You are on page 1of 30

2264 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO.

3, THIRD QUARTER 2018

Auction Mechanisms for Virtualization in 5G


Cellular Networks: Basics, Trends, and
Open Challenges
Ummy Habiba and Ekram Hossain , Fellow, IEEE

Abstract—Wireless network virtualization (WNV) is consid- for the next generation (i.e., 5G/B5G) cellular networks. The
ered as a reliable and effective solution to enhance the capac- LTE/LTE-A network architecture has improvised access and
ity and resource utilization in emerging 5G cellular wireless core network known as evolved universal terrestrial radio
networks. WNV supports network sharing and multi-tenancy by
allowing application or service providers with limited resources to access network (E-UTRAN) and evolved packet core (EPC),
lease network resources from mobile network operators. Several respectively [1], [2]. The access network part comprises of the
works in the literature surveyed various aspects of resource allo- base stations (BSs) as the evolved nodeBs (eNodeBs) and the
cation and network slicing methods to implement virtualization in air interface, which provides radio connectivity between the
wireless networks. In this paper, we focus on economic aspects user equipment (UE) and the BS. The user data packets
of WNV and study auction theory as a fundamental tool for
designing business models for virtualization of wireless networks, are forwarded to the Internet via serving gateway (SGW),
5G cellular networks in particular. Starting with the concept of packet data network gateway (PGW) components in EPC.
WNV in 5G cellular networks, we describe the basic principles The mobility management entity (MME) in EPC network
and solution approaches in auction theory for heterogeneous and manages all the signaling and control messages to provide
multi-commodity scenarios. Subsequently, we review the recent end-to-end connectivity along with the home subscriber server
advances in WNV based on auction models. We conclude by out-
lining the open challenges and future research directions related (HSS), and policy control and charging rule functions (PCRF)
to applications of auctions in WNV. components.
From network management perspective, the static and
Index Terms—5G cellular, wireless network virtualiza-
tion (WNV), software-defined network (SDN), network func- hardware-based platform in the existing LTE/LTE-A technol-
tion virtualization (NFV), auction, network slicing, resource ogy suffers from scalability and flexibility due to coupled
allocation. design of control and data planes. Therefore, the existing cellu-
lar technologies need to be upgraded to support the envisioned
wide range of on-demand services in 5G/B5G networks.
I. I NTRODUCTION Mobile network operators (MNOs) also require to upgrade
HE MOBILE data traffic is increasing exponentially with hardware appliances to deploy new services and technologies.
T the growth of wireless devices. The emergence of various
types of wireless services such as virtual reality, automated
To reduce capital expenditure (CAPEX) and/or operational
expenditure (OPEX), the MNOs or service providers (SPs),
driving, smart home appliances, smart personal gadgets are who have limited radio and infrastructure resources, may
also pushing mobile network operators (MNOs) to upgrade need to share infrastructure and radio resources with other
their networks. The next generation mobile networks (e.g., MNOs or SPs to meet the 5G requirements (Fig. 1). Different
5G and beyond 5G [B5G]) are expected to be flexible and types of technologies which are expected to be used for
highly reliable so that the capacity is scaled up to meet user 5G include massive MIMO, cloud radio access network (C-
demands with high data rate and decrease end-to-end latency, RAN), device-to-device (D2D) communication, full-duplex
reduce maintenance cost, and provide consistent quality of (FD) communication, and non-orthogonal multiple access
experience (QoE). (NOMA) communication.
Developed by the 3GPP, the existing 4G systems have With network-wide sharing of various infrastructure ele-
the all-IP packet based LTE technology. The LTE-Advanced ments in the core networks and both infrastructure and radio
(LTE-A), which includes LTE release 10 and beyond resources at the access networks among different virtual
(e.g., LTE-Broadcast [LTE-B]), is expected to be the basis networks (VNs), virtualization can improve the utilization of
the network resources. In fact, WNV creates business oppor-
Manuscript received February 26, 2018; accepted February 26, 2018. Date tunities for infrastructure providers (InPs), SPs, and MNOs
of publication March 2, 2018; date of current version August 21, 2018. This to make profits and provide improved network services by
work was supported by the Strategic Partnership Grant from the Natural
Sciences and Engineering Research Council of Canada under Grant STPGP sharing the network resources. The business entities who par-
494315. (Corresponding author: Ekram Hossain.) ticipate in the virtualization process, choose one of the logical
The authors are with the Department of Electrical and Computer roles among InP, MVNO, or SP according to the system model
Engineering, University of Manitoba, Winnipeg, MB R3T 5V6, Canada
(e-mail: habibau@myumanitoba.ca; ekram.hossain@umanitoba.ca). and business requirements. The service providers (SPs) are
Digital Object Identifier 10.1109/COMST.2018.2811395 the business entities who do not have sufficient infrastructure
1553-877X  c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2265

TABLE I
A LTERNATE S OLUTION A PPROACHES FOR R ESOURCE P ROVISIONING AND P RICING IN WNV

resource chunks, allocate VN segments to SPs and determine


the selling prices in a way that maximizes the utilities of all
of the involved entities. In a wireless environment, the deploy-
ment of VNs should be automated according the time varying
channel conditions. In presence of multiple operators at the
same geographic location, end users and SPs should have the
opportunity to choose the MNO from which it can get the
resource or service at a lower cost. Therefore, the standard
WNV model for 5G or beyond 5G cellular network needs a
market model that guarantees benefits for all entities through
Fig. 1. SDN and NFV-enabled 5G network architecture.
network sharing.

and/or resources to provide wireless services to their sub- A. Motivation of Using Auctions in WNV
scribed users. Hence, SPs want to purchase infrastructure Within the framework of network virtualization, resource
and/or resources from other entity known as infrastructure slicing, resource allocation and scheduling, VN mapping, and
providers (InPs). The services provided by the SPs include other service provisioning problems have been studied in the
e-commerce, video, gaming, VOIP, wearable smart devices, literature using game theory, optimization tools as well as
smart home appliances and other IoT devices, virtual reality graph theory (as shown in Table I). However, the WNV busi-
or augmented reality, other over-the-top (OTT) services, etc. ness model, especially in the case of 5G/B5G systems, needs
In the WNV business model, the MVNOs and SPs represent comprehensive investigations to deploy network sharing and
the same entity with different roles. SPs accumulate the users’ multi-tenancy in real networks through automated resource or
demand and service requirements and forward the requests to service provisioning. The trading of network infrastructure and
the MVNO. An MVNO is a virtual entity representing an SP radio resources can be modeled using microeconomic theory,
in the virtualization layer who leases resources from one or optimization, non-cooperative game, bargaining game, and/or
multiple InPs according to the demand requests received from auction approaches. Auction models come as a natural choice
the SP. On the other hand, the role of an InP is different. It to design resource provisioning and pricing schemes because
owns infrastructure and resources, partitions and assigns them of their ability to model interactions among the interested buy-
to MVNOs. Therefore, an entity cannot be an InP and MVNO ers and sellers [12], [13]. These models can be easily adapted
at the same time. Similarly, an InP and SP cannot be the same to integrate optimization and game theory tools for analyses
entity. However, an SP can play the role of a virtual InP and of computational and economic properties. The auction mech-
can lease its underutilized or idle resources to other SPs. Thus, anisms can support a wide variety of features and can be used
the SPs/MNOs can reduce the cost for deploying new services to design the complete business model that jointly optimizes
and the InPs can earn more revenue by sharing their under- the resource utilization and revenue maximization with an effi-
utilized network resources. SPs are assigned with isolated VN cient pricing rule. Auction mechanisms also allow the InPs,
segments that may consist chunks of different types of infras- MNOs, SPs, and end users to communicate so that they can
tructure and radio resources across the access and core network express their individual requirements and agree on a price
such as spectrum, transmission power, antennas, computational acceptable to both seller and buyer ends. The auction mod-
and storage resources [11]. WNV requires an efficient mech- els also enable on-demand real-time service provisioning of
anism to partition the network considering different types of network functions.
2266 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

TABLE II
S UMMARY OF A BBREVIATIONS is reviewed, whereas [17] particularly focuses on the resource
allocation and isolation problems and provides a review of
existing works on resource slicing in WNV. The implementa-
tion of network sharing and multi-tenancy in WNV, through
SDN hypervisor or the virtual machine monitor, is studied
in [18]. The authors review both centralized and decentral-
ized SDN hypervisors or virtualization controllers that allow
multiple tenant architecture. The software-defined NFV archi-
tecture in [19] studies the flexibility of service deployment by
virtualizing various network functions of hardware appliances
into software applications. An SDN and NFV-based architec-
ture for mobile packet core network is presented in [14] that
focuses on functional implementation and deployment strategy
of the next generation EPC network.
The pricing mechanisms for network infrastructure shar-
ing among multiple tenants in WNV have not been studied
comprehensively in the existing literature. Dynamic pricing
for virtualizing network resources and services will enable
on-demand service provisioning, optimal resource utilization,
and low maintenance cost in 5G/B5G wireless networks.
We, therefore, focus on pricing mechanisms for auction-
based market models for virtualization of network infrastruc-
ture/resources and functionalities, e.g., base stations, antennas,
spectrum, edge computing servers, cache storage, etc. The
main contributions of this paper are as follows:
• We provide an overview of virtualization process in wire-
less networks, the business model and main research
challenges in WNV. We also discuss about the deploy-
ment of WNV techniques in 5G wireless systems using
SDN and NFV technologies.
• We present the fundamentals of auction theory in design-
ing virtualization models for wireless networks with the
aim of achieving efficient network resource utilization as
well as revenue maximization of the MNOs.
• We review the existing auction approaches in virtualiza-
tion of wireless networks.
• We identify open challenges which have not yet been
addressed in the literature and discuss future research
directions.

C. Paper Organization
The rest of the paper is organized as follows. Section II
presents the concepts of network virtualization in wireless
networks, business models including SDN and NFV-based
architecture along with related research challenges. A sum-
mary of abbreviations used in this paper is provided in Table II.
The basic principles and various solution approaches in auc-
tion mechanism design are detailed in Section III. The existing
B. Scope and Contributions auction-based virtualization models in wireless networks are
Despite several existing surveys on WNV [14]–[19], we reviewed in Section IV. The lessons learned from different
aim at reviewing the virtualization models with a new per- auction approaches in WNV are discussed in Section V. We
spective in terms of network slicing and pricing based on discuss the key open research issues for future investigation
auction mechanisms. The existing works survey the research in Section VI. Finally, we conclude the paper in Section VII.
challenges for resource slicing and implementing the virtual For readers, basic knowledge about wireless communica-
network slices in SDN/NFV-enabled wireless networks. The tions, optimization theory and game theory may be required.
survey in [15] presents an overview of WNV along with a To understand the detailed analyses of auction mecha-
brief survey of virtualization methods and related research nisms, readers may need to be familiar with combinato-
challenges. In [16], virtualization of wireless links and nodes rial optimization theory (e.g., linear programming, knapsack
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2267

problems), convex optimization theory (e.g., duality), online resource utilization and facilitates faster implementation of
learning algorithm (e.g., reinforcement learning). new wireless technologies and services.

II. OVERVIEW OF W IRELESS N ETWORK V IRTUALIZATION B. Issues in WNV


WNV is an extension of the network virtualization (NV) There are several research challenges in modeling the vir-
in the context of wireless networks. In this section, we first tualization methods for wireless networks, which include
explain the concept of NV and its application to wireless isolation, resource discovery and allocation, mobility and
networks. We will outline the business models and research network management, and security issues [15]. In this paper,
challenges to implement WNV. The scope of WNV in com- we briefly outline some of the major challenges that motivate
bination with SDN and NFV to design future 5G network auction-based virtualization mechanism.
architecture is then described. 1) Embedding of Virtual Resources: One of the major chal-
lenges in WNV is to decide how resources are assigned
A. Basic Concepts and Motivations for WNV as virtual resources which is referred to as the embedding
NV is the process of abstracting and slicing the physical problem. The initial task is to identify the resources to be
network resources into virtual networks (VNs). The abstract virtualized by monitoring the state of the physical resources.
representation of the isolated slices is shared among differ- Upon receiving the requests for virtual resources, a mapping
ent parties or network nodes. The node that has access to a is required to match VN requests with available resources.
virtual slice, has the complete control to manage the set of Finally, an allocation method is required to define how vir-
resources within that slice. In [16], virtualization is defined as tual resources will be mapped to VNs and how VNs will
a resource mapping which is comprised of the following prin- then be assigned onto the physical infrastructure. A business
ciples: 1) abstracting physical resources as virtual resources, model will therefore be required to model the mappings and
2) splitting and combining virtual resources into slices, 3) iso- allocations of network resources and functionalities.
lating each of the slices, 4) allocating them simultaneously 2) Isolating Virtual Networks: A mechanism is also
among different entities with full ownership within the slice, required to isolate the virtual slices so that virtual networks can
and 5) recursive use of the physical resources. The VNs coexist coexist without interfering with each other. There can be differ-
on the underlaying physical substrate network and indepen- ent levels of isolation, such as at the frequency or sub-channel
dently provide services according to the needs of network level, time-slot level, spatial location level, information or flow
nodes. The virtual links are used to map virtual nodes with level, network level, and hardware level (antenna, signal pro-
substrate nodes. Thus, NV separates the roles of InPs and SPs cessors, etc.). Guaranteeing isolation is difficult in wireless
and enables network sharing with increased competition and networks due to time varying channel conditions. In addition,
innovation. The implementation of new services and protocols co-tier and cross-tier interferences in heterogeneous wireless
does not require installing new hardware or physical nodes. networks make the isolation problem challenging.
The VNs allow new applications to be tested on the same 3) Migrating Virtual Machines (VMs): The VNs operate
physical infrastructure, but on logically isolated platforms. over the VMs which run on physical servers. If the network
This leads to enhanced flexibility, programmability, security, planning is changed within the data center, the corresponding
efficiency, and cost savings. mapping of virtual nodes and links also need to be updated.
In wireless networks, the network resources are abstracted For example, a user’s serving base station may change due
into VN slices and can be isolated according to different types to the user’s mobility or in case of any power outage in the
of spectrum, infrastructure, network and traffic flow. The spec- serving base station. Therefore, the VMs associated with the
trum level virtualization can be considered as an application virtualized BSs that serve such mobile users need migration
of spectrum sharing and dynamic access where the radio spec- from the current computing node to another. In such scenar-
tra are sliced through multiplexing technique and assigned to ios, the footprint of VMs needs to be updated in real-time
different SPs. The infrastructure level virtualization supports to guarantee continuity of on-going services and QoS require-
infrastructure sharing among multiple operators by partition- ments. The cost of VM migration depends on the time and the
ing the physical access network elements, e.g., antennas, BSs, backhaul resources spent during the migration. Therefore, the
site area, backhaul equipment, and cabinets, etc. The network WNV framework should carefully design with the VN embed-
level virtualization represents a virtual network consisting of ding process to efficiently manage the assignment of VNs with
virtualized BSs and radio resources (e.g., time slots, spectrum, the objective of minimizing the VM migration cost.
signal processors). The flow level virtualization involves allo- 4) Managing Control Interfaces: In the virtualization envi-
cation of a certain virtual network slice based on some service ronment, the end-to-end connectivity is established through
or data rate requirements. virtual links which are configured using programmable con-
A complete framework for virtualization provides opera- trol interfaces. The signaling and control messages exchanged
tional flexibility and efficiency to model the heterogeneity of between the users in the access network and the core network
the traffic demands and satisfies the end-to-end service require- components, should be handled considering processing delays
ments. With WNV, differentiated services can be configured on over the virtual links. It is difficult to manage all the interfaces
the same infrastructure without any dependency on dedicated in a centralized way because it involves handling a large
hardware devices and geographic location. This optimizes the number of message exchanges between the two end nodes.
2268 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

TABLE III
B USINESS M ODELS FOR AUCTION M ECHANISMS IN WNV

Designing a reliable communication protocol becomes more slices. In practice, the wireless services provided by the
complex due to users’ diverse QoS requirements or ser- SPs include e-commerce, video, gaming, VOIP, wear-
vice level agreements as well as heterogeneity of access able smart devices, smart home appliances and other
technologies. IoT devices, virtual reality or augmented reality, other
over-the-top (OTT) services, etc.
• Mobile Virtual Network Operators (MVNOs) are the vir-
C. WNV Business Model tual entities who manage the virtual resource requests
WNV provides potential business models to enhance the from SPs and lease resources from one or multiple InPs
current network architecture by enabling network sharing and according to the demand requests. Then, an MVNO
multi-tenancy. Virtualization provides more control over the uses virtualized resource slices for SPs to satisfy their
wireless resources and services as well as additional oppor- subscribers’ QoS requirements.
tunity of revenue generation for different business entities. Network virtualization can be applied to different business
The key business players of WNV represent different mobile scenarios in wireless networks. A summary of business mod-
network operators, wireless service providers, application or els considered in auction-based virtualization is provided in
content providers, or business entities who provides the cloud Table III. Multiple InPs can form a common resource pool
services (e.g., C-RAN, IaaS, RaaS, edge computing, etc.) in by allowing other parties to share their under-utilized spec-
wireless networks. When these business entities participate in trum and radio resources dynamically. In another scenario, an
the virtualization process, they are identified by one of the operator may share its physical RAN elements only, not the
following roles: spectrum resources. The site area and other supporting ele-
• Infrastructure Providers (InPs) own the network infras- ments including antenna frame and transmission equipments
tructures and radio resources that include licensed spec- within the RAN can be shared among MVNOs who have
trum, radio access networks (RANs), backhaul, trans- their own spectrum resources. A virtualized common core
mission networks and core networks. Sometimes, the network can also be shared among RANs belonging to dif-
InP may not own the spectrum resources but still offer ferent operators. In some cases, SPs and MNOs who have
network infrastructure sharing among other parties. The their own spectrum resources and RAN elements but need to
InP virtualizes the physical network resources and inter- enhance coverage region, can apply virtualization to share their
acts with other business players to manage the network resources over the different shared regions.
sharing. An MVNO always have full control over the slice of
• Service Providers (SPs) are the business entities who assigned resources which it can further customize as per users’
do not have sufficient infrastructure and/or resources QoS requirements. For example, an MVNO can play the role
to provide wireless services to their subscribed users. of the controller node that creates the virtual slices and enables
They want to purchase infrastructure and/or resources multi-flow transmission for SPs. If a SP has underutilized or
from InPs. SPs accumulate the users’ demand and idle resources, then the SP can also play the role of a virtual
service requirements and forward the requests to the InP and can lease its underutilized or idle resources to other
MVNOs. SPs enable services for their subscribed users SPs [23]. This will allow SPs to increase resource utiliza-
over the resources allocated through virtual network tion and get additional revenue at the same time. In Table III,
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2269

