Near-Optimal Deviation-Proof Medium Access Control Designs in Wireless Networks

Distributed medium access control (MAC) protocols are essential for the proliferation of low-cost, decentralized wireless local area networks (WLANs). Most MAC protocols are designed with the presumption that nodes comply with prescribed rules. However, selfish nodes have natural motives to manipulate protocols in order to improve their own performance. This often degrades the performance of other nodes as well as that of the overall system. In this paper, we propose a class of protocols that limit the performance gain from selfish manipulation while incurring only a small efficiency loss. The proposed protocols are based on the idea of a review strategy, with which nodes collect signals about the actions of other nodes over a period of time, use a statistical test to infer whether or not other nodes are following the prescribed behavior, and trigger a punishment if a deviation is inferred. We consider the cases of private and public signals and provide analytical and numerical results to demonstrate the properties of the proposed protocols.

[1]  Richard T. B. Ma,et al.  An Analysis of Generalized Slotted-Aloha Protocols , 2009, IEEE/ACM Transactions on Networking.

[2]  Mihaela van der Schaar,et al.  Stackelberg Contention Games in Multiuser Networks , 2008, EURASIP J. Adv. Signal Process..

[3]  Michihiro Kandori,et al.  Introduction to Repeated Games with Private Monitoring , 2002, J. Econ. Theory.

[4]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[5]  Mihaela van der Schaar,et al.  Medium Access Control Protocols With Memory , 2009, IEEE/ACM Transactions on Networking.

[6]  Bernhard Walke,et al.  IEEE 802.11s: The WLAN Mesh Standard , 2010, IEEE Wireless Communications.

[7]  Essaid Sabir,et al.  Cooperative and non-cooperative control for slotted aloha with random power level selections algorithms , 2007, ValueTools '07.

[8]  Zhu Han,et al.  Cooperation enforcement and learning for optimizing packet forwarding in autonomous wireless networks , 2008, IEEE Transactions on Wireless Communications.

[9]  Bruce Hajek,et al.  Decentralized dynamic control of a multiaccess broadcast channel , 1982 .

[10]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[11]  Richard J. La,et al.  Optimal routing control: repeated game approach , 2002, IEEE Trans. Autom. Control..

[12]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[13]  Stephen B. Wicker,et al.  Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Lawrence G. Roberts,et al.  ALOHA packet system with and without slots and capture , 1975, CCRV.

[15]  J. Norris Appendix: probability and measure , 1997 .

[16]  Dusit Niyato,et al.  Competitive Pricing for Spectrum Sharing in Cognitive Radio Networks: Dynamic Game, Inefficiency of Nash Equilibrium, and Collusion , 2008, IEEE Journal on Selected Areas in Communications.

[17]  G. Mailath,et al.  Repeated Games and Reputations: Long-Run Relationships , 2006 .

[18]  R. Radner Repeated Partnership Games with Imperfect Monitoring and No Discounting , 1986 .

[19]  Dimitri P. Bertsekas,et al.  Data networks (2nd ed.) , 1992 .

[20]  John V. Guttag,et al.  The 802.11 MAC protocol leads to inefficient equilibria , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  George Kesidis,et al.  Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.

[22]  R. Radner Repeated Principal-Agent Games with Discounting , 1985 .

[23]  K. J. Ray Liu,et al.  Repeated open spectrum sharing game with cheat-proof strategies , 2009, IEEE Transactions on Wireless Communications.

[24]  James L. Massey,et al.  The collision channel without feedback , 1985, IEEE Trans. Inf. Theory.

[25]  Eitan Altman,et al.  Slotted Aloha as a game with partial information , 2004, Comput. Networks.

[26]  E. Kalai,et al.  Finite Rationality and Interpersonal Complexity in Repeated Games , 1988 .

[27]  Lijun Chen,et al.  Random Access Game and Medium Access Control Design , 2010, IEEE/ACM Transactions on Networking.

[28]  Anthony Ephremides,et al.  MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.

[29]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[30]  P. Samundiswary,et al.  Performance Analysis of IEEE 802 , 2013 .

[31]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[32]  Rutherford Aris,et al.  Discrete Dynamic Programming , 1965, The Mathematical Gazette.

[33]  El-Houssine Bouyakhf,et al.  Cooperative and non-cooperative control for slotted aloha with random power level selections algorithms , 2007, Valuetools 2007.