Game theoretic approach to medium access control in wireless networks

This paper proposes a game-theoretic random access model, compliant with the IEEE 802.11 standard, that can be integrated into the distributed coordination function (DCF). The objective is to design a game theoretic model that can potentially optimize throughput and fairness in each node independently and, therefore, minimise channel access delay. We propose a utility function, such that it can decouple the protocol's dynamic adaptation to channel load from collision detection. We demonstrate that our model can reach a Nash equilibrium that results in a relatively stable contention window, provided that a node adapts its behavior to the idle rate of the broadcast channel, coupled with observation of its own transmission activity. The simulation results show that this model is capable of achieving much higher throughput than the standard IEEE 802.11 DCF with absolutely better short-time fairness.

[1]  L. Kleinrock,et al.  Packet Switching in Radio Channels : Part Il-The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution , 2022 .

[2]  Chong-Ho Choi,et al.  Analysis of the IEEE 802.11 Back-Off Mechanism in Presence of Hidden Nodes , 2009, IEICE Trans. Commun..

[3]  Yongkang Xiao,et al.  Game theory models for IEEE 802.11 DCF in wireless ad hoc networks , 2005, IEEE Communications Magazine.

[4]  Anthony Ephremides,et al.  MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.

[5]  Thierry Turletti,et al.  Modeling and analysis of slow CW decrease IEEE 802.11 WLAN , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[6]  W. Marsden I and J , 2012 .

[7]  Sanjay Gupta,et al.  Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol , 1997, Wirel. Networks.

[8]  Jerzy Konorski A game-theoretic study of CSMA/CA under a backoff attack , 2006, TNET.

[9]  Ashok K. Agrawala,et al.  Sniffing out the correct physical layer capture model in 802.11b , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[10]  Fouad A. Tobagi,et al.  Cooperative and Non-Cooperative Aloha Games with Channel Capture , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[11]  Jennifer C. Hou,et al.  A Novel Approach to Contention Control in IEEE 802.11e-Operated WLANs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[12]  Fu-Yi Hung,et al.  Performance Modeling and Analysis of the IEEE 802.11 Distribution Coordination Function in Presence of Hidden Stations , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[13]  Anthony Ephremides,et al.  Power control and rate adaptation as stochastic games for random access , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[14]  Dina Katabi,et al.  Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.

[15]  Srihari Nelakuditi,et al.  CSMA/CN: Carrier Sense Multiple Access With Collision Notification , 2012, IEEE/ACM Transactions on Networking.

[16]  John S. Thompson,et al.  A New Approach for the Throughput Analysis of IEEE 802.11 in Networks with Hidden Terminals , 2005 .

[17]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[18]  Dimitri P. Bertsekas,et al.  Data Networks , 1986 .

[19]  P. Karn,et al.  MACA-a New Channel Access Method for Packet Radio , 1990 .

[20]  Pavan Nuggehalli,et al.  A Game-Theoretic Analysis of QoS in Wireless MAC , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[21]  Cristina Comaniciu,et al.  A Game-Theoretic Approach for Exploiting Multiuser Diversity in Cooperative Slotted Aloha , 2008, IEEE Transactions on Wireless Communications.

[22]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[23]  Hailin Zhang,et al.  Using Incompletely Cooperative Game Theory in Wireless Mesh Networks , 2008, IEEE Network.

[24]  Jean-Pierre Hubaux,et al.  Efficient MAC in cognitive radio systems: A game-theoretic approach , 2009, IEEE Transactions on Wireless Communications.

[25]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[26]  Leonidas J. Guibas,et al.  Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach , 2009, IEEE INFOCOM 2009.

[27]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[28]  David I. Laurenson,et al.  Revisiting the Hidden Terminal Problem in a CSMA/CA Wireless Network , 2008, IEEE Transactions on Mobile Computing.

[29]  R. Aumann Subjectivity and Correlation in Randomized Strategies , 1974 .

[30]  Dinan Gunawardena,et al.  Rethinking Indoor Wireless Mesh Design: Low Power, Low Frequency, Full-Duplex , 2010, 2010 Fifth IEEE Workshop on Wireless Mesh Networks.

[31]  Yu Wang,et al.  Performance of collision avoidance protocols in single-channel ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[32]  Luigi Fratta,et al.  Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.

[33]  Debdeep Chatterjee,et al.  Resource allocation and cooperative behavior in fading multiple-access channels under uncertainty , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[34]  Robert G. Sargent,et al.  Verification and validation of simulation models , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).

[35]  Lijun Chen,et al.  Contention control: A game-theoretic approach , 2007, 2007 46th IEEE Conference on Decision and Control.

[36]  Zhu Han,et al.  Wireless Access in Vehicular Environments Using BitTorrent and Bargaining , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[37]  Kwang-Cheng Chen,et al.  Interference analysis of nonpersistent CSMA with hidden terminals in multicell wireless data networks , 1995, Proceedings of 6th International Symposium on Personal, Indoor and Mobile Radio Communications.

[38]  Liqiang Zhao,et al.  A novel MAC scheme for wireless LANs from the perspective of game theory , 2007 .

[39]  Kwang-Cheng Chen,et al.  Performance analysis of IEEE 802.11 CSMA/CA medium access control protocol , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.

[40]  Dong In Kim,et al.  Game Theoretic Approaches for Multiple Access in Wireless Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.

[41]  David Wetherall,et al.  Taking the sting out of carrier sense: interference cancellation for wireless LANs , 2008, MobiCom '08.

[42]  Theodore Antonakopoulos,et al.  CSMA/CA performance under high traffic conditions: throughput and delay analysis , 2002, Comput. Commun..

[43]  Haitao Wu,et al.  WSN02-1: Analysis of IEEE 802.11 DCF with Hidden Terminals , 2006, IEEE Globecom 2006.

