On Selfish Behavior in CSMA/CA Networks

Size: px
Start display at page:

Download "On Selfish Behavior in CSMA/CA Networks"

Transcription

1 On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, IEEE Infocom

2 Introduction CSMA/CA is the most popular MAC paradigm for wireless networks CSMA/CA protocols rely on a (fair) random deferment of packet transmission where nodes control their own random delays CSMA/CA is efficient if nodes follow predefined rules, however, nodes have a rational motive to cheat - IEEE Infocom

3 Cheating pays well 8 7 Cheater Well-behaved cheater Throughput (Mbits/s) well-behaved destination Contention window of Cheater - IEEE Infocom

4 Our goal Study the coexistence of a population of greedy stations Derive the conditions for the stable and optimal functioning of a population of greedy stations - IEEE Infocom

5 Model and assumptions Network of N nodes (transmitters) out of which C are cheaters IEEE protocol MAC layer authentication (no Sybil attack) single collision domain (no hidden terminals) nodes always have packets (of the same size) to transmit Contention window size-based cheating fix W i = W min = W max (no exponential backoff) delay transmissions for d i U {1, 2,..., W i } Cheaters are rational (maximize their throughput r i ) - IEEE Infocom

6 Cheaters utility function U i Derived from Bianchi s model of IEEE each cheater i controls its access probability τ i = 2 W i + 1 cheater i receives the following throughput: U i (τ i, τ i ) r i (τ i, τ i ) = τ i c i 1(τ i ) τ i c i 2 (τ i) + c i 3 (τ i), where τ i (τ 1,..., τ i 1, τ i+1,..., τ N ). - IEEE Infocom

7 Static CSMA/CA game Static games players make their moves independently of other players players play the same move forever A move in the CSMA/CA game corresponds to setting the value of the cheater s contention window W i (that is, τ i ) Solution concept - Nash equilibrium (NE) W = (W 1, W 2,..., W C ) is a NE point if i = 1,..., C, we have: U i (W i, W i ) U i (Ŵi, W i ), Ŵi {1, 2,..., W max } - IEEE Infocom

8 Nash equilibria of the static game Proposition 1. A vector W = (W 1,..., W C ) is a Nash equilibrium if and only if i {1, 2,..., C} s.t. W i = 1. Proposition 2. The static CSMA/CA game admits exactly W C max (W max 1) C Nash equilibria.

9 Nash equilibria of the static game Proposition 1. A vector W = (W 1,..., W C ) is a Nash equilibrium if and only if i {1, 2,..., C} s.t. W i = 1. Proposition 2. The static CSMA/CA game admits exactly W C max (W max 1) C Nash equilibria. Two families of Nash equilibria define D {i : W i = 1, i = 1, 2,..., C} 1st family, D = 1, implying that only one cheater receives a non-null throughput (some allocations are Pareto-optimal!) 2nd family, D > 1, implying r i = 0, for i = 1,..., C (known as the tragedy of the commons) - IEEE Infocom

10 How to avoid undesirable equilibria? Multiple Nash equilibria that are either highly unfair or highly inefficient

11 How to avoid undesirable equilibria? Multiple Nash equilibria that are either highly unfair or highly inefficient To derive a better solution we use Nash bargaining framework solve the following problem max C i=1 (r i r 0 i ) Π 1 : s.t. r R r r 0. where R is a finite set of feasible solutions, and r 0 i max i min i r i, i = 1, 2,..., C is the disagreement point - IEEE Infocom

12 Uniqueness, fairness and optimality Π 1 admits a unique, fair and Pareto-optimal solution W (Nash bargaining solution) 1.2 Throughput (Mbits/s) Nash-equilibrium point Pareto-optimal point Simulations Analytical W* Contention window (W) of greedy stations - IEEE Infocom

13 Dynamic CSMA/CA game W is a desirable solution, but is not a Nash equilibrium i.e., W i > 1, i = 1,..., C

14 Dynamic CSMA/CA game W is a desirable solution, but is not a Nash equilibrium i.e., W i > 1, i = 1,..., C In the model of dynamic games cheaters utility function changes to J i = r i P i, where P i is a penalty function cheaters are reactive - IEEE Infocom

