Selfish Users in Graph-Based Random Access

被引:0
|
作者
Clazzer, Federico [1 ]
机构
[1] German Aerosp Ctr DLR, Inst Commun & Nav, D-82234 Oberpfaffenhofen, Wessling, Germany
关键词
CODED SLOTTED ALOHA; GAME; CRDSA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent advances in random access (RA) have highlighted the performance improvement yield by the joint use of proactive replication of packets and successive interference cancellation (SIC). Users send multiple replicas and collisions are resolved via iterative cancellation of the interference. The optimal choice for the number of replicas is drawn from a properly designed probability mass function (PMF). Selfish uncoordinated users are prone to choose the maximum number of replicas and diverge from the designed PMF. Exploiting game theoretic tools, we describe such scenario as a non-cooperative game. Properly setting the cost per replica transmission, we are able to drive the Nash equilibrium to the designed PMF and thus hinder the users to diverge. Numerical results complement the study, showing the practical impact of the proposed solution.
引用
收藏
页码:1960 / 1966
页数:7
相关论文
共 50 条
  • [31] Random Graph-Based M-QAM Classification for MIMO Systems
    Sarfraz, Mubashar
    Alam, Sheraz
    Ghauri, Sajjad A.
    Mahmood, Asad
    Akram, M. Nadeem
    Rehman, M. Javvad Ur
    Sohail, M. Farhan
    Kebedew, Teweldebrhan Mezgebo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [32] Cooperative caching in fog radio access networks: a graph-based approach
    Jiang, Yanxiang
    Cui, Xiaoting
    Bennis, Mehdi
    Zheng, Fu-Chun
    Fan, Baotian
    You, Xiaohu
    IET COMMUNICATIONS, 2019, 13 (20) : 3519 - 3528
  • [33] Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers
    Iacovazzi, Alfonso
    Raza, Shahid
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 30 - 37
  • [34] Random task graph-based comparative study of deterministic scheduling algorithms
    Han, Jia-Yuan
    Birmiwal, K.
    Wang, C.Y.
    Hsu, P.K.
    International Journal in Computer Simulation, 1994, 4 (01):
  • [35] Efficient graph-based tensile strength simulations of random fiber structures
    Harmening, Marc
    Marheineke, Nicole
    Wegener, Raimund
    ZAMM-ZEITSCHRIFT FUR ANGEWANDTE MATHEMATIK UND MECHANIK, 2021, 101 (09):
  • [36] Towards Graph-based and Semantic Search in Legal Information Access Systems
    Mimouni, Nada
    Nazarenko, Adeline
    Paul, Eve
    Salotti, Sylvie
    LEGAL KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 271 : 163 - 168
  • [37] Random access games: Selfish nodes with incomplete information
    Inaltekin, Hazer
    Wicker, Stephen B.
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3896 - 3901
  • [38] A Lightweight Graph-Based Model for Inter-networking Access Control
    Kang, Zhongmiao
    Jiang, Wenting
    Chen, Yan
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 589 - 597
  • [39] Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access
    Paolini, Enrico
    Liva, Gianluigi
    Chiani, Marco
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (12) : 6815 - 6832
  • [40] Selfish Users and Fair Sharing of Bandwidth in Distributed Medium Access
    Guha, Ratan K.
    Rakshit, Sudipta
    INTERNATIONAL JOURNAL OF ENTERPRISE INFORMATION SYSTEMS, 2006, 2 (02) : 28 - 44