References
- N. Abramson, "The Aloha system: another alternative for computer communications," in Proc. of AFIPS, vol. 36, pp. 295-298, Nov. 17-19, 1970.
- A. B. MacKenzie and S. B. Wicker, "Selfish users in aloha: A game theoretic approach," in Proc. of the Fall 2001 IEEE Vehicular Technology Conference (VTC Fall '01), pp. 1354-1357, Oct. 2001.
- A. B. MacKenzie and S. B. Wicker, "Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information," in Proc. of IEEE Conference on Computer Communications (INFOCOM), pp.1583-1590, Apr. 1-3, 2003.
- E. Altman, R. E. Azouzi and T. Jimnez, "Slotted Aloha as a game with partial information," The International Journal of Computer and Telecommunications Networking, vol. 45, no 6, pp. 701-713, 2004.
- Y. Cho, C. S. Hwang and F. A. Tobagi, "Design of Robust Random Access Protocols For Wireless Networks using Game Theoretic Models," in Proc. of IEEE INFOCOM, pp. 1750-1758, Apr. 13-18, 2008.
- L. Zhao, J. Zhang, K. Yang and H. Zhang, "Using incompletely cooperative game theory in mobile ad hoc networks," in Proc. IEEE International Conference on Communications (ICC '07), pp. 3401-3406, June 2007.
- R. T. B. Ma, V. Misra and D. Rubenstein, "An Analysis of Generalized Slotted-Aloha Protocols," IEEE/ACM Transactions on Networking, pp. 936-949, June 2009.
- T. Cui, L. Chen and S. Low, "A game-theoretic framework for medium access control," IEEE Journal on Selected Areas in Communications, vol. 26, no. 7, pp. 1116-1127, Sep. 2008. https://doi.org/10.1109/JSAC.2008.080909
- L. Chen, S. Low and J. Doyle, "Random Access Game and Medium Access Control Design," IEEE/ACM Transactions on Networking, vol. 17, no. 3, pp. 1303-1316, 2010.
- H. Inaltekin and S. Wicker, "The analysis of Nash equilibria of the one- shot random-access game for wireless networks and the behavior of selfish nodes," IEEE/ACM Transactions on Networking, vol. 16, no. 5, pp. 1094-1107, Oct. 2008. https://doi.org/10.1109/TNET.2007.909668
- Y. Jin and G. Kesidis, "Equilibria of a Noncooperative Game for Heterogeneous Users of an ALOHA Network," IEEE Communications Letters, vol. 6, no. 7, pp.282-284, July 2002. https://doi.org/10.1109/LCOMM.2002.801326
- H. Inaltekin and S. Wicker, "The analysis of Nash equilibria of the one- shot random-access game for wireless networks and the behavior of selfish nodes," IEEE/ACM Transactions on Networking, vol. 16, no. 5, pp. 1094-1107, Oct. 2008.
- H. Lee, H. Kwon, A. Motskin and L. Guibas, "Interference-aware MAC protocol for wireless networks by a game-theoretic approach," in Proc. 28th IEEE Conference on Computer Communications (INFOCOM '09), pp. 1854-1862, Apr. 2009.
- J. Lee, A. Tang, J. Huang, M. Chiang and A. R. Calderbank, "Reverse-engineering mac: A non-cooperative game model," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1135-1147, Aug. 2007. https://doi.org/10.1109/JSAC.2007.070808
- Y. Jin and G. Kesidis, "Distributed contention window control for selfish users in IEEE 802.11 wireless LANs," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1113-1123, Aug. 2007. https://doi.org/10.1109/JSAC.2007.070806
- J. Konorski, "A game-theoretic study of CSMA/CA under a backoff attack," IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1167-1178, Dec. 2006. https://doi.org/10.1109/TNET.2006.886298
- J. Lee, A. Tang, J. Huang, M. Chiang and A. R. Calderbank, "Reverse-engineering mac: A non-cooperative game model," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1135-1147, Aug. 2007.
- Y. Jin and G. Kesidis, "Distributed contention window control for selfish users in IEEE 802.11 wireless LANs," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1113-1123, Aug. 2007.
- L. Zhao, J. Zhang and H. Zhang, "GDCF: game-theoretic distributed co-ordination function in WLANs," Electronics Letters, vol. 43, no. 9, pp. 510-511, Apr. 2007. https://doi.org/10.1049/el:20070653
- L. Zhao, J. Zhang and H. Zhang, "Using incompletely cooperative game theory in wireless mesh networks," IEEE/ACM Transactions on Networking, vol. 22, no. 1, pp. 39-44, Jan. - Feb. 2008.
- M. H. Ngo and V. Krishnamurthy, "Game theoretic cross-layer trans-mission policies in multipacket reception wireless networks," IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 1911-1926, May 2007. https://doi.org/10.1109/TSP.2006.889403
- K. Park, J. C. Hou, T. Basar and H. Kim, "Noncooperative Carrier Sense Game in Wireless Networks," IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5280--5289, 2009. https://doi.org/10.1109/TWC.2009.081582
- D. Fudenberg and J. Tirole, Game Theory, the MIT Press, 1991.
- C. Chin, "Slotted Aloha with time-variant transmission probabilities," to be submitted, 2011.
- J. F. Nash, "Equilibrium points in n-person games," in Proc. of the National Academy of Sciences of the United States of America, vol. 36, no. 1, pp.48-49, Jan. 1950.
- A. B. MacKenzie and L. A. DaSilva, "Game Theory for Wireless Engineers," San Rafael, California: Morgan & Claypool Publishers, 2006.
Cited by
- Selfish attacks and detection in cognitive radio Ad-Hoc networks vol.27, pp.3, 2013, https://doi.org/10.1109/mnet.2013.6523808