 Research
 Open Access
 Published:
Mechanism design and implementation theoretic perspective for interference coupled wireless systems
EURASIP Journal on Wireless Communications and Networking volume 2012, Article number: 284 (2012)
Abstract
This article investigates the properties of social choice functions (SCFs) that represent resource allocation strategies for interference coupled wireless systems. The resources can be physical layer parameters such as power vectors or spatial streams. Strategy proofness and efficiency properties of SCFs are used to capture the properties of nonmanipulability and Pareto optimality of resource allocation strategies, respectively. This article introduces and investigates the concepts of (strong) intuitive fairness and nonparticipation in interference coupled systems. The analysis indicates certain inherent limitations when designing strategy proof and efficient resource allocation strategies, if additional desirable and intuitive properties are imposed. These restrictions are investigated in an analytical mechanism design framework for interference coupled wireless systems. The article also investigates the permissible SCFs, which can be implemented by a mechanism in either Nash equilibrium or dominant strategy for utility functions representing interference coupled wireless systems. Among other results, it is shown that a strategy proof and efficient resource allocation strategy cannot simultaneously satisfy continuity and the often encountered property of nonparticipation.
Introduction
From the evolution of wireless infrastructure from second generation to third generation, there has been a gradual transition from voice centric to data centric applications. Many of these applications are quality of service (QoS) based. A QoS application typically requires users to report their channel qualities to a central controller. The vendors manufacturing end user equipment have an incentive to report a higher channel quality, than the true channel quality experienced by the user. Such a misrepresentation of the channel quality is motivated by the vendor’s intention of over provisioning for its users. There can be other instances, where the users have an incentive to misrepresent their measured channel quality or interference temperature. The result of solving a resource allocation problem with misrepresented utilities is that the outcome might not always be the one desired by the central controller, e.g., base station, operator. Such a misrepresentation of utilities can have an undesirable effect on the resource allocation. Being in a position to tackle such a misrepresentation helps in better formulation of the optimization problem for radio resource allocation in wireless networks.
Expecting the resource allocation strategy to be strategy proof could be one possible solution to the central controller’s dilemma of solving an optimization problem with misrepresented utilities. Much of previous strategy proofness literature in wireless network has been motivated from the perspective, that the users might have a motivation and ability to misrepresent their utilities (refer to the networksrelated literature in “Literature survey” section).
We utilize the social choice function (SCF) to represent resource allocation strategies in interference coupled wireless systems. The goals of the designed resource allocation strategies can be viewed in terms of social choice, which is simply an aggregation of the preferences of the different users toward a single joint decision. The difference of interest between the operator and users is one example in networks, where the theory of mechanism design can be utilized. Mechanism design attempts implementing desired social choices in a strategic setting, assuming that the different members of society act rationally in a game theoretic sense[1].
We utilize an axiomatic framework for SCFs (discussed in detail in “SCFs” section). An SCF represents a resource allocation strategy in interference coupled wireless systems. In our abstraction, if an SCF satisfies a particular axiom, then the resource allocation strategy is said to satisfy the property corresponding to the axiom. We capture the nonmanipulation of the resource allocation strategy by the property of strategy proofness of the SCF. An example of a strategy proof SCF is the second price auction (Vickrey Clarke Groves auction). Pareto optimality of the resource allocation strategy is captured by the property of efficiency. This article studies such and certain other desirable properties of SCFs representing resource allocation strategies.
We consider resource sets beyond pure exchange economies. The only constraint on our resource sets is that they satisfy the signaltointerference plus noise ratio (SINR)based utility (SBU) function framework (see “ Utility modeling” section). This article provides certain new insights on a particular class of strategy proof and efficient resource allocation strategies and has the following main contributions (see “Analysis: properties of resource allocation strategies” section):

1
We introduce the property of intuitive fairness (see “SCFs” section). Intuitive fairness implies that if a particular user scales down its demand for utility, then the other users must obtain the same or better utility. For strong intuitive fairness, the users can choose from a family of utility functions.

(a)
A strategy proof and efficient resource allocation strategy, which satisfies the property of intuitive fairness (see Definition 6) is robust to a particular user’s scaling down of the utility, when the utilities of all other users are fixed.

(b)
A strategy proof and efficient resource allocation strategy, satisfying either intuitive fairness (see Definition 6) or strong intuitive fairness (see Definition 7), can be altered only if two or more users change their utilities, i.e., the resource allocation strategy is robust to the change in utilities of any singular user.

(c)
If a strategy proof and efficient resource allocation strategy is not constant with respect to the utility of a user k, then another user j (j ≠ k) experiences a measurable decrease in its performance, even if this other user j’s utility function is fixed.

(a)

2
We introduce the property of nonparticipation, which says that if a particular user does not demand any utility, then it obtains no resource.A strategy proof and efficient resource allocation strategy for interference coupled systems cannot simultaneously satisfy continuity and the property of nonparticipation. Continuity is a desirable property of resource allocation strategies for designing practical algorithms and for mathematical tractability. Hence, this result proves to be an impossibility result, i.e., a strategy proof, efficient, and nonparticipation resource allocation strategies are discontinuous.

3
Let a mechanism implement an SCF in Nash equilibrium. Then, there exists a “point” in the set of physical layer resources, such that the SCF chooses this point for all possible utility functions in the family of SBU functions. A similar result can be proved for dominant strategy implementation.

3
A resource allocation strategy is strategy proof, if and only if the SINR function γ _{ k } for a particular user k is a constant function, independent of its own utility u _{ k }. The constant mentioned in the previous sentence depends on the utility functions of the other users.
There has been a significant amount of economic literature on this topic. We give a brief overview of this literature in “Literature survey” section. It can be observed from the literature that previous work in networks and communication theory has typically focused on the design of strategy proof resource allocation strategies for particular wireless or communication systems. This article characterizes certain boundaries while designing strategy proof and efficient resource allocation strategies, when combined with certain desirable and intuitive properties. We investigate these contradictions in the framework of interference coupled wireless systems and an analytical framework of mechanism design, described in the following section.
Analytical framework
In this article, we shall investigate the case of interference coupled wireless systems, beyond pure exchange economies. Before we begin to describe our system model and present the relevant definitions, we provide certain notational conventions used in the article in the next section.
Preliminaries and notation
Matrices and vectors are denoted by bold capital letters and bold lowercase letters, respectively. Let y be a vector, then y_{l} =[y]_{l} is the lth component. Let y_{−l} denote the vector y without the lth component. Likewise G_{mn} = [G]_{mn} is a component of the matrix G. The notation y ≥ 0 implies that y_{l} ≥ 0 for all components l. x ⪈ y implies componentwise inequality with strict inequality for at least one component. Similar definitions hold for the reverse directions. x ≠ y implies that the vector differs in at least one component. Let\mathcal{Y}\phantom{\rule{0.5em}{0ex}} denote a set of vectors and denote a family (class) of functions or tuples. We use y_{k} for indexing of individual components of vectors and individual components of tuples of functions, where{y}_{k}\in {\mathcal{Y}}_{k}. Let{\mathcal{Y}}^{K}=:{\times}_{k\in \mathcal{K}}{\mathcal{Y}}_{k} unless otherwise specified. The set of nonnegative real numbers and positive real numbers are denoted as{\mathbb{R}}_{+} and as{\mathbb{R}}_{++}, respectively.
Interference coupled wireless systems
In a wireless system, the users’ utilities can strongly depend on the underlying physical layer. An important measure for the link performance in cellular and ad hoc wireless networks is the SINR. SINR is also utilized as a performance indicator in the standardization community. Hence, results pertaining to such a model could help investigate the limitations of SINRbased communication systems. Consider K users with transmit powers p = [p_{1}, … , p_{K}]^{T} and\mathcal{K}:=\{1,\dots ,K\}. The noise power at each receiver is σ^{2}. Hence, the SINR at each receiver depends on the extended power vector
The resulting SINR of user k is
where{\mathcal{I}}_{k} is the interference (plus noise) as a function of\underset{\xaf}{\mathit{p}}. In order to model interference coupling, we shall follow the axiomatic approach proposed in[2, 3]. The general interference functions possess the properties of conditional positivity, scale invariance, and monotonicity with respect to the power component and strict monotonicity with respect to the noise component. For further details, kindly refer to the Appendix.
Utility modeling
In mathematical economics, the modeling of users’ utilities is an initial step toward characterizing the preferences of the users and in turn utilizing the framework of mechanism design and implementation theory. In our system model, each user can choose its own utility function. For a user, announcing its true utilities to the operator might not be in its best interest, i.e., the users can choose to reveal a utility function, which differs from their true utility functions, so as to obtain more utility.
Generally, it is not possible to accurately communicate a nonparametric utility function in an Euclidean space. However, for the purpose of obtaining certain initial intuition on the topic we have not concerned ourselves with this issue. For a practical implementation we can utilize approximations, e.g., a parametrization, where one could transmit a scalar and choose a function from a look up table based on the transmitted scalar or transmission of a finite number of scalars (based on the system constraints, e.g., bandwidth, time duration of block fading, etc.), which represent coefficients of a polynomial utilized to approximate the utility function. Scalar parameterized mechanisms have been discussed in[4].
We are particularly interested in analyzing the class of utility functions, which are functions of the SINR, given by (2). The utility functions, which shall be introduced in Definition 1, are motivated based on the below two factors.