15 Penalty function P i Proposition 3. Define: P i = { pi, if τ i > τ 0, otherwise, where p i / τ i > r i / τ i and τ i < 1, i = 1, 2,..., C. Then, J i = r i P i has a unique maximizer τ. - IEEE Infocom

16 Graphical interpretation Example: P i = k i (τ i τ), with k i > r i / τ i Nash equilibrium point P i r i normalized payoff J i = r i P i i - IEEE Infocom

17 Making W a Nash equilibrium point Let τ = min τ i, (i.e., W = i=1,...,c max W i) i=1,...,c Each player j calculates a penalty p j i given that r i > r j, as follows: to be inflicted on player i j, p j i = r i r j note, r i / τ i > 0 and r j / τ i < 0 p j i / τ i > r i / τ i hence, J i = r i p j i = r j has a unique maximizer τ i = τ j

18 Making W a Nash equilibrium point Let τ = min τ i, (i.e., W = i=1,...,c max W i) i=1,...,c Each player j calculates a penalty p j i given that r i > r j, as follows: to be inflicted on player i j, p j i = r i r j note, r i / τ i > 0 and r j / τ i < 0 p j i / τ i > r i / τ i hence, J i = r i p j i = r j has a unique maximizer τ i = τ j Then, τ i = τ (i.e., W i = W ), i = 1,..., C, is a unique Nash equilibrium. - IEEE Infocom

19 Making W a Nash equilibrium point (cont.) Moving Nash Equilibrium 1.2 Throughput (Mbits/s) Pareto-optimal Nash equilibrium Nash-equilibria Simulations Analytical W* Contention window (W) of greedy stations - IEEE Infocom

20 Implementation of the penalty function Achieved by selective jamming Penalty should result in r i = r j, therefore T jam = (r i /r j 1)T obs Throughput (Mbits/s) Cheater X Other cheaters Time (s) Throughput of cheater X (Mbits/s) With jamming Without jamming Unique maximizer for cheater X Contention window (W X ) of cheater X - IEEE Infocom

21 Adaptive strategy Prescribes to a player what to do when the player is penalized (jammed) Throughput (Mbits/s) Cheater X Other cheaters Contention window size Cheater X 5 Other cheaters Time (s) Time (s) - IEEE Infocom

22 Fully distributed algorithm Evolution of the contention windows and the aggregated cheaters throughput for N = 20, C = 7, the step size γ = Contention window size Ch. X: Distrib. prot. Ch. Y: Distrib. prot. Ch. X, Y: Forced CW Contention window size Our protocol stops at this point 5 Ch. 1-7: Distributed prot. 0 Ch. 1-7: Forced CW Time (s) Aggregated throughput of cheaters (Mbits/s) - IEEE Infocom

23 Conclusions Static CSMA/CA game admits two families of Nash equilibria one family includes equilibria that are also Pareto-optimal Nash bargaining framework is appropriate to study fairness at the MAC layer using this framework we have identified the unique Pareto-optimal point exhibiting efficiency and fairness We have shown how to make this Pareto-optimal point a Nash equilibrium point, by providing a fully distributed algorithm that leads a population of greedy stations to the efficient Paret-optimal Nash equilibrium

24 Conclusions Static CSMA/CA game admits two families of Nash equilibria one family includes equilibria that are also Pareto-optimal Nash bargaining framework is appropriate to study fairness at the MAC layer using this framework we have identified the unique Pareto-optimal point exhibiting efficiency and fairness We have shown how to make this Pareto-optimal point a Nash equilibrium point, by providing a fully distributed algorithm that leads a population of greedy stations to the efficient Paret-optimal Nash equilibrium CSMA/CA game has a high educational value - IEEE Infocom

On Selfish Behavior in CSMA/CA Networks

On Selfish Behavior in CSMA/CA Networks On Selfish Behavior in CSMA/CA Networks Mario Čagalj, Saurabh Ganeriwal,ImadAad and Jean-Pierre Hubaux School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), CH-1015

