Skip to main content
Log in

Contention Resolution under Selfishness

  • Published:
Algorithmica Aims and scope Submit manuscript

Abstract

In many communications settings, such as wired and wireless local-area networks, when multiple users attempt to access a communication channel at the same time, a conflict results and none of the communications are successful. Contention resolution is the study of distributed transmission and retransmission protocols designed to maximize notions of utility such as channel utilization in the face of blocking communications.

An additional issue to be considered in the design of such protocols is that selfish users may have incentive to deviate from the prescribed behavior, if another transmission strategy increases their utility. The work of Fiat et al. (in SODA ’07, pp. 179–188, SIAM, Philadelphia 2007) addresses this issue by constructing an asymptotically optimal incentive-compatible protocol. However, their protocol assumes the cost of any single transmission is zero, and the protocol completely collapses under non-zero transmission costs.

In this paper we treat the case of non-zero transmission cost c. We present asymptotically optimal contention resolution protocols that are robust to selfish users, in two different channel feedback models. Our main result is in the Collision Multiplicity Feedback model, where after each time slot, the number of attempted transmissions is returned as feedback to the users. In this setting, we give a protocol that has expected cost Θ(n+clogn) and is in o(1)-equilibrium, where n is the number of users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Protocol 3.1
Protocol 4.1

Similar content being viewed by others

Notes

  1. Recall from the earlier description that the threat of Fiat et al. requires that all remaining players will be transmitting in every step with probability 1 for a large number of steps. This is an equilibrium only when the cost of a transmission is zero.

  2. Alternatively, we can assume that player transmits with p it =0 on all subsequent rounds.

  3. Notice that since the feedback is symmetric, h it =h jt implies H it =H jt .

  4. Since we are interested in symmetric protocols, then the average expected cost is equal to the expected cost of any player, and hence the social utility coincides with the individual utility.

  5. In fact, if the identities of the players were common knowledge, then simply transmitting in lexicographic order would be incentive-compatible and achievable.

  6. A player i who is currently assigned a leave slot keeps transmitting until she succeeds. This technical detail ensures that the protocol will not collapse if some other player j tries to transmit at that slot. Such an event would occur only if j deviated from the protocol by transmitting in the leave slot assigned to i.

  7. It may reduce by two if the player that succeeded during the split belonged to a group of size 2. The other player in that group would be assigned a leave slot in the same round.

  8. More details can be found in the full-version of [8], at www.cs.tau.ac.il/~urinadav/papers/JournalSelfishMac.pdf

  9. As opposed to a player that the protocol instructs to stay quiet during s with probability 1.

  10. At round 0 all players belong to the same group, i.e., M 0=1.

  11. Validation slots only happen if there is at least one player from G j,k that is supposed to transmit in them. Thus, a player cannot have a successful transmission by attacking a validation slot.

  12. If none of the members of G j,k transmitted during the split slot, then i has a successful transmission. If all members but one transmitted, then the cheating does not get caught (and i only had a failed transmission). In this case, it looks as if all members of G j,k transmitted, and the validation slot is skipped. In all other cases, i gets caught.

References

  1. Abramson, N.: The ALOHA system: another alternative for computer communications. In: AFIPS ’70, November 17–19, 1970, pp. 281–285. ACM, New York (1970)

    Google Scholar 

  2. Altman, E., El Azouzi, R., Jiménez, T.: Slotted aloha as a game with partial information. Comput. Netw. 45(6), 701–713 (2004)

    Article  MATH  Google Scholar 

  3. Altman, E., Barman, D., Benslimane, A., El Azouzi, R.: Slotted aloha with priorities and random power. In: Boutaba, R., Almeroth, K.C., Puigjaner, R., Shen, S.X., Black, J.P. (eds.) NETWORKING. Lecture Notes in Computer Science, vol. 3462 pp. 610–622. Springer, Berlin (2005)

    Google Scholar 

  4. Auletta, V., Moscardelli, L., Penna, P., Persiano, G.: Interference games in wireless networks. In: Papadimitriou, C.H., Zhang, S. (eds.) WINE. Lecture Notes in Computer Science, vol. 5385, pp. 278–285. Springer, Berlin (2008)

    Google Scholar 

  5. Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Gibbons, P.B., Spirakis, P.G. (eds.) SPAA ’05, pp. 325–332. ACM, New York (2005)

    Chapter  Google Scholar 

  6. Capetanakis, J.: Tree algorithms for packet broadcast channels. IEEE Trans. Inf. Theory 25(5), 505–515 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  7. Capetanakis, J.: Generalized TDMA: the multi-accessing tree protocol. IEEE Trans. Commun. 27(10), 1476–1484 (1979)

    Article  Google Scholar 

  8. Fiat, A., Mansour, Y., Nadav, U.: Efficient contention resolution protocols for selfish agents. In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’07, pp. 179–188. SIAM, Philadelphia (2007)