Users in a wireless system are coupled by interference.

Performance indicators in wireless systems are influenced by physical layer parameters.
Definition 1
For user k, u_{ k } is said to be an SBU function, if there exists a strictly monotonic, increasing and continuous function q and an interference function{\mathcal{I}}_{k} such that
Remark 1
Let\mathit{u}=[{u}_{1},\dots ,{u}_{K}]\in {\mathcal{U}}^{K}, where{\mathcal{U}}^{K} is the family of SBU functions for K users.
In this article, “utility” can represent certain arbitrary performance measures, which depend on the SINR by a strictly monotonic, increasing, and continuous function q defined on{\mathbb{R}}_{+}. The utility of user k is
An example of the above case is capacity: q(x) = log(1 + x) and effective bandwidth q(x) = x / (1 + x)[5]. The same theory can be developed for strictly monotonic, decreasing, and continuous functions\widehat{q}. For the following performance indicators, we would like to minimize the objective function, e.g., mean square error :\widehat{q}\left(x\right)=1/(1+x), BER:\widehat{q}\left(x\right)=Q\left(\sqrt{x}\right), and highSNR approximation of BER\widehat{q}\left(x\right)={x}^{\alpha} with diversity order α.
Analytical framework: SCFs and mechanism design
In this section, we review certain mechanism design and implementation theoretic notation[6], in the context of interference coupled systems. We assume that the number of users K ≥ 2. Let\mathcal{R}\phantom{\rule{0.5em}{0ex}} be an arbitrary set of outcomes at the physical layer. Let\mathcal{R}:={\times}_{k\in \mathcal{K}}{\mathbf{R}}_{k} and r_{k} ∈ R_{ k }. Resources at the physical layer are power, antenna weights, spatial streams, etc. A combination of these could also be considered as resources and modeled by our framework.
Example 1
Consider a SIMO uplink scenario with a total power constraint or a MISO downlink scenario with a total power constraint P_{total} and beamforming vectors for the users being ω_{k}, withk\in \mathcal{K}. The set of resources\mathcal{R}\phantom{\rule{0.5em}{0ex}} can be represented in this scenario as follows.
Let r = [r_{1}, … ,r_{K}]. A result is said to be presented for the case of pure exchange economies, if the resource set is defined as follows:
As mentioned in the “Introduction” section, in this article we analyze the case of interference coupled wireless systems, beyond pure exchange economies.
SCFs
Each user k has a preference relation defined over the set of outcomes\mathcal{R}\phantom{\rule{0.5em}{0ex}}, which admits a numerical representation{u}_{k}:\mathcal{R}\mapsto {\mathbb{R}}_{+}.
Remark 2
As has been observed earlier in this article, the set of outcomes\mathcal{R}\phantom{\rule{0.5em}{0ex}} is the set of resources, which could be the set of power\mathcal{P}\phantom{\rule{0.5em}{0ex}}. In this special case, where power allocation is an outcome, we have that the particular power vector\mathit{p}\in \mathcal{P}.
Example 2
Consider the case, when the users report their utility functions to a central controller, e.g., base station. Based on a system objective (an SCF), the base station allocates resources to the users. Based on the allocated resources, the users derive their own performance, e.g., QoS level.
Different users in a wireless system could have different preferences depending on their resource allocation strategy. We shall utilize the SCF to characterize resource allocation strategies. If a particular property (axiom) is satisfied by the SCF, then the corresponding property is satisfied by the resource allocation strategy, i.e., we utilize certain properties (axioms) to emulate desirable properties of resource allocation strategies.
An SCF aggregates the preferences of all the users into a social choice for the entire system, i.e., the resource allocation strategy.
Definition 2
An SCF is a functionf:{\mathcal{U}}^{K}\mapsto \mathcal{R} (i.e., f is an injective function) that associates with every\mathit{u}\in {\mathcal{U}}^{K} a unique outcome f(u) in\mathcal{R}\phantom{\rule{0.5em}{0ex}}.
We now clarify that what we mean by a strategy Ktuple and a strategy set. A strategy is a complete contingent plan or decision rule that says what a user will do at each of its information sets. Let{\mathcal{S}}_{k} be the strategy set of a userk\in \mathcal{K} and{\mathcal{S}}^{K}:={\times}_{k\in \mathcal{K}}{\mathcal{S}}_{k} be the strategy set of the set of users\mathcal{K}\phantom{\rule{0.5em}{0ex}}. We now present certain wellknown desired properties of SCFs. We shall revisit strategy Ktuples and strategy sets, when we deal with mechanisms and implementation theoretic concepts in “Mechanism design and implementation theoretic concepts” section.
Review of extant properties of SCFs
We formalize certain desirable properties of resource allocation strategies by means of an axiomatic framework for SCFs to capture these properties. In this article, we are interested in exploring the interplay between the axiomatic framework and the implementation of resource allocation strategies.
Example 3
Consider for two users an SCF f (see Equation 7). We analyze the case for linear interference functions and for a total power constraint P_{total}. Then we have that{\gamma}_{1}\left(\underset{\xaf}{\mathit{p}}\right)=\frac{{p}_{1}}{{v}_{12}{p}_{2}+{\sigma}^{2}} and{\gamma}_{2}\left(\underset{\xaf}{\mathit{p}}\right)=\frac{{p}_{2}}{{v}_{21}{p}_{1}+{\sigma}^{2}}, where v_{12} and v_{21} are the normalized coupling between user 1 and 2. Let the utility sets for the users be as follows:
where [ω_{1}, ω_{2}] = ω > 0. Let us choose the following f :
where s = [s_{1}, s_{2}], p = e^{s} such that p_{k} ∈ p,{p}_{k}={e}^{{s}_{k}} and P_{total} is the total power constraint on the system for 2 users (see Figure1b). The function{\omega}_{1}log{\gamma}_{1}\left({e}^{\mathit{s}}\right)+{\omega}_{2}log{\gamma}_{2}\left({e}^{\mathit{s}}\right) is strictly convex and bounded. Therefore, there exists a unique optimizer, i.e., the function f is a welldefined SCF. From (7) we can see that a user has an incentive to misrepresent its utility function.
By misrepresenting its utility function, a user can manipulate the outcome of a resource allocation strategy. Avoiding such behavior is a desired property from the perspective of an operator or a regulator. The property, that a particular resource allocation strategy is nonmanipulable, is emulated by the SCF f satisfying the property strategy proofness. The following two definitions can also be found in[7].
Definition 3
An SCF f is said to be strategy proof, if for all usersk\in \mathcal{K} and for all utility functions{u}_{k},{\xfb}_{k}\in \mathcal{U},\forall {\mathit{\xfb}}_{k}\in {\mathcal{U}}^{K1}, we have that{u}_{k}\left(f\right({u}_{k},{\mathit{\xfb}}_{k}\left)\right)\ge {u}_{k}\left(f\right({\xfb}_{k},{\mathit{\xfb}}_{k}\left)\right).
An SCF is said to be strategy proof if the users have no incentive to misrepresent their utilities to the central controller.
Definition 4
An SCF f is efficient if\forall \mathit{u}\in {\mathcal{U}}^{K},

1.
there is no \mathit{r}\in \mathcal{R} such that u _{ k }(r) ≥ u _{ k }(f(u)) for all users k\in \mathcal{K}, and