More information

MS&E 246: Lecture 17 Network routing. Ramesh Johari

MS&E 246: Lecture 17 Network routing. Ramesh Johari MS&E 246: Lecture 17 Network routing Ramesh Johari Network routing Basic definitions Wardrop equilibrium Braess paradox Implications Network routing N users travel across a network Transportation Internet

More information

Ü B U N G S A U F G A B E N. S p i e l t h e o r i e

Ü B U N G S A U F G A B E N. S p i e l t h e o r i e T E C H N I S C H E U N I V E R S I T Ä T D R E S D E N F A K U L T Ä T E L E K T R O T E C H N I K U N D I N F O R M A T I O N S T E C H N I K Ü B U N G S A U F G A B E N S p i e l t h e o r i e by Alessio

More information

Spectrum Sharing between DSRC and WiFi: A Repeated Game Approach

Spectrum Sharing between DSRC and WiFi: A Repeated Game Approach pectrum haring between DRC and WiFi: A Repeated Game Approach neihil Gopal, anjit K. Kaul and Rakesh Chaturvedi Wireless ystems Lab, IIIT-Delhi, India Department of ocial ciences & Humanities, IIIT-Delhi,

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

A Game-Theoretic Model for Medium Access Control

A Game-Theoretic Model for Medium Access Control A Game-Theoretic Model for Medium Access Control (Invited Paper) Lijun Chen, Tao Cui, Steven H. Low, and John C. Doyle Division of Engineering and Applied Science California Institute of Technology Pasadena,

More information

Service differentiation without prioritization in IEEE WLANs

Service differentiation without prioritization in IEEE WLANs Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs

More information

Repeated Inter-Session Network Coding Games: Efficiency and Min-Max Bargaining Solution

Repeated Inter-Session Network Coding Games: Efficiency and Min-Max Bargaining Solution Repeated Inter-Session Networ Coding Games: Efficiency and Min-Max Bargaining Solution Hamed Mohsenian-Rad, Member, IEEE, Jianwei Huang, Senior Member, IEEE, Vincent W.S. Wong, Senior Member, IEEE, and

More information

Research Article Stackelberg Contention Games in Multiuser Networks

Research Article Stackelberg Contention Games in Multiuser Networks Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 29, Article ID 35978, 5 pages doi:.55/29/35978 Research Article Stackelberg Contention Games in Multiuser Networks

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.

More information

ALOHA Performs Optimal Power Control in Poisson Networks

ALOHA Performs Optimal Power Control in Poisson Networks ALOHA erforms Optimal ower Control in oisson Networks Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu

More information

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Pierre Coucheney, Corinne Touati, Bruno Gaujal INRIA Alcatel-Lucent, LIG Infocom 2009 Pierre Coucheney (INRIA)

More information

Bargaining, Contracts, and Theories of the Firm. Dr. Margaret Meyer Nuffield College

Bargaining, Contracts, and Theories of the Firm. Dr. Margaret Meyer Nuffield College Bargaining, Contracts, and Theories of the Firm Dr. Margaret Meyer Nuffield College 2015 Course Overview 1. Bargaining 2. Hidden information and self-selection Optimal contracting with hidden information

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

A (Brief) Introduction to Game Theory

A (Brief) Introduction to Game Theory A (Brief) Introduction to Game Theory Johanne Cohen PRiSM/CNRS, Versailles, France. Goal Goal is a Nash equilibrium. Today The game of Chicken Definitions Nash Equilibrium Rock-paper-scissors Game Mixed

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Extensive Form Games I

Extensive Form Games I Extensive Form Games I Definition of Extensive Form Game a finite game tree X with nodes x X nodes are partially ordered and have a single root (minimal element) terminal nodes are z Z (maximal elements)

More information

Communication Games on the Generalized Gaussian Relay Channel

Communication Games on the Generalized Gaussian Relay Channel Communication Games on the Generalized Gaussian Relay Channel Dileep M. alathil Department of Electrical Engineering University of Southern California manisser@usc.edu Rahul Jain EE & ISE Departments University

