Mechanisms to Induce Random Choice

  • Antoniy Ganchev
  • Lata Narayanan
  • Sunil Shende
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4286)


Media access protocols in wireless networks require each contending node to wait for a backoff time chosen randomly from a fixed range, before attempting to transmit on a shared channel. However, nodes acting in their own selfish interest may not follow the protocol. In this paper, we use a mechanism design approach to study how nodes might be induced to adhere to the protocol. In particular, a static version of the problem is modeled as a strategic game (the protocol) played by non-cooperating, rational players (the nodes). We present a game which exhibits a unique mixed-strategy Nash equilibrium that corresponds to nodes choosing backoff times randomly from a given range of values, according to any apriori given distribution. We extend this result to the situation when each player can choose a backoff value from a different range, provided there are at least two players choosing from the largest range. In contrast, we show that if there are exactly two players with different backoff ranges, then it becomes impossible to design a strategic game with a unique such Nash equilibrium. Finally, we show an impossibility result under certain natural limitations on the network authority.


Utility Function Nash Equilibrium Mixed Strategy Pure Strategy Contention Window 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Conti, M., Gregori, E., Maselli, G.: Cooperation issues in mobile ad hoc networks. In: ICDCSW 2004: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW 2004), pp. 803–808 (2004)Google Scholar
  2. 2.
    Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of MOBIHOC, pp. 226–236 (2002)Google Scholar
  3. 3.
    Marti, S., Guili, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of ACM MOBICOM, pp. 255–265 (2000)Google Scholar
  4. 4.
    Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of Communications and Multimedia Security, pp. 107–121 (2002)Google Scholar
  5. 5.
    Buttyan, L., Hubaux, J.P.: Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC/2001, Swiss Federal Institue of Technology (2001)Google Scholar
  6. 6.
    Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of IEEE INFOCOM 2003, vol. 3, pp. 1987–1997 (2003)Google Scholar
  7. 7.
    Kyasanur, P., Vaidya, N.: Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing 4, 502–516 (2005)CrossRefGoogle Scholar
  8. 8.
    Osbourne, M., Rubenstein, A.: A Course In Game Theory. The MIT Press, Cambridge (1996)Google Scholar
  9. 9.
    Cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.P.: On selfish behavior in CSMA/CA networks. In: Proceedings of IEEE INFOCOM 2005, vol. 4, pp. 2513–2524 (2005)Google Scholar
  10. 10.
    MacKenzie, A., Wicker, S.: Selfish users in Aloha: a game theoretic approach. In: Proceedings of IEEE Vehicular Technology Conference, pp. 1354–1357 (2001)Google Scholar
  11. 11.
    Nissan, N., Ronen, A.: Algorithmic mechanism design. In: STOC 1999: Proceedings of the thirty-first annual ACM symposium on Theory of computing, pp. 129–140 (1999)Google Scholar
  12. 12.
    Feigenbaum, J., Papadimitrou, C., Sami, R., Shenker, S.: A BGP-based mechanism for lowest-cost routing. In: Proceedings of the 21st Symposium on Distributed Computing, pp. 173–182 (2002)Google Scholar
  13. 13.
    Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom 2003: Proceedings of the 9th annual international conference on Mobile computing and networking, pp. 245–259 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Antoniy Ganchev
    • 1
  • Lata Narayanan
    • 1
  • Sunil Shende
    • 2
  1. 1.Department of Computer Science and Software EngineeringConcordia UniversityMontrealCanada
  2. 2.Department of Computer ScienceRutgers UniversityCamdenUSA

Personalised recommendations