Interference-aware MAC protocol for wireless networks by a game-theoretic approach

Hyung June Lee, Hyukjoon Kwon, Arik Motskin, Leonidas Guibas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

29 Scopus citations

Abstract

We propose an interference-aware MAC protocol using a simple transmission strategy motivated by a game-theoretic approach. We formulate a channel access game, which considers nodes concurrently transmitting in nearby clusters, incorporating a realistic wireless communication model - the SINR model. Under inter-cluster interference, we derive a decentralized transmission strategy, which achieves a Bayesian Nash Equilibrium (BNE). The proposed MAC protocol balances network throughput and battery consumption at each transmission. We compare our BNE-based decentralized strategy with a centralized globally optimal strategy in terms of efficiency and balance. We further show that the transmission threshold should be adaptively tuned depending on the number of active users in the network, crosstalk, ambient noise, transmission cost, and radio-dependent receiver sensitivity. We also present a simple dynamic procedure for nodes to efficiently find a Nash Equilibrium (NE) without requiring each node to know the total number of active nodes or the channel gain distribution, and prove that this procedure is guaranteed to converge.

Original languageEnglish
Title of host publicationIEEE INFOCOM 2009 - The 28th Conference on Computer Communications
Pages1854-1862
Number of pages9
DOIs
StatePublished - 2009
Event28th Conference on Computer Communications, IEEE INFOCOM 2009 - Rio de Janeiro, Brazil
Duration: 19 Apr 200925 Apr 2009

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X

Conference

Conference28th Conference on Computer Communications, IEEE INFOCOM 2009
Country/TerritoryBrazil
CityRio de Janeiro
Period19/04/0925/04/09

Fingerprint

Dive into the research topics of 'Interference-aware MAC protocol for wireless networks by a game-theoretic approach'. Together they form a unique fingerprint.

Cite this