More information

MS&E 246: Lecture 18 Network routing. Ramesh Johari

MS&E 246: Lecture 18 Network routing. Ramesh Johari MS&E 246: Lecture 18 Network routing Ramesh Johari Network routing Last lecture: a model where N is finite Now: assume N is very large Formally: Represent the set of users as a continuous interval, [0,

More information

Economics 209B Behavioral / Experimental Game Theory (Spring 2008) Lecture 3: Equilibrium refinements and selection

Economics 209B Behavioral / Experimental Game Theory (Spring 2008) Lecture 3: Equilibrium refinements and selection Economics 209B Behavioral / Experimental Game Theory (Spring 2008) Lecture 3: Equilibrium refinements and selection Theory cannot provide clear guesses about with equilibrium will occur in games with multiple

More information

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs Technical Report Christina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran EPFL, Switzerland, Institute IMDEA

More information

How do Wireless Chains Behave? The Impact of MAC Interactions

How do Wireless Chains Behave? The Impact of MAC Interactions The Impact of MAC Interactions S. Razak 1 Vinay Kolar 2 N. Abu-Ghazaleh 1 K. Harras 1 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Wireless Networks RWTH Aachen University,

More information

Confronting Theory with Experimental Data and vice versa. European University Institute. May-Jun Lectures 7-8: Equilibrium

Confronting Theory with Experimental Data and vice versa. European University Institute. May-Jun Lectures 7-8: Equilibrium Confronting Theory with Experimental Data and vice versa European University Institute May-Jun 2008 Lectures 7-8: Equilibrium Theory cannot provide clear guesses about with equilibrium will occur in games

More information

Negotiation: Strategic Approach

Negotiation: Strategic Approach Negotiation: Strategic pproach (September 3, 007) How to divide a pie / find a compromise among several possible allocations? Wage negotiations Price negotiation between a seller and a buyer Bargaining

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989)

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) September 13th, 1995 Donald Ferguson*,** Christos Nikolaou* Yechiam Yemini** *IBM T.J. Watson Research Center

More information

Controlled Matching Game for Resource Allocation and User Association in WLANs

Controlled Matching Game for Resource Allocation and User Association in WLANs Controlled Matching Game for Resource Allocation and User Association in WLANs Mikael Touati, Rachid El-Azouzi, Marceau Coupechoux, Eitan Altman and Jean-Marc Kelif arxiv:50.0093v2 [cs.gt] 2 May 206 Abstract

More information

On the stability of flow-aware CSMA

On the stability of flow-aware CSMA On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Sebastian Marban, Peter van de Ven, Peter Borm, Herbert Hamers. A cooperative game-theoretic approach to ALOHA RM/10/049

Sebastian Marban, Peter van de Ven, Peter Borm, Herbert Hamers. A cooperative game-theoretic approach to ALOHA RM/10/049 Sebastian Marban, Peter van de Ven, Peter Borm, Herbert Hamers A cooperative game-theoretic approach to ALOHA RM/10/049 A cooperative game-theoretic approach to ALOHA Sebastian Marban 1 Peter van de Ven

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

What kind of bonus point system makes the rugby teams more offensive?

What kind of bonus point system makes the rugby teams more offensive? What kind of bonus point system makes the rugby teams more offensive? XIV Congreso Dr. Antonio Monteiro - 2017 Motivation Rugby Union is a game in constant evolution Experimental law variations every year

More information

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games A Polynomial-time Nash Equilibrium Algorithm for Repeated Games Michael L. Littman mlittman@cs.rutgers.edu Rutgers University Peter Stone pstone@cs.utexas.edu The University of Texas at Austin Main Result

More information

Title: The Castle on the Hill. Author: David K. Levine. Department of Economics UCLA. Los Angeles, CA phone/fax

Title: The Castle on the Hill. Author: David K. Levine. Department of Economics UCLA. Los Angeles, CA phone/fax Title: The Castle on the Hill Author: David K. Levine Department of Economics UCLA Los Angeles, CA 90095 phone/fax 310-825-3810 email dlevine@ucla.edu Proposed Running Head: Castle on the Hill Forthcoming:

