A wireless system consisting of a finite number of heterogeneous users transmitting packets over a slotted ALOHA Rayleigh-fading channel is investigated in this paper. In this system, each user tries to minimize its number of transmission attempts while meeting the throughput demand. The user interaction in such an ALOHA network is modeled as a random access game. A novel technique to better exploit the channel state information (CSI) named adaptive CSI transmission method is proposed. Benchmarking with the no-CSI method and threshold-based CSI method, it is revealed that the proposed adaptive CSI method can yield up to 9.9% more throughput and 12.3% power reduction. Two simple yet effective guidelines on selecting among these CSI-related methods are formulated for systems with different SNRs and capture ratios. A distributed algorithm is proposed to find the optimal transmission probability. Both analytical and simulation results show that the algorithm exhibits fast convergence speed and is robustness against changes on the number of active nodes in the network.
1. Introduction
The ALOHA protocol has been attracting a lot of attentions from both academia and industry since its introduction. It has been used for various generations of mobile phone services such as GPRS and SMS [1]. In recent years, various derivatives of ALOHA protocol have been developed and considered promising for a wide spectrum of applications including wireless sensor networks [2], next generation Internet of Things (IoT) [3, 4], cognitive radio [5, 6], and smart grid [7].
The earlier works on ALOHA, for example, in [8, 9], were focused on the system-level performance, for example, the system throughput. With the evolution of telecommunication systems into distributed systems in recent years [10], the focus has been shifted from the system perspective to the user perspective. As the network might be of heterogeneous nature, a system-level approach might be insufficient to differentiate each user's goal and action. Moreover, many users in the wireless networks are power-constrained and they may prefer power conservation over throughput maximization. As such, new techniques and performance metrics should be developed to better design the network [11, 12].
In [13], MacKenzie and Wicker conducted the analysis of a slotted ALOHA from the perspective of a selfish user. It is shown that a game-theoretic approach [14] was able to provide insights into the equilibrium operating point [15, 16] and the network performance such as throughput from a decentralized perspective. Later works explore more realistic settings by incorporating the CSI into the ALOHA model to enable each node to make channel-aware decisions [10, 12, 17–19]. More sophisticated channel models were also investigated towards a more accurate characterization of the fading channel. A simple collision model had been widely assumed to model the network interaction in a random access network [10, 18, 20, 21]. It was subsequently generalized to power capture model [22] and SINR capture model [17] to better characterize the time-varying fading channels and the multipacket reception capacity [23].
Intuitively, the use of CSI should lead to power-efficient outcomes as a node can choose not to send a packet under bad channel conditions to avoid wasting energy. In [10, 12, 24], CSI is exploited to enhance the throughput performance in a collision channel. However, it was shown in [17, 25] that, for a channel model with capture effect, a threshold-based CSI method may experience Braess Paradox [26]; that is, adding extra information to the network reduces the overall performance. Consequently, the achievable throughput may be even worse than that without CSI.
This paradox does not occur all the time. In ideal cases when the signal-to-noise ratio (SNR) approaches to infinity, it will always occur and it is suggested in [17] not to use CSI in such cases. When the SNR is a finite number, the occurrence of Braess Paradox is quite intricate. Thus it is difficult to decide whether to use CSI.
In this work, this Braess Paradox has been further investigated and it has been shown that the occurrence of the paradox is purely determined by the radio capture ratio and the SNR. It has been further discovered that there exists an enhanced method on exploiting the CSI, namely, adaptive CSI method, which may result in better system-level performance. Inspired by the threshold-CSI and no-CSI methods in [17], the adaptive CSI method adopts a probabilistic rather than deterministic strategy on how to respond to the instantaneous CSI. With the adaptive CSI method, this paper presents three original contributions.
The throughput using the proposed adaptive CSI is derived. The adaptive CSI can achieve up to 9.9% more throughput than the threshold CSI and no-CSI methods for a wide variety of systems. Moreover, it can result in up to 12.3% power reduction than the other two methods.