2.
u _{ k }(r) > u _{ k }(f(u)) for some user k\in \mathcal{K}.
Efficiency from the point of view of wireless communication (physical layer perspective) of the resource allocation strategies implies choosing an operating point on the Pareto boundary of the feasible utility region[8].
Definition 5
The option set of a userk\in \mathcal{K}, given a utility function (K − 1)tuple{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}, is the set
where r is a resource vector.
The option set Q_{k} is the set of resources for all the users, which user k can influence with its utility function, given the utility function (K − 1)tuples{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}. The use of option sets has proved to be a useful technique in analyzing strategy proof SCFs[9]. The reader should bear in mind that option sets are relative to a given function on a given domain, even if this is not explicit in the notation. We shall now present certain new properties, which are quite natural from a wireless system perspective.
Introduced properties of SCFs
In this section, we introduce the properties of (strong) intuitive fairness and nonparticipation and connect them with certain well established concepts in literature.
Definition 6
An SCF f is said to satisfy the property of intuitive fairness, if for all utility function Ktuples\mathit{u}\in {\mathcal{U}}^{K}, for all userk\in \mathcal{K} we have that, for arbitrarily chosen (u_{ k }, u_{−k}) and 0 < λ < 1, u_{ k }(f(λu_{ j }, u_{−j})) ≥ u_{ k }(f(u_{ j }, u_{−j})),k\in \mathcal{K}, k ≠ j.
An SCF is said to be intuitive fair, if for all usersk\in \mathcal{K}, we have the case, that if any user linearly scales down its utility, then the other users should either obtain the same or better utility as in the case, when the user had not scaled its utility. Definition 6 is similar to the axiom of population monotonicity (in the context of cooperative bargaining theory[10]) introduced under a different name in[11]. The axiom of population monotonicity states the following. Suppose a group of users{\mathcal{K}}_{1} have arrived to play a particular resource allocation game. If the users{\mathcal{K}}_{2}\setminus {\mathcal{K}}_{1} (with{\mathcal{K}}_{1}\subset {\mathcal{K}}_{2}) do not show up, let the set of users{\mathcal{K}}_{1} reach a particular solution outcome. If the users{\mathcal{K}}_{2}\setminus {\mathcal{K}}_{1} show up afterwards, resource allocation is carried out again and no user in{\mathcal{K}}_{1} should be better off.
Now, we allow the user to possess the ability of not only scaling its utility function, but also choosing other utility functions altogether.
Definition 7
An SCF f is said to satisfy the property of strong intuitive fairness, if for all usersk\in \mathcal{K}, for all utility function (K − 1)tuples{\mathit{u}}_{k}\in {\mathcal{U}}^{K1},{u}_{k},{\xfb}_{k}\in \mathcal{U} and for0\le {\xfb}_{k}\left(\mathit{r}\right)\le {u}_{k}\left(\mathit{r}\right) for all r ≥ 0, we have that
In the definition of strong intuitive fairness it can be seen that the utility function{\xfb}_{k} is dominated by the utility function u_{ k }, for all usersk\in \mathcal{K}, for all resource vectors\mathit{r}\in \mathcal{R}, and all utility function (K − 1)tuples{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}.
Remark 3
The SCF f presented in Example 3 satisfies the properties of efficiency and strong intuitive fairness.
The properties of intuitive fairness and strong intuitive fairness are somehow connected to the property of min–max fairness. For any resource allocation strategy providing QoS to the users we can associate a specific notion of fairness. The consideration of fairness notions has mainly been a wired network issue[12, 13]. The most common fairness notion is min–max fairness. It represents an equilibrium associated with an ideal social system characterized by the fact that no user’s QoS measure can be increased without decreasing an already lower user’s QoS measure.
Example 4
In the framework of interference coupled systems the min–max fair power allocation solves the problem
where{q}_{k}^{\text{req}} describes the QoS requirement of the k th user and{\gamma}_{k}^{\left(\text{req}\right)} the corresponding SINR threshold. V is the link gain matrix for the interference coupled wireless system. Fortunately, in cellular wireless networks the intricacies associated with the socalled bottleneck connections are nonexistent. Under nonexisting or equal QoS requirements the min–max fair power allocation equalizes all link QoS measures and represents the right eigenvector of the interference matrix.
Comparing min–max fairness to intuitive fairness, we can see that if a particular user k reduces its demand for utility, then there are more resources for the remaining users. Hence, another userj\in \mathcal{K}\setminus k could increase its utility without decreasing the utility of a userm\in \mathcal{K}\setminus \{j,k\}.
We now discuss another property of resource allocation strategies, namely pointwise continuity. We say that the sequence of functions{\left\{{\mathit{u}}^{\left(n\right)}\right\}}_{n\in \mathbb{N}},{\mathit{u}}^{\left(n\right)}\in {\mathcal{U}}^{K} converges to\mathit{u}\in {\mathcal{U}}^{K}, if for all constants R_{total} > 0, we have that
The sequence of utility functions{\left\{{u}_{k}^{\left(n\right)}\right\}}_{n\in \mathbb{N}} are defined by their values, so the utility functions converge if their values converge. This reduces the convergence of realvalued functions to the convergence of real numbers. Such a convergence is called pointwise convergence. We are dealing with utility function Ktuples (Ktuple of utility functions) as against utility functions. Hence, we use the l − 1 norm. We would like at this point to remind the reader that we say that an SCF f is continuous, if for all convergent sequences of utility Ktuples{\left\{{\mathit{u}}^{\left(n\right)}\right\}}_{n\in \mathbb{N}} the following expression holds:
We now explain a very natural property, which is almost always satisfied for all resource allocation strategies occurring in interference coupled wireless systems. The property states that, if a particular user demands no utility, then the resource allocation strategy does not allocate any resource to this user.
Definition 8
An SCF f is said to satisfy the property of nonparticipation, if for a given userk\in \mathcal{K} and for all utility function (K − 1)tuples{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}, we have that
Remark 4
In practical wireless networks it must be noted that if a user requires no utility, i.e., it demands no resources at a particular time instant, it still has to utilize some resources to report its utility function to the resource allocation agent (central controller). Hence, the property of nonparticipation though seemingly intuitive and harmless could lead to certain restrictions for resource allocation strategies, when it is expected to be satisfied with certain other properties. This will displayed in detail later in the proof of Theorem 3 (where the interplay of axioms of nonparticipation and continuity along with strategyproofness and efficiency is brought to light).
Equipped with the suitable notations and framework, we present the results of our analysis in “Analysis: properties of resource allocation strategies” section.
Mechanism design and implementation theoretic concepts
In the previous section, we have seen that the SCF being used as a tool to capture certain desirable properties of resource allocation strategies in a wireless system. We shall now like to shift our focus to investigating the implementation aspects of resource allocation strategies in a wireless network. For this purpose, we shall utilize the theory of mechanism design and implementation theory. We begin by introducing the mechanism below.
Definition 9
A mechanism is a functiong:{\mathcal{S}}^{K}\mapsto \mathcal{R} that assigns to every strategy Ktuple\mathit{s}\in {\mathcal{S}}^{K} a unique element\mathit{r}\in \mathcal{R}.
A mechanism is a procedure for determining outcomes. Who gets to choose the mechanism, i.e., who is mechanism designer depends on the scenario in question, e.g., base station, operator, regulator, etc.
Example 5
Consider an example, where the resources at the physical layer are only the powers of the users, i.e.,\mathcal{R}=\mathcal{P}, with\mathcal{P}\phantom{\rule{0.5em}{0ex}} the set of powers defined as follows:\mathcal{P}=\{\mathit{p}\mid {\sum}_{k\in \mathcal{K}}{p}_{k}\le {P}_{\text{total}}\} and the utility function is defined by (4). With this scenario, Figure 1 displays the concepts of an SCF f, the set of outcomes\mathcal{P}\phantom{\rule{0.5em}{0ex}} and the set of utilities{\mathcal{U}}^{K}.
Let g(S_{k}, s_{−k}) be the attainable set of user k at s_{−k}, i.e., the set of outcomes that user k can induce when the other users select s_{−k}. Fork\in \mathcal{K}, u_{ k } ∈ U_{ k } and a resource vector\mathit{r}\in \mathcal{R}, let\mathbf{L}(\mathit{r},{u}_{k})=\{\widehat{r}\in \mathcal{R}\mid {u}_{k}(\mathit{r})\ge {u}_{k}(\widehat{r}\left)\right\} be the weak lower contour set of user k with u_{ k } at resource vector r.
Definition 10
Given a mechanismg:{\mathcal{S}}^{K}\mapsto \mathcal{R}, the strategy profile{\mathit{s}}^{\ast}\in {\mathcal{S}}^{K} is a Nash equilibrium of g at\mathit{u}\in {\mathcal{U}}^{K}, if and only if for all usersk\in \mathcal{K} and for all (K − 1)strategy tuples s_{−k} ∈ S_{k} we have that
The Nash equilibrium of a mechanism can also be characterized in terms of the weak lower contour set as follows. Given a mechanismg:{\mathcal{S}}^{K}\mapsto \mathcal{R}, the strategy profile\mathit{s}\in {\mathcal{S}}^{K} is a Nash equilibrium of g at\mathit{u}\in {\mathcal{U}}^{K} if for allk\in \mathcal{K}, g(S_{ k },s_{−k}) ⊆ L(g(s),u_{ k }). Let N^{g} (u) be the set of Nash equilibria of the mechanism g at utility function tuple u. We now introduce the corresponding implementation theoretic concept of Nash equilibrium implementation.
Definition 11
The mechanism g implements the SCF f in Nash equilibrium, if for each utility function Ktuple\mathit{u}\in {\mathcal{U}}^{K}, the following condition is fulfilled.