Fig. 2. Virtualization of RAN resources.

existing WNV business models used for auction mechanism Fig. 3. A SDN/NFV-enabled LTE/LTE-A network architecture.
design are summarized in terms of entities who own the
resources, bidders/buyers who request for the virtual resources,
and the type of resources. The table also indicates whether the routers, switches, signal processors, and other computing and
business model allows dynamic allocation of resources among storage devices will be virtualized into virtual machines (VMs)
the sellers and the buyers. and deployed in the cloud environment. The virtualization
of the core network will enable sharing of the common
D. Virtualization in 4G Wireless Networks core elements by multiple RANs that belong to the differ-
In the context of LTE/LTE-A systems, network virtualiza- ent MVNOs. The virtualized access and core networks are
tion can be applied to both the E-UTRAN and EPC. In the separated by the LTE/LTE-A hypervisor which abstracts and
traditional LTE system, the air interface between the UE and logically partitions them. The interactions among the VMs can
eNodeB in RAN enables the UE to attach to the core network. be modeled through open and programmable interfaces based
The UE gets an IP address from the PGW that allows it to on SDN protocols and thus the LTE/LTE-A hypervisor can be
send user data packets to the packet data network (PDN) and implemented as a centralized SDN controller.
vice versa, through a communication tunnel in the data plane. Full virtualization of the wireless networks can be achieved
Firstly, the UE sends the data packets to the eNodeB through through an NFV framework which supports multi-tenancy
the air interface and the data packets are then forwarded to of both network resources and service functions over a sin-
the PGW via the SGW. The data tunnel setup involves vari- gle physical platform. In the NFV framework, the wireless
ous authentication and security setup procedures and exchange network resources and functions offered by different InPs can
of signaling information among the eNodeB, MME, SGW and be managed by a virtualized resource manager. The applica-
PGW in the control plane. tions and services offered by the SPs or MVNOs and the
As shown in Fig. 2, the eNodeB or BS in the LTE air control and signaling functions in the core network can be
interface can be virtualized to enable the sharing of spectrum implemented through virtual network functions (VNFs). And
and antenna resources among multiple MVNOs. The virtual- SDN can be used in defining the programmable network
ization controller entity known as LTE hypervisor takes the interfaces for the implementing the VNFs.
responsibility to partition the physical eNodeB into virtual Considering a case of network virtualization in LTE/LTE-A
BSs (VBSs). The hypervisor can aggregate network resources mobile network where multiple RANs from different oper-
from multiple InPs and then virtualize to allocate them to ators share the common core infrastructure, SDN and NFV
the MVNOs. The hypervisor schedules the physical resource can be fully utilized in implementing the virtualization. As
blocks (PRBs) among MVNOs by virtualizing the radio spec- depicted in Fig. 3, the SDN controller separates the control and
trum resources. The radio spectra can be sliced using the data planes and provides northbound and southbound applica-
OFDMA technique and then assigned to VNs. Similarly, trans- tion programming interfaces (APIs) to enable communication
mission power and antenna system can also be sliced in their between these two layers. The C-RAN virtualizes BBUs as
smallest units and assigned to VNs in a way that maximizes VNFs in data and control planes. The SGW and PGW in
total utility. The MVNOs can independently run their own the EPC are partitioned into virtual gateways separately. The
applications utilizing the allocated resources in the VNs. signaling and management events of the virtualized control
Virtualization can also be applied to virtualize the core plane gateways (SGW-C, PGW-C) and the data plane gate-
network components particularly the MME, SGW, and PGW. ways (SGW-D, PGW-D) are configured as VNFs. The VNFs
The hardware devices related to the EPC entities such as are installed as software applications at the VMs in the control
2270 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

plane. Other control entities such as MME are deployed as part NFV MANO manages the tasks necessary in the NFV frame-
of the SDN controller in the control plane. NFV can also be work which include defining the interfaces for communication
applied on SDN controller to virtualize its functional respon- among different components.
sibilities as VNFs. The VNFs may form a pool in the cloud The dynamic and elastic nature of the NFV architecture
and provide services as per the requirements in the control and allow to design virtualization mechanisms that support multi-
data planes. The applications running on VMs in the control tenancy, resource pooling and on-demand service or resource
plane gateways communicate with the SDN controller through allocation. In the NFV business model, an InP represents a
the northbound interface, e.g., JSON-RPC. On the other hand, resource supplier who manages the physical resources in the
the southbound interface based on OpenFlow protocol enables data centers and also wireless infrastructure resources. In the
communication between the virtualized gateway switches and context of NFV, InPs can be considered as VNF providers. The
the SDN controller. The overall functionalities are managed by SPs lease resources from InPs and use them for running VNFs.
the NFV management and orchestration (NFV MANO) node. They may also re-sell the resources by taking the role of an
InP. The VNF providers execute the software implementation
for VNFs at the VMs. In some cases, the SPs may need to
E. Virtualization in 5G Networks interact with multiple VNF providers to provide a single ser-
The existing 4G network architecture needs to be upgraded vice. In such cases a broker is considered in the market model
in various perspectives to fulfill the 5G performance require- that manages the interactions among multiple InPs, SPs, and
ments. The 5G RAN is envisioned to provide diverse services end users. The end users are like consumers in the market who
by operating over a wide range of licensed and unlicensed demand a wide range of services and SPs are envisioned to
spectrum (e.g., mmWave bands) as well as sharing spectrum serve them accordingly.
through spectrum pool and mutual renting. In order to support The cloud computing services for a mobile network can also
new services and technologies (such as device-to-device [D2D] be virtualized with the help of NFV. In the cloud environment,
communication, IoT and machine-to-machine [M2M] com- the InP manages the cloud computing platform, e.g., VNs,
munications, full-duplex [FD] communication, non-orthogonal servers, storage, and services. NFV can be applied to create
multiple access [NOMA]), the RAN should be able to scale a virtual pool of these computing resources and lease them
in terms of throughput, the number of devices, and the num- to cloud users using a multi-tenant model based on usage-
ber of connections. The data rate and spectral efficiency can be based pricing scheme. The cloud computing service models
enhanced by using massive MIMO and mmWave communica- are categorized under the everything-as-a-service concept. In
tions, and the capacity can be boosted further through network the infrastructure-as-a-service (IaaS) model, users can request
densification and offloading in a heterogeneous network envi- for any processing, storage, and other computing resources.
ronment. The 5G network should provide multi-connectivity These infrastructure resources are then virtualized into VNs
between a device and multiple network nodes. The data and and assigned to users according to their demands. This is
control planes should support network slicing so that multiple often generalized as providing users with network-as-a-service
virtual networks can coexist as independent business opera- (NaaS). Similar to IaaS, wireless radio spectrum resources can
tions on a shared physical infrastructure. The radio spectrum, also be provisioned as a radio-as-a-service (RaaS).
infrastructure and transport network resources can be re-used 2) Auctions for Virtualization in 5G: The partitioning and
within the network slices. 5G networks will also support mapping procedures in WNV can be modeled as an auc-
C-RAN deployment and different types of cloud services tion mechanism where the physical network infrastructure
including backhaul and fronthaul. Next, we discuss the role and resources are considered as the items or commodities to
of NFV in 5G as well as the potential use of auction theory in be auctioned. The existing network virtualization models are
the context of WNV. We also discuss how the auction mech- mostly static and thus rely on contractual agreements for pric-
anisms and NFV-enables services can be implemented using ing and charging rules. Moving toward 5G, WNV needs to
the SDN in 5G networks. incorporate on-demand allocation of wireless services where
1) NFV in 5G: In wireless networks, NFV can be imple- operators may purchase resources or capacity for a limited
mented to design elastic service provisioning mechanisms for period of time. In addition, virtualization needs to model
virtualizing different 5G wireless services. An example of heterogeneous network functionalities. Auction is a powerful
virtualizing the EPC components through NFV is shown in tool which has all the desirable properties to design eco-
Fig. 3 which represents a possible implementation of NFV nomically efficient mechanisms. Auction mechanisms can be
in 5G wireless networks. The standard NFV architecture has used to design a virtualization framework to jointly ensure
three elements: NFV infrastructure (NFVI), VNFs, and NFV the allocation and economic efficiency for heterogeneous 5G
management and orchestration (NFV MANO) [42]. NFVI con- systems.
sists of the physical resources such as computing devices, 3) SDN in 5G: An SDN-enabled wireless network archi-
storage, signal processing units, and other physical network tecture offers the ability to virtualize and slice the wire-
components that can be virtualized as VM instances. The VM less network by separating the control and data planes in
instances are implemented as VNFs with well-defined func- RAN and EPC. The SDN controller acts as the hypervi-
tionalities and necessary external logical interfaces. The VNF sor to host the network virtualization on a programmable
may comprise multiple network components and the function- platform. The hypervisor uses a priori knowledge about wire-
alities will then be implemented as a chain of services. The less links and traffic status, users’ QoS requirements, and
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2271

other service level agreements among InPs and MVNOs. to the buyers who value them the most and transfers the
Therefore, auction-based algorithms for virtualization can run allocation payment to the seller.
in the SDN controllers (e.g., in those owned by an InP when An auction model can be categorized in several ways.
it leases resources to the MVNOs/SPs. SDN also provides A detailed classification of the auction models is presented
access to different MVNOs and corresponding VNs to use in [48]. In this paper, we focus on different types of auctions
different radio access technologies (RATs). In addition, the that are relevant to WNV.
communication interfaces in NFV architecture can be imple- 1) Sealed-Bid Auctions: Most of the auction models in
mented via SDN controller. The virtual and physical data WNV are sealed-bid auctions where bidders’ valuations are
plane devices (e.g., gateway switches) are managed via south- private information. The self-interested SPs or MVNOs who
bound interface protocols. The southbound interfaces can be are willing to buy or lease network resources evaluate their
defined using the OpenFlow protocol which is proposed by preferences based on available network information and pri-
the open networking foundation (ONF). In the context of vately submit their bids. The SPs determine the set of their
wireless and mobile networks, OpenFlow protocol has been desired resources and corresponding bid prices without know-
studied in several works. The FlowVisor in [43] is the first ing the valuations of other buyers.
work on SDN-based architecture for network virtualization The sealed-bid auctions are usually implemented with pric-
enabled via OpenFlow protocol. As an extension to FlowVisor ing rule of k-th price or the second-price auction. The
in the mobile network, CellVisor is proposed in [44] to man- sealed-bid second-price auction of a single item is alterna-
age and control the resources of the cellular network based on tively known as the Vickrey auction where the highest bidder
mobile users’ demands. RadioVisor in [45] presents the vir- wins the bid, but pays the second highest bid price [49]. The
tualization of radio resources in 3D resource grid of space, pricing mechanism in sealed-bid auction of multiple items
time-slots and frequency. MobileVisor architecture in [46] or multiple units is known as generalized Vickrey auction or
integrates the FlowVisor functionality into virtualization of Vickrey-Clarke-Groves (VCG) auction [50], [51]. In the VCG
mobile packet core network. The SDN controller interacts pricing scheme, the payment equals the opportunity cost of
with the network applications running on the control plane assigning the items to the winning bidder with the objective
via northbound interface protocols. The northbound interface of maximizing the social welfare. We will discuss the details
between the control plane and the SDN controller has not been of VCG mechanism design later in this paper.
standardized. To exchange data packets between control plane 2) Single-Sided and Double-Sided Auctions: In an auction,
gateways and the controller node, [47] has used JSON-RPC. the buyers and sellers participate as the players of a two-sided
game. In single-sided auctions, one side hosts the auction as
III. F UNDAMENTALS OF AUCTION T HEORY the auctioneer and the players of the other side compete with
each other to get the desired resources by submitting bids to
The pricing models used for wireless networks are often
the auctioneer. In WNV, only one entity plays the role of the
pre-negotiated among the business entities and payments are
auctioneer and there can be multiple users, SPs, or MVNOs
determined according to contractual agreements. Such pricing
who play as the buyers. If there is a single InP who wants
models are applied in symmetric and complete informa-
to sell resources among SPs or user, then the InP hosts the
tion scenarios, whereas auctions can be modeled even in
virtualization as well as auction process is referred to as single-
asymmetric and incomplete information scenarios. In wire-
sided forward auction. The single-sided auction can also occur
less networks, auctions can be applied to efficiently allo-
in reverse manner where multiple InPs compete by submitting
cate resources among users and wireless service providers.
their ask prices as bids to sell their resources to a single user,
By using the auction properties, users and wireless service
SP, or MVNO.
providers can achieve required performance guarantee as well
In case of a double-sided auction, multiple sellers and
as optimize overall network utility. We refer the readers to
multiple buyers participate in the auction and submit their ask
[12] and [13] for a detailed introduction to different auction
or buy bid prices to the auctioneer respectively. Each player
models used for resource allocation in wireless systems. For
can behave strategically to set the bidding strategy to win
completeness, we will discuss basic auction concepts and var-
the ask or buy bid. The optimal allocation is determined by
ious aspects of auction mechanism design that are relevant to
matching the bid prices submitted by buyers and sellers.
WNV.
3) Single-Item Auctions: In single-item auctions, the sellers
offer a single type of commodity consisting of one or more
A. Basic Concepts and Classification of Auctions indivisible units. If there is only one unit available, then the
An auction is a pricing model to buy and sell items with auction is referred to as a single-item single-unit auction. On
undetermined values. An auction process is run by an auction- the other hand, single-item multiple-unit auction refers to an
eer among a set of players consisting of seller(s) and buyer(s). auction where bidders can request for multiple units of the
A typical auction process is considered to have one seller who same item. For instance, in the LTE virtualization model, a
usually plays the role of an auctioneer and offers different service provider may bid for multiple sub-channels required
commodities for sale. The interested buyers submit their bids to satisfy its users’ requirements.
to the auctioneer. The auctioneer then assigns the commodities 4) Multi-Item Auctions: The auction model with multiple
in a way that maximizes the total utilities of the players. In a heterogeneous items is referred to as the multi-item
typical auction scenario, the auctioneer assigns commodities or combinatorial auction. Bidders can bid for arbitrary
2272 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

combinations of items and express their actual preferences Example: Consider, a second-price auction for a single-item
over the bundles of items considering the complementarities single-unit scenario which can be illustrated as a game. The
and substitutabilities among items. The valuation of comple- payoff of bidder i for bid bi can be represented as
mentary items can be represented by a super-additive utility
function, whereas the substitutable items have sub-additive ui (b) = vi − max bj , if i = arg max b (1)
j=i
utility function [52]. The combinatorial auction can also be
where vi is the true valuation and maxj=i bj represents the
categorized as single-unit multi-item and multi-unit multi-item
highest bid without bidder i’s participation. In this game, all
auctions based on the number of units available for each item.
the bidders participate with the objective of maximizing their
In wireless networks, virtualization is applied on various
own payoffs. Each bidder i would choose a bid value equiva-
types of resources to share them among different entities
lent to its true valuation vi as the dominant strategy, because
or network nodes. Therefore, combinatorial auctions will be
the resulting the payoff will always be non-negative. For each
preferred instead of performing single-item auction multiple
bidder, the true bid b∗i = vi is the Nash equilibrium.
times. Combinatorial auction will also facilitate in express-
ing bids on network resources with complementarities. For
example, sub-channels and power resources complement each C. Auction Mechanism Design
other in network virtualization, and sub-channels with differ- The WNV model often involves virtualizing heterogeneous
ent bandwidth can be considered as substitutable items while network resources simultaneously (such as sub-channels,
virtualizing through a combinatorial auction. power, antenna, computing and storage hardware, and other
5) Direct and Iterative Auctions: In a direct mechanism, infrastructure resources). In order to model the virtualization
the auctioneer determines the winning bidders and payments technique efficiently, the combinatorial auction would be a
in one shot based on the bids submitted during the bidding potential model which allows bidders to submit an arbitrary
process. The winner determination is computationally difficult number of bids on heterogeneous items according to their pref-
and NP-hard in case of combinatorial auction. In an iterative erences. In this section, we discuss both direct and iterative
auction, the auctioneer repeats the bidding and allocation pro- approaches to design auction mechanism particularly for com-
cess until an efficient solution is achieved. The iterative auction binatorial auctions in the context of sealed-bid auctions. We
can be designed in different ways. A simple iterative ascend- also address the auction design where the bidders need to adapt
ing price auction is presented in [53] where the auctioneer their bidding strategies under uncertainties, which is more rel-
announces an initial ask price and collects bids at the current evant in the stochastic environments of wireless networks. In
price. The auctioneer then aggregates the demand bids and some cases, the MVNOs may not be able to evaluate the exact
assigns an item to a bidder if no other bidder demands the achievable user rate and they need to evaluate probabilistically.
same item. If there exists any excess demand, i.e., multiple 1) Auction Design Objectives and Properties: Auctions
bidders request the same item, then the auctioneer increases have been widely and successfully applied in wireless
the ask price of that item and repeats the bidding and allocation networks for computational mechanism design that reconciles
process. game theoretic and computational properties. One of the main
objectives of auction design is to determine optimal allocation
of items. An efficient allocation represents disjoint assignment
B. Auction as a Game of items to bidders in a way that maximizes the social welfare,
An auction can be represented as a game with self-interested i.e., total valuation of the bidders. This is similar to partition-
players who want to maximize their own payoffs. In an auction ing the network resources in a way that maximizes resource
game, sellers or buyers participate as players by submit- utilization through WNV. Another objective of auction design
ting bids over a set of commodities. A player valuates each is to maximize the revenue of the sellers with efficient pricing
commodity according to his/her willingness to pay for that rule. Therefore, the design of an optimal auction mechanism
commodity. The player’s actual valuation is private informa- needs to handle the trade-off between allocation efficiency
tion which is not revealed to other players. In the auction and revenue maximization. An optimal auction is expected
game, bids are considered as strategies where the bid amount to optimize sellers’ revenue under the constraint that buyers’
is determined using the player’s private valuation. A player welfare meets a minimum threshold.
can bid more or less than the actual valuation. Considering An auction mechanism involves designing an algorithm to
all possible strategy combinations, the player selects a bid obtain the allocation outcome along with a pricing rule to
that maximizes his/her payoff. The outcomes of the auc- determine the payment prices for the participating bidders.
tion game are the winning buyers whose bids are accepted The auction mechanism is expected to satisfy the following
and the price that the winners pay for allocation of the economic properties [48]:
commodities. • Individual rationality: An auction is individual rational
In an incomplete information scenario, players may have if each player receives a non-negative utility gain. A
knowledge about the number of bidders and the distribution of winning buyer is charged according to his/her bid price,
the valuations of other players. In equilibrium, all bidders play not more than the bid. Similarly, a winning seller gets a
best responses, i.e., select the bidding strategies in a way that maximum reward equivalent to the ask price.
maximize their expected payoffs. Players determine their best • Efficiency: An allocation in the auction is considered
responses based on their beliefs about other players’ strategies. to be efficient when the sum value of all winning
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2273