Two simple yet effective guidelines are generalized on selecting the aforementioned three CSI-related methods to achieve maximum throughput or power efficiency for different system parameters and thus to avoid the occurrence of Braess Paradox.
A distributed algorithm is proposed to tune the transmission probability to the optimal point. It is shown that the algorithm can guarantee fast convergence and is robust against changes on the number of active nodes in the network.
The rest of the paper is organized as follows. Section 2 formulates the problem and states the assumptions on the system. The proposed adaptive CSI is presented in Section 3. Section 4 compares the adaptive CSI with the threshold-based CSI method and no-CSI method. Guideline on the selection scheme for different systems is also derived. Section 5 compares the power efficiency for the three methods. The convergence algorithm is presented in Section 6, together with an update interval analysis. Section 7 presents the simulation results, followed by a conclusion in Section 8.
2. Problem Formulation
In the following, a wireless network where there are n nodes transmitting packets at a predetermined power level to a base station over a shared channel is considered. It is assumed that the time is slotted and the amount of information contained in a data packet is fixed and is the same for all the nodes. A data packet, with the possible acknowledgement packet, occupies one time slot. Each node contends for the channel access using the slotted probabilistic ALOHA protocol. In each time slot k, each node i transmits with a transmission probability . Each node is assigned with an average throughput demand . In this network, each node tries to minimize its overall power investment, which is equivalent to minimizing the transmission probability, while meeting the average throughput demand . It is assumed that all the nodes have packets buffered for transmission at any time and the essential problem for each node is to choose a transmission strategy that fulfills its goal. Moreover, all the nodes are assumed to be well synchronized.
2.1. Throughput
For the brevity of the analysis, the average throughput for node i is defined as the ratio of the number of packets that are successfully received by the base station to the total number of time slots. For example, if a node i transmits 100 packets to the base station during a 10000-slot period, of which 67 are successful, then the average throughput for node i is 0.0067.
2.2. Fading Channel and SINR Capture
Signal-to-interference-and-noise ratio (SINR) capture [17] is considered in this paper to model the fading channel. In the SINR model, node i's packet at time k will be successfully received by the base station if [17], where b is the radio capture ratio and is the SINR of node i at time slot k. is given by
where N is the average power of the additive noise at the base station and is the transmission power of each node. if node i transmits a packet at time slot k and otherwise. is the channel gain between node i and the base station at time k. The physical intuition of the SINR model can be traced back to the capture effect of a radio receiver. Only when the signal from a particular node i is at least b times stronger than the interference, then it can be amplified and successfully decoded [27].
In the sequel, it is assumed that the channel is an i.i.d Rayleigh Fading channel and are thus assumed to be an i.i.d uniformly exponential random variable, fixed within one slot and varying from one slot to another as in [17, 28]. It is further assumed that at the beginning of the time slot k, each node i is able to obtain its own instantaneous channel state information, which provides an indication of the quality of the channel. Furthermore, each node can obtain and thus from the CSI reading, as in [17].
2.3. Adaptive CSI-Based Transmission Method
In this paper, a novel method named adaptive CSI-based method is proposed. Instead of using a fixed threshold-based CSI strategy as in [17], the proposed method considers the fact that is exponentially distributed. A complementary function is constructed to dynamically determine the transmission probability with respect to the instantaneous CSI, where is a tuning factor determining the amplitude of the transmission probability. The intuition of the adaptive CSI-based transmission is that the transmission probability is made to be proportional to “how good the channel is.” This method can be defined as follows.
Definition 1.
An adaptive CSI-based transmission strategy for node i in time slot k is defined as a mapping from to and has the form of . Moreover, the node i transmits a packet in slot k with a probability .
