Design and analysis of defection-proof MAC protocols using a repeated game framework

Khoa T. Phan, Jaeok Park, Mihaela Van Der Schaar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

It is well-known that medium access control (MAC) protocols are vulnerable to the selfish behavior of nodes, which often results in inefficient use of resources. In this work, we aim to overcome this inefficiency by constructing a class of defection-proof MAC protocols in the context of slotted multiple access communications. The operation of the proposed protocols can be divided into a review phase and a reciprocation phase. In a review phase, nodes cooperate and collect signals on the behavior of other nodes. At the end of a review phase, nodes perform a statistical test independently to determine whether there has been a defecting node in the system. In a reciprocation phase, a node cooperates if it concludes that no defection has occurred and carries out a punishment otherwise. We provide sufficient conditions for protocols to be defection-proof against a constant defection strategy and to achieve an arbitrarily small efficiency loss. We analyze an example of a statistical test based on which we can build protocols that satisfy the sufficient conditions.

Original languageEnglish
Title of host publication2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
DOIs
Publication statusPublished - 2010 Dec 1
Event53rd IEEE Global Communications Conference, GLOBECOM 2010 - Miami, FL, United States
Duration: 2010 Dec 62010 Dec 10

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other53rd IEEE Global Communications Conference, GLOBECOM 2010
CountryUnited States
CityMiami, FL
Period10/12/610/12/10

Fingerprint

Medium access control
Statistical tests
Communication

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

Phan, K. T., Park, J., & Van Der Schaar, M. (2010). Design and analysis of defection-proof MAC protocols using a repeated game framework. In 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 [5683740] (GLOBECOM - IEEE Global Telecommunications Conference). https://doi.org/10.1109/GLOCOM.2010.5683740
Phan, Khoa T. ; Park, Jaeok ; Van Der Schaar, Mihaela. / Design and analysis of defection-proof MAC protocols using a repeated game framework. 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 2010. (GLOBECOM - IEEE Global Telecommunications Conference).
@inproceedings{9c6a641dcfa347a58c524d851a975545,
title = "Design and analysis of defection-proof MAC protocols using a repeated game framework",
abstract = "It is well-known that medium access control (MAC) protocols are vulnerable to the selfish behavior of nodes, which often results in inefficient use of resources. In this work, we aim to overcome this inefficiency by constructing a class of defection-proof MAC protocols in the context of slotted multiple access communications. The operation of the proposed protocols can be divided into a review phase and a reciprocation phase. In a review phase, nodes cooperate and collect signals on the behavior of other nodes. At the end of a review phase, nodes perform a statistical test independently to determine whether there has been a defecting node in the system. In a reciprocation phase, a node cooperates if it concludes that no defection has occurred and carries out a punishment otherwise. We provide sufficient conditions for protocols to be defection-proof against a constant defection strategy and to achieve an arbitrarily small efficiency loss. We analyze an example of a statistical test based on which we can build protocols that satisfy the sufficient conditions.",
author = "Phan, {Khoa T.} and Jaeok Park and {Van Der Schaar}, Mihaela",
year = "2010",
month = "12",
day = "1",
doi = "10.1109/GLOCOM.2010.5683740",
language = "English",
isbn = "9781424456383",
series = "GLOBECOM - IEEE Global Telecommunications Conference",
booktitle = "2010 IEEE Global Telecommunications Conference, GLOBECOM 2010",

}

Phan, KT, Park, J & Van Der Schaar, M 2010, Design and analysis of defection-proof MAC protocols using a repeated game framework. in 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010., 5683740, GLOBECOM - IEEE Global Telecommunications Conference, 53rd IEEE Global Communications Conference, GLOBECOM 2010, Miami, FL, United States, 10/12/6. https://doi.org/10.1109/GLOCOM.2010.5683740

Design and analysis of defection-proof MAC protocols using a repeated game framework. / Phan, Khoa T.; Park, Jaeok; Van Der Schaar, Mihaela.

2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 2010. 5683740 (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Design and analysis of defection-proof MAC protocols using a repeated game framework

AU - Phan, Khoa T.

AU - Park, Jaeok

AU - Van Der Schaar, Mihaela

PY - 2010/12/1

Y1 - 2010/12/1

N2 - It is well-known that medium access control (MAC) protocols are vulnerable to the selfish behavior of nodes, which often results in inefficient use of resources. In this work, we aim to overcome this inefficiency by constructing a class of defection-proof MAC protocols in the context of slotted multiple access communications. The operation of the proposed protocols can be divided into a review phase and a reciprocation phase. In a review phase, nodes cooperate and collect signals on the behavior of other nodes. At the end of a review phase, nodes perform a statistical test independently to determine whether there has been a defecting node in the system. In a reciprocation phase, a node cooperates if it concludes that no defection has occurred and carries out a punishment otherwise. We provide sufficient conditions for protocols to be defection-proof against a constant defection strategy and to achieve an arbitrarily small efficiency loss. We analyze an example of a statistical test based on which we can build protocols that satisfy the sufficient conditions.

AB - It is well-known that medium access control (MAC) protocols are vulnerable to the selfish behavior of nodes, which often results in inefficient use of resources. In this work, we aim to overcome this inefficiency by constructing a class of defection-proof MAC protocols in the context of slotted multiple access communications. The operation of the proposed protocols can be divided into a review phase and a reciprocation phase. In a review phase, nodes cooperate and collect signals on the behavior of other nodes. At the end of a review phase, nodes perform a statistical test independently to determine whether there has been a defecting node in the system. In a reciprocation phase, a node cooperates if it concludes that no defection has occurred and carries out a punishment otherwise. We provide sufficient conditions for protocols to be defection-proof against a constant defection strategy and to achieve an arbitrarily small efficiency loss. We analyze an example of a statistical test based on which we can build protocols that satisfy the sufficient conditions.

UR - http://www.scopus.com/inward/record.url?scp=79551620033&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79551620033&partnerID=8YFLogxK

U2 - 10.1109/GLOCOM.2010.5683740

DO - 10.1109/GLOCOM.2010.5683740

M3 - Conference contribution

AN - SCOPUS:79551620033

SN - 9781424456383

T3 - GLOBECOM - IEEE Global Telecommunications Conference

BT - 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010

ER -

Phan KT, Park J, Van Der Schaar M. Design and analysis of defection-proof MAC protocols using a repeated game framework. In 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 2010. 5683740. (GLOBECOM - IEEE Global Telecommunications Conference). https://doi.org/10.1109/GLOCOM.2010.5683740