Mobility

MAC Games for Distributed Wireless Network Security With Incomplete Information of Selfish and Malicious User Types

Free registration required

Executive Summary

The authors consider game theoretic models of wireless Medium Access Control (MAC) in which each transmitter makes individual decisions regarding their power level or transmission probability. This allows for scalable distributed operation; however, it can also enable users to pursue malicious objectives such as jamming other nodes to deny them service. They study games with two types of players: selfish and malicious transmitters. Each type is characterized by a utility function depending on throughput reward and energy cost. Furthermore, they focus on the setting where the transmitters have incomplete information regarding other transmitters' types, modeled as probabilistic beliefs.

  • Format: PDF
  • Size: 227.04 KB