It can be concluded that is a monotonically increasing function of the channel state . It also immediately follows that the average transmission probability of node i is solely determined by and is given by
2.4. Acknowledgment Information
It is assumed in this study that an acknowledgement (ACK) packet issued from the base station is available upon each successful transmission. By recording all its ACK results for a certain period, each node can determine the average packet success rate for that period. The for the current period can be used to determine the game strategy. The game strategy is updated every I time slot and each node keeps a record of the ACK packets in the form of between 2 consecutive update instants. The will be erased to 0 upon each update and reflects only the traffic and channel conditions in the current update interval.
3. Equilibrium Analysis
3.1. Power Optimization Problem
According to the problem formulation, the local optimization problem for each node i using the adaptive CSI method can be modeled as
where is the transmission probability vector, is the average throughput of node i when it transmits with probability given that others transmit with probability , where represents the transmission probability vector of all nodes except node i, and is the throughput demand for node i.
The system can be modeled as a constrained noncooperative game. Each node acts as a selfish entity, taking actions, that is, choosing the tuning factor and thus the transmission probability [11, 17, 18], to minimize its own power investment subject to the throughput constraint.
3.2. Nash Equilibria
It is assumed that each takes value from . A utility function can be defined as . Higher transmission probability results in higher power investment and thus lower utility. With the utility function, the following definition on Nash equilibrium can be established.
Definition 2.
An action profile p is a constrained Nash Equilibrium point if, for all , there exists
where is the transmission probability of node i such that its throughput demand can be fulfilled.
Equivalently, p is a Nash equilibrium if
Since and are nondecreasing functions of under the SINR model, it immediately follows as in [17] that p is a Nash equilibrium if and only if it is a solution to the set of equations:
3.3. Existence of Nash Equilibrium
When there are nodes using the adaptive CSI strategy to transmit a packet to the base station at the same time slot, the probability that the packet received successfully from a particular node i is given as
Solving (7) yields
Using (2) and denoting and for brevity, the following theorem on the average throughput of node i using the proposed adaptive CSI method can be formulated.
Theorem 3.
Under the SINR capture model with capture ratio b and i.i.d., Rayleigh fading channels between all nodes and the base station, the average throughput of node i when the transmission probability vector is and when each node uses the adaptive CSI transmission strategy is as follows:
where is the set of all the nodes in the network except node i. The Nash equilibrium is achieved when for every node i in the network.
Proof.
The theorem can be proved by Binomial theorem and is similar to Lemma 1 in [17]. Thus the details are omitted here for brevity.
From (9), the following 2 corollaries can be given.
Corollary 4. The average packet success rate of node i is given as
Corollary 5. When all the nodes have the same throughput demand ρ, the average throughput of each node can be simplified as
To determine the existence of Nash equilibrium, the derivative of r is derived as
It can be seen that when and there exists a such that when and and when , . Thus, when the throughput demand is achievable (i.e., ), there exists one (i.e., when ) or two (i.e., when ) Nash equilibrium points.
When there are 2 equilibrium points, the one associated with smaller transmission probability is superior to the other in terms of minimizing power investment. This immediately follows from the fact that power investment is an increasing function of transmission probability.
Moreover, simulation results show that, for heterogeneous network, there exists at least one equilibrium point given that the throughout demand is feasible.
4. Maximum Throughput Analysis
In Section 3, the Nash equilibrium of (3) is analyzed. The relationship between throughput demand and transmission probability is derived for the adaptive CSI scheme. In this section, the maximum achievable throughput of the adaptive CSI scheme is compared with the 2 other schemes in [17], namely, threshold-based CSI method and no-CSI method.
For the no-CSI method, the throughput is given by [17] as follows:
It can be seen that the maximal throughput is obtained when and the throughput when is as follows:
For the threshold-based CSI method, the throughput is given by [17]:
When ,
When ,
It can be seen that there exists a unique solution for . When , and when , . When , the maximum throughput is achieved. However, is difficult to obtain analytically due to the complexity of (16) and (17). Notice that when b is large (e.g., ), as the transmission probability p is typically very small. Thus (16) can be approximated as
and it can be seen that .
