A cut-off phenomenon in location based random access games with imperfect information

Hazer Inaltekin, Mung Chiang, H. Vincent Poor

Research output: Contribution to conferencePaperpeer-review

Abstract

This paper analyzes the behavior of selfish transmitters under imperfect location information. The scenario considered is that of a wireless network consisting of selfish nodes that are randomly distributed over the network domain according to a known probability distribution, and that are interested in communicating with a common sink node using common radio resources. In this scenario, the wireless nodes do not know the exact locations of their competitors but rather have belief distributions about these locations. Firstly, properties of the packet success probability curve as a function of the node-sink separation are obtained for such networks. Secondly, a monotonicity property for the best-response strategies of selfish nodes is identified. That is, for any given strategies of competitors of a node, there exists a critical node-sink separation for this node such that its best-response is to transmit when its distance to the sink node is smaller than this critical threshold, and to back off otherwise. Finally, necessary and sufficient conditions for a given strategy profile to be a Nash equilibrium are provided.

Original languageEnglish (US)
DOIs
StatePublished - 2008
Event4th Annual International Conference on Wireless Internet, WICON 2008 - Maui, United States
Duration: Nov 17 2008Nov 19 2008

Conference

Conference4th Annual International Conference on Wireless Internet, WICON 2008
Country/TerritoryUnited States
CityMaui
Period11/17/0811/19/08

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Keywords

  • Imperfect information
  • Nash equilibrium
  • Random access
  • Selfish transmitters

Fingerprint

Dive into the research topics of 'A cut-off phenomenon in location based random access games with imperfect information'. Together they form a unique fingerprint.

Cite this