[44]  Allen B. MacKenzie,et al.  Game Theory for Wireless Engineers , 2006, Game Theory for Wireless Engineers.

[45]  Marco Conti,et al.  Runtime optimization of IEEE 802.11 wireless LANs performance , 2004, IEEE Transactions on Parallel and Distributed Systems.

[46]  Jason Liu,et al.  Experimental evaluation of wireless simulation assumptions , 2004, MSWiM '04.

[47]  Yuguang Fang,et al.  A novel MAC protocol with fast collision resolution for wireless LANs , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[48]  Jong-Tae Lim,et al.  Throughput analysis considering coupling effect in ieee 802.11 networks with hidden stations , 2009, IEEE Commun. Lett..

[49]  Andrzej Duda,et al.  Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs , 2005, SIGCOMM '05.

[50]  Vaduvur Bharghavan,et al.  MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.

[51]  Fouad A. Tobagi,et al.  Design of Robust Random Access Protocols For Wireless Networks Using Game Theoretic Models , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[52]  Sachin Katti,et al.  Embracing wireless interference: analog network coding , 2007, SIGCOMM '07.

[53]  Tracy Camp,et al.  MANET simulation studies: the incredibles , 2005, MOCO.

[54]  Lijun Chen,et al.  Random Access Game and Medium Access Control Design , 2010, IEEE/ACM Transactions on Networking.

[55]  Xing Li,et al.  Dynamic optimization of IEEE 802.11 CSMA/CA based on the number of competing stations , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[56]  Costas C. Constantinou,et al.  A game theoretic model for wireless medium access control in the presence of hidden terminals , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[57]  Nikos Vlassis,et al.  A Concise Introduction to Multiagent Systems and Distributed AI , 2003 .

[58]  Stephen B. Wicker,et al.  The Analysis of a Game Theoretic MAC Protocol for Wireless Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[59]  Gordon L. Stuber,et al.  Principles of Mobile Communication , 1996 .

[60]  John V. Guttag,et al.  Time-based Fairness Improves Performance in Multi-Rate WLANs , 2004, USENIX Annual Technical Conference, General Track.

[61]  Allen B. MacKenzie,et al.  Game Theory for Wireless Engineers (Synthesis Lectures on Communications) , 2006 .

[62]  Jie Zhang,et al.  Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[63]  David Starobinski,et al.  Performance of wireless networks with hidden nodes: a queuing-theoretic analysis , 2005, Comput. Commun..

[64]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[65]  David Malone,et al.  Modeling the 802.11 distributed coordination function in non-saturated conditions , 2005, IEEE Communications Letters.

[66]  Robert Tappan Morris,et al.  Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.

[67]  K. Sakakibara,et al.  Analysis of unsaturation throughput of IEEE 802.11 DCF , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[68]  Haitao Wu,et al.  Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[69]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[70]  D. W. Bliss,et al.  Simultaneous Transmission and Reception for Improved Wireless Network Performance , 2007, 2007 IEEE/SP 14th Workshop on Statistical Signal Processing.

[71]  Ilenia Tinnirello,et al.  Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[72]  Izhak Rubin,et al.  Analysis of Random Access Protocol under Bursty Traffic , 2001, MMNS.

[73]  Stephan Robert,et al.  Dynamic tuning of the contention window minimum (CW/sub min/) for enhanced service differentiation in IEEE 802.11 wireless ad-hoc networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[74]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[75]  Richard T. B. Ma,et al.  An Analysis of Generalized Slotted-Aloha Protocols , 2009, IEEE/ACM Transactions on Networking.

[76]  Kee Chaing Chua,et al.  A Capacity Analysis for the IEEE 802.11 MAC Protocol , 2001, Wirel. Networks.

[77]  R. Abraham,et al.  Manifolds, Tensor Analysis, and Applications , 1983 .

[78]  Lawrence G. Roberts,et al.  Extensions of packet communication technology to a hand held personal terminal , 1972, AFIPS '72 (Spring).

[79]  Hari Balakrishnan,et al.  Divert: fine-grained path selection for wireless LANs , 2004, MobiSys '04.

[80]  Hossam S. Hassanein,et al.  A new class of collision prevention MAC protocols for wireless ad hoc networks , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[81]  Vaduvur Bharghavan,et al.  Achieving MAC layer fairness in wireless packet networks , 2000, MobiCom '00.

[82]  Ajay Chandra V. Gummalla,et al.  Wireless medium access control protocols , 2000, IEEE Communications Surveys & Tutorials.

[83]  Norman M. Abramson,et al.  Development of the ALOHANET , 1985, IEEE Trans. Inf. Theory.

[84]  Nah-Oak Song,et al.  Enhancement of IEEE 802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[85]  Debarshi Kumar Sanyal,et al.  Game-Theoretic Modeling and Optimization of Contention-Prone Medium Access Phase in IEEE 802.16/WiMAX Networks , 2008, 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications.

[86]  Fu-Yi Hung,et al.  Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations , 2010, Comput. Networks.

[87]  Robert Morris,et al.  Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM 2004.

[88]  l.L. Gheorma,et al.  RF Photonic Techniques for Same Frequency Simultaneous Duplex Antenna Operation , 2007, IEEE Photonics Technology Letters.

[89]  Abbas Yongaçoglu,et al.  IEEE 802.11a Throughput Performance with Hidden Nodes , 2008, IEEE Communications Letters.

[90]  Stephen B. Wicker,et al.  Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[91]  Michael L. Littman,et al.  Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.

[92]  Lijun Chen,et al.  A Game-Theoretic Framework for Medium Access Control , 2008, IEEE Journal on Selected Areas in Communications.

[93]  Marco Conti,et al.  Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit , 2000, TNET.