An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol

被引:0
作者
Boyer, Stéphane [1 ]
Robert, Jean-Marc [1 ]
Otrok, Hadi [2 ]
Rousseau, Clément [1 ]
机构
[1] Département de Génie Logiciel et des TI, École de Technologie Supérieure (ÉTS), Montréal, QC
[2] Department of Electrical and Computer Engineering, Khalifa University of Science, Technology and Research (KUSTAR), Abu Dhabi
关键词
802.11; CSMA/CA; Cooperation; Reputation systems; Selfish behaviour; Tit-for-tat strategies;
D O I
10.1504/IJSN.2012.050026
中图分类号
学科分类号
摘要
In non-cooperative environments, selfish nodes can take advantage of the mechanisms in place to obtain unfair shares of the network resources. Unfortunately, they may impact the performance of the other nodes. Our objective is to propose a novel IEEE 802.11 medium access control protocol, which can fairly share the resources among cooperative nodes but can retaliate if some selfish ones are present. We first show that the classical jamming method is inappropriate. We then present a novel game theoretical strategy designed to cope with the shortterm unfairness of resource sharing. Our reputation-based tit-for-tat mechanism is immune to infrequent misclassification errors and motivates rational selfish nodes to cooperate. It depends on the observation of the nodes' behaviour. If any node misbehaves, the monitoring nodes should adapt and behave themselves selfishly. Thus, rational nodes should not have any other choice than to follow the legitimate behaviour in order to maximise their payoff. Copyright © 2012 Inderscience Enterprises Ltd.
引用
收藏
页码:95 / 106
页数:11
相关论文
共 25 条
[1]  
Axelrod R., The Evolution of Cooperation, Revised Edition, (2006)
[2]  
Bianchi G., Performance analysis of the IEEE 802.11 distributed coordination function, IEEE Journal on Selected Areas in Communications, 18, pp. 535-547, (2000)
[3]  
Cagalj M., Ganeriwal S., Aad I., Hubaux J.-P., On selfish behavior in CSMA/CA networks, Proceedings - IEEE INFOCOM, 4, pp. 2513-2524, (2005)
[4]  
Cali F., Conti M., Gregori E., IEEE 802.11 protocol: Design and performance evaluation of an adaptive backoff mechanism, IEEE Journal on Selected Areas in Communications, 180, 9, pp. 1774-1786, (2000)
[5]  
Cardenas A.A., Radosavac S., Baras J.S., Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments, IEEE/ACM Transactions on Networking, 17, pp. 605-617, (2009)
[6]  
Cui T., Chen L., Low S., A game-theoretic framework for medium access control, IEEE Journal on Selected Areas in Communications, 26, pp. 1116-1127, (2008)
[7]  
Felegyhazi M., Hubaux J.-P., Game Theory in Wireless Networks: A Tutorial, (2006)
[8]  
Fudenberg D., Tirole J., Game Theory, (1991)
[9]  
Ganchev A., Narayanan L., Selfishness detection for backoff algorithms in wireless networks, Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 517-524, (2011)
[10]  
Hamburger H., N-person prisoner's dilemma, Journal of Mathematical Sociology, 3, pp. 27-48, (1973)