Skip to main content

Reverse engineering MAC

Publication ,  Journal Article
Tang, A; Lee, JW; Huang, J; Chiang, M; Calderbank, AR
Published in: 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006
December 1, 2006

This paper reverse engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that contention resolution algorithm in such protocols is implicitly participating in a non-cooperative game. Each link attempts to maximize a selfish local utility function, whose exact shape is reverse engineered from protocol description, through a stochastic subgradient method in which link updates its persistence probability based on its transmission success or failure. We prove that existence of a Nash equilibrium is guaranteed in general. minimum amount of backoff aggressiveness needed for uniqueness of Nash equilibrium and convergence of best response strategy are established as a function of user density. Convergence properties and connection with best response strategy are also proved for variants of stochastic-subgradient-based dynamics of game. Together with known results in reverse engineering TCP and BGP, this paper completes recent efforts in reverse engineering main protocols in layers 2-4. © 2006 IEEE.

Duke Scholars

Published In

2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006

DOI

Publication Date

December 1, 2006

Related Subject Headings

  • General Science & Technology
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Tang, A., Lee, J. W., Huang, J., Chiang, M., & Calderbank, A. R. (2006). Reverse engineering MAC. 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006. https://doi.org/10.1109/WIOPT.2006.1666466
Tang, A., J. W. Lee, J. Huang, M. Chiang, and A. R. Calderbank. “Reverse engineering MAC.” 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006, December 1, 2006. https://doi.org/10.1109/WIOPT.2006.1666466.
Tang A, Lee JW, Huang J, Chiang M, Calderbank AR. Reverse engineering MAC. 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006. 2006 Dec 1;
Tang, A., et al. “Reverse engineering MAC.” 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006, Dec. 2006. Scopus, doi:10.1109/WIOPT.2006.1666466.
Tang A, Lee JW, Huang J, Chiang M, Calderbank AR. Reverse engineering MAC. 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006. 2006 Dec 1;

Published In

2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2006

DOI

Publication Date

December 1, 2006

Related Subject Headings

  • General Science & Technology