bids is maximized. An auction mechanism is considered compute the bids by themselves in order to save com-
computationally efficient if the auction has a polynomial- putational time in solving the allocation problem. This
time allocation algorithm. From economic perspective, an allows bidders to select which items to bid on and to
auction is optimal if it maximizes the seller’s revenue. prioritize combinations which are economically impor-
• Incentive compatibility: An auction mechanism is said tant to them. The bid generation problem in the bidder
to be incentive compatible or strategy-proof when every determined combinatorial auction is NP-hard [57].
bidder gets the maximum utility by submitting his/her • Allocation: The main challenge in designing a combi-
true valuation over the item(s). The dominant strategy natorial auction mechanism is to find computationally
of truthful bidding ensures that no buyer or seller can feasible outcome that maximizes the social welfare (i.e.,
improve his/her utility by submitting any non-truthful bid total utility of the winning bidders) while maintaining
or ask prices. the economic properties such as efficiency and strategy-
• Budget balance: An auction is budget-balanced when the proofness. In a combinatorial auction, solving the win-
auctioneer collects the payments from the winning buy- ner determination problem (WDP) corresponding to the
ers’ and transfers the same amount to respective seller(s). optimal allocation is equivalent to solving an NP-hard
This guarantees that there is no deficit for the auctioneer. combinatorial optimization problem [48], [58]. There are
2) Issues in Designing Combinatorial Auctions: The stan- several approaches to obtain a computationally efficient
dard auction design involves three procedures: bidding, allo- solution to WDP, such as exact or approximate (local)
cation, and pricing. For single-item auctions, conventional algorithms based on mathematical programming. We will
auction mechanisms such as English auction, Dutch auction, discuss different solution approaches in the following sec-
and Vickrey auction can provide efficient allocation and pric- tion. The bidders’ valuation strategies may also affect the
ing rules [49], [54]. Combinatorial auctions bring additional optimal outcome, which needs to be considered in deter-
challenges in computing tractable solution as the social welfare mining the efficient allocation. The auction model may
maximizing problem is NP-hard. adopt a static or dynamic mechanism depending on bid-
• Bidding: The auction determines the bidding rules by ders’ information revelation policies. In the incomplete
specifying the bid structure, bid language, and strategies information revelation scenario, the dynamic mechanism
for bid computation. In a simple single-item auction, a allows bidders to bid progressively so that the auctioneer
bidder states the amount of money he/she wants to pay can solve easier instances of the WDP.
to obtain the item. In case of a combinatorial auction, • Pricing: The auction model defines a pricing rule to cal-
a bidder has to evaluate each possible combination of culate the price each winner pays for winning the bid.
items that s/he may get. The auction specifies the bid The definition of payment rule is essential to maintain
structure representing the bid size, number of bundles in the incentive compatibility of the auction and to deter-
each bid, and the attributes in each bundle. The bidding mine the sellers’ revenue. The VCG mechanism provides
language provides the syntax and semantics to express a strategy-proof pricing rule that motivates bidders for
bidders’ preferences over the exponential number of com- truthful valuation revelation and ensures that bidders will
binations in a concise way. There are a number of bidding have incentives for truthful bidding. The VCG pricing
languages and valuation models in the combinatorial auc- rule also ensures that no bidder is made worse-off by
tion [55], [56]. The different types of bidding languages participating in the auction. We will present the details
include atomic bids, OR bids, XOR bids, and combination of the VCG mechanism in the following section.
of OR and XOR bids. The XOR bids are fully expressive
and can represent all valuations. The XOR bids allow
each bidder to submit an arbitrary number of bids and D. VCG Mechanism Design
at most one of the bids will be assigned to the bidder. The classic VCG mechanism is a generalized truthful
The XOR bid representation enables truthful valuation auction mechanism for multiple units of homogeneous or
revelation and leads to economic efficiency and incentive heterogeneous items that provides socially optimal solu-
compatibility using VCG mechanism [55]. For a com- tion [49]–[51]. In a non-cooperative environment of auction
binatorial auction, a computationally efficient method is mechanism, each bidder has privately known valuation and
required to determine the bid values. The atomic and wants to maximize his/her own utility. The self-interested bid-
XOR bidding languages are called polynomially inter- ders do not necessarily act as instructed by the auctioneer. The
pretable, i.e., there exists a polynomial time algorithm to strategy-proof VCG mechanism provides bidders with incen-
compute bid value for a given bid and a subset of items. tives for submitting their true valuations as the bid prices and
However, other bidding languages (such as OR bids) may guarantees that bidders get benefits from their participation.
not be polynomially interpretable when bids on all possi- The truthful or strategy-proof VCG also satisfies individual
ble combinations are allowed. The problem then becomes rationality where the winners pay a discounted price which
exactly the same optimization problem as allocating a is equivalent to their contribution to total social welfare. We
set of items among different bidders, which is NP-hard. will discuss VCG auction-based virtualization models in the
Therefore, the task of interpreting the bid values is often later sections. In the VCG mechanism, allocation outcome is
left to the auctioneer who solves the allocation problem. determined by solving the WDP. We will discuss different
In some cases, the auction process may allow bidders to approaches for solving WDP in Section III-E.
2274 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

1) VCG Pricing Rule: Consider a single-unit multi-item


auction of M = {1, 2, . . . , m} items and N = {1, 2, . . . , n}
bidders. The allocation variable xi (S) represents the allocation
of the subset of items S ⊆ M to the bidder i ∈ N. Since there
is total m units of items, at most m number bidders can win
the bids. The true bid submitted by bidder i on the subset S is
vi (S). The optimal social welfare obtained from WDP solution
Fig. 4. An example of XOR bids submitted in VCG auction.
can be represented as

V = max vi (S)xi (S)
xi (S)
i∈N S⊆M
 
s.t. xi (S) ≤ 1, ∀ j ∈ M
i∈N S⊆M,j∈S

xi (S) ≤ 1, ∀i ∈ N
S⊆M
xi (S) ∈ {0, 1}, ∀i ∈ N (2) Fig. 5. An example of bids submitted in VCG auction with zero payment.
where every bidder is constrained to get at most one subset of
items where each item is not assigned to more than one bid-
der. The winners are chosen from the tractable WDP solution. 2) Limitations VCG Mechanism: The VCG mechanism
The payment rule in VCG mechanism is based on the second becomes computationally infeasible where WDP is intractable.
highest bid which guarantees that winning bidder pays less In such situations, a VCG-based mechanism is designed with
than his/her submitted bid. The VCG payment for bidder i is sub-optimal allocation and VCG payment. However, in those
calculated by taking the difference between the optimal wel- cases, the VCG-based mechanism is not guaranteed to be
fare when i is not participating, i.e., V −i and the welfare of incentive compatible. To design a computationally feasible
other players in the optimal allocation xi∗ (S) obtained from (2). VCG mechanism, the allocation of VCG can be modified
Thus, with the second chance of submitting an appeal function as
⎡ ⎤
proposed in [59].

pVCG
i = V −i − ⎣V − vi (S)xi∗ (S)⎦ (3) In some cases, the VCG price may not be in the competi-
S⊆M tive equilibrium (CE),1 i.e., the allocation prices that maximize
bidders’ payoff may not be efficient from the seller’s perspec-
where the optimal welfare without bidder i’s participation is
tive. The VCG mechanism provides the buyers with incentives
given by
  in payments for truthful bidding. VCG is thus sometimes
V −i = max vi (S)xi (S) called the minimum-revenue auction. The VCG payments can
xi (S)
i ∈N\i S⊆M be too low and lead to low seller revenue. Fig. 5 shows such
 
s.t. xi (S) ≤ 1, ∀ j ∈ M a bidding scenario in a VCG auction where bidder 1 and 2
i ∈N\i S⊆M,j∈S
win the auction for their bids on item B and item A, respec-
 tively. However, the VCG payments for bidder 1 and 2 are
xi (S) ≤ 1, i ∈ N\i obtained as zero and the net payments of winners is zero
S⊆M which results in null revenue. To enforce minimum and max-
xi (S) ∈ {0, 1}, ∀i ∈ N\i. (4) imum bid prices and to avoid zero payments, reserve prices
The seller’s revenue is determined as the total amount can be used. The revenue maximizing optimal auction mecha-
received by the auctioneer or the seller. nism can be designed based on the Myerson’s characterization
As an example, Fig. 4 shows the XOR bids submitted in a of [60], which we will discuss in Section III-G.
single-unit combinatorial auction where three buyers bid over The general VCG mechanism requires an exponential
two items. In this case, there are total two items with single amount of information to calculate 2m − 1 nonempty com-
unit for each item of items and thus at most two bids can win. binations of m items. To prevent the infeasible outcome, an
The combination of bids that gives the maximum valuation is iterative variant of VCG can be explored which can lower
chosen as the winning bids. Here, bidder 1 and bidder 3 will the computational cost of bid generation. The exponential
be the winners for their bids on item A and item B, respec- information exchange can also be reduced by preference elic-
tively, because their bid combination provides the maximum itation techniques, i.e., by learning bidders’ preferences over
bid valuation of 20+15 = 35. The payment of bidder 1 will be items [61].
calculated according to (3) as the difference between optimal The VCG mechanism is not always budget-balanced, i.e.,
welfare without i’s participation and welfare of other winners the auctioneer may have deficit. The budget constraints in
in the chosen outcome. Therefore, bidder 1’s payment will be VCG auction may encourage bidders to cheat. Moreover,
(pVCG
1 = 34 − (35 − 20) = 19. Similarly, bidder 3 will pay
pVCG
3 = 32 − (35 − 15) = 12. The seller’s revenue will be the 1 Given the final allocation and payment prices, the competitive equilibrium
sum of payments received from the winners, i.e., 19+12 = 31. represents that bidders’ utilities and the auctioneer’s revenue are maximized.
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2275

with the general valuation2 model, there is no mechanism technique of LP-relaxation in combinatorial optimization the-
which is simultaneously efficient, individual rational, and ory. The integer constraint of the linear program in (6) can be
budget-balanced, even when budget information is public [62]. relaxed by allowing bidders to win any fraction of the bids.
The LP relaxed allocation problem which is referred to as the
E. Solution Approaches for Winner Determination Problem fractional combinatorial auction can be expressed as:
The main objective of WDP is to obtain the winning 
n 
bids. This is a combinatorial optimization problem to deter- max vi (S)xi (S)
xi (S)
mine a disjoint allocation of items to the bidders such that i=1 S⊆M
the social welfare is maximized. The WDP can be mod- n 
eled using linear programming (LP), intersection graph, and s.t. xi (S) ≤ 1, ∀ j ∈ M
network flow models. In this paper, we consider the LP-based i=1 S⊆M, j∈S

solution approaches and analyze the computational and eco- xi (S) ≤ 1, ∀ i ∈ N
nomic properties required to model the heterogeneity of items. S⊆M
In order to analyze the existing auction-based virtualization xi (S) ≥ 0, ∀i ∈ N (7)
model, we explain the WDP solutions in the context of both
single-sided and double-sided auction models, multiple-item where the constraints ensure that each item is not assigned to
single-unit and multiple-item multi-unit auctions considering more than one buyer and each buyer gets a subset of items not
XOR bidding language. more than one. The integer solutions of (7) will provide the
1) WDP for Single-Unit Combinatorial Auction: We con- exact solutions of the allocation problem. The exact solution
sider a single-sided forward auction model where the seller to the LP-relaxation is guaranteed for bid structures which are
hosts an auction to sell multiple single-unit heterogeneous restricted to one of the following cases [55], [64]:
items among different bidders. Let M = {1, 2, . . . , m} denote • Linearly ordered bids: When the bids are linearly ordered,
the set of auction commodities and N = {1, 2, . . . , n} is the set a bidder can only bid on subsets of adjacent items.
of buyers. Assume each bidder i ∈ N can submit an arbitrary However, WDP with XOR bidding restricted to this case
number of bids Fi . The price that bidder i is willing to pay is still NP-hard.
for a combination or set of items S ⊆ M is denoted by vi (S) • Hierarchical bids: The LP solution provides an optimal
where vi (S) ∈ Fi . The allocation variable is defined by allocation when the bids form a nested hierarchy or a
 tree structure. In such a setting, bidders are allowed to
1, if bidder i gets S
xi (S) = (5) submit bids on different combination of items as a pack-
0, otherwise
age of bids. In the nested structure, every two subsets of
where an allocation is considered feasible if no item is allo- items can be disjoint or aggregated combination of other
cated more than once and each bidder gets at most one subset subsets [64].
of items due to XOR bidding. The WDP can be formulated • Single item bids: In this case, the bidders are restricted
as the following integer linear program: to win only a single item.
• OR-of-XORs of singletons bids: The LP solution provides

n 
max vi (S)xi (S) an optimal allocation if there is only OR-of-XORs of
xi (S) singletons bids. If the bidder values all items identically
i=1 S⊆M
n  and rearranges them in a descending order, the bids can
s.t. xi (S) ≤ 1, ∀ j ∈ M be represented as OR-of-XORs of singletons bids.
i=1 S⊆M, j∈S The integral solution to the LP relaxation can also be
 obtained by restricting the bid values or preferences. In case
xi (S) ≤ 1, ∀ i ∈ N
of indivisible items, LP-relaxation of WDP with XOR bidding
S⊆M
provides the optimal solution if the goods are substitutive [52].
xi (S) ∈ {0, 1}, ∀i ∈ N (6) This restriction would not allow superadditive valuations for
where the first constraint ensures that every item j in the subset complementarities.
S ⊆ M is not assigned to more than one buyer. The second 3) Algorithms for Exact Solutions of WDP: The straight-
constraint is to restrict that each buyer gets at most one subset forward approach to find the exact or optimal WDP solution
of items. The above WDP formulation is equivalent to the is to enumerate all exhaustive partitions where each item is
weighted set packing problem (WSP) which is an NP-hard included in exactly one subset of the partition. However, enu-
problem. The WDP with XOR bidding is NP-complete even merating all partitions would not be a suitable approach unless
if restrictions are applied on bid values to be equivalent to 1 the number of items is extremely small.
and size of subsets of bid items is limited to at most 2 [63]. The enumeration of exhaustive partitions can be per-
2) Linear Programming Relaxation of WDP: A tractable formed more efficiently using the dynamic programming
solution of WDP can be obtained by using the classic algorithm [64]. The dynamic programming algorithm can be
used to find optimal WDP solution if bids for combinations
2 The general valuation for a subset of items S can be defined as: v(S) = are sets of consecutive items. The main idea is to first evaluate
|S| the value of a small subset of items and proceed with larger
j=1 pj , where pj is an arbitrary non-negative number that represents the
amount that the bidder is willing to pay for item j [55]. ones that maximize the revenue. The main advantage of this
2276 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