Moreover, (17) can be approximated as
where given that .
Combining (18) and (19), it can be shown that . In practical systems, it is almost certain that . Thus, it is sufficient to discuss the case only.
When , the maximum throughput of the threshold-based CSI is given by
For the proposed adaptive CSI method, similar to the threshold-based CSI method, when b is large (e.g., ), , (12) can be approximated as
The unique solution such that is and the maximum throughput is given by
Comparing (22) with (14) and (20), the following theorem on the maximum throughput can be established.
Theorem 6.
Given a capture ratio b and the network size n, when
the adaptive CSI method results in higher maximum throughput than the no-CSI method and the threshold-based CSI method, where
Proof.
The proof can be completed by enforcing and with proper algebraic manipulations. The details are omitted for brevity.
It also follows that when , the threshold-based CSI method yields higher maximum throughput; when , it suffices to use the no-CSI method. The intuition is that when the channel is in general good enough, there is no need to confine the transmission to the “good” slots; when the channel is bad, the transmission should not be conducted at those bad slots at all; when the channel state is in between, there exists a wide gap where the CSI should be exploited in the proposed way.
Using (14), (20), and (22), the maximum throughput of each method under different capture ratios b and network sizes n can be obtained. Figure 1 compares the maximum throughput of the three methods. It is shown that there exists a red region in terms of SNR and capture ratio where the proposed adaptive CSI results in the highest throughput among the three methods. This improvement in throughput can be up to 9.9% as compared with the highest throughput that can be achieved by the no-CSI and threshold-based CSI methods.
Maximum throughput with different SNRs (dB) and capture ratios.
5. Power Efficiency Analysis
Given the same transmission probability p (i.e., the same power investment) and using (11)–(13), the adaptive CSI method outperforms the no-CSI method when . Solving the inequality for SNR yields
where
Similar comparisons can be made between (11) and (15). Solving the inequality for SNR yields
where
Combining (25) and (27), the following theorem can be formulated.
Theorem 7.
Given a capture ratio b, the network size n, and a fixed power investment in terms of transmission probability p, the power investment of each node can be minimized using the adaptive CSI method when the SNR satisfies both (25) and (27). When , the threshold-based CSI method is more power-efficient than the others. When , a node should use no-CSI method for power efficiency.
It should be noted that the intersection of (25) and (27) may be an empty SNR set for a given . It means that, under such circumstances, either no-CSI or threshold-based CSI is superior to the others.
As an illustrative example, Figure 2 shows the throughputs of the three methods for a given power investment (i.e., transmission probability) and . Figure 2 shows that, using the adaptive CSI, the power investment can be minimized for a wide variety of systems with different SNRs and capture ratios. For this particular example, the power reduction can go up to 9.3%. Figure 3 traverses through all the possible power investment schemes, it can be found that the power reduction can go up to 12.3%.
Throughput comparison for a given transmission probability .
Power reduction for different power investment schemes.
6. Convergence Analysis
6.1. ACK-Based Game Strategy
In Section 3, the Nash equilibrium is derived for the adaptive CSI method. In this section, an ACK-based algorithm is proposed for each node to find the power-efficient Nash equilibrium in a distributed manner.
Each node i in the network updates the transmission probability synchronously every I time slot and each node transmits with this probability for the current update interval. For node i, the new transmission probability for the th update is determined by
where is the packet success rate for node i from the tth update to the th update (the tth update interval). can be obtained from ACK information.
In particular, the initial transmission probability can be any value smaller than the Nash equilibrium point. In practice, each node can start with for simplicity and fast convergence.
The following theorem shows each node will converge to the Nash equilibrium using the strategy in (29). It is assumed that the throughput demand profile is feasible.
Theorem 8.
Using the ACK-based strategy in (29), the transmission probability of each node in the network asymptotically converges to the power-efficient Nash equilibrium point of the game (3).
