Game Theoretic Packet Scheduling in a Non-cooperative Wireless Environment

  • Zhen Kong
  • Yu-Kwong Kwok
Part of the Communications in Computer and Information Science book series (CCIS, volume 56)


In many practical scenarios, wireless devices are autonomous and thus, may exhibit non-cooperative behaviors due to self-interests. For instance, a wireless cellular device may be programmed to report bogus channel information to gain resource allocation advantages. In this paper, we first analyze the impact of these rationally selfish behaviors on the performance of packet scheduling algorithms in time-slotted wireless networks. We further propose a novel game theoretic approach, where a user punishes the selfish user with a probability p, to enforce cooperation among selfish users. Through simulations, we can see the wireless users are scheduled more efficiently and fairly in this non-cooperative environment with our proposed approach.


game theory incentives repeated game Nash equilibrium packet scheduling wireless networks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Buttyan, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)Google Scholar
  2. 2.
    Felegyhazi, M., Hubaux, J.P.: Wireless Operators in Shared Spectrum. In: Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM 2006), Barcelona, Catalunya, Spain, April 2006, pp. 1–11 (2006)Google Scholar
  3. 3.
    Jalali, A., Padovani, R., Pankai, R.: Data Throughput of CDMA-HDR a High Efficiency-High Data Rate Personal Communication Wireless System. In: Proceeding of the 51th IEEE Vehicular Technology Conference (VTC2000 Spring), Tokyo, Japan, January 2001, vol. 3, pp. 1854–1858 (2001)Google Scholar
  4. 4.
    Kong, Z., Kwok, Y.-K., Wang, J.: On the Impact of Selfish Behaviors in Wireless Packet Scheduling. In: Proceedings of the IEEE International Conference on Communications (ICC 2008), Beijing, China (May 2008)Google Scholar
  5. 5.
    Osborne, M.J.: An Introduction to Game Theory. Oxford University Press, New York (2004)Google Scholar
  6. 6.
    Qiu, X., Chawla, K.: On the Performance of Adaptive Modulation in Cellular Systems. IEEE Transactions on Communications 47(6), 884–895 (1999)CrossRefGoogle Scholar
  7. 7.
    Radosavac, S., Baras, J.S., Koutsopoulos, I.: A Framework for MAC Protocol Misbehavior Detection in Wireless Networks. In: Proceedings of the 4th ACM workshop on Wireless security (ACM WiSec 2005), Cologne, Germany, September 2005, pp. 33–42 (2005)Google Scholar
  8. 8.
    Tsybakov, B.S.: File Transmission Over Wireless Fast Fading Downlink. IEEE Transactions on Information Theory 48, 2323–2337 (2002)MATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Zhen Kong
    • 1
  • Yu-Kwong Kwok
    • 2
  1. 1.The University of Hong KongHong Kong
  2. 2.Colorado State UniversityFort CollinsUSA

Personalised recommendations