More information

An Evolutionary Game Perspective to ALOHA with power control

An Evolutionary Game Perspective to ALOHA with power control An Evolutionary Game Perspective to ALOHA with power control E. Altman a, N. Bonneau a, M. Debbah b and G. Caire b a MAESTRO, INRIA Sophia-Antipolis, 004 Route des Lucioles, B.P.93, 0690 Sophia-Antipolis,

More information

Battery-State Dependent Power Control as a Dynamic Game

Battery-State Dependent Power Control as a Dynamic Game 1 Battery-State Dependent Power Control as a Dynamic Game Ishai Menache and Eitan Altman Faculty of Electrical Engineering, Technion, Haifa 32000, Israel INRIA, Sophia-Antipolis, 2004 Route des Lucioles,

More information

Effective Carrier Sensing in CSMA Networks under Cumulative Interference

Effective Carrier Sensing in CSMA Networks under Cumulative Interference INFOCOM 2010 Effective Carrier Sensing in MA Networks under Cumulative Interference Liqun Fu Soung Chang Liew Jianwei Huang Department of Information Engineering, The Chinese University of Hong Kong Introduction

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com

More information

Distributed Learning based on Entropy-Driven Game Dynamics

Distributed Learning based on Entropy-Driven Game Dynamics Distributed Learning based on Entropy-Driven Game Dynamics Bruno Gaujal joint work with Pierre Coucheney and Panayotis Mertikopoulos Inria Aug., 2014 Model Shared resource systems (network, processors)

More information

Enforcing Truthful-Rating Equilibria in Electronic Marketplaces

Enforcing Truthful-Rating Equilibria in Electronic Marketplaces Enforcing Truthful-Rating Equilibria in Electronic Marketplaces T. G. Papaioannou and G. D. Stamoulis Networks Economics & Services Lab, Dept.of Informatics, Athens Univ. of Economics & Business (AUEB

More information

Game Theoretic Solutions for Precoding Strategies over the Interference Channel

Game Theoretic Solutions for Precoding Strategies over the Interference Channel Game Theoretic Solutions for Precoding Strategies over the Interference Channel Jie Gao, Sergiy A. Vorobyov, and Hai Jiang Department of Electrical & Computer Engineering, University of Alberta, Canada

More information

Game Theory Correlated equilibrium 1

Game Theory Correlated equilibrium 1 Game Theory Correlated equilibrium 1 Christoph Schottmüller University of Copenhagen 1 License: CC Attribution ShareAlike 4.0 1 / 17 Correlated equilibrium I Example (correlated equilibrium 1) L R U 5,1

More information

Game Theory: introduction and applications to computer networks

Game Theory: introduction and applications to computer networks Game Theory: introduction and applications to computer networks Introduction Giovanni Neglia INRIA EPI Maestro 27 January 2014 Part of the slides are based on a previous course with D. Figueiredo (UFRJ)

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 8 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu March 6, 2007 Jelenković (Columbia University)

More information

Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State Information

Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State Information Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State Information Ishai Menache and Nahum Shimkin Department of Electrical Engineering Technion, Israel Institute of Technology Haifa

More information

Game Theory. Professor Peter Cramton Economics 300

Game Theory. Professor Peter Cramton Economics 300 Game Theory Professor Peter Cramton Economics 300 Definition Game theory is the study of mathematical models of conflict and cooperation between intelligent and rational decision makers. Rational: each

More information

Mechanism Design: Implementation. Game Theory Course: Jackson, Leyton-Brown & Shoham

Mechanism Design: Implementation. Game Theory Course: Jackson, Leyton-Brown & Shoham Game Theory Course: Jackson, Leyton-Brown & Shoham Bayesian Game Setting Extend the social choice setting to a new setting where agents can t be relied upon to disclose their preferences honestly Start

More information

Computing Solution Concepts of Normal-Form Games. Song Chong EE, KAIST

Computing Solution Concepts of Normal-Form Games. Song Chong EE, KAIST Computing Solution Concepts of Normal-Form Games Song Chong EE, KAIST songchong@kaist.edu Computing Nash Equilibria of Two-Player, Zero-Sum Games Can be expressed as a linear program (LP), which means

