Data networks (2nd ed.)
ALOHA packet system with and without slots and capture
ACM SIGCOMM Computer Communication Review
Slotted Aloha as a game with partial information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
An analysis of generalized slotted-Aloha protocols
IEEE/ACM Transactions on Networking (TON)
Repeated open spectrum sharing game with cheat-proof strategies
IEEE Transactions on Wireless Communications
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Stackelberg contention games in multiuser networks
EURASIP Journal on Advances in Signal Processing - Special issue on game theory in signal processing and communications
Random access game and medium access control design
IEEE/ACM Transactions on Networking (TON)
Medium access control protocols with memory
IEEE/ACM Transactions on Networking (TON)
Performance analysis of the IEEE 802.11 distributed coordination function
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Distributed medium access control (MAC) protocols are essential for the proliferation of low-cost, decentralized wireless local area networks (WLANs). Most MAC protocols are designed with the presumption that nodes comply with prescribed rules. However, selfish nodes have natural motives to manipulate protocols in order to improve their own performance. This often degrades the performance of other nodes as well as that of the overall system. In this paper, we propose a class of protocols that limit the performance gain from selfish manipulation while incurring only a small efficiency loss. The proposed protocols are based on the idea of a review strategy, with which nodes collect signals about the actions of other nodes over a period of time, use a statistical test to infer whether or not other nodes are following the prescribed behavior, and trigger a punishment if a deviation is inferred. We consider the cases of private and public signals and provide analytical and numerical results to demonstrate the properties of the proposed protocols.