DOI QR코드

DOI QR Code

Stability of Slotted Aloha with Selfish Users under Delay Constraint

  • Chin, Chang-Ho (Department of Industrial & Management Systems Engineering, Kyung Hee University) ;
  • Kim, Jeong-Geun (Department of Electrical Engineering, Kyung Hee University) ;
  • Lee, Deok-Joo (Department of Industrial & Management Systems Engineering, Kyung Hee University)
  • Received : 2010.09.29
  • Accepted : 2011.01.11
  • Published : 2011.03.31

Abstract

Most game-theoretic works of Aloha have emphasized investigating Nash equilibria according to the system state represented by the number of network users and their decisions. In contrast, we focus on the possible change of nodes' utility state represented by delay constraint and decreasing utility over time. These foregone changes of nodes' state are more likely to instigate selfish behaviors in networking environments. For such environment, in this paper, we propose a repeated Bayesian slotted Aloha game model to analyze the selfish behavior of impatient users. We prove the existence of Nash equilibrium mathematically and empirically. The proposed model enables any type of transmission probability sequence to achieve Nash equilibrium without degrading its optimal throughput. Those Nash equilibria can be used as a solution concept to thwart the selfish behaviors of nodes and ensure the system stability.

Keywords

References

  1. N. Abramson, "The Aloha system: another alternative for computer communications," in Proc. of AFIPS, vol. 36, pp. 295-298, Nov. 17-19, 1970.
  2. A. B. MacKenzie and S. B. Wicker, "Selfish users in aloha: A game theoretic approach," in Proc. of the Fall 2001 IEEE Vehicular Technology Conference (VTC Fall '01), pp. 1354-1357, Oct. 2001.
  3. A. B. MacKenzie and S. B. Wicker, "Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information," in Proc. of IEEE Conference on Computer Communications (INFOCOM), pp.1583-1590, Apr. 1-3, 2003.
  4. E. Altman, R. E. Azouzi and T. Jimnez, "Slotted Aloha as a game with partial information," The International Journal of Computer and Telecommunications Networking, vol. 45, no 6, pp. 701-713, 2004.
  5. Y. Cho, C. S. Hwang and F. A. Tobagi, "Design of Robust Random Access Protocols For Wireless Networks using Game Theoretic Models," in Proc. of IEEE INFOCOM, pp. 1750-1758, Apr. 13-18, 2008.
  6. L. Zhao, J. Zhang, K. Yang and H. Zhang, "Using incompletely cooperative game theory in mobile ad hoc networks," in Proc. IEEE International Conference on Communications (ICC '07), pp. 3401-3406, June 2007.
  7. R. T. B. Ma, V. Misra and D. Rubenstein, "An Analysis of Generalized Slotted-Aloha Protocols," IEEE/ACM Transactions on Networking, pp. 936-949, June 2009.
  8. T. Cui, L. Chen and S. Low, "A game-theoretic framework for medium access control," IEEE Journal on Selected Areas in Communications, vol. 26, no. 7, pp. 1116-1127, Sep. 2008. https://doi.org/10.1109/JSAC.2008.080909
  9. L. Chen, S. Low and J. Doyle, "Random Access Game and Medium Access Control Design," IEEE/ACM Transactions on Networking, vol. 17, no. 3, pp. 1303-1316, 2010.
  10. H. Inaltekin and S. Wicker, "The analysis of Nash equilibria of the one- shot random-access game for wireless networks and the behavior of selfish nodes," IEEE/ACM Transactions on Networking, vol. 16, no. 5, pp. 1094-1107, Oct. 2008. https://doi.org/10.1109/TNET.2007.909668
  11. Y. Jin and G. Kesidis, "Equilibria of a Noncooperative Game for Heterogeneous Users of an ALOHA Network," IEEE Communications Letters, vol. 6, no. 7, pp.282-284, July 2002. https://doi.org/10.1109/LCOMM.2002.801326
  12. H. Inaltekin and S. Wicker, "The analysis of Nash equilibria of the one- shot random-access game for wireless networks and the behavior of selfish nodes," IEEE/ACM Transactions on Networking, vol. 16, no. 5, pp. 1094-1107, Oct. 2008.
  13. H. Lee, H. Kwon, A. Motskin and L. Guibas, "Interference-aware MAC protocol for wireless networks by a game-theoretic approach," in Proc. 28th IEEE Conference on Computer Communications (INFOCOM '09), pp. 1854-1862, Apr. 2009.
  14. J. Lee, A. Tang, J. Huang, M. Chiang and A. R. Calderbank, "Reverse-engineering mac: A non-cooperative game model," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1135-1147, Aug. 2007. https://doi.org/10.1109/JSAC.2007.070808
  15. Y. Jin and G. Kesidis, "Distributed contention window control for selfish users in IEEE 802.11 wireless LANs," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1113-1123, Aug. 2007. https://doi.org/10.1109/JSAC.2007.070806
  16. J. Konorski, "A game-theoretic study of CSMA/CA under a backoff attack," IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1167-1178, Dec. 2006. https://doi.org/10.1109/TNET.2006.886298
  17. J. Lee, A. Tang, J. Huang, M. Chiang and A. R. Calderbank, "Reverse-engineering mac: A non-cooperative game model," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1135-1147, Aug. 2007.
  18. Y. Jin and G. Kesidis, "Distributed contention window control for selfish users in IEEE 802.11 wireless LANs," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1113-1123, Aug. 2007.
  19. L. Zhao, J. Zhang and H. Zhang, "GDCF: game-theoretic distributed co-ordination function in WLANs," Electronics Letters, vol. 43, no. 9, pp. 510-511, Apr. 2007. https://doi.org/10.1049/el:20070653
  20. L. Zhao, J. Zhang and H. Zhang, "Using incompletely cooperative game theory in wireless mesh networks," IEEE/ACM Transactions on Networking, vol. 22, no. 1, pp. 39-44, Jan. - Feb. 2008.
  21. M. H. Ngo and V. Krishnamurthy, "Game theoretic cross-layer trans-mission policies in multipacket reception wireless networks," IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 1911-1926, May 2007. https://doi.org/10.1109/TSP.2006.889403
  22. K. Park, J. C. Hou, T. Basar and H. Kim, "Noncooperative Carrier Sense Game in Wireless Networks," IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5280--5289, 2009. https://doi.org/10.1109/TWC.2009.081582
  23. D. Fudenberg and J. Tirole, Game Theory, the MIT Press, 1991.
  24. C. Chin, "Slotted Aloha with time-variant transmission probabilities," to be submitted, 2011.
  25. J. F. Nash, "Equilibrium points in n-person games," in Proc. of the National Academy of Sciences of the United States of America, vol. 36, no. 1, pp.48-49, Jan. 1950.
  26. A. B. MacKenzie and L. A. DaSilva, "Game Theory for Wireless Engineers," San Rafael, California: Morgan & Claypool Publishers, 2006.

Cited by

  1. Selfish attacks and detection in cognitive radio Ad-Hoc networks vol.27, pp.3, 2013, https://doi.org/10.1109/mnet.2013.6523808