A Game Theoretical Approach to Design

Author(s):  
S. Mehta ◽  
B. H. Kim ◽  
K.S. Kwak

Game Theory provides a mathematical tool for the analysis of interactions between the agents with conflicting interests, hence it is a suitable tool to model some problems in communication systems, especially, to wireless sensor networks (WSNs) where the prime goal is to minimize energy consumption than high throughput and low delay. Another important aspect of WSNs are their ad-hoc topology. In such ad-hoc and distributed environment, selfish nodes can easily obtain the unfair share of the bandwidth by not following the medium access control (MAC) protocol. This selfish behavior, at the expense of well behaved nodes, can degrade the performance of overall network. In this chapter, the authors use the concepts of game theory to design an energy efficient MAC protocol for WSNs. This allows them to introduce persistent/non-persistent sift protocol for energy efficient MAC protocol and to counteract the selfish behavior of nodes in WSNs. Finally, the research results show that game theoretical approach with the persistent/non-persistent sift algorithm can improve the overall performance as well as achieve all the goals simultaneously for MAC protocol in WSNs.

2013 ◽  
pp. 1475-1497
Author(s):  
S. Mehta ◽  
B. H. Kim ◽  
K.S. Kwak

Game Theory provides a mathematical tool for the analysis of interactions between the agents with conflicting interests, hence it is a suitable tool to model some problems in communication systems, especially, to wireless sensor networks (WSNs) where the prime goal is to minimize energy consumption than high throughput and low delay. Another important aspect of WSNs are their ad-hoc topology. In such ad-hoc and distributed environment, selfish nodes can easily obtain the unfair share of the bandwidth by not following the medium access control (MAC) protocol. This selfish behavior, at the expense of well behaved nodes, can degrade the performance of overall network. In this chapter, the authors use the concepts of game theory to design an energy efficient MAC protocol for WSNs. This allows them to introduce persistent/non-persistent sift protocol for energy efficient MAC protocol and to counteract the selfish behavior of nodes in WSNs. Finally, the research results show that game theoretical approach with the persistent/non-persistent sift algorithm can improve the overall performance as well as achieve all the goals simultaneously for MAC protocol in WSNs.


Author(s):  
Rinkuben N. Patel ◽  
Nirav V. Bhatt

Background: WSN is a network of smart tiny electromechanical devices named as sensors. Sensors perform various tasks like sensing the environment as per its range, transmit the data using transmission units, store the data in the storage unit and perform an action based on captured data. As they are installed in an unfriendly environment, to recharge the sensors are not possible every time which leads to a limited lifetime of a network. To enhance the life of a sensor network, the network required energy-efficient protocols. Various energy-efficient MAC protocols are developed by Research community, but very few of them are integrated with the priority-based environment which performs the priority-based data transmission. Another challenge of WSN is, most of the WSN areas are delay-sensitive because it is implemented in critical fields like military, disaster management, and health monitoring. Energy, Delay, and throughput are major quality factors that affect the sensor network. Objective: In this paper, the aim is to design and develop a MAC Protocol for a field like the military where the system requires energy efficiency and priority-based data transmission. Method: In the proposed model, the cluster-based network with priority queues are formed that can achieve higher power efficiency and less delay for sensitive data. Results: In this research simulation of Proposed MAC, TMAC and SMAC are done with different numbers of nodes, same inter-packet intervals, and variant inter-packet intervals. Based on the script simulation, result graphs are generated. Conclusion: The proposed work achieves greater lifetime compared to TMAC and SMAC using priority-based data transmission.


2013 ◽  
Vol 470 ◽  
pp. 611-616
Author(s):  
Xuan Jie Ning ◽  
Hai Zhao ◽  
Mao Fan Yang ◽  
Dan Wu

This paper is concerned with the capacity of ad hoc networks employing pure ALOHA medium access control (MAC) protocol under the effect of different transmission power levels and variable data rate control. The data rate of a certain link is related to the signal to interference plus noise ratio (SINR), and SINR is, in turn, related to the transmitted power and link distance. The increasing power conducts a high data rate, resulting in the high interference of networks. Consequently, the optimum power that yields maximum network throughput is a tradeoff between transmission rate and network interference. Mathematical model analysis for the ad hoc network capacity are presented in the paper. A revised expression to the approximate calculating of the capture probability in networks is proposed.