More information

distributed approaches For Proportional and max-min fairness in random access ad-hoc networks

distributed approaches For Proportional and max-min fairness in random access ad-hoc networks distributed approaches For Proportional and max-min fairness in random access ad-hoc networks Xin Wang, Koushik Kar Rensselaer Polytechnic Institute OUTline Introduction Motivation and System model Proportional

More information

: Cryptography and Game Theory Ran Canetti and Alon Rosen. Lecture 8

: Cryptography and Game Theory Ran Canetti and Alon Rosen. Lecture 8 0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 8 December 9, 2009 Scribe: Naama Ben-Aroya Last Week 2 player zero-sum games (min-max) Mixed NE (existence, complexity) ɛ-ne Correlated

More information

Routing in Max-min Fair Networks: A Game Theoretic Approach

Routing in Max-min Fair Networks: A Game Theoretic Approach Routing in Max-min Fair Networks: A Game Theoretic Approach Dejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra and Jin Zhang Abstract In this paper, we study the problem of routing in networks with max-min

More information

Competitive Scheduling in Wireless Collision Channels with Correlated Channel State

Competitive Scheduling in Wireless Collision Channels with Correlated Channel State Competitive Scheduling in Wireless Collision Channels with Correlated Channel State Utku Ozan Candogan, Ishai Menache, Asuman Ozdaglar and Pablo A. Parrilo Abstract We consider a wireless collision channel,

More information

Fraud within Asymmetric Multi-Hop Cellular Networks

Fraud within Asymmetric Multi-Hop Cellular Networks Financial Cryptography 2005 EPFL, Lausanne, Switzerland ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Wireless networks Single-hop cellular network Multi-hop network Multi-hop cellular network Asymmetric multi-hop

More information

A Multi-Leader Stackelberg Game for Two-Hop Systems with Wireless Energy Transfer

A Multi-Leader Stackelberg Game for Two-Hop Systems with Wireless Energy Transfer A Multi-Leader Stacelberg Game for Two-Hop Systems with Wireless Energy Transfer Shiyang Leng and Aylin Yener Wireless Communications and Networing Laboratory WCAN School of Electrical Engineering and

More information

REPEATED GAMES. Jörgen Weibull. April 13, 2010

REPEATED GAMES. Jörgen Weibull. April 13, 2010 REPEATED GAMES Jörgen Weibull April 13, 2010 Q1: Can repetition induce cooperation? Peace and war Oligopolistic collusion Cooperation in the tragedy of the commons Q2: Can a game be repeated? Game protocols

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,

More information

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy

More information

Game Theory. Wolfgang Frimmel. Perfect Bayesian Equilibrium

Game Theory. Wolfgang Frimmel. Perfect Bayesian Equilibrium Game Theory Wolfgang Frimmel Perfect Bayesian Equilibrium / 22 Bayesian Nash equilibrium and dynamic games L M R 3 2 L R L R 2 2 L R L 2,, M,2, R,3,3 2 NE and 2 SPNE (only subgame!) 2 / 22 Non-credible

More information

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,

More information

6.254 : Game Theory with Engineering Applications Lecture 13: Extensive Form Games

6.254 : Game Theory with Engineering Applications Lecture 13: Extensive Form Games 6.254 : Game Theory with Engineering Lecture 13: Extensive Form Games Asu Ozdaglar MIT March 18, 2010 1 Introduction Outline Extensive Form Games with Perfect Information One-stage Deviation Principle

More information

Static Models of Oligopoly

Static Models of Oligopoly Static Models of Oligopoly Cournot and Bertrand Models Mateusz Szetela 1 1 Collegium of Economic Analysis Warsaw School of Economics 3 March 2016 Outline 1 Introduction Game Theory and Oligopolies 2 The

More information

Procedures we can use to resolve disagreements

Procedures we can use to resolve disagreements February 15th, 2012 Motivation for project What mechanisms could two parties use to resolve disagreements? Default position d = (0, 0) if no agreement reached Offers can be made from a feasible set V Bargaining