algorithm is that it does not repeatedly evaluate the same sub- used to ensure truthfulness and individual rationality in the
set of items. This allows obtaining the solution faster than approximation mechanisms.
exhaustive enumeration. If the items are not well-ordered, the 5) Truthful Fractional VCG Mechanism: The classic
dynamic programming method may fail to provide the optimal Vickrey-Clarke-Groves (VCG) mechanism is considered to be
solution due to an infeasible amount of memory requirements. an efficient mechanism where bidders submit their true bids
There are several commercially available softwares that can and the auctioneer finds an optimal allocation by solving the
be used to solve the integer program of WDP. A comparison WDP. The strategy-proof VCG pricing rule can be used for the
of different WDP solvers presented in [65] suggests the use fractional LP-relaxed problem. This will assure that bidders’
of CPLEX which dominates its predecessors in terms of run utilities are maximized for the fractional solutions if they bid
time. The WDP solver named CABOB, which is presented truthfully. This mechanism can be considered as the fractional
in [66], is specifically designed for winner determination with VCG mechanism [69]. The optimal fractional social welfare
OR bid language and uses the depth-first branch and bound can be scaled down by an approximation ratio α. Assuming
search strategy. CABOB performs faster than the mixed integer x∗ as the optimal fractional allocation obtained from (7) the
program solver CPLEX and does not run out of memory. In fractional VCG payment for bidder i can be calculated by:
order to address the bid generation problem, the eMediator is 
proposed in [67] which is suitable for generating XOR and p∗i = z∗ (b−i ) − bi (x∗ ) (8)
OR-of-XORs bids. i=i
4) Algorithms for Approximate Solutions of WDP: In case
where z∗ (b−i ) represents the fractional welfare without bid-
of combinatorial auctions with large number of bidders and
der i’s participation and bi (x∗ ) is the other bidder’s marginal
unrestricted bidding structure, determining exact WDP solu-
welfare in the optimal fraction allocation x∗ . The fractional
tion could be computationally infeasible (i.e., not solvable in
VCG can be considered as a deterministic mechanism since
polynomial run-time). An approximate algorithm can be used
the allocation prices are always defined based on the VCG
to solve WDP and obtain a feasible solution by using heuris-
pricing rule where truthful bidding is the dominant strategy
tic approaches. Two heuristic approaches to solve WDP are as
and bidders get non-negative utilities.
follows:
6) Randomized Rounding Mechanism: A randomized
(i) Greedy algorithm: The greedy algorithm for LP-
mechanism can be defined as a probability distribution over
relaxation allows fractional allocation of items. The bids
the deterministic fractional VCG mechanism. A randomized
are ordered in descending order according to the ratio of
mechanism can be individual rational and truthful in expecta-
bid value and bid size. The items are then sequentially
tion such that a bidder’s expected utility is maximized when
allocated to the bidder until all items are assigned. The
the bidder bids truthfully regardless of other bidders’ strate-
greedy mechanism with single-minded
√ bids is incentive
gies [69]. In randomized rounding mechanisms, the main idea
compatible and achieves m-approximation for combi-
is to derive integer solution by rounding off the fraction solu-
natorial auctions, where m is the number of items [68].
tion for any bidder chosen in a random order. Consider a
However, the optimal allocation is not always guaranteed.
single-unit multi-item auction with optimal fractional VCG
(ii) Branch-and-bound algorithm: The main idea of the
allocation x∗ and prices p∗ , an integer solution of social wel-
branch-and-bound technique is to narrow down the search
fare can be estimated by rounding off using a scalingfactor
space in evaluating bid values. The upper bound is ∗
α. This rounding step can be represented by: xα = l λl xl
obtained by using the LP-relaxation solution. The greedy
where an integer solution xl is selected with the probability
algorithm provides the lower bound and an initial low
distribution λl . In the next step, an output allocation Sil for
value is chosen as the threshold value. The mechanism
bidder i is obtained by randomly selecting an integer solution
proceeds recursively and the low threshold is updated
xl and the payment price is calculated by:
according to the greedy algorithm until the optimal allo-
cation is obtained. Although the branch-and-bound tech- bi (Sil ) ∗
nique provides an optimal outcome, the computational pli = p (9)
bi (x∗ ) i
efficiency is not guaranteed.
The computationally feasible solution of the LP-relaxed where bi (Sil ) is the bid value for the allocation obtained from
problem is referred to as the optimal fractional solution, as randomized rounding, bi (x∗ ) is the bid value for the optimal
the resulting social welfare value includes fractional alloca- fractional allocation, and p∗i is bidder i’s fractional VCG
tion of items. The optimal fractional objective value of the payment price.
LP-relaxed problem is an approximate of the globally opti- 7) WDP for Multi-Unit Combinatorial Auction: In the case
mum social welfare. The approximation ratio can be defined of multi-item multi-unit (combinatorial) auction, we consider
by a multiplicative factor α which represents the fraction of single-sided forward auction where the auctioneer (seller)
optimal welfare achieved using the approximation algorithm. offers m different types of items and Cj identical units of
However, the optimal fractional solution of the LP-relaxed each item j ∈ {1, 2, . . . , m}. Let us assume that bidder
problem does not necessarily guarantee economic properties i ∈ {1, 2, . . . , n} submits a bid requesting a bundle of item
of an auction mechanism design, e.g., incentive compatibility, with a bid price of vi . We represent the number of units
individual rationality or budget balance. The following frac- that bidder i requests for each item j by wij . The alloca-
tional VCG and randomization rounding mechanisms can be tion problem with single-bundle bid can be generalized as
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2277

a multi-dimensional knapsack problem (MDKP). The inte- F. Automated Online Mechanism Design
ger programming formulation of MDKP corresponding to the Given that there is significant probabilistic information
WDP can be given as available in the market history, a real-time automated auc-

n 
m tion mechanism can be designed to predict any future events.
max vi xij The auctioneer requires exact information about the number
xi (S)
i=1 j=1 of bidders, number of items, combination of bids, bidders’
n preferences, valuations, etc. to determine efficient allocation
s.t. wij xij ≤ Cj , ∀ j ∈ M and payment rule. The probabilistic information can be use-
i=1 ful to handle uncertainties in a stochastic environment and to
m
elicit information required for designing revenue maximizing
xij ≤ 1, ∀i ∈ N auction model. In online auction models, the type of a bid-
j=1
der is labeled according to the bidder’s arrival time, departure
xij ∈ {0, 1}, ∀i ∈ N, j ∈ M (10) time, and bid value. Considering a quasi-linear5 preferences,
where xij represents whether bidder i gets item j or not. the allocation and payment rule in an online auction is deter-
The multi-unit combinatorial auction can also be designed mined such that the allocation is monotonically non-decreasing
with XOR bids where the bidder can bid on a number of and only depends on the types of bidders who have already
bundles as the demand bid. The WDP can therefore be for- arrived.
mulated as a multiple multi-dimensional knapsack problem In an online auction mechanism framework, the optimal
(MMKP) [58] and can be represented as stopping theory can be applied to run the auction periodically
at a certain time interval. In general, the optimal stopping the-

n 
Bi
ory is applied to the problem of deciding an early stopping
max vib xib
xib time to take a particular action based on sequentially observed
i=1 b=1
random variables [71]. In such optimal stopping problems,
Bi
the objective is to maximize the expected payoff or to min-
xib = 1, ∀ i ∈ N
imize the expected cost. An approximation mechanism for
b=1
online auction model can designed based on optimal stop-
m  Bi
ping rule, considering that the distribution of the number of
qijb xib ≤ Cj , ∀j ∈ M
bidders n is known and the price sequence is non-decreasing,
j=1 b=1
i.e., price never decreases for the new agent who enters into
xib ∈ {0, 1}, ∀i ∈ N, j ∈ M (11)
the system [72]. The automated mechanism is designed with
where each bidder i submits Bi bundles as bids and can win the objective to maximize the expected efficiency and revenue.
at most one bundle. Each bid bundle b contains the desired When the bidders enter sequentially and bids are independent
number of units that bidder i wants for each item j which we random variables, an online allocation rule can be defined by
denote by qijb , and the price that bidder is willing to pay for stopping rules where the auctioneer sells an item to the bid-
the bundle which is denoted as vib . The allocation of bundle der who arrives at that stopping time. Given that there is an
b to bidder i is represented as xib . initial ask price before the arrival of all the bidders, the auc-
Different generalized knapsack solvers for multi-unit combi- tioneer allocates an item to the first bidder whose bid value
natorial auction are discussed in [58]. The MDKP and MMKP is strictly greater than the price posted in the previous stop-
formulations are reducible to 0 − 1 knapsack problem3 which ping time. This sequentially posted-price mechanism allows
is NP-hard. Similar to single-unit combinatorial auctions, the mechanism to be temporarily strategy-proof by motivat-
the dynamic programming, branch and bound, and greedy ing the bidders to bid truthfully to obtain an item in the next
approaches can be used to solve the allocation problem in interval. The online mechanism provides a fractional objective
multi-item multi-unit auctions. In multi-item multi-unit auc- value of the social welfare with a constant approximation ratio
tions, randomization technique can be applied along with which can be defined by scaling the optimal social welfare.
approximation algorithm to achieve individual rationality and
truthfulness (in expectation) with approximation ratio of G. Iterative Combinatorial Auction Design
1
O(m β+1 ). In case of single-minded4 bids β = (log(m)) In a combinatorial auction, bidders may need to compute an
which guarantees (1 + ) approximation of optimal wel- exponential number of bids which can be handled by preferen-
fare [69]. tial elicitation, i.e., by computing desirable number of bids that
3 Given a set of indivisible items where each item has an individual profit are enough to obtain an optimal allocation. In order to do so,
value and a weight, the 0-1 knapsack problem can be interpreted as selecting bidders’ preferences need be elicited which can be achieved
a subset of items into a knapsack with the objective of maximizing the total through iterative auction model. In an iterative auction, the
profit of the selected items such that the total weight of the selected items auctioneer computes provisional pricing and allocation infor-
does not exceed the capacity of the knapsack [70]. The decision variable of
the 0-1 knapsack problem represents whether an item is selected or not. mation in each iteration and updates the prices according to
4 A single-minded bid (S, p) represents a subset of items that the bidders
want to obtain at bidding price p. The valuation of the subset of items in the 5 A bidder is considered to have quasi-linear preferences if the utility func-
single-minded bid is: v(T) = p for S ⊆ T and v(T) = 0 otherwise, i.e., the tion is additive and linear. The quasi-linear preferences with constant marginal
bidder wants to win the subset S at price p or nothing. utility can be represented as: U(x, y) = F(x) + y.
2278 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

bidders’ preferences. Thus, the iterative combinatorial auction


model allows bidders to bid for the combination of items they
really want in several rounds of bidding. The iterative auctions
can be modeled as the quantity-setting or the price-setting auc-
tions which are dual to each other [73]. In the quantity-setting
auction, bidders submit prices on various combinations in each
round and the auctioneer makes a temporary allocation based
on the submitted bids. The bidders are allowed to adjust bid
price in the next round and thus the auction continues until an
efficient outcome is achieved. In later sections, we will dis-
cuss how an auction mechanism can be designed with iterative
bidding process.
In the price-setting auctions, the auctioneer sets an initial
price and collects bids from the bidders who want to buy items
at the current price. The auctioneer then observes the requests,
computes a provisional allocation, and adjusts the prices if the
provisional allocation is not efficient. The auction continues
until the competitive equilibrium (CE) is reached, i.e., winning
bidders’ payments guarantee the maximum utility gain for the
bidders. Among different price-based iterative auctions that are
Fig. 6. Flow chart of primal-dual auction framework.
presented in [73], we will discuss some of the general iterative
models in combinatorial auctions. achieved [73]. In VCG auction-based primal-dual framework,
1) Ascending Price Auction: The ascending price auction the auction terminates with the VCG payment prices for the
in [53] presents a model where the auctioneer announces an winning bidders.
initial price and receives bids submitted by bidders at the cur- Consider a single-unit multi-item auction of M =
rent price. The auctioneer calculates the aggregate demand {1, 2, . . . , m} items among N = {1, 2, . . . , n} bidders. The
and if there is any excess demand for any item, i.e., the avail- winner determination problem (WDP) can be represented as
able supply is less than the aggregate demand, then the item the following integer program:
price is increased. The auctioneer collects the bids for the
updated prices and repeats until the market clears, i.e., all items 
n 
max vi (S)xi (S)
are allocated satisfying all the non-overlapping demands. In xi (S)
i=1 S⊆M
each round, if the aggregate demand of a bidder’s opponents
n 
at the current price becomes less than the available supply s.t. xi (S) ≤ 1, ∀ j ∈ M
then the items are allocated to that particular bidder. This i=1 S⊆M, j∈S
event is referred to as clinching when the payments are calcu- 
lated according to the clinching rule. The cumulative clinches, xi (S) ≤ 1, ∀ i ∈ N
denoted by {Ci (t)}ni=1 , are computed for bidder i at current time S⊆M
t as xi (S) ∈ {0, 1}, ∀i ∈ N (13)
⎧ ⎫
⎨  ⎬ where vi (S) is the bids submitted by buyer i ∈ N to obtain the
Ci (t) = max 0, M − xj (t) , ∀t = 0, . . . , L − 1 (12) subset of items S ⊆ M and xi (S) represents whether buyer i
⎩ ⎭ gets the subset S or not. The first constraint is to make sure
j=i
that a single object in the requested subset S is assigned to at
where L represents the last iteration and xj (t) represents the most one buyer and the second constraint ensures that each
number of units demanded by bidder j = i. Bidder i’s bidder get at most one subset of items.
payment is then determined based on the current clinches, Assuming a set of all possible allocations K, we can write
ci (t) =
LCi (t) − Ci (t − 1). The total payment is given by the primal linear program based on WDP in (13) as follows:
yi = t=0 p(t)ci (t), where p(t) denotes the item’s price at
time t. 
n 
max vi (S)xi (S)
2) Primal-Dual Auction Framework: The primal-dual algo- xi (S)
i=1 S⊆M
rithm is commonly used to solve combinatorial optimization
n 
problems. Fig. 6 shows an iterative approach in the primal-dual s.t. xi (S) ≤ y(k), ∀ S ⊆ M
framework that involves linear programming duality theory. In i=1 k∈K,S∈k
a combinatorial auction, the WDP is considered as the primal 
problem which leads to a provisional allocation, whereas the y(k) ≤ 1
k∈K
dual problem solution gives feasible prices that satisfy the 
complementary slackness (CS) conditions. The primal-dual xi (S) ≤ 1, ∀ i ∈ N
auction algorithm is a truthful mechanism where the prices S⊆M
are adjusted progressively until the optimal dual solution is xi (S), y(k) ≥ 0, ∀i ∈ N, k ∈ K, S ⊆ M (14)
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2279

where constraints ensure that an item is allocated once in a H. Bayesian Mechanism Design
feasible solution. The integer constraint in (13) is relaxed by When the bidders’ exact valuations are unknown, Bayesian
LP-relaxation as xi (S) ≥ 0. approach [77] can be used to learn bidders’ valuations. In
The dual problem of (14) can be written as follows [74]: the Bayesian approach, the bidders’ valuation information is
 n drawn from a publicly known distribution at random which
min z(i) + π is regarded as bidders’ common knowledge. In order to learn
z(i),z(S),π
i=1 own bid valuation, a bidder updates his/her strategy profile
s.t. z(i) + z(S) ≥ vi (S), ∀i ∈ N, S ⊆ M
 to determine distribution over the valuations of the remaining
π− z(S) ≥ 0, ∀k ∈ K bidders. Once the bidders learn their valuations, Bayes-Nash
S∈k equilibrium is achieved for the auction mechanism by selecting
z(i), z(S), π ≥ 0, ∀i ∈ N, S ⊆ M (15) highest bidders as the winners. An auction will be Bayesian
where the optimization constraints in the primal problem (14) incentive compatible if truthtelling is the dominant strategy
corresponds to the dual variables z(i), z(S), and π respectively. of all bidders which results in Bayes-Nash equilibrium. The
Here, z(i) represents the price for bidder i’s maximum util- characterization for designing a revenue maximizing optimal
ity and π represents the auctioneer’s maximum revenue. The auction mechanism in a Bayesian setting, is defined for single-
dual constraints in (15) corresponds to the primal variables dimensional mechanism in [60] which is also referred to as
xi (S) and y(k). For optimality, the feasible primal and dual the Myerson’s characterization. The single-dimension auction
solutions should satisfy the complementary slackness (CS) mechanism can be considered as a bargaining auction game
conditions [74]. To determine the solution to the dual program between a seller with a single-unit single-item and a buyer.
can be computationally hard as solving the original primal According to this characterization, optimal allocation and pay-
problem. ment for the self-interested bidder i with linear utility can be
In the primal-dual framework, the finite optimal solution to obtained in Bayes-Nash equilibrium if and only if
the WDP can be obtained by using the approximation tech- (i) the allocation xi (vi ) is monotone non-decreasing for
nique of Lagrangean relaxation [75]. The Lagrangean relax- strategy profile or bid valuation vi , and
v
ation is generally applied to relax the allocation constraints of (ii) payment rule is: pi (vi ) = vi xi (vi ) − 0 i xi (z)dz + pi (0),
the WDP, by transferring the constraints to the objective func- where often pi (0) = 0.
tion with penalizing non-negative variables known as Lagrange The optimal allocation and payment rule satisfy incentive com-
multipliers. The Lagrange multipliers are considered as the patibility and individual rationality in Bayes-Nash equilibrium
item prices and using this information as the feedback the and maximizes the expected profit. For multi-dimensional auc-
bidders update their bids iteratively. We consider a Lagrange tion with multiple items (single-unit or multi-unit) or multiple
function by relaxing the constraints of the WDP in (13) as sellers and buyers, the characterization for optimal revenue
follows: maximizing auction can be modified according to different
 bidding preferences [77].
L(x, λ, μ) = vi (S)xi (S) When the bidders’ valuations are not taken from an iden-
i∈N S⊆M tical distribution, i.e., the bidders do not have common
⎛ ⎞
   priori knowledge, then approximation is applied in mecha-
+ λj ⎝1 − xi (S)⎠ nism design based on reserve pricing. In case of second-price
j∈M i∈N S⊆M,j∈S auction with a distinct seller’s reserve price, the auctioneer
⎛ ⎞
first removes all bidders whose values do not meet the reserve
 
+ μi ⎝1 − xi (S)⎠ (16) price and then select the highest bidder as the winner from
i∈N S⊆M the remaining bidders. The allocation price will be the maxi-
mum between the reserve price and the second highest value
where λ = (λ1 , λ2 , . . . , λm ) and μ = (μ1 , μ2 , . . . , μn ) are
of a surviving bidder (if any). Another approximate pricing
the non-negative Lagrange multipliers. Now, the Lagrangean
mechanism is posted pricing where distinct allocation can be
relaxed problem corresponding to the WDP can be represented
determined using first-come-first-served and while-supplies-
similar to the resource scheduling problem in [76]
last concepts. In this auction, the bidders are considered to
Z(λ, μ) = max L(x, λ, μ) arrive in any arbitrary order decided by the auctioneer who
s.t. xi (S) ∈ {0, 1}, ∀i ∈ N (17) serves them sequentially according to the posted prices. The
variants of auctions under Bayesian setting for system models
The dual of the Lagrangean relaxed problem can be written as: with multi-seller, multi-buyer, multi-item, non-linear prefer-
min Z(λ, μ) ences are discussed in [77]. For scenarios with bid uncertainty,
s.t. λ ≥ 0, μ ≥ 0 (18) auction-based virtualization model in Bayesian settings will be
discussed in later sections.
The optimal solution to the Lagrangean dual problem gives
the dual solutions of the original WDP, i.e., the allocation I. Budget-Constrained Auction Design
prices of items. By using the sub-gradient method in convex We consider an auction with budget constraint with simple
optimization [75], the optimal values of Lagrange multipliers additive valuation (without any complementarity or substi-
can be obtained. tutability), where N = {1, 2, . . . , n} is the set of bidders and
2280 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

TABLE IV
S UMMARY OF AUCTION M ECHANISMS S UITABLE FOR WNV

M = {1, 2, . . . , m} is the set of heterogeneous items. Let sequential auction-based model for budget-constrained bid-
us assume that bidder i ∈ N has a maximum budget of Bi ders is presented in [79]. Bayesian approach can be applied
and the bidder bids on item j ∈ M with the bid value of to budget-constrained auction model considering that the bid-
vij . We denote the allocation of item j to the bidder i by xij ders’ private valuations are taken from mutually independent
and price that 
bidder i is willing to pay for the allocation is publicly known prior distributions.
pi = min{Bi , m j=1 vij xij }. The allocation problem that aims A Bayesian incentive compatible (BIC) mechanism is
for revenue maximization can be represented by the following presented in [80] which is individual rational and approx-
integer programming problem: imately maximizes the expected revenue of the auctioneer
under the budget constraint. This is an all-pay mechanism

max pi where each bidder pays a fixed price depending only on his/her
i∈N revealed valuation. Each bidder gets an allocation according

m to the valuations submitted by other bidders and a random
s.t. pi ≤ vij xij , ∀i ∈ N, choice made by the mechanism. This mechanism is unrealistic
j=1 in several situations and can be upgraded as the truthful dom-
pi ≤ Bi , ∀i ∈ N, inant strategy incentive compatible (DSIC) mechanism based
n on the sequential posted price scheme. The auctioneer will
xij ≤ 1, ∀j ∈ M, consider the bidders following an arbitrary sequence of order
i=1 and the bidders will select the subset of items and pay the
xij ∈ {0, 1}, ∀i ∈ N, j ∈ M, (19) pre-computed prices.
A summary of the auction mechanisms suitable for virtual-
where the first constraint represents the maximum amount the ization applications is provided in Table IV. The summary
buyer i can pay to obtain all the available items. The second outlines the advantages and main challenges of designing
constraint gives the maximum budget limit for buyer i and the VCG-based auction, stochastic online auction, double auc-
third constraint represents that at most one buyer can get an tion, iterative auctions and Bayesian auctions. These auction
item. mechanisms can be extended using game theory concepts
The optimal allocation for this budget constrained auction and learning algorithms to design other variants of auction
is NP-hard even in the case for two bidders with identical models as per the requirements for implementing the vir-
bids. The time complexity of dynamic programming approach tualization. For example, a two-stage auction game can be
to find the exact solution of the budget-constrained auction is designed for power allocation in WNV framework. An ini-
exponential in the number of items. The approximate alloca- tial power allocation can be obtained by solving WDP in the
tion for the budget-constrained auction with constant number first stage. In the second stage, the initial power allocation can
of bidders can be obtained using the randomized rounding be adjusted by determining optimal bidding strategies for SPs
algorithm [78]. based on Stackelberg equilibrium. We discuss the application
The VCG mechanism with general valuation is not directly of game theory and learning algorithms in auction mechanism
applicable in auction models with budget constraints. A in Section IV.
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2281

TABLE V
O RGANIZATION OF S ECTION IV

IV. AUCTION A PPROACHES IN WNV of MVNOs who participate as bidders and submit their bids
In this section, we will review the existing literature that to the InP according to their users’ requirements.
consider auction models for virtualization of wireless network Suppose MVNO i has Ki subscribers and it requires a subset
infrastructure and resources. We will discuss the applications of RBs Si to serve its users. It valuates the bid price to obtain
of different auction-based virtualization models designed to the subset Si in a way that maximizes the total utility of all
virtualize radio access network infrastructure and resources, users as given by

network functions, and cloud services. Moreover, we will dis- vi (Si ) = max uk (rk (Xi )) (20)
cuss the auction approaches for virtual network embedding Xi
k∈Ki
procedure and how auction mechanisms can be designed to
where rk (Xi ) represents the rate of user k for the allocated RBs
guarantee fairness in resource allocation and pricing. We will
as indicated in [Xi ]|Si |×|Ki | matrix. If the user k ∈ {1, 2, . . . , Ki }
provide a summary of existing auction-based virtualization
gets an RB j ∈ Si , then element xj,k = 1 in Xi , otherwise
models in the context of practical deployment, along with a
xj,k = 0. The allocation matrix Xi also satisfies that each RB
tabularized comparison of existing works. The organization of
j ∈ Si is not assigned to more than one user. Each user has a
this section is shown in Table V.
data rate requirement and the user rate rk (Xi ) is determined by
|Si |  
phj,k
A. Auction-Based LTE Virtualization rk (Xi ) = B log2 1 + xj,k (21)
N0 B
In an LTE-based cellular network, the hypervisor is in j=1
charge of running the virtualization process and assuring that where B is the bandwidth, p is the transmit power, hj,k is the
the SPs get the desired resources and they pay accordingly channel gain for user k on each RB j ∈ Si , and additive white
for the allocation. The LTE hypervisor belonging to the InP Gaussian noise spectrum density is denoted by N0 .
virtualizes a physical eNodeB into virtual eNodeBs such that In LTE virtualization model for mixed traffic scenario is
virtual resource blocks and virtual networks are assigned to considered in [27] where MVNOs have users with different
respective MVNOs or SPs. The VCG auction is considered data rate requirements. The MVNOs submit bids to lease RBs
to be an efficient mechanism where the main objective is to from an InP and determine their bidding strategies by using
maximize the bidders’ total valuation, not the seller’s revenue. a unified utility function for their users. The unified utility
The VCG mechanism also guarantees that bidders get incen- function for user k is given by
tive for truthful bidding in order to prevent them from cheating. 1
In cellular networks, the primary objective of allocating spec- uk (rk ) = −C(r
+D (22)
1 + Be k −d)
trum resources to users is to satisfy their QoS requirements.
Therefore, VCG auction-based models are suitable for sce- where d is the QoS requirements and C represents the slope
narios where the SPs or MVNOs aim to increase their utility of the user’s gain in service level. The parameters B and D
gain by satisfying their users’ data rate demands. In a mixed are adjusted according to the range of the utility function.
traffic scenario, there can be a group of users with certain The InP collects the resource requests and solves the RB
data rate requirements and another group of users with no allocation problem based on VCG mechanism. The WDP with
rate requirements. The virtualization of spectrum resources the objective of maximizing total welfare can be represented as

should be performed in an optimized way that all users get RBs SVCG = arg max vi (Si )
according to their QoS requirements. In [27], a VCG auction- (S1 ,S2 ,...,SN ) i∈j
based model is considered where the InP plays the role of s.t. S1 ∪ · · · ∪ SN = S,
an auctioneer and the MVNOs compete for RBs as bidders.
Si ∩ Sk = ∅ ∀i, k ≤ N, i = k
The allocation of RBs is performed in two stages. The InP 
slices the RBs for MVNOs first and then the MVNOs assign |Si | ≥ Mi , ∀i ≤ N, Mi ≤ |S| (23)
RBs within their virtual slice to serve their users. The authors i
consider a unified utility function to model mixed traffic con- where (S1 , S2 , . . . , SN ) are the optimal disjoint allocations of
ditions in the virtualization process. They assume N number RBs obtained from VCG mechanism. The first two constraints
2282 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

Nash equilibrium for the virtualization framework. In addi-


tion, incentive compatibility is achieved for both the InP and
the SPs. However, the InP requires knowledge about the dis-
tribution of the channel conditions and the SPs need the state
transition probabilities for updating the state value function. To
address this issue, the stochastic game model is simplified with
an iterative approach presented in [21] that allows updating
the conjectural prices without any prior knowledge. A sub-
gradient method-based online learning algorithm is considered
to update the conjectural prices. We will discuss the auction
models designed to learn and optimize bidding price estima-
Fig. 7. Stochastic resource allocation game [21].
tion in the following section. In real systems, the primal-dual
framework can also be utilized to estimate the future prices
and the bid value for each state simultaneously.
represent the isolation of RBs allocated to MVNOs and the
third constraint guarantees that each MVNO i gets at least Mi
number of RBs. The authors propose an approximate solu- C. Auctions for Virtualization With Adaptive
tion using a heuristic algorithm. The InP uses the heuristic Bidding Strategies
algorithm to assign RBs to the MVNOs starting with the high- In the VCG mechanism, the allocation is performed in one
est valuation and continues assigning RBs until the MVNO’s round based on bidders’ submitted bids. When SPs participate
demand is not satisfied. The allocation among users served as bidders in the virtualization framework, SPs are expected
by an MVNO ensures fairness in a way that users with QoS to have knowledge about their bidding strategies. Therefore,
requirements are assigned with RBs first and then remaining the SPs need to determine the exact amount of resources they
users get RBs. The price that each MVNO pays to the InP is need to satisfy their users and also the price they want to pay
calculated by using the VCG payment rule. to obtain those resources. In real scenarios, determining the
In this auction model, the bidders require to bid truth- bidding strategies is critical due to the time-varying channel
fully to achieve maximum utility for the allocation of each conditions in wireless networks. Therefore, the InPs can per-
RB according to the VCG mechanism. Due to the require- form the auction periodically to model the interaction between
ment of calculating a large number of possible allocations for the InPs, SPs, and users. In each time period, the SPs will
each MVNO, the authors only present an approximate solution determine their demand and the InP will allocate the resources
obtained from the heuristic algorithm and does not analyze the based on the bids submitted by SPs.
other economic properties. The competition among different A VCG-based dynamic auction model is presented in [30]
InPs is also not considered, which may further increase the where an InP virtualizes the physical resources of a massive
computational complexity. MIMO antenna system into spatial streams and allocates them
to MVNOs based on their demands. Each MVNO then sched-
B. Stochastic Auction-Based Virtualization ules their users on the acquired resources. In this virtualization
The varying channel and propagation characteristics in the model, the authors consider an auction-time block based on
wireless environment bring challenges to fair and efficient spatial multiplexing. In every auction-time block, the InP esti-
allocation of resources in wireless networks. The auction mates the channel conditions and sends channel estimates
mechanism for resource mechanism for such stochastic wire- to the MVNOs. The MVNOs then compute the number of
less environment can be modeled as a stochastic game as streams they need and submit their bids accordingly. The InP
in [20]. The InP and the SPs interact with each other to uses the one round VCG mechanism to determine the winners
exchange traffic information and the resources are allocated and the number of spatial streams for winning MVNOs using
dynamically over the auction time slots. This dynamic game a heuristic algorithm. The payment is calculated according to
of resource allocation is performed in two phases - current and the VCG payment rule. Suppose MVNO i wins Si number of
future resource allocation. spatial streams by submitting the bid bi . Then, the price that
As shown in Fig. 7, the InP collects the bids from all SPs MVNO i will pay is calculated as
in the current phase and performs the VCG mechanism to  
Pi = Sw bw − Sw bw (24)
determine resource allocation and payment for each SP assum-
w∈W w∈W
ing that it has prior knowledge of channel profiles. The InP
also computes the conjectural prices which is an estimate of where W is the set of winning MVNOs and W is the set of
rate allocation cost per unit sub-channel. The SPs compute the winners without MVNO i’s participation.
state-value function, i.e., the bid value for the future state by Every MVNO determines the bidding strategies in a way
using the state transition probability and the conjectural prices that maximizes its utility, i.e., the difference between the total
provided by the InP. This VCG-based one shot resource allo- profit the MVNO can achieve with the resource blocks and
cation game is performed in the current phase and continued the estimated payment price for the resources. In [30], the
repeatedly over the future states. The truthful revelation of bid profit value of the spatial streams is estimated according to
values in the VCG mechanism allows the InP to compute the the average achievable rate and uses a uniform spatial stream
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2283

price which is learned from the auction outcome in the last the optimal bidding strategy that maximizes reward over time.
auction-time block. For instance, if an MVNO i has Ki users The payoff for each SP is a quasi-convex6 function which
and the unit spatial stream price in the last auction-time block guarantees the existence of Nash equilibrium [22].
is Ci (t−1), then the bidding strategy can be derived by solving
the following problem:
D. Auction Approaches With Game Theory for Virtualization

Ki
max δ rk − Ci (t − 1)Ki (25) In order to design the interaction between the mobile users
Ki
k=1 and SPs, an efficient mechanism is desired such that SPs
where rk is the achievable rate for user k and δ is the monetary can exactly determine users’s resource demands and the bid-
unit representing MVNO’s profit per unit of data. The bid ding price. Game theory can be applied to auction mechanism
value can be obtained from the ratio of the total profit gain design to determine the optimal bidding strategies.
and the number of users. A power allocation mechanism for virtualized wireless
The estimated price from the last round of auction is a networks is presented in [29]. In this mechanism, a single
local information which may not be accurate. A learning algo- access point (AP) that belongs to an InP collects the resource
rithm can be applied to estimate the price more accurately in requests from SPs who require transmission power to serve
a dynamic manner. Such a VCG auction-based virtualization their users. The InP virtualizes the available power units to
model is presented in [22] that incorporates the Q-learning share the limited power among multiple SPs. A two-stage
algorithm to determine SPs’ optimal bidding strategies. In each game is formulated based on the sequential auction model and
auction time slot, the InP allocates the resources dynamically the Stackelberg equilibrium solution is selected as the optimal
to increase the resource utilization efficiency based on the link bidding strategy. In the first stage, the SPs derive the desired
quality and traffic information exchanged by the SPs. Each SP transmission power and optimal bid price with the objective
abstracts the traffic information using a satisfaction function of maximizing their utility. In this system model, the utility
which indicates the SP’s evaluation of service level on the pos- of user k in SP i is defined as
sible allocated bandwidth. Assuming that SP i has Ki users,
the satisfaction function is given by [22] uki = βki Rki − αki Pki (29)

Si (xi ) = bi ak uk (xki ) (26)
where βki is the gain per unit transmission rate of Rki and αki
k∈Ki
is the price per unit transmission power Pki between the user
where uk denotes the utility of user k for the allocation xki k and SP i. The optimal bidding strategies are obtained as the
which can be computed based on the achievable rate and ak is Stackelberg equilibrium.
a unit parameter to scale the user’s utility. The bidding price In the second stage, the InP performs a sequential auction to
bi is chosen from a strategy set which consists of countable allocate power resources based on SPs’ traffic load. The InP
number of bid values. The self-interested SPs may choose a initially determines an allocation for SPs which is updated
bid value different than the true one if they find any chance further for load balancing. Underloaded SPs, who want to
to maximize their own profit gain. Since the InP does not sell their rest of the power resources, reveal ask prices per
have any clue about how the satisfaction function is evaluated, unit power. On the other side, overloaded SPs reveal power
the SPs gets the opportunity to bid untruthfully. To ensure requirements and bid prices. Power from underloaded SPs is
truthfulness, VCG allocation and pricing rule can be applied reallocated to overloaded SPs through sequential auction. The
which also guarantees individual rationality. auction finally terminates when the overloaded SPs obtain their
In each time slot t, each SP i selects a bidding strategy as the required transmission power or all the remaining power is sold
bidding price bti and an demand bandwidth xit that predicts the out.
maximum profit gain. The reward of SP i for the state-action The self-interested SPs desire to obtain more transmission
pair (s, a) is given by power for higher transmission rate for their mobile users.
    However, the InP has limited transmission power and it desires
R(s, a) = yt+1
i bt+1
i , xi
t+1
− yti bti , xit (27)
to ensure efficiency as well as fairness. In order to design a
where the payoff is the difference between the achieved profit power allocation mechanism with fairness guarantee, a two-
gain and payment price and is represented by yti = Si (xi∗ ) − stage auction game can be formulated using coalitional game
vcg theory. The power allocation scheme in [28] considers time-
pi . The Q-value corresponding to the state-action pair is
updated as follows: varying constraint in power allocation problem formulation.
  The InP periodically collects the bidding information from
Qt+1 st , at = (1 − β)Qt (st , at ) + β MVNOs. At each time period, the InP calculates an initial
  
× R(st , at ) + γ max Qt st+1 , at+1 , (28) payoff and payment using VCG mechanism with the objec-
a tive of maximizing the total achievable user rate. The initial
where β is the learning rate, which refers to the extent the
previous bidding strategy is updated and γ is the discount 6 A utility function u(x) of bidders x ∈ {1, 2, . . . , n} defined on a convex
rate which estimates the future reward value. The SPs bid set S is quasi-convex if the lower level set {x ∈ S : u(x) ≤ a} is convex for
truthfully to ensure that the Q-learning algorithm converges to any real number a.
2284 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

payment for user k of MVNO i is calculated as E. Auction for Virtualization in a Bayesian Setting
In the WNV framework, the role of SPs can be extended by

l=K 
l=K   allowing them to lease their idle resources to other SPs as a
i,VCG
cik = max Ril − Ril pl,k (30)
pik,j =0 virtual InP. This will bring an additional profit to SPs. An auc-
l=1,l=k l=1,l=k
tion mechanism can be designed for such a scenario with the
where the first part is the maximum data rate given that the objective of maximizing the resource utilization and achieving
transmit powers for RBs allocated to user k are set to zero, and additional revenue. A bandwidth reuse mechanism for SPs is
i,VCG
pl,k represents the optimal power allocation obtained from presented in [23] where the SPs can act as the virtual InPs
the VCG mechanism. The payoff of user k can be determined and lease idle bandwidth to other SPs. The virtual InPs may
as mik = Rik − cik , where Rik is the achievable data rate of user also behave strategically and may not reveal their idle band-
k under MVNO i. In the second stage of power allocation, width truthfully. To guarantee truthfulness, VCG mechanism
a coalition game is developed among MVNOs to adjust their can be applied that provides incentives to the SPs by max-
users’ initial payoff and payments using the Shapley value. imizing their welfare. The mechanism should also consider
This is to ensure fair allocation of power resources among providing incentive to SPs for maximizing revenue when they
users based on their rate requirements. act as the virtual InPs. In the traditional VCG mechanism,
An iterative resource bidding auction mechanism is the bidders’ valuations are private information which cannot
proposed in [31] where transmit power and sub-channels are lead to optimal revenue. Hence, a mechanism can be designed
virtualized through a non-cooperative game. The substrate in Bayesian setting where the SPs’ bid valuations are drawn
wireless network controller of the InP abstracts the avail- from publicly known independent distributions. The classi-
able resources based on the users’ QoS requests and allocates cal Myerson’s optimal mechanism in [60] can be adopted to
the virtual network slices accordingly. The users indepen- improve the VCG auction for revenue generation. For each
dently derive the optimal request strategies and submit their buyer SP i, a virtual bid is computed as
bids dynamically during each auction interval. The strategy 1 − Fi (bi )
vi (bi ) = bi − (33)
of user k consists of two types of resource requests and can f (bi )
p p
be represented by Sk = (xk , xkn ) where xk denotes the amount
n where Fi (bi ) is the probability distribution of SP i and fi (bi )
of transmit power units and xk denotes the number of sub-
is the probability density function for bid value of bi . The
channels desired by user k. The payoff or utility of each
virtual bids are monotone non-decreasing. In the next step, the
user is computed based on effective capacity on the requested
winners are determined by solving the following problem that
resources minus the cost of each resource type. The effective
maximizes the sum of winning virtual bids among N bidders:
capacity represents the maximum rate of a service process that
needs to be achieved to satisfy the QoS. The payoff of user 
N

k for the resource request Sk with QoS requirement of βk is max vi (bi )xi (b−i , bi )
bi
given by i=1
N
  p   s.t. di xi (b−i , bi ), (34)
yk (Sk , βk ) = α1 Ek (Sk , βk ) − α2 cp xk + cn xkn (31)
i=1

where α1 and α2 are the weight parameters for effective where di denotes the bandwidth demand and xi indicates
capacity and cost, respectively. The cost of allocated trans- whether SP i wins or not. This problem can be considered
p
mit power and sub-channels are denoted by cp (xk ) and cn (xkn ), as a knapsack problem where the virtual bids are the profit
respectively. value of the items and the demands are the weights of items.
The users derive the optimal bidding strategy by solving the This problem can be solved exactly by the dynamic program-
following optimization problem ming algorithm which will guarantee efficiency with optimal
expected revenue. The payment price can be calculated based
Sk ∗ = arg max yk (Sk , βk ), on VCG pricing rule.
Sk
  