Proof.
Case 1. First consider the case where the number of nodes in the network is fixed. For this scenario, the following should be satisfied.
The sequence of the transmission probability of any node is increasing.
Any two arbitrary entries and in the transmission probability vector p asymptotically follow regardless of their initial values.
The actual throughput of node i at any update interval t will not exceed its corresponding throughput demand.
Factor (i) must be satisfied because only when the sequence of the transmission probability increases, then it is possible that it converges to the equilibrium point. Factor (ii) must be met because, at the equilibrium point, according to (9) and Corollary 4, and thus factor (ii) must follow. Factor (iii) guarantees that the transmission probability will not go to the region where the actual throughput is larger than what is required and thus it can avoid converging to the unfavorable energy-inefficient equilibrium point.
While Factor (ii) immediately follows from the game strategy and Corollary 4, and it can be met starting from the second update, factor (i) can be proved by induction. It has been assumed that is not greater than . Thus, . Assuming that , one needs to prove that holds.
Recall that is a decreasing function of , . As , , it thus follows that .
As for the proof of (iii), since , it follows that Thus according to (29).
Combining (i) and (iii), the transmission probability of node i will increase monotonically and is always smaller (yet getting closer) to the equilibrium point. Meanwhile, factor (ii) ensures that for each update and the transmission probability of any other node k will “move” up in an appropriate step and thus they asymptotically converge to the equilibrium point at the same time.
Case 2. Next consider the case when there are newly joined nodes during the network operation. In this case, a new equilibrium point must be sought and the new equilibrium probability is expected to be greater than the previous one as more packet transmissions are expected. This situation can be viewed as a special case of case 1. The convergence can be achieved as long as the new throughput demand is feasible.
Case 3. Finally the case where there are nodes dissociating from the network or stopping transmitting data during the network operation is examined. Contrary to case 2, the new equilibrium probability of each node should be smaller than the previous one as there is less traffic in the network. For this case, which is similar to case 1, the following guidelines must be met.
The sequence of the transmission probability of any node i deceases over time after the nodes leave the network.
Any two arbitrary entries and in the transmission probability vector p asymptotically follow regardless of their values at the time the nodes leave the network.
The rationales and proofs are similar to case 1 and omitted for brevity. In this case, will decrease. Thus it will not converge to the energy-inefficient equilibrium point, which is always greater than the value of at the time the nodes leave the network.
This proposed ACK-based updating strategy can also apply to threshold-based CSI and no-CSI methods. The proofs are very similar and are omitted.
Remark 10.
Through simulations, it is observed that the condition that the initial transmission probability should be any value smaller than the Nash equilibrium point can be relaxed. Even for initial transmission probabilities greater than the equilibrium point, each node can still adjust the probability to the optimum using the proposed algorithm. The simulations also show that the transmission probability vector can always converge to the equilibrium point with negligible errors within 3 updates.
6.2. Update Interval Analysis
For the proposed algorithm, the update interval I is a key parameter that can affect its performance. There exists a tradeoff: frequent updates allow each node to respond promptly to the traffic condition. However, a short update interval may result in a high randomness in calculating the and thus the transmission probability of each node may deviate from the optimal point.
A statistical characterization of the packet transmission is given here in order to provide a guideline on choosing the update interval that allows timely update while reducing the randomness to a desired level.
Each packet transmission is considered i.i.d with success probability , where can be obtained from (10). In other words, each packet transmission can be seen as a Bernoulli trial. If we take m consecutive transmissions, the number of successes out of m transmissions follows binomial distribution . Furthermore, when and , the binomial distribution can be approximated using the corresponding normal distribution [29].
Accordingly, the for m consecutive transmissions is also a random variable following normal distribution . Denote each set of m consecutive transmissions as a minimal unit. For w consecutive minimal units, the sample mean of PSR is also approximately normally distributed with mean and standard deviation .
