Abstract
Ad Hoc LAN systems are noncooperative MAC settings where regular stations are prone to "bandwidth stealing" by greedy ones. The paper formulates a minimum-information model of a LAN populated by mutually impenetrable groups. A framework for a noncooperative setting and suitable MAC protocol is proposed, introducing the notions of verifiability, feedback compatibility and incentive compatibility. For Random Token MAC protocols based on voluntary deferment of packet transmissions, a family of winner policies called RT/ECD-Z is presented that guarantees regular stations a close-to-fair bandwidth share under heavy load. The proposed policies make it hard for greedy stations to select short deferments, therefore they resort to smarter strategies, and the winner policy should leave the regular stations the possibility of adopting a regular strategy that holds its own against any greedy strategy. We have formalized this idea by requiring evolutionary stability and high guaranteed regular bandwidth shares within a set of heuristic strategies.
Effort sponsored by the Air Force Office of Scientific Research, Air Force Material Command, USAF, under grant FA8655-04-1-3074. The U.S Government is authorized to reproduce and distribute reprints for Governmental purpose notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the AFOSR or the U.S. Government.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ganeriwal, S., Aad, I., Hubaux, J.: On Cheating in CSMA/CA Ad Hoc Networks. In: Proc. IEEE INFOCOM 2005, Miami FL (March 2005)
Chlamtac, I., Ganz, A.: Evaluation of the Random Token Protocol for High-Speed and Radio Networks. IEEE J. Select. Areas of Comm. JSAC 5, 969–976 (1987)
ETSI TC Radio Equipment and Systems: High Performance Radio Local Area Network (HIPERLAN); Services and Facilities; Version 1.1, RES 10 (1995)
Friedman, E.J., Shenker, S.: Synchronous and Asynchronous Learning by Responsive Learning Automata, Mimeo (1996)
Fudenberg, D., Levine, D.K.: The Theory of Learning in Games. MIT Press, Cambridge (1998)
IEEE 802.11 Standard: Wireless Media Access Control (MAC) and Physical Layer (PHY) Specifications (1999)
Ingber, L.: Simulated Annealing: Practice versus Theory. Mathl. Comput. Modelling 18, 29–57 (1993)
Konorski, J.: Packet Scheduling in Wireless LANs - A Framework for a Non-cooperative Paradigm. In: Proc. IFIP Int. Conf. on Personal Wireless Comm., pp. 29–42. Kluwer, Dordrecht (2000)
Konorski, J., Kurant, M.: Application of a Hash Function to Discourage MAC-Layer Misbehaviour in Wireless LANs. J. Telecomm. and Inf. Technology 2, 38–46 (2004)
Kyasanur, P., Vaidya, N.H.: Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In: Proc. Int. Conference on Dependable Systems and Networks, San Francisco, CA (June 2003)
MacKenzie, B., Wicker, S.B.: Selfish Users in ALOHA: A Game-Theoretic Approach. In: Proc. Vehicular Technology Conference Fall 2001, Atlantic City, NJ (October 2001)
Raya, M., Hubaux, J., Aad, I.: DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In: Proc. MobiSys 2004, Boston MA (June 2004)
Shenker, S.: Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines. In: Proc. SIGCOMM 1994, London, UK (June 1994)
Yao, X.: Evolutionary Stability in the n-Person Iterated Prisoners’ Dilemma. BioSystems 39, 189–197 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Konorski, J. (2005). Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations. In: Pal, A., Kshemkalyani, A.D., Kumar, R., Gupta, A. (eds) Distributed Computing – IWDC 2005. IWDC 2005. Lecture Notes in Computer Science, vol 3741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11603771_29
Download citation
DOI: https://doi.org/10.1007/11603771_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30959-8
Online ISBN: 978-3-540-32428-7
eBook Packages: Computer ScienceComputer Science (R0)