DocumentCode
1993250
Title
Design and Analysis of Defection-Proof MAC Protocols Using a Repeated Game Framework
Author
Phan, Khoa T. ; Park, Jaeok ; Van der Schaar, Mihaela
Author_Institution
Electr. Eng. Dept., Univ. of California, Los Angeles (UCLA), Los Angeles, CA, USA
fYear
2010
fDate
6-10 Dec. 2010
Firstpage
1
Lastpage
6
Abstract
It is well-known that medium access control (MAC) protocols are vulnerable to the selfish behavior of nodes, which often results in inefficient use of resources. In this work, we aim to overcome this inefficiency by constructing a class of defection-proof MAC protocols in the context of slotted multiple access communications. The operation of the proposed protocols can be divided into a review phase and a reciprocation phase. In a review phase, nodes cooperate and collect signals on the behavior of other nodes. At the end of a review phase, nodes perform a statistical test independently to determine whether there has been a defecting node in the system. In a reciprocation phase, a node cooperates if it concludes that no defection has occurred and carries out a punishment otherwise. We provide sufficient conditions for protocols to be defection-proof against a constant defection strategy and to achieve an arbitrarily small efficiency loss. We analyze an example of a statistical test based on which we can build protocols that satisfy the sufficient conditions.
Keywords
access protocols; multi-access systems; statistical testing; defection-proof MAC protocol; medium access control protocol; repeated game framework; slotted multiple access communication; statistical test; Games; History; IEEE Communications Society; Media Access Protocol; Peer to peer computing; Probability;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
Conference_Location
Miami, FL
ISSN
1930-529X
Print_ISBN
978-1-4244-5636-9
Electronic_ISBN
1930-529X
Type
conf
DOI
10.1109/GLOCOM.2010.5683740
Filename
5683740
Link To Document