K
F. Double-Sided Auction for Virtualization
(n)
s.t. E pk ≤ Pk and nk ≤ N, ∀k (32)
k=1 The single-sided auction models discussed above, are
designed based on the competition among multiple buyers who
where the constraints represent the maximum transmit power want to obtain resources from a single seller. The buyers sub-
units per user and sub-channel capacities for all users. At mit bids to the seller who plays the role of the auctioneer.
first, the users determine the optimal transmit power by max- In real scenarios, there will be competition on both sellers’
imizing the payoff on each sub-channel using the Lagrange and buyers’ ends. To incorporate the competition among the
function. The Lagrange variables are updated iteratively with sellers, we can design a double auction model where multiple
a fixed step size and converge to Nash equilibrium of transmit sellers can participate in the auction by submitting ask bids.
power request strategy. Then, the users find the optimal num- In the framework of virtualizing RAN resources in cellular
ber of sub-channels by maximizing overall payoffs based on network, Fig. 8 depicts an iterative double auction model
the obtained optimal transmit power. where M InPs and N MVNOs interact with each other for
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2285

of each user k of MVNO i and the second constraint represents


the total amount of data offered by BS l. The third constraint
ensures that the data rate provided by BS l is not less than the
data requested by user k. To globally optimize the social wel-
fare, Zhang et al. [32] derives the KKT conditions using the
Lagrange function where the Lagrange multipliers are referred
to as shadow prices. However, the optimal solution is infeasi-
ble due to insufficient information about the utility functions
and thus the authors present an iterative approach to solve
the problem. At each iteration, the mechanism calculates the
bidding strategies for InPs and MVNOs separately using the
Fig. 8. A double auction model in SDN-based cellular network. truthful VCG mechanism and also obtains the shadow prices.
The primal optimization problem with the KKT conditions is
transformed into a dual problem. The shadow prices of the dual
dynamic resource allocation via a SDN controller who acts problem are updated iteratively using sub-gradient method.
as the auctioneer. The InPs submit ask bids to the SDN con- However, the analyses for the duality gap and economic
troller that contain the number of available spectrum and BS properties are not provided.
resources and the prices at which the InPs want to sell their Another double auction based virtualization model for
resources. Similarly, SPs submit bids requesting for desired multi-flow transmission is proposed in [81] which guarantees
amount of resources and the prices that SPs are willing to fairness in mixed traffic scenario and also preserve energy con-
pay. The SDN controller computes the allocation problem and sumption by reducing the cost budget and balancing traffic
updates the prices iteratively to obtain an optimal solution loads among BSs. This paper introduces distance-based trans-
that satisfies both InPs and SPs. Once the optimal solution action cost which includes costs associated with signaling,
is achieved, the SDN controller collects the payments from backhaul, etc. The transaction cost is applied to an MVNO
SPs and transfers to respective InPs. when it purchases data from an InP. The transaction cost is
An SDN-based generalized virtualization framework is directly proportional to power consumption and transmitted
presented in [32], that considers mobile traffic with diverse data amount which allows to control the energy efficiency
QoS requirements. The authors assume that the physical of the virtualization model. The social welfare maximization
resources are leased based on pre-contracts on pricing and problem for this double auction model is solved by a similar
charging rules. The SDN controller takes the responsibility for iterative approach discussed above.
partitioning the various wireless service requests into multiple
slices of traffic flows and enables multi-flow transmission. The
SDN controller receives the ask prices from InPs who want to G. Hierarchical Auction for Virtualization
share their network resources and also collects bids from SPs
In the generalized virtualization framework, the InP allo-
who want to lease these resources to meet their subscribers’
cates the virtual network slices to the MVNOs and also
demands. The authors adopt a VCG-based iterative approach
schedules resource assignments for end users. Therefore, the
to virtualize the traffic flows with diverse QoS requirements.
computational complexity of virtualization increases which
Consider M = {1, 2, . . . , m} InPs as the sellers where each
can be reduced by performing the resource allocation in
InP j ∈ M has Lj BSs and N = {1, 2, . . . , n} MVNOs as
multiple stages. If the MVNOs are allowed to compute
the buyers where each MVNO i ∈ N has Ki users. We
the assignment of resources within the slice according to
denote the set of all BSs by L and the set of all users by K.
their users’ requests, then computational burden at the InP
Therefore, the social welfare maximization problem for the
reduces significantly. Such a hierarchical auction is presented
double auction model is defined as [32]
     in [33] and [34] where the resources are allocated in two
max Ui (xi ) + Vj yj − pij Tij stages: InP to MVNOs and then MVNOs to users. This
(x,y) hierarchical auction is designed considering a massive MIMO-
i∈N j∈M i∈N j∈M
 enabled cellular network. In the upper level of this hierarchical
s.t. xk,l ≥ rkmin , ∀ k ∈ Ki
auction, the MVNOs bid for sub-channels, power and anten-
l∈L
 nas from the InPs. The MVNOs compute bids for all possible
yk,l ≤ qmax
l ,∀l ∈ L combinations of resource bundles using the general valuation
k∈K model. MVNO i with Ki subscribers determines a resource
yk,l ≥ xk,l , ∀k ∈ K, l ∈ L bundle Si = {Ci , Pi , Ai } where Ci , Pi and Ai are the number
yk,l ≥ 0, xk,l ≥ 0, ∀k ∈ K, l ∈ L (35) of desired sub-channels, transmit power units and antennas,
respectively. The MVNO i’s valuation for the resource bundle
where Ui (xi ) is the utility of MVNO i that aggregates all users’
Si is given by
utilities and Vj (yj ) is the sum-utility of InP j. The total amount
of data requested by MVNO i is denoted by xi and the amount 
of data provided by InP j is yj . In the optimization problem, the vi (Si ) = qk (Si ) − qres
i (36)
first constraint represents the minimum data rate requirement k∈Ki
2286 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

where qk (Si ) is the price paid by user k in the lower-level Both upper and lower level auctions use the same pricing
auction and qres
i is a reserve price for MVNO i. In the lower- scheme. For the exact solutions, users’ payment prices are
level auction, MVNOs allocate the resources obtained from calculated using VCG pricing rule which is expressed as
InPs among their subscribers. Users determine bids using a    
vj S̄j∗ − vj (Sj∗ )
vcg
linear valuation function. Consider the resource request bundle qk = (40)
for user k is Sk = {ck , pk }, where ck and pk are the number j=k j=k

of subchannels and transmit power unit requested for user k. where the first part of (40) represents the welfare without user
The valuation of user k for the requested bundle Sk can be k’s participation and the second part represents the welfare
represented as contributed by the other users in the chosen allocation.
To avoid any decrease in seller’s revenue, the VCG price
vk (Sk ) = δk rk (Sk ) (37)
is adjusted with a minimum reserve price and the final price
where δk is a constant parameter to scale achievable user rate charged to user k will be qk = max{qres
vcg
k , qk }. For the approx-
rk for the bundle Sk . imate solutions, a VCG-like payment is calculated as follows
greedy
The authors analyze the auction model both for single-seller qk = max{qresk , qk } and the price for greedy algorithm is
multi-buyer and multi-seller multi-buyer cases. For single- calculated as
seller multi-buyer case, the WDP for lower level auction is greedy vj 
represented as qk = max  |Sj | (41)
j∈Bk |Sj |

max vk (Sk )xk where Bk represents the set of users who lose the bid due to
xk
k∈Ki user k’s participation and thus the price is computed according

s.t. pk (Sk )xk ≤ Pi to the highest bid the user k defeats.
k∈Ki The analyses of auction properties in this hierarchical auc-
 tion shows that the VCG scheme with the exact WDP solution
xk ≤ L, ∀n
achieves allocation efficiency, individual rationality, and incen-
k∈Ki n∈Sk
tive compatibility at each level. On the other hand, the payment
xk ∈ {0, 1}, ∀k (38)
rule for the approximate solution achieved using the greedy
where the objective is to maximize the social welfare or total algorithm guarantees incentive compatibility for single-minded
valuation of users who win the auction, the first constraint users in the lower-level auction only. The proposed hierar-
gives the maximum transmit power capacity limit and the sec- chical auction is in offline setting which can be extended to
ond constraint represents the maximum number of users who online auction model to allocate resources dynamically based
can share a sub-channel n. This WDP can be solved exactly on users’ actual demand.
using a dynamic programming-based algorithm for a low-scale
deployment scenario. A greedy algorithm based approximate H. Auction for Network Function Virtualization
solution is also proposed in [33].
The virtualization technique allows to abstract not only
The WDP for the upper-level auction between the InP and
the physical resources but also the wireless services and
MVNOs is represented as
  network functionalities. The requirements for users’ service
max vi (Si )xi (Si ) level, resource negotiation and contracting can be automated
xi
i∈N Si ⊆i using an auction-based virtualization framework. A two-stage
  Vickrey auction is proposed in [26] for on-demand alloca-
s.t. Ci (Si )xi (Si ) ≤ C
tion of heterogeneous commodities. At first, SPs compute the
Si ⊆
i i∈N
  resource cost for a package of virtual resources and submit
Ai (Si )xi (Si ) ≤ A the quotes as VN bidders. The quotes of the requested VN
Si ⊆
i i∈N segments are mapped with maximum reservation prices and
 
Pi (Si )xi (Si ) ≤ P feedback is sent to the VN bidders asking for final resource
Si ⊆
i i∈N demands. In the second stage, the VN segments are assigned
 to the lowest VN bidder of that segment according to the final
xi (Si ) ≤ 1, ∀i ∈ N
quoted price. This package-based bidding strategy results in
Si ⊆
i
heuristic resource partitioning that minimizes cost.
xi (Si ) ∈ {0, 1}, ∀i ∈ N, Si ⊆
i (39)
1) Dynamic Auction With Optimal Payment Strategy: In
where the optimization problem aims to maximize the total the SDN/NFV-enabled network, the SDN controller operates
valuation of MVNOs and the first three constraints represent within NFV framework to offer newly innovated services
the capacity limits of sub-channel, antennas and power, respec- through virtualization. In the NFV-enabled network service
tively. The other constraints ensure that at most one set of chaining model, a continuous chain of network functions is
resource bundle is assigned to MVNO i over the all possible virtualized as virtual network functions (VNFs). The network
combinations of XOR bids which is denoted by
i . Similar service chaining is designed to provide high QoS to the IoT
to the lower-level auction, dynamic programming-based algo- devices. The network service chaining also allow data offload-
rithm and greedy algorithm can be used to solve the WDP for ing to improve QoS for end users. The network function
the upper-level auction. virtualization model in [35] provides an efficient solution for
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2287

dynamic service provisioning through flexible VNF instances. Each MVNO estimates the real-time resource demand accord-
A VNF service chain consists of a sequence of VNFs that ing to current achievable data rate and traffic demands.
is traversed during data flow implementation. The SPs aggre- Considering N MVNOs as the bidders and M BSs as the dif-
gate the necessary VNFs and deploy VNFs in the data center ferent types of commodities offered by a RaaS provider, the
according to users’ demands. The dynamic resource provi- WDP is formulated as an integer linear program as follows:
sioning can be implemented through an auction in this NFV

N
market model. The VNF service chains are auctioned among max vj xj
users with the objective of maximizing the social welfare. The j=1
auction is designed based on the primal-dual approximation

N
algorithm and provides a truthful and computationally effi- s.t. dij xj ≤ Ci , ∀i ∈= {1, . . . , M},
cient solution with a payment strategy obtained by using the j=1
Myerson’s optimal mechanism [60].
xj ∈ {0, 1}, ∀j ∈ {1, . . . , N} (42)
2) Iterative Online Auction With Price Learning Algorithm:
An SP can lease resources from other suppliers and aggregate where vj is the valuation of MVNO j and xj indicates whether
with its pool of computing resources. The SP can then vir- MVNO j wins the bid or not. The fraction of resources
tualize its own computing resources and bandwidth as VNF requested by MVNO j is denoted by dij and Ci represents the
service chains and assign them to users dynamically. The maximum amount of resources offered by BS i. The authors
online auction hosted by SP in [40] considers stochastic arrival propose a greedy approximation algorithm to select the win-
of users’ bids and allocates VNF service chains based on ners and determine prices. The reserve prices of the MVNOs
the primal-dual framework. A user can compute demands by ensure that the winning MVNOs do not pay any zero payment
defining the desired number of VNF instances and bandwidth and thus the RaaS provider’s profit is guaranteed.
and respective bid prices according to estimated arrival rates, 2) VCG-Based Online Auction for C-RAN: The C-RAN
capacity and processing delay of traffic flows. This multi-seller platform allows hosting a large number of virtual BS instances
multi-buyer auction model aims to maximize the social welfare in the cloud. Computing resources for baseband signal pro-
by deriving primal and dual solutions. Exploiting the online cessing are pooled as VMs that are placed in the cloud data
price learning algorithm, the auction model is extended to han- center. Within a C-RAN system, the base stations can be
dle the bid departures after a specific period of time. The flexibly shared among multiple entities by using an auction-
algorithm enables to learn resource availability and average based virtualization technique. Reference [38] presents an
prices for future time slots based on the arrived bids. online auction model where the C-RAN resources are shared
among mobile operators through virtualization. This VCG-
based mechanism solves the WDP by using LP relaxation and
taking the fractional objective value of the social welfare. In
I. Auction for Virtualization of Cloud Services the online setting, the authors propose a randomized rounding
In the 5G wireless network architecture, cloud comput- approach to learn future bids based on known bidding prices.
ing will be integrated with virtualization to abstract different 3) Hierarchical Auction for C-RAN in a Bayesian Setting:
computational resources, memory, processing units as well When C-RAN resources are allocated to users via MVNOs, a
as different network functionalities such as edge computing, hierarchical auction model can be adopted as presented in [39].
caching, etc. The various network operations are segmented A C-RAN operator sells spectrum resources among MVNOs
into different cloudlets which can be managed by a central- where the MVNOs assign the resources to serve their sub-
ized cloud manager. The cloud SPs will virtualize the cloud scribed users. This paper considers a two-level hierarchical
resources and functionalities as cloud services and assign them auction: the lower-level auction is between end users and the
to cloud users. The cloud services can be allocated to cloud virtual operators, and the higher-level one is between MVNOs
users through an auction mechanism. The SDN/NFV based and the C-RAN operator. Both homogeneous and heteroge-
architecture supports virtualization for various system models neous user demands are considered for the auction models.
such as C-RAN, radio-as-a-service (RaaS), infrastructure-as- In the lower-level auction, the optimal solution is obtained
a-service (IaaS) or everything-as-a-service which may include under Bayesian setting where the virtual valuations of users
virtualizing IoT devices, edge computing, fog computing, are determined based on their best response strategies that
cache placement, etc. maximize their profits. The authors propose a polynomial-time
1) VCG-Based RaaS Auction: Through virtualization, the greedy approximate algorithm to reduce the time complexity
radio spectrum resources of an InP can be provided as a ser- in solving the allocation and price determination problems.
vice, which is known as RaaS. The virtualization model for 4) Online IaaS Auction in a Primal-Dual Framework: The
RaaS can be modeled as an auction mechanism where the IaaS cloud system allows users to request customized bundle
MVNOs can lease radio resources from RaaS cloud provider of computing resources according to their real-time prefer-
and pay for the service. A VCG-based auction for allo- ences. An online auction model can be used where the IaaS
cating RaaS is presented in [41], where a certain amount provider can virtualize the infrastructure resources and sell
of resources is reserved for each MVNO. In addition to them to cloud users. Zhang et al. [40] propose an online
the reserved resources, MVNOs can request for additional framework where the IaaS provider dynamically creates VMs
resources dynamically to satisfy their users’ requirements. consisting of heterogeneous physical machines. This online
2288 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