For any strategy Ktuple s ∈ N^{g} (u), g(s) = f(u).
Hence, there exists a strategy Ktuple s ∈ N^{g} (u) such that g(s) = f(u).
The SCF f is Nash implementable if there exists a mechanism that implements f in Nash equilibria. The second condition in Definition 11 ensures that irrespective of the choice of the strategy Ktuple in the set N^{g} (u), we always obtain the same outcome in the set of outcomes, namely f(u). Such a requirement is essential for implementation, since otherwise, we would not be in a position to characterize the properties of the SCF f . We now turn to another concept in game theory and mechanism design, namely that of strategic dominance, i.e., a particular strategy s_{k} is “better” than another strategy{\u015d}_{k} for a particular userk\in \mathcal{K}, independent of the other usersj\in \mathcal{K}\setminus k strategies s_{−k}. Even though, the concept of dominant strategy is sometimes thought of as a simplification[14], it is still a useful analytical and practical tool to investigate mechanisms and resource allocation strategies.
Definition 12
The strategy{s}_{k}\in {\mathcal{S}}_{k} is a dominant strategy for userk\in \mathcal{K} of g at utility function{u}_{k}\in {\mathcal{U}}_{k} if for all strategy (K − 1)tuples{\mathit{\u015d}}_{k}\in {\mathcal{S}}^{K1},g({\mathbf{S}}_{k},{\mathit{\u015d}}_{k})\subseteq \mathbf{L}\left(g\right({s}_{k},{\mathit{\u015d}}_{k}),{u}_{k}).
LetD{S}_{k}^{g}\left({u}_{k}\right) be the set of dominant strategies for user k of mechanism g at utility function u_{k}. The strategy Ktuple\mathit{s}\in {\mathcal{S}}^{K} is a dominant strategy equilibrium of g at utility Ktuple\mathit{u}\in {\mathcal{U}}^{K} if for all usersk\in \mathcal{K},{s}_{k}\in D{S}_{k}^{g}\left({u}_{k}\right). Let DS^{g}(u) be the set of dominant strategy equilibria of mechanism g at utility Ktuple u.
Example 6
In the context of wireless systems, the authors of[15] show that with an appropriately designed downlink scheduler the socially optimal uplink rate allocation emerges as a dominant strategy for all users.
Definition 13
The mechanism g implements the SCF f in dominant strategy equilibria if for each utility Ktuple\mathit{u}\in {\mathcal{U}}^{K},

1.
there exists a strategy Ktuple s ∈ DS ^{g} (u) such that g(s) = f(u) and

2.
for any strategy Ktuple s ∈ DS ^{g} (u), g(s) = f(u).
Remark 5
The SCF f is dominant strategy implementable if there exists a mechanism that implements f in dominant strategy equilibria.
The mechanism g is called a direct revelation mechanism associated with the SCF f if\mathcal{S}=\mathcal{U} for allk\in \mathcal{K} and g(u) = f(u) for all\mathit{u}\in {\mathcal{U}}^{K}. We do not distinguish between the SCF f and the direct revelation mechanism associated with the SCF f . While analyzing the implementation aspects in “Nash implementation and dominant strategy implementation” section, when we say the SCF f , we also mean the direct revelation mechanism g associated with the SCF f .
Analysis: properties of resource allocation strategies
For certain interference coupled wireless scenarios we would like to characterize resource allocation strategies, which satisfy certain desirable properties from the axiomatic framework, which can be implemented using mechanisms (see Figure2).
We shall present following results in this section.

1.
Results pertaining to desired properties of resource allocation strategies captured by SCFs (see sections “Nash implementation and dominant strategy implementation”, “Intuitive fairness and strong intuitive fairness SCFs”, and “Nonparticipation and continuity properties of SCFs” sections.

2.
Results pertaining to Nash equilibrium implementation and Dominant strategy implementation of resource allocation strategies in a wireless network based on a SINR physical layer model (see “Nash implementation and dominant strategy implementation” section).
Nonmanipulable and efficient SCFs
We begin by presenting a result, which states the following. An SCF f is strategy proof , if and only if for all usersk\in \mathcal{K}, the outcome of the resource allocation for the k^{th} user, i.e., γ_{k}(r) is a constant, which is independent of its own utility function{u}_{k}\in \mathcal{U}. However, this constant is dependent on the utility functions u_{1}, … ,u_{k−1}, u_{k + 1}, … ,u_{ K }, i.e., the utilities of the other users u_{−k}.
Theorem 1
An SCF f is strategy proof, if and only if for all usersk\in \mathcal{K}and for all utility function (K − 1)tuples{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}, there exists a constant c_{ k }(u_{−k}) > 0 such that for all resource vectors r ∈ Q_{ k }(u_{−k}), γ_{ k }(r) = c_{ k }(u_{−k}), where γ_{ k }is the SINR function of the k^{th}user.
Proof
“⇒”: Assume that the SCF f is strategy proof . Let there be an arbitrary userk\in \mathcal{K} and an utility function (K − 1)tuple{\mathit{u}}_{k}\in {\mathcal{U}}^{K1} also chosen arbitrarily but fixed. Then, for utility functions{u}_{k},{\xfb}_{k}\in \mathcal{U} chosen arbitrarily, we have that
Since, γ_{ k } is a special case of our utility function, the above expression follows from strategy proofness. Then{\gamma}_{k}\left(f\right({u}_{k},{\mathit{u}}_{k}\left)\right)\ge {\gamma}_{k}\left(f\right({\xfb}_{k},{\mathit{u}}_{k}\left)\right). However, due to strategy proofness, we also have
Then,{\gamma}_{k}\left(f\right({\xfb}_{k},{\mathit{u}}_{k}\left)\right)={\gamma}_{k}\left(f\right({u}_{k},{\mathit{u}}_{k}\left)\right)={c}_{k}\left({\mathit{u}}_{k}\right). Since we have chosen the utility function{\xfb}_{k}\in \mathcal{U} arbitrarily, we have for all resource vectors r ∈ Q_{ k }(u_{−k}) that γ_{ k }(r) = c_{k}(u_{−k}).
“⇐”: Let us choose a userk\in \mathcal{K} arbitrarily. Let{\mathit{u}}_{k}\in {\mathcal{U}}^{K1} be an arbitrarily chosen (but fixed) utility function (K − 1)tuple. Let{u}_{k},{\xfb}_{k}\in \mathcal{U} be chosen arbitrarily. Then, we have that
Equation 10 holds for all usersk\in \mathcal{K}. Hence, the SCF f satisfies the property of strategy proofness. □
We now present a result for the 2user case. This result shows the restriction of the available SCFs f , if we want them to satisfy the properties of strategy proofness and efficiency, i.e., the resource allocation strategy is nonmanipulable and is Pareto optimal.
Corollary 1
Let the number of users K = 2. Then SCF f is efficient and strategy proof, if and only if there exists a resource vector{r}^{\ast}\in \mathcal{R}with γ(r^{∗}) a Pareto optimal resource allocation and for all utility function 2tuples({u}_{1},{u}_{2})\in {\mathcal{U}}^{2}, we have that f(u_{1}, u_{2}) = r^{∗}.
Proof
“⇒”: We have the number of users K = 2. Let SCF f be strategy proof and efficient. For{u}_{2}\in \mathcal{U} (u_{−1} = u_{2}) each resource r ∈ Q_{1}(u_{−1}) is on the Pareto boundary (γ_{1}(r), γ_{2}(r)) of the SINR region. From the strategy proofness of the SCF f , for all utility functions{u}_{1},{\xfb}_{1}\in \mathcal{U}, we have
Let us choose a utility function{\xfb}_{2}\in \mathcal{U} for user 2 arbitrarily. Then, the following expressions hold.
Then from (11), (12), and (13) for the utility functions{u}_{1},{\xfb}_{1},{u}_{2},{\xfb}_{2} chosen arbitrarily, we have thatf({u}_{1},{u}_{2})=f({u}_{1},{\xfb}_{2})=f({\xfb}_{1},{\xfb}_{2}). Hence, we have proved our desired result.
“⇐”: Can be easily proved. □
The classical results[16, 17] are for the case of pure exchange economies. Our results are for the case of beyond pure exchange economies for interference coupled systems. Theorems 1 and 1 provide certain initial intuition on the structure of strategy proof and efficient SCFs for the case of interference coupled systems. We observe that the structure imposed by the SBU function framework is quite restrictive. This structure is the basis of the impossibility results presented in Theorems 2, 3, 4, and 3.
Intuitive fairness and strong intuitive fairness SCFs
Here we present our results in relation to the restrictions obtained, when we try to obtain strategy proof and efficient resource allocation strategies, which satisfy the property of either

