in the Network, Security and Mult

media department of Telecom Bretagne, Franceinvestigating game-theory approaches to stud

and influence interactions among self-interesteagents in wireless networks. His research inter

est include game theory, economics, wireless net

works and information retrieval.

Please cite this article as: V. Fux et al., Road-side units operato

Networks (2015), http://dx.doi.org/10.1016/j.comnet.2015.06.008

Matteo Cesana is currently an Assistant Pro

fessor with the Dipartimento di ElettronicaInformazione e Bioingegneria of the Politecnic

di Milano, Italy. He received his MS degree i

Telecommunications Engineering and his Ph.Ddegree in Information Engineering from Politec

nico di Milano in July 2000 and in September 2004, respectively. From September 2002 t

March 2003 he was a visiting researcher at thComputer Science Department of the Universit

of California in Los Angeles (UCLA). His researc

activities are in the field of design, optimizatioand performance evaluation of wireless network

with a specific focus on wireless sensor networks and cognitive radio networks. Dr. Cesana is an Associate Editor of the Ad Hoc Networks Journa

(Elsevier).

rs in competition: A game-theoretical approach, Computer


Recommended