2002
DOI: 10.1007/3-540-47906-6_98
|View full text |Cite
|
Sign up to set email alerts
|

Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations

Abstract: A class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two scheduling policies, called RT/ECD and RT/ECD-1s, are evaluated via simulation It … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
45
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 53 publications
(45 citation statements)
references
References 4 publications
0
45
0
Order By: Relevance
“…J. Konorski [4] designs a noncooperative game for wireless LANS which obtains a fair distribution of bandwidth via two policies namely RT/ECD and RT/ECD-1s. Pradeep Kyasanur and Nitin H. Vaidya [5] proposed a scheme in which receiver interprets that a sender can access a channel without waiting for an assigned back off which detects selfish misbehavior.…”
Section: Literature Surveymentioning
confidence: 99%
“…J. Konorski [4] designs a noncooperative game for wireless LANS which obtains a fair distribution of bandwidth via two policies namely RT/ECD and RT/ECD-1s. Pradeep Kyasanur and Nitin H. Vaidya [5] proposed a scheme in which receiver interprets that a sender can access a channel without waiting for an assigned back off which detects selfish misbehavior.…”
Section: Literature Surveymentioning
confidence: 99%
“…These approaches assume that misbehaving nodes take greedy actions to gain better performance such as higher share of bandwidth, and leverage the optimal point called "Nash equilibrium". Konorski [39] proposes a misbehavior-resilient backoff algorithm for ad hoc networks in which all nodes can hear each other. By adjusting the backoff value, the network may reach a fair equilibrium for bandwidth allocation.…”
Section: Misbehavior Detectionmentioning
confidence: 99%
“…One widely used method is a distributed random access method called CSMA/CA [14]. Game theory has been applied to the CSMA/CA protocol [6,10] and to the Aloha protocol [11].…”
Section: Introductionmentioning
confidence: 99%