Game Theoretic Design of MAC Protocols: Pricing and Intervention in Slotted-Aloha

被引:0
作者
Canzian, Luca [1 ]
Xiao, Yuanzhang [1 ]
Zorzi, Michele [2 ]
van der Schaar, Mihaela [1 ]
机构
[1] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
[2] Univ Padua, DEI, I-35131 Padua, Italy
来源
2013 51ST ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON) | 2013年
关键词
MAC protocols; Slotted-Aloha; Game Theory; Incentive schemes; Pricing; Intervention; Imperfect monitoring;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many wireless communication networks a common channel is shared by multiple users who must compete to gain access to it. The operation of the network by self-interested and strategic users usually leads to the overuse of the channel resources and to substantial inefficiencies. Hence, incentive schemes are needed to overcome the inefficiencies of non- cooperative equilibrium. In this work we consider a slottedAloha random access protocol and two incentive schemes: pricing and intervention. We provide some criteria for the designer of the protocol to choose one scheme between them and to design the best policy for the selected scheme, depending on the system parameters. Our results show that intervention can achieve the maximum efficiency in the perfect monitoring scenario. In the imperfect monitoring scenario, instead, there exists a threshold for the number of users such that, for a number of users lower than the threshold, intervention outperforms pricing, whereas, for a number of users higher than the threshold pricing outperforms intervention.
引用
收藏
页码:707 / 714
页数:8
相关论文
共 13 条
[1]  
[Anonymous], P IEEE GLOBECOM
[2]  
[Anonymous], P GAMENETS
[3]  
[Anonymous], TECHNICAL REPORT
[4]  
[Anonymous], P IEEE INFOCOM
[5]  
[Anonymous], P IEEE CISS
[6]  
Owen G., 2001, GAME THEORY
[7]   The Theory of Intervention Games for Resource Sharing in Wireless Communications [J].
Park, Jaeok ;
van der Schaar, Mihaela .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (01) :165-175
[8]  
Parkinson John, 2009, V533, P1, DOI 10.1007/978-1-60327-136-3_1
[9]   Packet-Hiding Methods for Preventing Selective Jamming Attacks [J].
Proano, Alejandro ;
Lazos, Loukas .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) :101-114
[10]  
Thuente DJ, 2006, MILCOM 2006, VOLS 1-7, P3302