2013 ◽  
pp. 354-375
Author(s):  
Md. Imrul Hassan ◽  
Hai L. Vu ◽  
Taka Sakurai

It is envisaged that supporting vehicle-to-vehicle and vehicle-to-infrastructure communications with a Vehicular Ad-Hoc Network (VANET) can improve road safety and increase transportation efficiency. Among the candidate applications of VANETs, cooperative collision avoidance (CCA) has attracted considerable interest as it can significantly improve road safety. Due to the ad hoc nature of these highly dynamic networks, no central coordination or handshaking protocol can be assumed and safety applications must broadcast information of interest to many surrounding cars by sharing a single channel in a distributed manner. This gives rise to one of the key challenges in vehicle-to-vehicle communication systems, namely, the development of an efficient and reliable medium access control (MAC) protocol for CCA. In this chapter, we provide an overview of proposed MAC protocols for VANETs and describe current standardization activities. We then focus on the performance of the IEEE 802.11 carrier sense multiple access (CSMA) based MAC protocol that is being standardized by the IEEE standards body for VANET applications. In particular, we review prominent existing analytical models and study their advantages, disadvantages and their suitability for performance evaluation of the MAC protocol for VANETs. After a discussion of the shortcomings of these models, we develop a new analytical model in the second half of the chapter. Explicit expressions are derived for the mean and standard deviation of the packet delay, as well as for the packet delivery ratio (PDR) at the MAC layer in an unsaturated network formed by moving vehicles on a highway. We validate the analytical results using extensive simulations and show that good accuracy can be achieved with the proposed model for a range of topologies and traffic load conditions. More importantly, using the model, we show that hidden terminals can have a severe, detrimental impact on the PDR, which may compromise the reliability required for safety applications.


2012 ◽  
Vol 3 (2) ◽  
pp. 51-61
Author(s):  
A. Punitha ◽  
Sujin P. Jose

The authors provide an extensive survey of recent energy-efficient and contention based medium access control (MAC) protocols for wireless body area networks (WBANs). They briefed the crucial applications of WBAN in present scenario and also discussed low-power and contention based MAC protocols for medical and consumer electronics. The authors outlined the future applications of WBAN and the enhancement to be incorporated to improve the efficiency of WBAN systems.


2018 ◽  
Vol 7 (3) ◽  
pp. 1263
Author(s):  
Shah Murtaza Rashid Al. Masud ◽  
Asmidar Abu Bakar ◽  
Salman Yussof

Due to lack of deployment of information and communication technology (ICT) for real-time pilgrims' health monitoring during Hajj, many pilgrims left untreated, get lost and suffer from severe health problems which sometimes end with injury, traum and even death. WBAN is an emergent healthcare technology and can be deployed at Hajj ritual sites for pilgrims' health monitoring. WBANs body coordinator or gateway as an aggregator collect data from body nodes or sensors, store them and then forward to the healthcare stations for analyzing the data through outer-WBAN communications. Currently, most of the existing research works focused on intra-WBAN communications while the technical issues, problems, opportunities and standard correlated to outer-WBAN are not well discussed and mentioned. Since, medium access control (MAC) protocol is responsible for channel access, lower delay, and energy efficient transmission of data packets. Therefore, designing of an efficient and reliable MAC protocol is the earnest research demand to alleviate the aforementioned obstacle. In this research, a feasibility study has been completed to identify the problem and a proposal has been made to develop a suitable MAC protocol for outer-WBAN communication for pilgrims’ health monitoring during Hajj.  


Sign in / Sign up

Export Citation Format

Share Document