intuitive fairness or

strong intuitive fairness.
We now present a result, which states the following: a nonmanipulable, efficient, and intuitive fair resource allocation strategy is independent of the downwards scaling of the utility function{u}_{k}\in \mathcal{U} of a particular userk\in \mathcal{K}, when the utility function (K − 1)tuple{\mathit{u}}_{k}\in {\mathcal{U}}^{K1} is fixed, i.e., the resource allocation strategy is robust to downwards scaling of the utility function of a particular user, when the utility functions of all the other users are fixed.
Theorem 2
Let an SCF f be strategy proof and efficient. Then, the SCF f fulfills the property of intuitive fair, if and only if for all usersk\in \mathcal{K}, for all utility functions\mathit{u}\in {\mathcal{U}}^{K}and for0<\lambda \le 1, we have that
i.e., for 0 < λ ≤ 1 we have thatf(\lambda {u}_{k},{\mathit{u}}_{k})=f({u}_{k},{\mathit{u}}_{k}).
Proof
⇒: Let SCF f be strategy proof , efficient and not a constant function. Let us assume that SCF f is intuitive fair. Then, we have that for all usersk\in \mathcal{K}, for all utility function Ktuples\mathit{u}\in {\mathcal{U}}^{K} for u(λ) = (λu_{k}, u_{−k}), 0 < λ ≤ 1 and for all usersj\in \mathcal{K}\setminus k, we have that
Furthermore, we have that γ_{ k }(f(u(λ))) ≥ γ_{ k }(f(u)). For user j we have from Theorem 1, that γ_{ k }(f(u(λ))) = γ_{ k }(f(u)). Then, for r(λ) := f(u(λ)) we have that u_{ k }(r(λ)) ≥ u_{ k }(f(u)) fork\in \mathcal{K}. Since, SCF f is efficient, we must have that u_{ k }(r(λ)) = u_{ k }(f(u)) fork\in \mathcal{K}.
⇐: This direction can easily be verified. Let an SCF f be strategy proof , efficient and satisfy the following expression, for all usersk\in \mathcal{K} and λ ∈ (0, 1]:
Then, it can easily be observed that the SCF satisfies the property of intuitive fairness. □
Remark 6
The SCF f (ω) defined according to (7) (in Example 7) satisfies the properties of efficiency and intuitive fairness.
We now present a corollary to Theorem 2, which states the following. Let a resource allocation strategy be nonmanipulable and efficient. If the resource allocation strategy is not robust to downward scaling of the utility function of a particular userk\in \mathcal{K}, then at least one other userj\in \mathcal{K}\setminus k pays the price with a decrease in its performance, even if the utility functions u_{−k} are fixed.
Corollary 2
Let SCF f be strategy proof and efficient. For an arbitrarily chosen userk\in \mathcal{K}, with{u}_{k}\in \mathcal{U},{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}, and\widehat{\lambda}\in (0,1), let
Then, there exists at least one user j\in \mathcal{K}\setminus k such that
Proof
Let the assumptions of the corollary be true. Let us assume that for all usersk\in \mathcal{K}, for all utility functions{u}_{k}\in \mathcal{U}, for all utility function (K − 1)tuples{\mathit{u}}_{k}\in {\mathcal{U}}^{K1} and for allj\in \mathcal{K}\setminus k with λ ∈ (0, 1) we have that
Since, the SCF f satisfies the axioms of strategy proofness and efficiency, we have that
From Theorem 1 we have for an arbitrarily chosen user k, that u_{ k }(f(λu_{ k }, u_{−k})) = u_{ k }(f(u_{ k }, u_{−k})). Furthermore, we have that f(λu_{ k },u_{−k}) = f(u_{ k },u_{−k}) for 0 < λ < 1. □
We now present certain results, in relation to the stronger property of strong intuitive fairness.
Corollary 3
Let an SCF f be strategy proof and efficient. Then, the SCF f fulfills the property of strong intuitive fairness, if and only if for an arbitrary userk\in \mathcal{K}, for allj\in \mathcal{K}\setminus kwith utility function (K − 1)tuple{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}, there exists a constant d_{ k }(u_{−k},j) such that for all resources r ∈ Q_{ k }(u_{−k}) we have that
Proof
“⇒”: Let us choose a userk\in \mathcal{K} arbitrarily. We shall take the perspective of user k without any loss of generality. Let us arbitrarily choose a utility function (K − 1)tuple{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}. We have to show that for utility functions{u}_{k},{\xfb}_{k}\in \mathcal{U}, the expression{u}_{k}\left(f\right({u}_{k},{\mathit{u}}_{k}\left)\right)={u}_{k}\left(f\right({\xfb}_{k},{\mathit{u}}_{k}\left)\right) holds for allk\in \mathcal{K}. Let us assume that there exists a user k_{0}, where{k}_{0}\in \mathcal{K}\setminus k, such that
We define{u}_{k}^{\ast}\left(\mathit{r}\right) as follows:
The utility function{u}_{k}^{\ast} is strictly monotonic increasing and continuous. For all resource vectors\mathit{r}\in \mathcal{R}, we have that{u}_{k}^{\ast}\left(\mathit{r}\right)\ge {u}_{k}\left(\mathit{r}\right) and{u}_{k}^{\ast}\left(\mathit{r}\right)\ge {\xfb}_{k}\left(\mathit{r}\right). Therefore, from the property of intuitive fairness for all usersj\in \mathcal{K}\setminus k, we have that
From Theorem 1 we have that{\gamma}_{k}\left(f\right({u}_{k}^{\ast},{\mathit{u}}_{k}\left)\right)\le {\gamma}_{k}\left(f\right({u}_{k},{\mathit{u}}_{k}\left)\right). Since, SCF f is efficient, we must have that{\gamma}_{k}\left(f\right({u}_{k}^{\ast},{\mathit{u}}_{k}\left)\right)={\gamma}_{k}\left(f\right({u}_{k},{\mathit{u}}_{k}\left)\right), for allk\in \mathcal{K}. Therefore, from Theorem 1, we have thatf({u}_{k}^{\ast},{\mathit{u}}_{k})=f({u}_{k},{\mathit{u}}_{k}). We can have the same expression also for({u}_{k}^{\ast},{\mathit{u}}_{k}) and({\xfb}_{k},{\mathit{u}}_{k}). Then, for arbitrary utility functions{u}_{k},{\xfb}_{k}\in \mathcal{U} we havef({u}_{k},{\mathit{u}}_{k})=f({\xfb}_{k},{\mathit{u}}_{k}). We have proved the desired result.
“⇐”: Let us choose a strategy proof and efficient SCF f . Let, for an arbitrary userk\in \mathcal{K} and for all other usersj\in \mathcal{K}\setminus k with utility function(K1)tuple{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}, there exists a constant d_{ k }(u_{−k},j) such that for each resource vector r ∈ Q_{k}(u_{−k}) we have that u_{ k }(r) = d_{ k }(u_{−k},j). Then, it can easily be verified that the SCF f satisfies the property of strong intuitive fairness. □
From the above proof, we can obtain the following additional result. If a resource allocation strategy satisfies the properties of strategy proofness, efficiency, and strong intuitive fairness, then changing the preference of a single user is not sufficient to change the resource allocation, i.e., to affect a change in the resource allocation at least two users must change their preferences or utility functions for the desired resources.
Corollary 4
Let an SCF f be strategy proof and efficient. Then, the SCF f fulfills the property of strong intuitive fairness, if for all usersk\in \mathcal{K}and for all utility function (K − 1)tuples{\mathit{u}}_{k}\in {\mathcal{U}}^{K1}, we have that the cardinality of the option set Q_{ k }(u_{ k }) is equal to 1. Therefore, for any utility functions{u}_{k},{\xfb}_{k}\in \mathcal{U}we havef({u}_{k},{\mathit{u}}_{k})=f({\xfb}_{k},{\mathit{u}}_{k}).
Proof
The proof is contained in the proof of Theorem 3.
We have stated that for all utility function Ktuples{\mathit{u}}_{k}\in {\mathcal{U}}^{K1} and for all utility functions u_{k} ≠ 0 and for an arbitrarily chosen userj\in \mathcal{K}\setminus k, we have that
Theorem 4 has a certain connection to the axiom nondummy introduced in[18]. An SCF f is nondummy, if\forall k\in \mathcal{K},\exists \mathit{u}\in {\mathcal{U}}^{K} and{\xfb}_{k}\in \mathcal{U}, such thatf\left(\mathit{u}\right)\ne f({\xfb}_{k},{\mathit{u}}_{k}). The nondummy axiom states that each user can change the outcome of the SCF by changing its utility function. It guarantees every user the minimum right to affect the social decision. Then, we can say that a strategy proof, efficient, and strong intuitive fair resource allocation strategy for interference coupled systems does not satisfy the axiom nondummy.
Nonparticipation and continuity properties of SCFs
In this section, we present a result, which states that if the resource allocation strategy is nonmanipulable, Pareto optimal satisfies property of nonparticipation, then the resource allocation strategy has to be discontinuous. This has certain implications on the algorithmic implementation of resource allocation strategies. Furthermore, continuity is a desirable property for resource allocation strategies, e.g., in certain classes of widely used games, the Nash equilibrium is a continuous function of the game parameters, which follows from the implicit function theorem[19].
Theorem 3.
Let an SCF f be strategy proof and efficient. Then, the SCF f cannot simultaneously be continuous and satisfy the property of nonparticipation.
Proof
Let an SCF f be strategy proof and efficient. For the sake of obtaining a contradiction, let us assume that the SCF f is continuous and satisfies the property of nonparticipation. Let us choose a userk\in \mathcal{K} arbitrarily and take the perspective of this user k, without any loss in generality. Let us choose a utility function (K − 1)tuple{\mathit{u}}_{k}\in {\mathcal{U}}^{K1} arbitrarily. For all power vectors\underset{\xaf}{\mathit{p}}\in {\mathbf{Q}}_{k}\left({\mathit{u}}_{k}\right) we have that{\gamma}_{k}\left(\underset{\xaf}{\mathit{p}}\right)={c}_{k}\left({\mathit{u}}_{k}\right)>0. Therefore,\frac{{p}_{k}}{{\mathcal{I}}_{k}\left(\underset{\xaf}{\mathit{p}}\right)}={c}_{k}\left({\mathit{u}}_{k}\right), for all power vectors\underset{\xaf}{\mathit{p}}\in {\mathbf{Q}}_{k}\left({\mathit{u}}_{k}\right). Exploiting the fact, that{\mathcal{I}}_{k} is an interference function, we have that
where\phantom{\rule{1em}{0ex}}0<{\mu}_{k}={\mathcal{I}}_{k}\left((0,1)\right). For all power vectors\underset{\xaf}{\mathit{p}}\in {\mathbf{Q}}_{k}\left({\mathit{u}}_{k}\right) we have{c}_{k}\left({\mathit{u}}_{k}\right)=\frac{{p}_{k}}{{\mathcal{I}}_{k}\left(\underset{\xaf}{\mathit{p}}\right)}\le \frac{{p}_{k}}{{\sigma}_{k}^{2}{\mu}_{k}}, where{\mu}_{k}={\mathcal{I}}_{k}\left(\right(0,1\left)\right). Therefore, we have that the power vector{p}_{k}\ge {c}_{k}\left({\mathit{u}}_{k}\right){\sigma}_{k}^{2}{\lambda}_{k}, where λ∈(0,1). Let\mathit{u}\left(\lambda \right)\left(\underset{\xaf}{\mathit{p}}\right)=(\lambda {u}_{k},{\mathit{u}}_{k})\left(\underset{\xaf}{\mathit{p}}\right) for all P_{total} > 0. Then, we have that
Then, we have that
Equation 16 follows from the property of nonparticipation (Definition 8), which we have assumed that our SCF f satisfies (for the sake of obtaining a contradiction). However,{f}_{k}\left(\mathit{u}\right(\lambda \left)\right)\ge {c}_{k}\left({\mathit{u}}_{k}\right){\sigma}_{k}^{2}{\mu}_{k}>0. As can be observed that the constant{c}_{k}\left({\mathit{u}}_{k}\right){\sigma}_{k}^{2}{\mu}_{k} is independent of λ. Therefore, inf_{0<λ<1}f_{ k }(u(λ)) > 0, which is in contradiction with (16). Hence, we have our desired contradiction, which proves the result. □
The SCF f (ω) defined in (7) (in Example 3) satisfies the properties of efficiency, continuity, and nonparticipation. Another practical way of justifying the nonfulfillment of the axiom of nonparticipation along with the other axioms in practical resource allocation strategies is that in practical resource allocation strategies a user always utilizes certain resources, i.e., in practical resource allocation strategies f_{ k }(0, u_{−k}) = c for some constant c > 0. A simple way to picture this is that even if the user decides to transmit nothing, it would require some resource to sense the channel or measure the interference temperature. Hence, the constant c can be made arbitrarily small, however we always have c > 0.
Nash implementation and dominant strategy implementation
In this section, we present certain results pertaining to Nash equilibrium implementation and dominant strategy implementation aspects for the class of SBU functions. In this article, we have not concerned ourselves with existence and uniqueness issues of the Nash equilibrium. For the purpose of analysis of this article, we assume that these issues have been addressed. One such paper toward this direction is[20]. We begin by presenting Lemma 1, which characterizes the Nash equilibrium properties of a strategy Ktuple.
Lemma 1
1. Let\mathit{u}\in {\mathcal{U}}^{K}be a fixed utility function Ktuple. Let s ∈ N^{g} (u) be an arbitrary strategy Ktuple. Then, we have for all utility function Ktuples\mathit{\xfb}\in {\mathcal{U}}^{K}, that\mathit{s}\in {N}^{g}\left(\mathit{\xfb}\right).
2. Let\mathit{u},\mathit{\xfb}\in {\mathcal{U}}^{K}be arbitrary utility function Ktuples. Then, we have that{N}^{g}\left(\mathit{u}\right)={N}^{g}\left(\mathit{\xfb}\right).
Proof

