Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
Proceedings of the 9th annual international conference on Mobile computing and networking
IEEE Transactions on Mobile Computing
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Research advances in cognitive ultra wide band radio and their application to sensor networks
Mobile Networks and Applications
Non-cooperative games for service differentiation in CDMA systems
Mobile Networks and Applications
A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
A game-theoretic study of CSMA/CA under a backoff attack
IEEE/ACM Transactions on Networking (TON)
Antenna tilt control in CDMA networks
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
A game-theoretic look at simple relay channel
Wireless Networks
A station strategy to deter backoff attacks in IEEE 802.11 LANs
Journal of Discrete Algorithms
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Capacity and fairness of an ad hoc IEEE 802.11 cell with sophisticated noncooperative stations
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Cooperation in ad hoc networks with noisy channels
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
On the uniqueness of Nash equilibrium in ALOHA games with group of selfish users
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
Local information busy burst thresholding
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detecting greedy behaviors by linear regression in wireless ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A survey on game theory applications in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A channel-change game for multiple interfering cognitive wireless networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Fuzzy-based load self-configuration in mobile P2P services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Decentralized activation in sensor networks - global games and adaptive filtering games
Digital Signal Processing
Mobile Networks and Applications
Playing CSMA/CA game to deter backoff attacks in ad hoc wireless LANs
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Grouping nodes in wireless sensor networks using coalitional game theory
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
A cooperative differential game model based on transmission rate in wireless networks
Operations Research Letters
Self-configuration in MANETs: different perspectives
IWSOS'07 Proceedings of the Second international conference on Self-Organizing Systems
PRALINE: a tool for computing nash equilibria in concurrent games
CAV'13 Proceedings of the 25th international conference on Computer Aided Verification
Hi-index | 0.25 |
Game theory provides a wealth of tools that can be applied to the design and operation of communications systems. In this article, we provide a brief introduction to game theory. We then present applications of game theory to problems in random access and power control. In the case of random access, we examine the behavior of selfish users in a simplified Aloha system; surprisingly, rational selfish users do not implement the “always transmit” strategy that one might expect. In the case of power control, we show that game theoretic techniques can yield an optimal operating point without the intervention of an external controller