auction is based on a primal-dual framework that maximizes exact bandwidth required to serve their users by a Q-learning
the social welfare considering the costs required for maintain- algorithm. Given the actual bandwidth resource requests or
ing the servers or VMs. In this auction model, the dual solution bids submitted by SPs, the InP determines the allocation and
to the allocation problem is determined by using the Fenchel payment prices based on the VCG auction mechanism.
duality [82]. The Fenchel conjugates of the convex program- Given that the radio resources are already scheduled for
ming relaxation provides detailed guidelines to analyze the MVNOs, the LTE air interface virtualization model in [28]
online auction model. The commonly used Lagrangean dual proposes a two-stage power allocation algorithm to assign the
problem can be considered as a special case of Fenchel dual- power resources among MVNOs. In the first stage, an initial
ity. The Fenchel duality is applied to handle the convex cost allocation of available power units is determined by the VCG
functions considering that the resource demands vary with time auction mechanism where the MVNOs submit bids on behalf
and the same set of resources can be requested repeatedly. The of their users. The initial allocation of MVNOs is adjusted in
authors further extend the online auction model for expected the second stage via a cooperative game where users belong-
profit maximization using randomized reduction technique. ing to the same MVNO form a coalition. A Shapley value
is considered as a user’s average payment in the coalition,
J. Auction-Based Virtual Network Embedding which is used to adjust the MVNO’s user rate requirements.
The auction mechanisms can be applied for embedding the The readjustment of initial allocation is performed iteratively
virtual networks on to the physical substrate network and man- based on the time-based proportional-fairness (PF) criterion.
aging the resource discovery, resource allocation, and mapping A fair provisioning of radio resources as cloud services
the virtual links to the physical nodes based on the requests for among MVNOs in the radio-as-a-service (RaaS) model is
virtual links and nodes. An online auction is developed in [24] presented in [41]. The RaaS cloud service provider acts as the
which enables the InP to perform the embedding technique by auctioneer who runs the VCG-based auction to periodically
periodically selecting the VN requests that maximize the prof- allocate the radio resources among the MVNOs’ according to
its. This solution approach takes the column generation-based their real-time demands. To ensure fair pricing for resource
problem formulation and the branch-and-bound and rounding- allocation, the auction model defines reserve prices so that
off heuristic algorithms. This embedding model also provides cloud SPs receive a payment which is greater or equal to a
methods to penalize the bidders with cheating tendency. A threshold price.
consensus-based distributed auction for VN embedding is con- 2) Fair Resource Scheduling Among Users: In wireless
sidered in [25] which runs periodically. In each round, bidders network environment, users requirements are highly vari-
exchange bids with neighboring physical bidder nodes and able where fair resource scheduling means equal shares of
then VNs are mapped to virtual links according to their agree- resources for users rather than equal bit rates. Fair scheduling
ment policies. A bidder can request for virtual path linked of resource blocks (RBs) among MVNOs and their users can
with single or multiple physical nodes in each round. The be ensured by an auction-based mechanism. A VCG-based
distributed auction finally converges to a solution using the auction model is considered in [27] where the MVNOs sub-
pseudo-submodularity7 of the utility function. mit their resource requests to the InP. The proposed allocation
algorithm prioritizes the MVNOs based on their users’ QoS
K. Auction for Virtualization With Fairness Criterion requirements and assigns the available RBs one-by-one to the
MVNOs accordingly. The mechanism explicitly guarantees
In WNV, MVNOs or SPs compete with each other to obtain fairness among users within an MVNO by scheduling RBs for
resources from InPs and satisfy their users’ QoS requirements. a user as long as its requirement is satisfied. The remaining
Different users may have different data rate requirements. RBs will then be assigned to other users inside the MVNO
Multiple InPs operating in the same area also compete with whose rates are below the requirements. The allocation for
each other to sell as much as resources to MVNOs or SPs. The users within an MVNO will terminate when all users QoS
main objective of an InP is to maximize its revenue and dis- requirements are satisfied. This will ensure fairness among all
tribute its available resources among MVNOs or SPs according MVNOs.
to their users’ requirements. On the other hand, MVNOs or 3) Fair Market Revenue Among InPs: From a seller’s per-
SPs want to obtain resources from InPs to serve their users spective, the InP needs to be able to earn a fair amount
at a minimum cost. Different entities in the WNV frame- of revenue for the resources it leases to the MVNOs. The
work (e.g., users, MVNO, SPs, or InPs) have different fairness SDN-based WNV presented in [32] considers a double auc-
perspectives. tion model to enable multi-flow transmission among multiple
1) Fair Allocation Among MVNOs/SPs: Fair resource allo- InPs and multiple MVNOs. The auction mechanism guaran-
cation in WNV refers to assigning MVNOs or SPs with tees fairness among InPs by defining a target sell or minimum
resources proportional to their users demands. The VCG allocation criterion for each InP. The allocation also satisfies
auction-based virtualization model presented in [22] parti- the MVNOs’ data demand constraints according to their users’
tions and allocates the bandwidth resources of an InP among rate requirements.
SPs in an efficient and fair manner. The virtualization model In the WNV business model, a fair negotiation process
allows the SPs to derive their optimal bidding strategies, i.e., needs to be ensured among the sellers and buyers such that the
7 Pseudo-submodularity in auction corresponds to decreasing marginal value overall cost of both parties is minimized. An online auction-
of a bidder’s utility or payoff. based on-demand service negotiation model is proposed
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2289

TABLE VI
C OMPARISON A MONG AUCTION M ODELS IN WNV

in [26], which provides a mutually beneficial contract among multiple business entities (e.g., MVNOs, SPs, cloud providers)
InPs and SPs. This mechanism aims to minimize the costs to coexist within the same infrastructure with efficient resource
involved in partitioning the resources into VN slices and allocation and payment rules.
embedding them onto the physical substrate network. In this There are several approaches to design auction-based vir-
auction model, both InPs and SPs submit their ask bids and tualization model in wireless networks. Table VI presents a
buy bids according to their bidding preferences, respectively. comparison among existing auction-based virtualization mod-
A package-based bidding strategy is adopted which is an els in terms of auction classification, objective, and economic
weighted average of heterogeneous resources based on the properties.
proportional cost of each type of resource. For practical deployment of virtualization in wireless
networks, an online auction mechanism will be useful to vir-
tualize the network resources in both access and core network
V. AUCTION A PPROACHES IN WNV: L ESSONS L EARNED where the users will be served on-demand manner based on
WNV provides the foundation for rapid innovation of new their real-time requirements. In SDN/NFV-based 5G wireless
wireless services and their flexible implementation in future networks, the auction-based virtualization model will need
generation wireless networks. It also encourages the develop- to manage the allocation of heterogeneous types of network
ment of new business solutions for network sharing to reduce infrastructure and radio resources as well as network func-
the capital and operational expenditures as well as to make tionalities and cloud-based services across the access and core
additional revenues by leasing the network resources for a networks. The dynamic and flexible network-wide virtualiza-
limited time. The virtualization motivates service providers tion can be designed based on combinatorial auction where
with limited physical resources to join the market and to the MVNOs or SPs can submit bids on a combination of
implement new services on the shared network architecture. commodities according to their QoS requirements in terms
Auction mechanism design provides the guidelines to enable of bandwidth and latency. The online combinatorial auction
2290 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

model can be extended with double-sided auction framework spectrum, bandwidth, computing and storage devices spanning
in order to enable a fair competition among InPs and MVNOs. from the access to the core networks.
In the double auction framework, multiple InPs and MVNOs SDN and NFV-based architecture has the potential to deploy
can submit their ask bids and buy bids to the auctioneer such network-wide virtualization. SDN supports flow level
according to their preferences, respectively. The InPs aim to virtualization which enables multi-flow transmission over dif-
sell as much as resources or services to MVNOs with the ferent RANs. NFV can be integrated to virtualize operational
objective of maximizing their revenue, whereas the MVNOs functionalities of different processing units, storage units, and
want to buy resources or services with the objective of mini- gateway devices as VNF service chains. The network-wide
mizing their allocation cost (i.e., maximizing utility or payoff). auction based virtualization can be implemented via a cen-
Therefore, the allocation problem formulation also needs to tralized SDN controller where heterogeneous user demands
take care the fairness criteria for InPs and MVNOs such that are modeled using an online combinatorial auction frame-
each InP can sell a fair amount of resources and each MVNO work. In the online setting, users are served in an on-demand
can get a fair portion of resources from the InPs. manner according to the users’ QoS requirements. To evalu-
Considering the complexity issues in solving the winner ate the quality of virtualized services and profit gain at the
determination problem (WDP) of an online double-sided com- user end, new valuation and utility function models need to
binatorial auction model for virtualization as discussed above, be investigated in the context of combinatorial auctions.
finding exact solutions could be computationally inefficient.
A heuristic greedy allocation algorithm can be designed to B. Virtualizing Everything-As-a-Service
assign the resources in an computationally efficient manner.
In the SDN/NFV enabled 5G network, virtualization
The heuristic algorithm can also be improved with additional
technique has the flexibility to virtualize various devices
fairness criterion for different entities in WNV (e.g., InPs,
and network functions as services or applications over the
MVNOs, SPs, users) according to the system model. In real
network. This motivates virtualizing everything-as-a-service
applications, the online auction will be performed periodically
which include virtualization of traditional RAN infrastructure
at certain interval when the auctioneer will collect the ask bids
and radio resources as well as computing and storage devices
and buy bids from InPs and MVNOs respectively. An iterative
in the cloud data centers. In addition, virtualization can be
primal-dual approach can be adopted to handle the complex-
applied on mobile edge computing and caching functional-
ity issues using duality theory and estimate bidding strategies
ities for the low-power devices deployed in IoT or mobile
for InPs and MVNOs for the next round of auction based on
edge networks. The computational and caching resources in
online learning algorithms. For such online auction with uncer-
the edge or IoT cloudlets can be virtualized and shared among
tainties in bid values, randomized rounding technique can be
different cloud service providers and mobile user ends using
applied to round off the optimal fractional solution and guaran-
auction mechanisms. The main challenge in this auction based
tee truthfulness in expectation. Although auction mechanisms
virtualization process would be choosing the cloud SPs for
are designed in virtualization to achieve economical efficiency,
users according to their preferred bundle of services from
most of the works do not analyze the economic properties of
multiple SPs. The performance of virtualization can be ana-
the auction methods. In particular, none of the mechanisms
lyzed in terms of computational overhead, power consumption,
considers the budget balance property.
energy efficiency using suitable utility functions of the auction
model.
VI. O PEN R ESEARCH I SSUES AND F UTURE D IRECTIONS
The development of virtualization applications in 5G C. Service-Centric Virtualization Mechanism
networks will need to handle several research challenges.
A dynamic framework of virtualization is expected for next
In this section we will discuss some of the open research
generation wireless networks to meet users’ real-time demands
issues and future directions based on auction mechanisms for
in an inexpensive way. The SPs who desire to provide short-
virtualization in wireless networks.
lived services, also look for dynamic and flexible network
architecture so that users’ access to the common pool of infras-
A. Dynamic Allocation of Network-Wide Resources tructure resources is available on request. Therefore, the InPs,
The existing auction-based virtualization models mostly SPs and users need to be modeled under a single framework
handle the allocation of wireless physical infrastructure and where users and SPs are served according to their hetero-
radio resources within the radio access network. Some recent geneous QoS demands. Thus, InPs can accordingly slice the
works have applied virtualization technique to abstract com- physical resources into customized VNs and provide required
putational resources in the core network. The auction based logical/physical connectivity. The InPs sometimes may need
virtualization framework has a wide range of opportunities to abstract network functionalities as VNFs through softwares
to increase the resource utilization by jointly virtualizing running on VMs in the cloud data centers. The management
infrastructure and computational resources across the access of VNs and VNFs brings additional challenges to initiate
and core networks as a single service or application pack- on-demand service or resource allocation and automated place-
age. Network-wide resource slicing and sharing in a 5G ment of respective VMs/VNFs to the network nodes. Instead of
network would bring additional challenges due to the multi- hardware or device-centric allocation, service-centric auction
dimensional heterogeneity of network resources such as radio mechanism needs to be investigated where various services are
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2291

considered as commodities. A complete service-centric man- SDN-controller should be able to protect bidders’ private
agement solution in the virtualization layer is still an open bidding information and locations so that other participating
research challenge in WNV. bidders cannot rig the information and manipulate the auction
outcome. Furthermore, the isolation among the VNs should be
D. Embedding VNs and VNFs for Virtualization performed carefully such that applications running on a VN do
The integration of SDN and NFV into the virtualization not have access to another VN. The SDN controller should be
framework reduces the dependency on hardware devices and self-protected, i.e., the SDN interfaces should define protection
support flexible implementation of newer services and tech- policies for all different traffic types in order to restrict unau-
nologies. This certainly reduces the CAPEX and OPEX signif- thorized resource requests. For example, the cloud computing
icantly, but brings new challenges to economically deploy the systems, a single server can be flooded with multiple requests
VNs and VNFs onto the network infrastructure in the dynamic (i.e., DDoS attack) which disrupt the QoS of cloudlet services.
framework. In general, each virtual resource or service slice Therefore, various security protocols need to be installed at
is embedded as a VM running on a server machine. With the the virtual controller for content filtering, authentication, load
increasing wireless traffic demand, the VM footprint would balancing, etc.
become too large and it would not be cost-efficient to deploy
VM per VN or VNF. Therefore, cost-effective approaches for VII. C ONCLUSION
the embedding process will need to be investigated.
The 5G cellular networks are envisioned to provide flex-
ibility, scalability, and reduced maintenance cost in network
E. Pricing Issues in Virtualization
operation and maintenance while guaranteeing very high data
The payment method for on-demand virtualized service pro- rate and low latency to users. It is expected that 5G/B5G
visioning needs further analyses within a dynamic framework. systems will adopt virtualization to design the network archi-
The online auction-based virtualization models consider the tecture operating on logically isolated virtual network slices
pay-as-you-go concept where the SPs or users pay according to and provide a wide variety of services on the same plat-
their usage. The payment price is generally determined based form. Wireless network virtualization supports the network
on VCG pricing. In some cases, the payments are determined sharing business models which can be represented as mod-
by learning game theoretic strategies that maximize users’ util- els to jointly achieve allocation and economic efficiency. In
ities. Efficient approaches need to be designed that benefit both this paper, we have focused on auction approaches in WNV
sellers and buyers in the auction model. To ensure that sell- to allow MVNOs or SPs to lease resources by submitting bids
ers get a minimum revenue from the auction and to avoid the on a common resource pool. The virtualization controller will
zero payment scenario some auction models consider reserve act as the auctioneer to allocate resource slices and collect
prices to avoid zero payment situation. Similarly, to guaran- payment for resource usage. We have discussed the basics of
tee that the buyers receive required level of service with their different auction models that are suitable for WNV. We have
limited budgets, the pricing model should also consider bud- reviewed the existing literature related to the auction-based
get constraints in the auction mechanism and analyze their virtualization models. We have outlined some open research
strategic behavior since they tend to cheat to avoid running challenges and future directions to implement network-wide
out of money. This is to be noted that designing a computa- and service-centric allocation of virtualized network resources
tionally efficient auction mechanism which is simultaneously and functionalities through the auction mechanism.
incentive compatible, individual rational and budget-balanced
is still considered as an open research problem.
The pricing scheme in the auction-based virtualization R EFERENCES
model should have the flexibility to adopt the competitions [1] E-UTRA and E-UTRAN; Overall Description; Stage 2, Release 11, 3GPP
among multiple sellers and multiple buyers. In the double auc- Standard TS 36.300 V11.5.0, 2013.
tion setting, participating sellers (e.g., InPs, MVNOs or SPs) [2] 3GPP Evolved Packet System (EPS); Evolved General Packet Radio
Service (GPRS) Tunnelling Protocol for Control Plane (GTPv2-C);
need to determine the ask bid in way that they can successfully Stage 3, Release 12, 3GPP Standard TS 29.274 version 12.6.0, 2014.
sell their resources or services with significant profit gain. In [3] X. Zhang and Q. Zhu, “Game-theory based power and spectrum virtu-
each round of online double auction model, the mechanism alization for optimizing spectrum efficiency in mobile cloud-computing
wireless networks,” IEEE Trans. Cloud Comput., to be published.
should also allow determining bidding strategies according
[4] S. M. A. Kazmi, N. H. Tran, T. M. Ho, and C. S. Hong, “Hierarchical
to the objectives of sellers and buyers and updating pay- matching game for service selection and resource purchasing in wire-
ment prices respectively. The computational complexity will less network virtualization,” IEEE Commun. Lett., vol. 22, no. 1,
increase further when the sellers and buyers need to determine pp. 121–124, Jan. 2017.
[5] J. Liu, W. Lu, F. Zhou, P. Lu, and Z. Zhu, “On dynamic service function
combinatorial bids over heterogeneous resources or services. chain deployment and readjustment,” IEEE Trans. Netw. Service Manag.,
vol. 14, no. 3, pp. 543–553, Sep. 2017.
F. Security Issues in Virtualization [6] Y. Zhang, S. Bi, and Y. J. A. Zhang, “A two-stage spectrum leasing
optimization framework for virtual mobile network operators,” in Proc.
In the SDN/NFV-based network architecture, security is IEEE Int. Conf. Commun. Syst. (ICCS), Shenzhen, China, Dec. 2016,
crucial issue in the virtualization model. The SDN-based pp. 1–6.
[7] T. Mano et al., “Efficient virtual network optimization across multiple
virtualization controller should provide a trusted encryption domains without revealing private information,” IEEE Trans. Netw.
platform for communication between InPs and MVNOs. The Service Manag., vol. 13, no. 3, pp. 477–488, Sep. 2016.
2292 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