The standard deviation of the sample mean, σ, can be used to characterize the significance of the randomness and show how “steady” is the obtained. It can be shown that a larger w, which translates to a larger update interval, will bring about smaller standard deviation of the and vice versa.
Given a standard deviation requirement, say T, the minimal sample size can be readily computed as . Subsequently, as the update interval , the optimal update interval can be computed as .
It can be concluded that if the imposed standard deviation requirement is the same for every node, the node with the lowest throughput, say node i, will require the largest update interval. Assuming that all nodes update their transmission probabilities synchronously, the update interval will depend on node i, that is,
Determining the update interval online in an adaptive manner will theoretically lead to optimal results. By doing this, however, node i will have to broadcast the new update interval to the rest, which introduces additional traffic overheads and more power investment. Alternatively, the update interval can be fixed offline assuming the worst-case scenario that is maximum. It can be shown that when , is at its peak . As such, (30) can then be approximated as
7. Simulation Results
In this section, various Monte Carlo simulation results are presented to validate the proposed distributed convergence algorithm. A scenario where there are n nodes transmitting fixed-length packets to a base station in a probabilistic manner is considered. Each transmission, with the possible acknowledgement, takes up one time slot. The update interval is determined using (31) with a standard deviation requirement of 0.04.
The applicability of the convergence algorithm for different CSI-based methods is first evaluated. In this case the capture ratio is and the SNR is 10. The network size is . The convergence algorithm is used for all the three methods. Different throughput demands ranging from 0.005 per node to 0.04 per node have been evaluated. Each set of simulation is run for 10 times and the transmission probability of each node at equilibrium is recorded.
Figure 4 shows the actual throughput and transmission probability of both the simulation and the theoretical analysis. The simulation results match quite well with the theoretical ones for all the three methods, indicating that the proposed ACK-based convergence algorithm can achieve accurate results.
Comparisons between the simulation results and the theoretical analysis (Sim: simulations and Anal: analytical derivations).
Figure 5 examines the accuracy of the convergence algorithm for different heterogeneous networks in detail. Such a network consists of 5 classes of nodes, with a throughput demand of 0.002, 0.004, 0.006, 0.008, and 0.01, respectively. The capture ratio is and the SNR is 50. Simulations have been conducted for the networks with different number of nodes per class, ranging from 1 to 4. Each set of simulation is repeated 10 times. It can be shown that nodes are able to meet the throughout demand regardless of the number of nodes in the network, with only an average error of 1.1% and a standard deviation of no more than 0.1% of its throughput demand. The transmission probability increases as the number of nodes increases. This is because more frequent transmissions are needed to compensate for the higher packet loss rate due to the increment of the number of nodes in the network.
Throughput and transmission probability for heterogeneous networks (□: transmission probability; Δ: actual throughput; ∗: throughput demand).
As an illustrative example, Figure 6 presents the convergence speed for a heterogeneous network with 5 nodes and a capture ratio of 5 and a SNR of 50. The throughput demand is set to be 0.01, 0.02, 0.03, 0.04, and 0.05 for each node, respectively. It is observed that each node can reach the equilibrium point from the 3rd update instant and is stable subsequently with negligible deviations after 2 updates.
Performance of the convergence algorithm.
Lastly, the robustness of the algorithm against changes on the number of nodes in the network is examined. The capture ratio and the SNR are the same in the previous simulations. In the following study 10 nodes are evaluated, each with a throughput demand of , where i is the node ID labeled from 1 to 10. At Phase I (from 1st to 7th update intervals), only the first 5 nodes transmit packets. At Phase II (from the 7th to the 10th update intervals), two more nodes, namely, Node 6 and Node 7, are active in the network. At Phase III (from the 10th to the 13th update intervals), all nodes actively perform transmissions. At Phase IV, Nodes 6–10 leave the network while Nodes 1–5 remain active in the network.
