Reverse engineering MAC

Ao Tang, Jang Won Lee, Jianwei Huang, Mung Chiang, A. Robert Calderbank

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from protocol description, through a stochastic subgradient method in which link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of best response strategy are established as a function of user density. Convergence properties and connection with best response strategy are also proved for variants of stochastic-subgradient-based dynamics of game. Together with known results in reverse engineering TCP and BGP, this paper completes recent efforts in reverse engineering main protocols in layers 2-4.

Original languageEnglish
Title of host publication2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006
DOIs
Publication statusPublished - 2006 Dec 1
Event2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006 - Boston, MA, United States
Duration: 2006 Feb 262006 Mar 2

Publication series

Name2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006

Other

Other2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006
CountryUnited States
CityBoston, MA
Period06/2/2606/3/2

Fingerprint

Reverse engineering
Reverse Engineering
Network protocols
Nash Equilibrium
Reverse
Subgradient Method
MAC Protocol
Non-cooperative Game
Subgradient
Random Access
Stochastic Methods
Contention
Ad Hoc Networks
Utility Function
Convergence Properties
Persistence
Uniqueness
Ad hoc networks
Update
Maximise

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Modelling and Simulation

Cite this

Tang, A., Lee, J. W., Huang, J., Chiang, M., & Calderbank, A. R. (2006). Reverse engineering MAC. In 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006 [1666466] (2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006). https://doi.org/10.1109/WIOPT.2006.1666466
Tang, Ao ; Lee, Jang Won ; Huang, Jianwei ; Chiang, Mung ; Calderbank, A. Robert. / Reverse engineering MAC. 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006. 2006. (2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006).
@inproceedings{23b349b190c64eabacdd2f2c6cdf6a23,
title = "Reverse engineering MAC",
abstract = "This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from protocol description, through a stochastic subgradient method in which link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of best response strategy are established as a function of user density. Convergence properties and connection with best response strategy are also proved for variants of stochastic-subgradient-based dynamics of game. Together with known results in reverse engineering TCP and BGP, this paper completes recent efforts in reverse engineering main protocols in layers 2-4.",
author = "Ao Tang and Lee, {Jang Won} and Jianwei Huang and Mung Chiang and Calderbank, {A. Robert}",
year = "2006",
month = "12",
day = "1",
doi = "10.1109/WIOPT.2006.1666466",
language = "English",
isbn = "0780395492",
series = "2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006",
booktitle = "2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006",

}

Tang, A, Lee, JW, Huang, J, Chiang, M & Calderbank, AR 2006, Reverse engineering MAC. in 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006., 1666466, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006, Boston, MA, United States, 06/2/26. https://doi.org/10.1109/WIOPT.2006.1666466

Reverse engineering MAC. / Tang, Ao; Lee, Jang Won; Huang, Jianwei; Chiang, Mung; Calderbank, A. Robert.

2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006. 2006. 1666466 (2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Reverse engineering MAC

AU - Tang, Ao

AU - Lee, Jang Won

AU - Huang, Jianwei

AU - Chiang, Mung

AU - Calderbank, A. Robert

PY - 2006/12/1

Y1 - 2006/12/1

N2 - This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from protocol description, through a stochastic subgradient method in which link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of best response strategy are established as a function of user density. Convergence properties and connection with best response strategy are also proved for variants of stochastic-subgradient-based dynamics of game. Together with known results in reverse engineering TCP and BGP, this paper completes recent efforts in reverse engineering main protocols in layers 2-4.

AB - This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from protocol description, through a stochastic subgradient method in which link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of best response strategy are established as a function of user density. Convergence properties and connection with best response strategy are also proved for variants of stochastic-subgradient-based dynamics of game. Together with known results in reverse engineering TCP and BGP, this paper completes recent efforts in reverse engineering main protocols in layers 2-4.

UR - http://www.scopus.com/inward/record.url?scp=84886571225&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84886571225&partnerID=8YFLogxK

U2 - 10.1109/WIOPT.2006.1666466

DO - 10.1109/WIOPT.2006.1666466

M3 - Conference contribution

AN - SCOPUS:84886571225

SN - 0780395492

SN - 9780780395497

T3 - 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006

BT - 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006

ER -

Tang A, Lee JW, Huang J, Chiang M, Calderbank AR. Reverse engineering MAC. In 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006. 2006. 1666466. (2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006). https://doi.org/10.1109/WIOPT.2006.1666466