[8] W. Xie, J. Zhu, C. Huang, M. Luo, and W. Chou, “Network virtualization [32] D. Zhang, Z. Chang, F. R. Yu, X. Chen, and T. Hämäläinen, “A double
with dynamic resource pooling and trading mechanism,” in Proc. IEEE auction mechanism for virtual resource allocation in SDN-based cellular
Glob. Commun. Conf., Austin, TX, USA, Dec. 2014, pp. 1829–1835. network,” in Proc. IEEE 27th Annu. Int. Symp. Pers. Indoor Mobile
[9] V. Jumba, S. Parsaeefard, M. Derakhshani, and T. Le-Ngoc, “Resource Radio Commun. (PIMRC), Valencia, Spain, Sep. 2016, pp. 1–6.
provisioning in wireless virtualized networks via massive-MIMO,” IEEE [33] K. Zhu and E. Hossain, “Virtualization of 5G cellular networks as a hier-
Wireless Commun. Lett., vol. 4, no. 3, pp. 237–240, Jun. 2015. archical combinatorial auction,” IEEE Trans. Mobile Comput., vol. 15,
[10] P. Zhang, H. Yao, and Y. Liu, “Virtual network embedding based on no. 10, pp. 2640–2654, Oct. 2016.
computing, network and storage resource constraints,” IEEE Internet [34] K. Zhu, Z. Cheng, B. Chen, and R. Wang, “Wireless virtualization as
Things J., to be published. a hierarchical combinatorial auction: An illustrative example,” in Proc.
[11] M. Jiang, M. Condoluci, and T. Mahmoodi, “Network slicing in 5G: An IEEE Wireless Commun. Netw. Conf. (WCNC), San Francisco, CA, USA,
auction-based model,” in Proc. IEEE Int. Conf. Commun., Paris, France, Mar. 2017, pp. 1–6.
2017, pp. 1–6. [35] S. Gu, Z. Li, C. Wu, and C. Huang, “An efficient auction mechanism
[12] Y. Zhang, D. Niyato, P. Wang, and E. Hossain, “Auction-based resource for service chains in the NFV market,” in Proc. IEEE 35th Annu. IEEE
allocation in cognitive radio systems,” IEEE Commun. Mag., vol. 50, Int. Conf. Comput. Commun. (INFOCOM), San Francisco, CA, USA,
no. 11, pp. 108–120, Nov. 2012. Apr. 2016, pp. 1–9.
[13] Y. Zhang, C. Lee, D. Niyato, and P. Wang, “Auction approaches for [36] X. Zhang, Z. Huang, C. Wu, Z. Li, and F. C. M. Lau, “Online stochastic
resource allocation in wireless systems: A survey,” IEEE Commun. buy-sell mechanism for VNF chains in the NFV market,” IEEE J. Sel.
Surveys Tuts., vol. 15, no. 3, pp. 1020–1041, 3rd Quart., 2013. Areas Commun., vol. 35, no. 2, pp. 392–406, Feb. 2017.
[14] V.-G. Nguyen, A. Brunstrom, K.-J. Grinnemo, and J. Taheri, “SDN/NFV- [37] M. Obadia, M. Bouet, V. Conan, L. Iannone, and J.-L. Rougier, “Elastic
based mobile packet core network architectures: A survey,” IEEE network service provisioning with VNF auctioning,” in Proc. 28th
Commun. Surveys Tuts., vol. 19, no. 3, pp. 1567–1602, 3rd Quart., 2017. Int. Teletraffic Congr. (ITC), vol. 1. Würzburg, Germany, Sep. 2016,
[15] C. Liang and F. R. Yu, “Wireless network virtualization: A survey, some pp. 340–348.
research issues and challenges,” IEEE Commun. Surveys Tuts., vol. 17, [38] S. Gu, Z. Li, C. Wu, and H. Zhang, “Virtualized resource sharing in
no. 1, pp. 358–380, 1st Quart., 2015. cloud radio access networks through truthful mechanisms,” IEEE Trans.
Commun., vol. 65, no. 3, pp. 1105–1118, Mar. 2017.
[16] J. van de Belt, H. Ahmadi, and L. E. Doyle, “Defining and surveying
wireless link virtualization and wireless network virtualization,” IEEE [39] M. Morcos, T. Chahed, L. Chen, J. Elias, and F. Martignon, “A
Commun. Surveys Tuts., vol. 19, no. 3, pp. 1603–1627, 3rd Quart., 2017. two-level auction for C-RAN resource allocation,” in Proc. IEEE Int.
Conf. Commun. Workshops (ICC Workshops), Paris, France, May 2017,
[17] M. Richart, J. Baliosian, J. Serrat, and J.-L. Gorricho, “Resource slic-
pp. 516–521.
ing in virtual wireless networks: A survey,” IEEE Trans. Netw. Service
[40] X. Zhang, Z. Huang, C. Wu, Z. Li, and F. C. M. Lau, “Online auc-
Manag., vol. 13, no. 3, pp. 462–476, Sep. 2016.
tions in IaaS clouds: Welfare and profit maximization with server costs,”
[18] A. Blenk, A. Basta, M. Reisslein, and W. Kellerer, “Survey on
IEEE/ACM Trans. Netw., vol. 25, no. 2, pp. 1034–1047, Apr. 2017.
network virtualization hypervisors for software defined networking,”
[41] J. Wang, D. Yang, J. Tang, and M. C. Gursoy, “Enabling radio-as-
IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 655–685, 1st Quart.,
a-service with truthful auction mechanisms,” IEEE Trans. Wireless
2016.
Commun., vol. 16, no. 4, pp. 2340–2349, Apr. 2017.
[19] Y. Li and M. Chen, “Software-defined network function virtualization:
[42] R. Mijumbi et al., “Network function virtualization: State-of-the-art
A survey,” IEEE Access, vol. 3, pp. 2542–2553, 2015.
and research challenges,” IEEE Commun. Surveys Tuts., vol. 18, no. 1,
[20] F. Fu and U. C. Kozat, “Wireless network virtualization as a sequential pp. 236–262, 1st Quart., 2016.
auction game,” in Proc. Proc. IEEE INFOCOM, San Diego, CA, USA, [43] R. Sherwood et al., “FlowVisor: A network virtualization layer,”
Mar. 2010, pp. 1–9. OpenFlow Consortium, Palo Alto, CA, USA, Rep. OPENFLOW-TR-
[21] F. Fu and U. C. Kozat, “Stochastic game for wireless network virtual- 2009-1, 2009.
ization,” IEEE/ACM Trans. Netw., vol. 21, no. 1, pp. 84–97, Feb. 2013. [44] L. E. Li, Z. M. Mao, and J. Rexford, “CellSDN: Software-defined cellu-
[22] X. Lv, A. Xiong, S. Zhang, and X.-S. Qiu, “VCG-based bandwidth allo- lar networks,” Dept. Comput. Sci., Princeton Univ., Princeton, NJ, USA,
cation scheme for network virtualization,” in Proc. IEEE Symp. Comput. Rep. TR-922-12, 2012.
Commun. (ISCC), Jul. 2012, pp. 744–749. [45] S. Katti and L. E. Li, “RadioVisor: A slicing plane for radio access
[23] D. Chen, Z. Qu, S. Zhang, X.-S. Qiu, and A. Xiong, “Novel mechanism networks,” in Proc. USENIX ONS, 2014, pp. 237–238.
for bandwidth reuse in network virtualization,” in Proc. IEEE Symp. [46] V.-G. Nguyen and Y. H. Kim, “Slicing the next mobile packet core
Comput. Commun. (ISCC), Jul. 2012, pp. 765–769. network,” in Proc. IEEE Int. Symp. Wireless Commun. Syst. (ISWCS),
[24] A. Jarray and A. Karmouch, “Decomposition approaches for virtual Barcelona, Spain, 2014, pp. 901–904.
network embedding with one-shot node and link mapping,” IEEE/ACM [47] J. Heinonen et al., “Dynamic tunnel switching for SDN-based
Trans. Netw., vol. 23, no. 3, pp. 1012–1025, Jun. 2015. cellular core networks,” in Proc. 4th Workshop All Things Cell.
[25] F. Esposito, D. D. Paola, and I. Matta, “On distributed virtual network Oper. Appl. Challenges (AllThingsCellular), Chicago, IL, USA, 2014,
embedding with guarantees,” IEEE/ACM Trans. Netw., vol. 24, no. 1, pp. 27–32. [Online]. Available: http://doi.acm.org.uml.idm.oclc.org/
pp. 569–582, Feb. 2016. 10.1145/2627585.2627587
[26] F.-E. Zaheer, J. Xiao, and R. Boutaba, “Multi-provider service negoti- [48] S. Parsons, J. A. Rodriguez-Aguilar, and M. Klein, “Auctions and bid-
ation and contracting in network virtualization,” in Proc. IEEE Netw. ding: A guide for computer scientists,” ACM Comput. Surveys, vol. 43,
Oper. Manag. Symp. (NOMS), Osaka, Japan, Apr. 2010, pp. 471–478. no. 10, pp. 1–59, Feb. 2011.
[27] L. Gao, P. Li, Z. Pan, N. Liu, and X. You, “Virtualization framework and [49] W. Vickrey, “Counterspeculation, auctions, and competitive sealed ten-
VCG based resource block allocation scheme for LTE virtualization,” in ders,” J. Financ., vol. 16, no. 1, pp. 8–37, Mar. 1961.
Proc. IEEE 83rd Veh. Technol. Conf. (VTC Spring), Nanjing, China, [50] E. H. Clarke, “Multipart pricing of public goods,” Public Choice, vol. 11,
May 2016, pp. 1–6. no. 1, pp. 17–33, 1971.
[28] B. Fan, H. Tian, and B. Liu, “Game theory based power allocation in [51] T. Groves, “Incentives in teams,” Econometrica, vol. 41, no. 4,
LTE air interface virtualization,” in Proc. IEEE Wireless Commun. Netw. pp. 617–631, 1973.
Conf. (WCNC), New Orleans, LA, USA, Mar. 2015, pp. 972–976. [52] M. Bichler, “Combinatorial auctions: Complexity and algorithms,” in
[29] B. Cao, W. Lang, Y. Li, Z. Chen, and H. Wang, “Power allocation in Wiley Encyclopedia of Operations Research and Management Science.
wireless network virtualization with buyer/seller and auction game,” in Hoboken, NJ, USA: Wiley, 2011.
Proc. IEEE Glob. Commun. Conf. (GLOBECOM), San Diego, CA, USA, [53] L. M. Ausubel, “An efficient ascending-bid auction for multiple objects,”
Dec. 2015, pp. 1–6. Amer. Econ. Rev., vol. 94, no. 5, pp. 1452–1475, 2004.
[30] H. Ahmadi, I. Macaluso, I. Gomez, L. DaSilva, and L. Doyle, [54] V. Krishna, Auction Theory. San Diego, CA, USA: Academic Press,
“Virtualization of spatial streams for enhanced spectrum sharing,” in 2002.
Proc. IEEE Glob. Commun. Conf. (GLOBECOM), Washington, DC, [55] N. Nisan, “Bidding and allocation in combinatorial auctions,” in
USA, Dec. 2016, pp. 1–6. Proc. ACM Conf. Electron. Commerce, Minneapolis, MN, USA, 2000,
[31] Q. Zhu and X. Zhang, “Effective-capacity based gaming for optimal pp. 1–12.
power and spectrum allocations over big-data virtual wireless networks,” [56] N. Nisan, “Bidding languages,” in Combinatorial Auctions, P. Cramton,
in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), San Diego, CA, Y. Shoham, and R. Steinberg, Eds. Boston, MA, USA: MIT Press, 2006,
USA, Dec. 2015, pp. 1–6. ch. 9, pp. 400–415.
HABIBA AND HOSSAIN: AUCTION MECHANISMS FOR VIRTUALIZATION IN 5G CELLULAR NETWORKS 2293

[57] S. Park and M. H. Rothkopf, “Auctions with bidder-determined allow- Ummy Habiba received the B.Sc. degree in elec-
able combinations,” Eur. J. Oper. Res., vol. 161, no. 2, pp. 399–415, tronics and telecommunications engineering from
2005. North South University, Bangladesh, in 2010 and
[58] T. Kelly, “Generalized knapsack solvers for multi-unit combinatorial the M.Sc. degree in telecommunication engineering
auctions: Analysis and application to computational resource allocation,” from East West University, Bangladesh, in 2012. She
Hewlett Packard Lab., Palo Alto, CA, USA, Rep. HPL-2004-21, 2004. is currently pursuing the Ph.D. degree in telecom-
[59] N. Nisan and A. Ronen, “Computationally feasible VCG mechanisms,” munications engineering from the University of
J. Artif. Intell. Res., vol. 29, pp. 19–47, May 2007. Manitoba, Canada. Her research interests include
[60] R. B. Myerson, “Optimal auction design,” Math. Oper. Res., vol. 6, no. 1, resource allocation in 5G and beyond 5G networks,
pp. 58–73, 1981. wireless network virtualization of infrastructure, and
[61] M. H. Rothkopf, “Thirteen reasons why the Vickrey–Clarke-groves wireless resources. Her current focus is on auction
process is not practical,” Oper. Res., vol. 55, no. 2, pp. 191–197, mechanism design for spectrum and infrastructure sharing, mobile edge com-
Apr. 2007. puting, and software-defined networks. She was a recipient of Gold Medal
[62] P. Dütting, M. Henzinger, and M. Starnberger, “Auctions for hetero- for obtaining the highest CGPA in the M.Sc. program and the University of
geneous items and budget limits,” ACM Trans. Econ. Comput., vol. 4, Manitoba Graduate Fellowship for the Ph.D. program.
no. 1, pp. 1–17, Dec. 2015.
[63] S. V. Hoesel and R. Müller, “Optimization in electronic markets:
Examples in combinatorial auctions,” Netnomics, vol. 3, no. 1,
pp. 23–33, Jun. 2001.
[64] M. H. Rothkopf, A. Pekeč, and R. M. Harstad, “Computationally
manageable combinatorial auctions,” Manag. Sci., vol. 44, no. 8,
pp. 1131–1147, 1998.
[65] S. de Vries and R. V. Vohra, “Combinatorial auctions: A survey,” Informs
J. Comput., vol. 15, no. 3, pp. 284–309, 2003.
[66] T. Sandholm, S. Suri, A. Gilpin, and D. Levine, “CABOB: A fast
optimal algorithm for combinatorial auctions,” in Proc. IJCAI, 2001,
pp. 1102–1108.
[67] T. Sandholm, “eMediator: A next generation electronic commerce
server,” in Proc. 4th Int. Conf. Auton. Agents (AGENTS), Barcelona,
Spain, 2000, pp. 73–96.
[68] D. Lehmann, L. I. OiCallaghan, and Y. Shoham, “Truth revelation
in approximately efficient combinatorial auctions,” J. Assoc. Comput.
Mach., vol. 49, no. 5, pp. 577–602, 2002.
[69] R. Lavi and C. Swamy, “Truthful and near-optimal mechanism design Ekram Hossain (F’15) received the Ph.D. degree
via linear programming,” in Proc. 46th Annu. IEEE Symp. Found. in electrical engineering from the University of
Comput. Sci., Pittsburgh, PA, USA, 2005, pp. 595–604. Victoria, Canada, in 2001. He is a Professor with the
[70] H. Kellerer, U. Pferschy, and D. Pisinger, Knapsack Problems. Department of Electrical and Computer Engineering,
Heidelberg, Germany: Springer, 2004. University of Manitoba, Winnipeg, Canada. He is a
[71] T. S. Ferguson. Optimal Stopping and Applications. member (Class of 2016) of the College of the Royal
Accessed: Mar. 9, 2018. [Online]. Available: Society of Canada. His current research interests
http://www.math.ucla.edu/ tom/Stopping/Contents.html include design, analysis, and optimization of wire-
[72] M. T. Hajiaghayi, R. Kleinberg, and T. Sandholm, “Automated online less/mobile communication networks, cognitive and
mechanism design and prophet inequalities,” in Proc. AAAI, Vancouver, green radio systems, and network economics. He
BC, Canada, 2007, pp. 58–65. has authored/edited several books in the above
[73] D. C. Parkes, “Iterative combinatorial auctions,” in Combinatorial areas (http://home.cc.umanitoba.ca/∼hossaina). He has been the Editor-in-
Auctions, Y. S. P. Cramton and R. Steinberg, Eds. Boston, MA, USA: Chief of the IEEE Press since 2018. He serves as an Editor of IEEE
MIT Press, 2006, ch. 2, pp. 96–149. W IRELESS C OMMUNICATIONS. He served as the Editor-in-Chief of the IEEE
[74] D. C. Parkes and L. H. Ungar, “Iterative combinatorial auctions: Theory C OMMUNICATIONS S URVEYS AND T UTORIALS from 2012 to 2016, an Area
and practice,” in Proc. 17th Nat. Conf. Artif. Intell. (AAAI), 2000, Editor of the IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS in
pp. 74–81. the area of “Resource Management and Multiple Access” from 2009 to
[75] S. P. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, 2011, an Editor of the IEEE T RANSACTIONS ON M OBILE C OMPUTING
USA: Cambridge Univ. Press, 2004. from 2007 to 2012, and an Editor of the IEEE J OURNAL ON S ELECTED
[76] E. Kutanoglu and S. D. Wu, “On combinatorial auction and Lagrangean A REAS IN C OMMUNICATIONS -C OGNITIVE R ADIO S ERIES from 2011 to
relaxation for distributed resource scheduling,” IIE Trans., vol. 31, no. 9, 2014. He was a recipient of several research awards including the 2017
pp. 813–826, 1999. IEEE Communications Society Best Survey Paper Award, IEEE Vehicular
[77] J. D. Hartline, “Bayesian mechanism design,” Found. TrendsTheor. R Technology Conference (VTC-Fall 2016) Best Student Paper Award as a co-
Comput. Sci., vol. 8, no. 3, pp. 143–263, 2013. author, the IEEE Communications Society Transmission, Access, and Optical
[78] N. Andelman and Y. Mansour, “Auctions with budget constraints,” in Systems Technical Committee’s Best Paper Award in IEEE Globecom 2015,
Proc. 9th Scandinavian Workshop Algorithm Theory (SWAT), 2004, the University of Manitoba Merit Award in 2010, 2014, and 2015 (for
pp. 26–38. Research and Scholarly Activities), the 2011 IEEE Communications Society
[79] J.-P. Benoît and V. Krishna, “Multiple-object auctions with budget Fred Ellersick Prize Paper Award, the IEEE Wireless Communications and
constrained bidders,” Rev. Econ. Stud., vol. 68, no. 1, pp. 155–179, 2001. Networking Conference 2012 (WCNC’12) Best Paper Award, the 2017 IEEE
[80] S. Bhattacharya, G. Goel, S. Gollapudi, and K. Munagala, “Budget- Communications Society Technical Committee on Green Communications
constrained auctions with heterogeneous items,” Theory Comput., vol. 8, and Computing Distinguished Technical Achievement Recognition Award for
pp. 429–460, Sep. 2012. outstanding technical leadership and achievement in green wireless commu-
[81] D. Zhang, Z. Chang, T. Hämäläinen, and F. R. Yu, “Double auc- nications and networking, and he was listed as a 2017 Clarivate Analytics
tion based multi-flow transmission in software-defined and virtualized highly cited researcher. He was elevated to an IEEE Fellow “for spec-
wireless networks,” IEEE Trans. Wireless Commun., vol. 16, no. 12, trum management and resource allocation in cognitive and cellular radio
pp. 8390–8404, Dec. 2017. networks.” He is an elected Member of the Board of Governors of the IEEE
[82] N. R. Devanur and Z. Huang, “Primal dual gives almost optimal energy Communications Society for the term 2018–2020. He was a Distinguished
efficient online algorithms,” in Proc. 25th Annu. ACM SIAM Symp. Discr. Lecturer of the IEEE Communications Society from 2012 to 2015. He is cur-
Algorithms (SODA), Portland, OR, USA, 2014, pp. 1123–1140. [Online]. rently a Distinguished Lecturer of the IEEE Vehicular Technology Society. He
Available: http://dl.acm.org/citation.cfm?id=2634074.2634157 is a registered Professional Engineer in the province of Manitoba, Canada.

You might also like