More information

TWO-PERSON COOPERATIVE GAMES

TWO-PERSON COOPERATIVE GAMES TWO-PERSON COOPERATIVE GAMES Part II: The Axiomatic Approach J. Nash 1953 The Approach Rather than solve the two-person cooperative game by analyzing the bargaining process, one can attack the problem

More information

Computing Minmax; Dominance

Computing Minmax; Dominance Computing Minmax; Dominance CPSC 532A Lecture 5 Computing Minmax; Dominance CPSC 532A Lecture 5, Slide 1 Lecture Overview 1 Recap 2 Linear Programming 3 Computational Problems Involving Maxmin 4 Domination

More information

Channel-Relay Price Pair: Towards Arbitrating Incentives in Wireless Ad hoc Networks

Channel-Relay Price Pair: Towards Arbitrating Incentives in Wireless Ad hoc Networks 1 Channel-Relay Price Pair: Towards Arbitrating Incentives in Wireless Ad hoc Networks Yuan Xue, Baochun Li, Klara Nahrstedt Abstract Cooperation in wireless ad hoc networks has two-fold implications.

More information

Congestion Control. Topics

Congestion Control. Topics Congestion Control Topics Congestion control what & why? Current congestion control algorithms TCP and UDP Ideal congestion control Resource allocation Distributed algorithms Relation current algorithms

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area

More information

The Water-Filling Game in Fading Multiple Access Channels

The Water-Filling Game in Fading Multiple Access Channels The Water-Filling Game in Fading Multiple Access Channels Lifeng Lai and Hesham El Gamal arxiv:cs/05203v [cs.it] 3 Dec 2005 February, 2008 Abstract We adopt a game theoretic approach for the design and

More information

Economics 201B Economic Theory (Spring 2017) Bargaining. Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7).

Economics 201B Economic Theory (Spring 2017) Bargaining. Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7). Economics 201B Economic Theory (Spring 2017) Bargaining Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7). The axiomatic approach (OR 15) Nash s (1950) work is the starting point

More information

Exact Distribution of Access Delay in IEEE DCF MAC

Exact Distribution of Access Delay in IEEE DCF MAC Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Analysis of random-access MAC schemes

Analysis of random-access MAC schemes Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals

More information

Methodologies for Analyzing Equilibria in Wireless Games

Methodologies for Analyzing Equilibria in Wireless Games Methodologies for Analyzing Equilibria in Wireless Games Samson Lasaulce, Merouane Debbah, Eitan Altman To cite this version: Samson Lasaulce, Merouane Debbah, Eitan Altman. Methodologies for Analyzing

More information

Node Selection, Synchronization and Power Allocation in Cooperative Wireless Networks

Node Selection, Synchronization and Power Allocation in Cooperative Wireless Networks Node Selection, Synchronization and Power Allocation in Cooperative Wireless Networks Mohammed W. Baidas Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University

More information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi M. Minier and JP. Babau Centre d'innovations en Télécommunication & Intégration de services wassim.znaidi@insa-lyon.fr

More information

Costless Delay in Negotiations

Costless Delay in Negotiations Costless Delay in Negotiations P. Jean-Jacques Herings Maastricht University Harold Houba VU University Amsterdam and Tinbergen Institute Preliminary version. Do not quote without the permission of the

More information

MIMO Cognitive Radio: A Game Theoretical Approach Gesualdo Scutari, Member, IEEE, and Daniel P. Palomar, Senior Member, IEEE

MIMO Cognitive Radio: A Game Theoretical Approach Gesualdo Scutari, Member, IEEE, and Daniel P. Palomar, Senior Member, IEEE IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 2, FEBRUARY 2010 761 MIMO Cognitive Radio: A Game Theoretical Approach Gesualdo Scutari, Member, IEEE, and Daniel P. Palomar, Senior Member, IEEE Abstract

More information

Game Theory. Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin

Game Theory. Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin Game Theory Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin Bimatrix Games We are given two real m n matrices A = (a ij ), B = (b ij

More information

Math 152: Applicable Mathematics and Computing

Math 152: Applicable Mathematics and Computing Math 152: Applicable Mathematics and Computing May 26, 2017 May 26, 2017 1 / 17 Announcements Homework 6 was posted on Wednesday, due next Wednesday. Last homework is Homework 7, posted next week (due

More information

Game theory is a field of applied mathematics that

Game theory is a field of applied mathematics that [ Gesualdo Scutari, Daniel P. Palomar, Jong-Shi Pang, and Francisco Facchinei ] Flexible Design of Cognitive Radio Wireless Systems [From game theory to variational inequality theory] Game theory is a

More information

6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Potential Games

6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Potential Games 6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Asu Ozdaglar MIT March 2, 2010 1 Introduction Outline Review of Supermodular Games Reading: Fudenberg and Tirole, Section 12.3.

More information

Microeconomics for Business Practice Session 3 - Solutions

Microeconomics for Business Practice Session 3 - Solutions Microeconomics for Business Practice Session - Solutions Instructor: Eloisa Campioni TA: Ugo Zannini University of Rome Tor Vergata April 8, 016 Exercise 1 Show that there are no mixed-strategy Nash equilibria

More information

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b,

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b, ECE 788 - Optimization for wireless networks Final Please provide clear and complete answers. PART I: Questions - Q.. Discuss an iterative algorithm that converges to the solution of the problem minimize

More information

Repeated Game Analysis for Cooperative MAC with Incentive Design for Wireless Networks

Repeated Game Analysis for Cooperative MAC with Incentive Design for Wireless Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (ACCEPTED) 1 Repeated Game Analysis for Cooperative MAC with Incentive Design for Wireless Networks Peijian Ju and Wei Song, Senior Member, IEEE Abstract Cooperative

More information

Game Theory. Monika Köppl-Turyna. Winter 2017/2018. Institute for Analytical Economics Vienna University of Economics and Business

Game Theory. Monika Köppl-Turyna. Winter 2017/2018. Institute for Analytical Economics Vienna University of Economics and Business Monika Köppl-Turyna Institute for Analytical Economics Vienna University of Economics and Business Winter 2017/2018 Static Games of Incomplete Information Introduction So far we assumed that payoff functions

More information

Long-Run versus Short-Run Player

Long-Run versus Short-Run Player Repeated Games 1 Long-Run versus Short-Run Player a fixed simultaneous move stage game Player 1 is long-run with discount factor δ actions a A a finite set 1 1 1 1 2 utility u ( a, a ) Player 2 is short-run

More information

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS Shruti Sharma and Demos Teneketzis Department of Electrical Engineering and Computer Science University of

More information

NETWORK Coding (NC) [2] is a promising technique to. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

NETWORK Coding (NC) [2] is a promising technique to. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TC.206.2586068,

More information

arxiv: v1 [cs.ai] 22 Feb 2018

arxiv: v1 [cs.ai] 22 Feb 2018 Reliable Intersection Control in Non-cooperative Environments* Muhammed O. Sayin 1,2, Chung-Wei Lin 2, Shinichi Shiraishi 2, and Tamer Başar 1 arxiv:1802.08138v1 [cs.ai] 22 Feb 2018 Abstract We propose

More information

Computing Minmax; Dominance

Computing Minmax; Dominance Computing Minmax; Dominance CPSC 532A Lecture 5 Computing Minmax; Dominance CPSC 532A Lecture 5, Slide 1 Lecture Overview 1 Recap 2 Linear Programming 3 Computational Problems Involving Maxmin 4 Domination

More information

Mohammad Hossein Manshaei 1394

Mohammad Hossein Manshaei 1394 Mohammad Hossein Manshaei manshaei@gmail.com 1394 2 Concept related to a specific branch of Biology Relates to the evolution of the species in nature Powerful modeling tool that has received a lot of attention

More information

Computational complexity of solution concepts

Computational complexity of solution concepts Game Theory and Algorithms, Lake Como School of Advanced Studies 7-11 September 2015, Campione d'italia Computational complexity of solution concepts Gianluigi Greco Dept. of Mathematics and Computer Science

More information