A game theoretic model for wireless medium access control in the presence of hidden terminals

Seyed-Hani Mortazavi Najafabadi, C. C. Constantinou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

This paper proposes a game-theoretic random channel access model, compliant with the IEEE 802.11 standard that can be integrated into the distributed coordination function. The objective is to design a game theoretic model that can optimize both throughput and channel access delay in each node in the presence of hidden terminals and thus optimize fairness. We propose a utility function that can decouple the protocol's dynamic adaptation to channel load from collision detection. We demonstrate that our model can reach a Nash equilibrium resulting in a stable contention window, provided that a node adapts its behavior to the idle rate of the broadcast channel, coupled with observation of its own transmission activity. Simulation results show that this model is capable of achieving lower channel access delay and better throughput than the standard IEEE 802.11 distributed coordination function.

Original languageEnglish
Title of host publicationIEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1731-1736
Number of pages6
ISBN (Print)9781467362351
DOIs
Publication statusPublished - 1 Dec 2013
Event2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013 - London, United Kingdom
Duration: 8 Sept 201311 Sept 2013

Conference

Conference2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013
Country/TerritoryUnited Kingdom
CityLondon
Period8/09/1311/09/13

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A game theoretic model for wireless medium access control in the presence of hidden terminals'. Together they form a unique fingerprint.

Cite this