Game Theory in Wireless Ad-Hoc Opportunistic Radios

Part of book or chapter of book English OPEN
Mumtaz, Shahid ; Gameiro, Atilio (2010)
  • Publisher: InTech
  • Subject:
    acm: ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS

Emerging research in game theory based power control applied to ad hoc opportunist networks shows much promise to help understand the complex interactions between OR nodes in this highly dynamic and distributed environment. Also, the employment of game theory in modeling dynamic situations for opportunist ad hoc networks where OR nodes have incomplete information has led to the application of largely unexplored games such as games of imperfect monitoring. Ad hoc security using game theory is the future area of research in ORs we have considered an ah hoc behavior in the opportunists radio (ORs) and suggested that by implementing ah hoc features in the ORs will improve the overall performance of system.
  • References (20)
    20 references, page 1 of 2

    H. A. Simon, The Sciences of the Artificial. MIT Press, 1969.

    R. Axelrod, The Evolution of Cooperation. New York: Basic Books, 1982

    R. Gibbons, A Primer in Game Theory. Prentice Hall, 1992.

    D. Fudenberg and J. Tirole, Game Theory. MIT Press, 1991

    M. J. Osborne and A. Rubinstein, A Course in Game Theory. Cambridge, MA: The MIT Press, 1994.

    M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, “On selfish behaviour in CSMA/CA networks,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '05), Miami, USA, Mar. 13-17 2005.

    T. S. Rappaport, Wireless Communications: Principles and Practice (2nd Edition). Prentice Hall, 2002

    M. Schwartz, Mobile Wireless Communications. Cambridge Univ.Press, 2005.

    J. Zander, “Jamming in slotted ALOHA multihop packet radio networks,” IEEE Transactions on Communications (ToC), vol. 39, no. 10, pp. 1525-1531, Oct. 1991.

    FCC, "ET Docket No 03-222 Notice of proposed rule making and order, ”December 2003.

  • Metrics
    No metrics available
Share - Bookmark

  • Download from
    InTech via InTech (Part of book or chapter of book, 2010)
  • Cite this publication