Skip to main content

Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations

  • Conference paper
Distributed Computing – IWDC 2005 (IWDC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3741))

Included in the following conference series:

  • 562 Accesses

Abstract

Ad Hoc LAN systems are noncooperative MAC settings where regular stations are prone to "bandwidth stealing" by greedy ones. The paper formulates a minimum-information model of a LAN populated by mutually impenetrable groups. A framework for a noncooperative setting and suitable MAC protocol is proposed, introducing the notions of verifiability, feedback compatibility and incentive compatibility. For Random Token MAC protocols based on voluntary deferment of packet transmissions, a family of winner policies called RT/ECD-Z is presented that guarantees regular stations a close-to-fair bandwidth share under heavy load. The proposed policies make it hard for greedy stations to select short deferments, therefore they resort to smarter strategies, and the winner policy should leave the regular stations the possibility of adopting a regular strategy that holds its own against any greedy strategy. We have formalized this idea by requiring evolutionary stability and high guaranteed regular bandwidth shares within a set of heuristic strategies.

Effort sponsored by the Air Force Office of Scientific Research, Air Force Material Command, USAF, under grant FA8655-04-1-3074. The U.S Government is authorized to reproduce and distribute reprints for Governmental purpose notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the AFOSR or the U.S. Government.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ganeriwal, S., Aad, I., Hubaux, J.: On Cheating in CSMA/CA Ad Hoc Networks. In: Proc. IEEE INFOCOM 2005, Miami FL (March 2005)

    Google Scholar 

  2. Chlamtac, I., Ganz, A.: Evaluation of the Random Token Protocol for High-Speed and Radio Networks. IEEE J. Select. Areas of Comm. JSAC 5, 969–976 (1987)

    Article  Google Scholar 

  3. ETSI TC Radio Equipment and Systems: High Performance Radio Local Area Network (HIPERLAN); Services and Facilities; Version 1.1, RES 10 (1995)

    Google Scholar 

  4. Friedman, E.J., Shenker, S.: Synchronous and Asynchronous Learning by Responsive Learning Automata, Mimeo (1996)

    Google Scholar 

  5. Fudenberg, D., Levine, D.K.: The Theory of Learning in Games. MIT Press, Cambridge (1998)

    MATH  Google Scholar 

  6. IEEE 802.11 Standard: Wireless Media Access Control (MAC) and Physical Layer (PHY) Specifications (1999)

    Google Scholar 

  7. Ingber, L.: Simulated Annealing: Practice versus Theory. Mathl. Comput. Modelling 18, 29–57 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  8. Konorski, J.: Packet Scheduling in Wireless LANs - A Framework for a Non-cooperative Paradigm. In: Proc. IFIP Int. Conf. on Personal Wireless Comm., pp. 29–42. Kluwer, Dordrecht (2000)

    Google Scholar 

  9. Konorski, J., Kurant, M.: Application of a Hash Function to Discourage MAC-Layer Misbehaviour in Wireless LANs. J. Telecomm. and Inf. Technology 2, 38–46 (2004)

    Google Scholar 

  10. Kyasanur, P., Vaidya, N.H.: Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In: Proc. Int. Conference on Dependable Systems and Networks, San Francisco, CA (June 2003)

    Google Scholar 

  11. MacKenzie, B., Wicker, S.B.: Selfish Users in ALOHA: A Game-Theoretic Approach. In: Proc. Vehicular Technology Conference Fall 2001, Atlantic City, NJ (October 2001)

    Google Scholar 

  12. Raya, M., Hubaux, J., Aad, I.: DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In: Proc. MobiSys 2004, Boston MA (June 2004)

    Google Scholar 

  13. Shenker, S.: Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines. In: Proc. SIGCOMM 1994, London, UK (June 1994)

    Google Scholar 

  14. Yao, X.: Evolutionary Stability in the n-Person Iterated Prisoners’ Dilemma. BioSystems 39, 189–197 (1996)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Konorski, J. (2005). Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations. In: Pal, A., Kshemkalyani, A.D., Kumar, R., Gupta, A. (eds) Distributed Computing – IWDC 2005. IWDC 2005. Lecture Notes in Computer Science, vol 3741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11603771_29

Download citation

  • DOI: https://doi.org/10.1007/11603771_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30959-8

  • Online ISBN: 978-3-540-32428-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics