skip to main content
10.1145/2093698.2093781acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisabelConference Proceedingsconference-collections
research-article

DRinK: a defense strategy of cooperative wireless terminals in a wireless multihoming environment

Published: 26 October 2011 Publication History

Abstract

In a wireless multihoming environment, each of a number of wireless terminals (WTs) can access multiple wireless networks (WNs). The lack of tight administrative control over the WTs gives rise to their potential selfishness oriented towards a self-defined utility (usually derived from long-term received bandwidth). We take the behavioral target approach, which consists in defining cooperative behavior that is considered desirable from the point of view of some system-wide objective, and building into the behavior of cooperative WTs a strategy to discourage a selfish WT. We present a strategy called Defense via Responding in Kind (DRinK) and evaluate its performance via simulation of contention-type WNs and WTs generating elastic traffic, elastic traffic with a minimum throughput requirement, and real-time traffic.

References

[1]
C. K. Tan, M. L. Sim, and T. C. Chuah, "Game theoretic approach for channel assignment and power control with no-internal-regret learning in wireless ad hoc networks," IET Commun., vol. 2, pp. 1159--1169, 2008.
[2]
J. O'Daniell Neel, "Analysis and design of cognitive radio networks and distributed radio resource management algorithms", Ph. D. dissert., Virginia Polytechnic Institute and State Univ., Blacksburg VA, 2006.
[3]
D. Niyato and E. Hossain, "Dynamics of network selection in heterogeneous wireless networks: An evolutionary game approach", IEEE Trans. Veh. Technol., vol. 58, pp. 2008--2017, 2009.
[4]
J. Konorski: "Multihomed Wireless Terminals: MAC Configuration and Network Selection Games," Proc. ICOIN 2011, Kuala Lumpur, Malaysia, Jan. 2011.
[5]
E. J. Friedman and S. Shenker, "Synchronous and Asynchronous Learning by Responsive Learning Automata," Mimeo 1996.
[6]
A. Galindo-Serrano and L. Giupponi, "Distributed Q-Learning for Aggregated Interference Control in Cognitive Radio Networks," IEEE Trans. Vehicular Technol., vol. 59, pp. 1823--1834, 2010.
[7]
C. Clancy, J. Hecker, E. Stuntebeck, and T. O'Shea, "Applications of Machine Learning to Cognitive Radio Networks," Wireless Communications, vol. 14, pp. 47--52, 2007.
[8]
J. Konorski, Wireless Multihoming Modeled as a Multi-WLAN Game, Proc. ACM MSWiM 2009, Tenerife, Spain, Oct. 2009.
[9]
IEEE Standard for Information Technology: LAN/MAN -Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ISO/IEC 8802--11:1999.
[10]
J. Konorski: "A game-theoretic study of CSMA/CA under a backoff attack," IEEE/ACM Trans. Networking, vol. 14, pp. 1167--1178, 2006.
[11]
J. Konorski, "Noncooperative QoS Support in an Ad Hoc WLAN," Proc. IFIP Wireless Days 2008, Dubai, UAE, Nov. 2008.
[12]
E. Rasmussen. Games and Information: An Introduction to Game Theory, 3rd ed. Blackwell Publ. 2001.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ISABEL '11: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
October 2011
949 pages
ISBN:9781450309134
DOI:10.1145/2093698
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Universitat Pompeu Fabra
  • IEEE
  • Technical University of Catalonia Spain: Technical University of Catalonia (UPC), Spain
  • River Publishers: River Publishers
  • CTTC: Technological Center for Telecommunications of Catalonia
  • CTIF: Kyranova Ltd, Center for TeleInFrastruktur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. defense strategy
  2. selfishness
  3. traffic scenarios
  4. wireless multihoming

Qualifiers

  • Research-article

Funding Sources

Conference

ISABEL '11
Sponsor:
  • Technical University of Catalonia Spain
  • River Publishers
  • CTTC
  • CTIF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 42
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media