    Google Scholar 

  9. Georgiadis, L., Papantoni-Kazakos, P.: A collision resolution protocol for random access channels with energy detectors. IEEE Trans. Commun. 30, 2413 (1982)

    Article  MATH  Google Scholar 

  10. Geréb-Graus, M., Tsantilas, T.: Efficient optical communication in parallel computers. In: SPAA ’92, pp. 41–48. ACM, New York (1992)

    Chapter  Google Scholar 

  11. Goldberg, L.A., Mackenzie, P.D.: Analysis of practical backoff protocols for contention resolution with multiple servers. J. Comput. Syst. Sci. 58(1), 232–258 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  12. Goldberg, L.A., Mackenzie, P.D., Paterson, M., Srinivasan, A.: Contention resolution with constant expected delay. J. ACM 47(6), 1048–1096 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  13. Greenberg, A.G., Winograd, S.: A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels. J. ACM 32(3), 589–596 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  14. Hayes, J.: An adaptive technique for local distribution. IEEE Trans. Commun. 26(8), 1178–1186 (1978)

    Article  Google Scholar 

  15. Koutsoupias, E., Papadimitriou, C.H.: Worst-case equilibria. Comput. Sci. Rev. 3(2), 65–69 (2009)

    Article  MATH  Google Scholar 

  16. Ma, R.T.B., Misra, V., Rubenstein, D.: Modeling and analysis of generalized slotted-aloha mac protocols in cooperative, competitive and adversarial environments. In: The 26th International Conference on Distributed Computing Systems (ICDCS 06), p. 62. IEEE, Washington (2006)

    Chapter  Google Scholar 

  17. MacKenzie, A.B., Wicker, S.B.: Stability of multipacket slotted aloha with selfish users and perfect information (2003)

  18. MacKenzie, P.D., Plaxton, C.G., Rajaraman, R.: On contention resolution protocols and associated probabilistic phenomena. J. ACM 45(2), 324–378 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  19. Menache, I., Shimkin, N.: Efficient rate-constrained Nash equilibrium in collision channels with state information. In: INFOCOM 2008, pp. 403–411 (2008)

    Google Scholar 

  20. Pippenger, N.: Bounds on the performance of protocols for a multiple-access broadcast channel. IEEE Trans. Inf. Theory 27(2), 145–151 (1981)

    Article  MathSciNet  MATH  Google Scholar 

  21. Prabhakar, R., Upfal, E.: Stochastic contention resolution with short delays. In: Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, STOC ’95, pp. 229–237. ACM, New York (1995)

    Google Scholar 

  22. Roberts, L.G.: Aloha packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev. 5(2), 28–42 (1975)

    Article  Google Scholar 

  23. Miklos, R., Vanroose, P.: How an Erdöos-Rényi-type search approach gives an explicit code construction of rate 1 for random access with multiplicity feedback. IEEE Trans. Inf. Theory 43(1), 368–372 (1997)

    Article  MATH  Google Scholar 

  24. Srivastava, V., Neel, J.O., MacKenzie, A.B., Menon, R., DaSilva, L.A., Hicks, J.E., Reed, J.H., Gilles, R.P.: Using game theory to analyze wireless ad hoc networks. IEEE Commun. Surv. Tutor. 7(5), 46–56 (2005)

    Article  Google Scholar 

  25. Tsybakov, B.: Resolution of a conflict of known multiplicity. Problemy Peredachi Informatsii (1980)

  26. Tsybakov, B.S., Mikhailov, V.A.: Free synchronous packet access in a broadcast channel with feedback. Probl. Inf. Transm. 14(4), 259–280 (1978)

    MathSciNet  Google Scholar 

  27. Wang, D., Comaniciu, C., Tureli, U.: Cooperation and fairness for slotted aloha. Wirel. Pers. Commun. 43(1), 13–27 (2007)

    Article  Google Scholar 

  28. Zheng, D., Ge, W., Zhang, J.: Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach. In: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’07, pp. 1–10. ACM, New York (2007)

    Chapter  Google Scholar 

Download references

Acknowledgements

The first author was partially supported by DFG grant Kr 2332/1-3 within Emmy Noether Program and by EPSRC grant EP/F069502/1. The second author was supported in part by an NSF Graduate Research Fellowship, NSF grant 0937060 to the Computing Research Association for the CIFellows Project, and NSF grant 1004416.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Evangelia Pyrga.

Additional information

A preliminary version of this work appeared in ICALP 2010.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Christodoulou, G., Ligett, K. & Pyrga, E. Contention Resolution under Selfishness. Algorithmica 70, 675–693 (2014). https://doi.org/10.1007/s00453-013-9773-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00453-013-9773-4

Keywords

Navigation