(1)
Choose an arbitrary strategy Ktuple \mathit{s}\in {N}^{g}\left(\mathit{u}\right). Then, we have for all users k\in \mathcal{K}, g({\mathcal{S}}_{k},{\mathit{s}}_{k})\subseteq \mathbf{L}\left(g\right(\mathit{s}),{u}_{k}), i.e., we have for all users k\in \mathcal{K} and for all {\stackrel{~}{s}}_{k}\in {\mathcal{S}}_{k}, q\left({\gamma}_{k}\right(g({\stackrel{~}{s}}_{k},{\mathit{s}}_{k})\left)\right)\le q\left({\gamma}_{k}\right(g({s}_{k},{\mathit{s}}_{k})\left)\right), i.e., we have for all users k\in \mathcal{K} and for all {\stackrel{~}{s}}_{k}\in {\mathcal{S}}_{k}, {\gamma}_{k}\left(g\right({\stackrel{~}{s}}_{k},{\mathit{s}}_{k}\left)\right)\le {\gamma}_{k}\left(g\right({s}_{k},{\mathit{s}}_{k}\left)\right). Let {\xfb}_{k}:=\widehat{q}\xb7{\gamma}_{k}, for any k\in \mathcal{K}. We have for all users k\in \mathcal{K} and for all {\stackrel{~}{s}}_{k}\in {\mathcal{S}}_{k} that {\xfb}_{k}\left(g\right({\stackrel{~}{s}}_{k},{\mathit{s}}_{k}\left)\right)\le {\xfb}_{k}\left(g\right({s}_{k},{\mathit{s}}_{k}\left)\right), i.e., \mathit{s}\in {N}^{g}\left(\xfb\right).

