An Evolutionary Game approach for the design of congestion control protocols in wireless networks

Eitan Altman, Rachid Elazouzi, Yezekeael Hayel, Hamidou Tembine

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Evolutionary games have been developed in biological sciences in the aim of studying the evolution and equilibrium behavior (called Evolutionary Stable Strategies - ESS) of large populations. While rich theoretical foundations of evolutionary games allow biologist to explain past and present evolution and predict future evolution, it can be further used in Engineering to architect evolution. In this paper, we apply evolutionary games to non-cooperative networks containing large number of individual non-cooperative terminals or sensors. We study the evolution of congestion control protocols, and show how the evolution and the ESS are influenced by the characteristics of the wireless channel. We then consider the challenge of architecting the evolution: we propose some guidelines for designing a framework that supports evolution of protocols.

Original languageEnglish (US)
Title of host publicationProceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2008
Pages547-552
Number of pages6
DOIs
StatePublished - 2008
Event6th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2008 - Berlin, Germany
Duration: Apr 1 2008Apr 3 2008

Publication series

NameProceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2008

Other

Other6th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2008
Country/TerritoryGermany
CityBerlin
Period4/1/084/3/08

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'An Evolutionary Game approach for the design of congestion control protocols in wireless networks'. Together they form a unique fingerprint.

Cite this