Figure 7 plots the transmission probability versus the update interval. It can be observed that both groups of node adapt well with the changes and the new equilibrium points can be reestablished in a distributed manner. Table 1 shows the actual throughput at the equilibrium. It is assumed that the equilibrium can be established one update interval later after each change on the number of nodes. The results show that each node matches well with its corresponding throughput demand, with an average relative error of 1.26%. Compared with the case that there is no change on the number of nodes (e.g., Figure 5, with average error of 1.1%), the error is still insignificant, indicating that the proposed algorithm works well with such changes.
Actual throughput with changes on the number of nodes.
Node
Actual throughput
Relative error (%)
1
0.000977
2
0.002002
3
0.003128
4
0.004033
5
0.004906
6
0.006056
7
0.006973
8
0.008054
9
0.009002
10
0.010336
Transmission probability with changes on the number of nodes.
8. Conclusion
A new method to exploit the channel state information (CSI), namely, adaptive CSI, has been presented. The throughput performance of the proposed adaptive CSI method has been analyzed and compared with the threshold-based CSI and the no-CSI method. It is shown that the proposed method is able to achieve up to 9.9% throughput improvement and 12.3% power reduction for a wide variety of systems as compared to the other two approaches. Two guidelines have been derived on selecting these three methods under different system scenarios. The proposed method can be readily implemented in a distributed manner with the use of the acknowledgement packets issued by the base station. Both the analytical and simulation results show that this distributed implementation is able to guarantee fast convergence and is robustness against changes on the number of nodes in the network.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
References
1.
AbramsonN.SacchiC.BellaltaB.VinelA.Multiple access communications in futuregeneration wireless networksEurasip Journal on Wireless Communications and Networking20122012, article 4510.1186/1687-1499-2012-452-s2.0-84872902796
2.
SenS.DorseyD. J.GuerinR.ChiangM.Analysis of slotted ALOHA with multipacket messages in clustered surveillance networksProceedings of the IEEE Military Communications Conference (MILCOM '12)November 2012Orlando, Fla, USA1610.1109/milcom.2012.64156792-s2.0-84874310210
3.
LienS.-Y.LiauT.-H.KaoC.-Y.ChenK.-C.Cooperative access class barring for machine-to-machine communicationsIEEE Transactions on Wireless Communications2012111273210.1109/TWC.2011.111611.1103502-s2.0-84856504065
4.
WuH.ZhuC.LaR. J.LiuX.ZhangY.FASA: accelerated S-ALOHA using access history for event-driven M2M communicationsIEEE/ACM Transactions on Networking20132161904191710.1109/tnet.2013.22410762-s2.0-84891599117
5.
LiX.LiuH.RoyS.ZhangJ.ZhangP.GhoshC.Throughput analysis for a multi-user, multi-channel ALOHA cognitive radio systemIEEE Transactions on Wireless Communications201211113900390910.1109/twc.2012.092112.1114252-s2.0-84870573467
6.
CohenK.LeshemA.ZehaviE.Game theoretic aspects of the multi-channel ALOHA protocol in cognitive radio networksIEEE Journal on Selected Areas in Communications201331112276228810.1109/JSAC.2013.1311092-s2.0-84886729428
7.
YaacoubE.Abu-DayyaA.Automatic meter reading in the smart grid using contention based random access over the free cellular spectrumComputer Networks20145917118310.1016/j.bjp.2013.10.0092-s2.0-84893731306
8.
HabbabI. M. I.KavehradM.SundbergC.-E. W.ALOHA with capture over slow and fast fading radio channels with coding and diversityIEEE Journal on Selected Areas in Communications198971798810.1109/49.168462-s2.0-0024481096
9.
ZorziM.Mobile radio slotted ALOHA with capture and diversityWireless Networks19951222723910.1007/BF012025452-s2.0-0012404262
10.
JinY.KesidisG.JangJ. W.A channel aware MAC protocol in an ALOHA network with selfish usersIEEE Journal on Selected Areas in Communications201230112813710.1109/JSAC.2012.1201122-s2.0-84855442473
11.