(2)
We need simply to exchange the order of \mathit{\xfb}\phantom{\rule{0.5em}{0ex}} and u in part (1) of the proof and we have the desired result. □
A similar result as in the Nash equilibrium implementation developed in Lemma 1 can be proved for dominant strategy implementation, i.e., for arbitrary\mathit{u},\mathit{\xfb}\in {\mathcal{U}}^{K}, we have thatD{S}^{g}\left(\mathit{u}\right)=D{S}^{g}\left(\mathit{\xfb}\right). We shall now develop the connection between the Nash equilibrium and an SCF f, which can be implemented in Nash equilibrium and between an SCF f and its dominant strategy implementation.
Theorem 4
An SCF f can be implemented in Nash equilibrium, if and only if it is a constant function. Furthermore, an SCF f can be implemented in dominant strategy, if and only if it is a constant function.
Proof
“⇒”: We shall only prove the result for the first statement of the theorem. Let{\mathit{u}}^{\left(1\right)},{\mathit{u}}^{\left(2\right)}\in {\mathcal{U}}^{K} be arbitrary utility functions in the family of functions{\mathcal{U}}^{K}, where{\mathit{u}}^{\left(1\right)}=[{u}_{1}^{\left(1\right)},\dots ,{u}_{K}^{\left(1\right)}] and{\mathit{u}}^{\left(2\right)}=[{u}_{1}^{\left(2\right)},\dots ,{u}_{K}^{\left(2\right)}]. Let s^{(1)} and s^{(2)} be two strategy Ktuples such that s^{(1)} ∈ N^{g} (u^{(1)}) and s^{(2)} ∈ N^{g} (u^{(2)}). We have from Lemma 1 that s^{(1)} ∈ N^{g} (u^{(2)}). This gives us
Equality (a) in (17) follows from condition 2 in Definition 11 and equality (b) in (17) follows from s^{(1)} ∈ N^{g} (u^{(1)}).
“⇐”: The other direction can easily be verified. The proof for the second statement of the theorem can be carried out in a similar manner. □
We now compare Theorem 4 with Maskin’s result in[8]. Maskin’s result requires an SCF to satisfy the following two properties: monotonicity and noveto power. In[8], an SCFf:{\mathcal{U}}^{K}\mapsto \mathcal{R} satisfies Maskin’s monotonicity condition, if\forall \mathit{r}\in \mathcal{R} and\forall \mathit{u},\mathit{\xfb}\in {\mathcal{U}}^{K}, if r=f(u) and for all usersk\in \mathcal{K},\forall \widehat{r}\in \mathcal{R} if{u}_{k}\left(\mathit{r}\right)\ge {u}_{k}\left(\widehat{r}\right) implies{\xfb}_{k}\left(\mathit{r}\right)\ge {\xfb}_{k}\left(\widehat{r}\right), then\mathit{r}=f\left(\mathit{\xfb}\right).
Transitioning to our case of SBU functions, let{u}_{k}\left(\mathit{r}\right)\ge {u}_{k}\left(\widehat{r}\right), for allk\in \mathcal{K} and for some\mathit{u}\in {\mathcal{U}}^{K}. Then, from the definition of SBU functions (Definition 1) we have{\gamma}_{k}\left(\mathit{r}\right)\ge {\gamma}_{k}\left(\widehat{r}\right), for all usersk\in \mathcal{K}. Once again, from Definition 1 we have{\xfb}_{k}\left({\gamma}_{k}\left(\mathit{r}\right)\right)\ge {\xfb}_{k}\left({\gamma}_{k}\left(\widehat{r}\right)\right), for all usersk\in \mathcal{K} and for all\mathit{\xfb}\in {\mathcal{U}}^{K}.
It can be observed that our class of SBU functions always satisfies the monotoncity property of Maskin. On the other hand, it does not satisfy the noveto property (see[8], p. 31). Furthermore, we analyze a smaller class of utility functions, compared to the general class analyzed by Maskin. Therefore, the domain for our SCFs is smaller than the domain of SCFs for the results from Maskin. Hence, the class of mechanisms which can implement our SCF in Nash equilibria should potentially be larger. However, we observe from Theorem 4 that for the class of SBU functions the only permitted mechanisms, which implement the SCF in Nash equilibria or dominant strategy are constant functions.
Example 7
Consider a multiuser multiple access channel, with a beamforming array at the base station[21, 22]. For fixed channels, the optimal beamforming weight vectors{\mathit{\omega}}_{k}^{\text{opt}} for the k th user, with respect to maximizing{\gamma}_{k}(\mathbf{p},{\mathit{\omega}}_{k}^{\text{opt}})s can easily be calculated. The optimal SINR for the k th user can be written as:{\gamma}_{k}(\mathit{p},{\mathit{\omega}}_{k}^{\text{opt}})={p}_{k}{\mathit{h}}_{k}^{H}{({\sigma}^{2}\mathbf{I}+{\sum}_{j\ne k}{p}_{j}{\mathit{h}}_{j}{\mathit{h}}_{j}^{H})}^{1}{\mathit{h}}_{k} where p_{ k }, h_{ k }, and{\sigma}_{k}^{2} are the power, the channel vectors at the base station array and the noise for the k th user, respectively. The interference function for the k th user is,{\mathcal{I}}_{k}\left(\mathit{p}\right)={\left({\mathit{h}}_{k}^{H}{({\sigma}^{2}\mathbf{I}+{\sum}_{j\ne k,j\in \mathcal{K}}{p}_{j}{\mathit{h}}_{j}{\mathit{h}}_{j}^{H})}^{1}{\mathit{h}}_{k}\right)}^{1}. The structure of the feasible utility region depends on several factors, for instance, the receiver strategy. For one set of beamformers ω_{k},\forall k\in \mathcal{K} corresponds to one particular utility region U(P_{total}, ω) for fixed channels, where ω = [ω_{ 1 }, … ,ω_{ K } and P_{total} is the total power constraint. Let a mechanism g implementf({\gamma}_{1}^{{\omega}_{1}^{\text{opt}}},\dots ,{\gamma}_{K}^{{\omega}_{K}^{\text{opt}}}) in Nash equilibria. Then from Theorem 4 the only permitted solution is the constant power allocation, i.e., a fixed power vector.
Literature survey
Economic literature survey
All the work cited here is for the case of pure exchange economies. Hurwicz[23] showed that there is no strategy proof , efficient, and individually rational mechanism in 2 user 2 resource pure exchange economy. The authors of[24] attempted to replace individual rationality in Hurwicz’s result with a weaker axiom of nondictatorship. Ameliorating upon both results, Zhou[25] established an impossibility result that there is no strategy proof , efficient, and nondictatorial mechanism in 2 user m resource (m≥2) pure exchange economies. He conjectures that there are no strategy proof , efficient, and noninversely dictatorial mechanisms in the case of 3 or more users. In[26], Zhou’s conjecture has been examined and a new class of strategy proof and efficient mechanisms in the case of four or more users (operators) was discovered.
The studies by the authors of[18, 27] provided examples of strategy proof , efficient, and nondictatorial SCFs. These SCFs are also nondummy. When we have four or more users, twostage dictator making mechanisms are strategy proof , efficient, and nondummy. When we have three or more users, the SCFs provided by Satterthwaite and Sonnenschein[27] are strategy proof and efficient. When we have four or more users, Kato and Ohseto[18] have shown existence of certain strategy proof , efficient, nondummy, and dictatorial SCFs.
The property of strategy proofness requiring revealing of a users’ preference is a dominant strategy. However, as can be seen from the previous results, this concept has serious drawbacks. In particular, many strategy proof mechanisms have multiple Nash equilibrium, some of which produce undesired outcomes. A possible solution to this problem is to require double implementation in Nash equilibrium and in dominant strategies. Saijo et al.[6] characterize securely implementable SCF and compare their results with dominant strategy implementations. Reichelstein and Reiter[28] discuss the realization and implementation of a social choice rule. It is shown that Nash implementation is always at least as costly, in message space size, as (decentralized) realization.
Networks literature survey
Our reference list is by no means comprehensive and the interested reader is further referred to the references in the mentioned papers. The studies of[29, 30] introduce the concept of a progressive second price auction. Lazar and Semret[29] have shown that a certain form of the Nash equilibrium holds when the progressive second price auction is applied by independent sellers on each link of a network with arbitrary topology. The studies of[31–33] study rules and structure of games such that their outcomes achieve certain objectives.
Huiping and Junde[34] propose a strategy proof trust management system fitting to wireless ad hoc networks. Pal and Tardos[35] have developed a general method for turning a primaldual algorithm into a group strategy proof costsharing mechanism. The authors of[36, 37] have called nodes selfish if they are owned by independent users and their only objective is to maximize their individual goals. The article presents a game theoretic framework for truthful broadcast protocol and strategy proof pricing mechanism. Guanxiang et al.[38] have proposed an auctionbased admission control and pricing mechanism for priority services, where each user pays a congestion fee for the external effect caused by their participation. The mechanism is proved to be strategy proof and efficient. Wang and Li[39] have addressed the issue of user cooperation in selfish and rational wireless networks using an incentive approach. They have presented a strategy proof pricing mechanism for the unicast problem. The authors of[40, 41] have provided a tutorial on mechanism design and attempt to apply it to concepts in engineering. Huang et al.[42, 43] have utilized SINR and power auctions to allocate resources in a wireless scenario and present an asynchronous distributed algorithm for updating power levels and prices to characterize convergence using supermodular game theory. Wu et al.[44] have proposed a repeated spectrum sharing game with cheatproof strategies. They propose specific cooperation rules based on maximum total throughout and proportional fairness criteria. Sharma and Teneketzis[45] have presented a decentralized algorithm to allocated transmission powers, such that the algorithm takes into account the externalities generated to the other users. Kakhbod and Teneketzis[46] consider a decentralized bandwidth/rate allocation problem in unicast service provisioning. They present a mechanism, which is implementable in Nash equilibrium, individually rational and budget balanced. Procaccia and Tennenholtz[47] advocate the reconsideration of highly structured optimization problems in the context of mechanism design. They argue that, in certain domains, approximation can be leveraged to obtain truthfulness without resorting to payments.
Conclusions
The article investigates certain desirable and natural properties of SCFs representing resource allocation strategies for interference coupled wireless systems. The property of nonmanipulation and Pareto optimality of the resource allocation strategies is captured by the properties of strategy proofness and efficiency of the SCF, respectively. We introduce the certain desirable and natural properties of resource allocation strategies, namely (strong) intuitive fairness and nonparticipation. We prove that there are certain inconsistencies, among the properties of strategy proofness, efficiency, (strong) intuitive fairness, nonparticipation, and continuity. These inconsistencies result in certain limitations while having algorithmic implementations and certain analytical investigations of these resource allocation strategies. Hence, it can be observed that nonmanipulation and Pareto optimality of the resource allocation strategies are stringent requirements and along with certain other desirable properties is not always implementable. It has been shown that the only permissible SCF representing a resource allocation strategy in interference coupled wireless systems, which can be implemented in either Nash equilibrium or dominant strategy is the trivial constant function.
Appendix
Interference functions
Definition 14
Interference functions: We say that\mathcal{I}:{\mathbb{R}}_{+}^{K+1}\mapsto {\mathbb{R}}_{+} is an interference function if the following axioms are fulfilled:
Note that we require that\mathcal{I}\left(\underset{\xaf}{\mathit{p}}\right) is strictly monotonic with respect to the last component{\underset{\xaf}{\mathit{p}}}_{K+1}. An example is\mathcal{I}\left(\underset{\xaf}{\mathit{p}}\right)={\mathit{v}}^{T}\mathit{p}+{\sigma}^{2}, where\mathit{v}\in {\mathbb{R}}_{+}^{K} is a vector of interference coupling coefficients. The axiomatic framework A1–A4 is connected with the framework of standard interference functions[2].
Definition 15
Standard interference functions: A functionY:{\mathbb{R}}_{+}^{K}\mapsto {\mathbb{R}}_{++} is said to be a standard interference function if the following axioms are fulfilled:
For any constant noise power{\underset{\xaf}{\mathit{p}}}_{K+1}={\sigma}^{2} the functionY\left(\mathit{p}\right)=\mathcal{I}\left(\underset{\xaf}{\mathit{p}}\right) is standard. Conversely, any standard interference. function can be expressed within the framework A1–A4. The details about the relationship between the model A1–A4 and Yates’ standard interference functions were discussed in[3] and further investigated in[48]. For the purpose of this article, it is sufficient to be aware that there exists a connection between these two models and the results of this article are applicable to standard interference functions.
References
Nissan N, Roughgarden T, Tardos E: Algorithmic Game Theory. (Cambridge University Press, Cambridge, 2007)
Yates RD: A framework for uplink power control in cellular radio systems. IEEE J. Sel. Areas Commun 1995, 13(7):13411348. 10.1109/49.414651
Schubert M, Boche H: QoSbased resource allocation and transceiver optimization. Found. Trends Commun. Inf. Theory 2006., 2: 10.1561/0100000010
Johari R, Tsitsiklis JN: Efficiency of scalarparameterized mechanisms. Oper. Res 2009, 57(4):823839. 10.1287/opre.1080.0638
Tse DNC, Hanly SV: Linear multiuser receivers: effective interference, effective bandwidth and user capacity. IEEE Trans. Inf. Theory 1999, 45(2):641657. 10.1109/18.749008
Saijo T, Sjöström T, Yamato T: Secure implementation. Theor. Econ 2007, 2: 203229.
MasColell A, Whinston MD, Green JR: Microeconomic Theory. (Oxford University Press, New York, 1995)
Maskin E: Nash equilibrium and welfare optimality. Rev. Econ. Stud 1999, 66: 2338. 10.1111/1467937X.00076
Babera S, Peleg B: Strategyproof voting schemes with continuous preferences. Social Choice Welfare 1990, 7: 3138. 10.1007/BF01832918
Peters HJM: Axiomatic Bargaining Game Theory. (Kluwer Academic Publishers, Dordrecht, 1992)
Thomson W: The fair division of a fixed supply among a growing population. Math. Oper. Res 1983, 8: 319326. 10.1287/moor.8.3.319
Mo J, Walrand J: Fair endtoend windowbased congestion control. IEEE/ACM Trans. Netw 2000, 5(8):556567.
Massoulie L, Roberts J: Bandwidth sharing: objectives and algorithms. IEEE/ACM Trans. Netw 2002, 3(10):320328.
Chung KS, Ely JC: Foundations of dominant strategy mechanisms. Robust Mechanism Design (Cowles Foundation for Research in Economics, Yale University, 2004)
Price J, Javidi T: Leveraging downlink for efficient uplink allocation in a singlehop wireless network. IEEE Trans. Inf. Theory 2007, 53(11):43304339.
Gibbard A: Manipulation of voting schemes: a general result. Econometrica 1973, 41: 587601. 10.2307/1914083
Satterthwaite MA: Strategyproofness and arrow’s conditions: existence and correspondence theorems for voting procedures and social welfare functions. J. Econ. Theory 1975, 10(2):187217. 10.1016/00220531(75)900502
Kato M, Ohseto S: Nondummy agents in pure exchange economies. Jpn. Econ. Rev 2004, 55(2):212220. 10.1111/j.14685876.2004.t01100303.x
Alpcan T: Noncooperative games for control of networked systems. PhD thesis, University of Illinois at UrbanaChampaign, Urbana, IL, 2006
Naik S, Alpcan T, Boche H: A Nash equilibrium analysis of interference coupled wireless systems,. IEEE ICC, Cape Town, South Africa, 2010
Schubert M, Boche H: A unifying theory for uplink and downlink multiuser beamforming,. International Zurich Seminar on Broadband Communications, 2002, pp. 271–275
Stanczak S, Boche H, Wiczanowski M: Towards better understanding of medium access control for multiuser beamforming systems,. IEEE WCNC, 2005, pp. 689–694
Hurwicz L: Decision and Organization,. chap. on Informationally Decentralized Systems (NorthHolland, Amsterdam, 1972), pp. 297–336
Dasgupta P, Hammmond P, Maskin E: The implementation of social choice rules: some general results of incentive Compatibility. Rev. Econ. Stud 1979, 46: 185216. 10.2307/2297045
Zhou L: Inefficiency of strategyproof allocation mechanisms in pure exchange economies. Social Choice Welfare 1991, 8: 247254.
Kato M, Ohseto S: Towards general impossibility theorems in pure exchange economies. Social Choice Welfare 2002, 19: 659664. 10.1007/s003550100143
Satterthwaite MA, Sonnenschein H: Strategyproof allocation mechanisms at differntiable points. Rev. Econ. Stud 1981, 48: 587597. 10.2307/2297198
Reichelstein S, Reiter S: Game forms with minimal strategy spaces. Econometrica 1988, 49: 661692.
Lazar AA, Semret N: The progressive second price auction mechanism for network resource sharing,. International Symposium on Dynamic Games and Applications, Maastricht, Netherlands, 1998
Jia P, Caines PE: Equilibria and convergence of auctions on networks,. Proceedings of International Conference on Game Theory for Networks (GameNets2009), Istanbul, Turkey, 2009, pp. 268–276
Yang S, Hajek B: VCGKelly mechanisms for allocation of divisible goods: adapting VCG mechanisms to onedimensional signals. IEEE J. Sel. Areas Commun 2007, 25(6):12371243.
Maheswaran RT, Basar T: Social welfare of selfish agents: motivating efficiency for divisible resources,. 43rd IEEE Conference on Decision and Control (CDC), vol. 2, 2004, pp. 1550–1555
Dimakis A, Jain R, Walrand J: Mechanisms for efficient allocation in divisible capacity networks,. 45th IEEE Conference on Decision and Control (CDC), San Diego, CA, USA, 2006
Huiping S, Junde S: Strategyproof trust management in wireless ad hoc network,. Canadian Conference on Electrical and Computer Engineering, 2004, vol. 3, 2004, pp. 1593–1596
Pal M, Tardos E: Group strategy proof mechanisms via primaldual algorithms,. Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, 2003, 2003 pp. 584–593
Suri NR: Design of incentive compatible protocols for wireless networks: a game theoretic approach,. IEEE International Confernce on Computer Communications (INFOCOM), 2006, pp. 1–2
Suri NR, Narahari Y, Manjunath D: An efficient pricing based protocol for broadcasting in wireless ad hoc networks,. First International Conference on Communication System Software and Middleware, 2006. Comsware 2006, 2006, pp. 1–7
Guanxiang Z, Yan L, Zongkai Y, Wenqing C: Auctionbased admission control and pricing for priority services,. 29th Annual IEEE International Conference on Local Computer Networks, 2004, 2004, pp. 398–399
Wang WZ, Li XY: Truthful lowcost unicast in selfish wireless networks,. Proceedings of the 18th International Parallel and Distributed Processing Symposium, 2004, 2004, p. 219
Garg D, Narahari Y, Gujar S: Foundations of mechanism design: a tutorial. Part 1—key concepts and classical results. Sadhana 2008, 33(3):83130.
Garg D, Narahari Y, Gujar S: Foundations of mechanism design: a tutorial. Part 2—advanced concepts and results. Sadhana 2008, 33(2):131174. 10.1007/s1204600800092
Huang J, Berry R, Honig M: Distributed interference compensation for wireless networks. IEEE J. Sel. Areas Commun 2006, 24(5):10741084.
Huang J, Berry R, Honig M: Auctionbased spectrum sharing. ACM Mob. Netw. Appl. J 2006, 24(5):405418.
Wu Y, Wang B, Liu KJR, Clancy TC: Repeated open spectrum sharing game with cheatproof strategies. IEEE Trans. Wirel. Commun 2009, 8(4):19221933.
Sharma S, Teneketzis D: An ExternalitiesBased Decentralized Optimal Power Allocation Algorithm for Wireless Networks. IEEE/ACM Trans. on Networking 2009, 17(6):18191831.
Kakhbod A, Teneketzis D: An individually rational, budgetbalanced mechanism that implements in Nash equilibria the solution of the unicast service provisioning problem,. Proceedings of the 47th annual Allerton conference on Communication, control, and computing, 2009
Procaccia AD, Tennenholtz M: Approximate mechanism design without money,. Proceedings of the 10th ACM Conference on Electronic Commerce, Stanford, CA, USA, 2009
Boche H, Schubert M: Unified framework for interference modeling of multiuser wireless networks,. IEEE International Conference on Communications (ICC), Dresden, Germany, 2009
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Boche, H., Naik, S. & Alpcan, T. Mechanism design and implementation theoretic perspective for interference coupled wireless systems. J Wireless Com Network 2012, 284 (2012). https://doi.org/10.1186/168714992012284
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/168714992012284
Keywords
 Utility Function
 Nash Equilibrium
 Dominant Strategy
 Social Choice Function
 Resource Allocation Strategy