MenacheI.ShimkinN.Noncooperative power control and transmission scheduling in wireless collision channelsACM SIGMETRICS Performance Evaluation Review200836134935810.1145/1384529.1375497
12.
MenacheI.ShimkinN.Rate-based equilibria in collision channels with fadingIEEE Journal on Selected Areas in Communications20082671070107710.1109/JSAC.2008.0809052-s2.0-50649084778
13.
MacKenzieA. B.WickerS. B.Selfish users in Aloha: a game-theoretic approachProceedings of the IEEE 54th Vehicular Technology Conference (VTC '01)October 2001135413572-s2.0-0035191841
14.
MyersonR. B.Game Theory2013Cambridge, Mass, USAHarvard University PressMR1107301
15.
SenguptaS.ChatterjeeM.KwiatK. A.A game theoretic framework for power control in wireless sensor networksIEEE Transactions on Computers201059223124210.1109/tc.2009.82MR27505272-s2.0-75149136526
16.
WangY.MiaoG.WangX.An energy-efficient non-cooperative game approach for channel-aware distributed medium access controlProceedings of the IEEE 80th Vehicular Technology Conference (VTC Fall '14)September 2014Vancouver, Canada1610.1109/vtcfall.2014.6965871
17.
HsuF.-T.SuH.-J.Random access game in fading channels with capture: equilibria and braess-like paradoxesIEEE Transactions on Signal Processing20115931158116910.1109/tsp.2010.2094194MR27977232-s2.0-79951638379
18.
MenacheI.ShimkinN.Efficient rate-constrained nash equilibrium in collision channels with state informationProceedings of the 27th IEEE Conference on Computer Communications (INFOCOM '08)April 2008Phoenix, Ariz, USAIEEE10.1109/infocom.2007.872-s2.0-51349118279
19.
YehY.-N.ChenK.-C.ChenY.-C.Throughput in a cooperative network and channel state informationWireless Personal Communications20158141481151010.1007/s11277-015-2509-9
20.
ParkP.ErgenS. C.FischioneC.Sangiovanni-VincentelliA.Duty-cycle optimization for IEEE 802.15.4 wireless sensor networksACM Transactions on Sensor Networks2013101, article 1210.1145/25299792-s2.0-84890349384
HsuF.-T.SuH.-J.Throughput improvement in ALOHA networks with power capture and a cheat-proof access controlProceedings of the IEEE 21st International Symposium on Personal Indoor and Mobile Radio CommunicationsSeptember 20101447145110.1109/pimrc.2010.56719862-s2.0-78751542994
23.
BaeY. H.ChoiB. D.AlfaA. S.Achieving maximum throughput in random access protocols with multipacket receptionIEEE Transactions on Mobile Computing201413349751110.1109/TMC.2012.2542-s2.0-84894571841
24.
WangS.-H.HongY.-W. P.Transmission control with imperfect CSI in channel-aware slotted ALOHA networksIEEE Transactions on Wireless Communications20098105214522410.1109/TWC.2009.0813152-s2.0-70350589272
25.
JunS.ModianoE.Opportunistic power allocation for fading channels with non-cooperative users and random accessProceedings of the 2nd International Conference on Broadband Networks (BROADNETS '05)October 2005IEEE36637410.1109/icbn.2005.15896392-s2.0-33847073131
26.
BraessD.NagurneyA.WakolbingerT.On a paradox of traffic planningTransportation Science200539444645010.1287/trsc.1050.01272-s2.0-28244450350
27.
CardieriP.Modeling interference in wireless ad hoc networksIEEE Communications Surveys & Tutorials201012455157210.1109/surv.2010.032710.000962-s2.0-78649402963
28.
ProakisJ. G.Digital Communications20014thNew York, NY, USAMcGraw-Hill
29.
KreyszigE.Advanced Engineering Mathematics2007John Wiley & Sons