Evolutionary coalitional games for random access control

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we consider a random access system where each user can be in two modes of operation, has a packet or not and the set of users which have a packet is available to a shared medium. We propose an evolving coalitional game theory to analyze the system outcomes. Unlike classical coalitional approaches that assume that coalitional structures are fixed and formed with cost-free, we explain how coalitions can be formed in a fully distributed manner using evolutionary dynamics and coalitional combined fully distributed payoff and strategy (CODIPAS) learning. We introduce the concept of evolutionarily stable coalitional structure (ESCS), which is, when it is formed it is resilient by small perturbation of strategies. We show that (i) the formation and the stability of coalitions depend mainly on the cost of making a coalition compared to the benefit of cooperation, (ii) the grand coalition can be unstable and a localized coalitional structure is formed as an evolutionarily stable coalitional structure. When the core is empty, the coalitional CODIPAS scheme selects one of the stable sets. Finally, we discuss the convergence and complexity of the proposed coalitional CODIPAS learning in access control with different users' activities.

Original languageEnglish (US)
Title of host publication2013 Proceedings IEEE INFOCOM 2013
Pages535-539
Number of pages5
DOIs
StatePublished - 2013
Event32nd IEEE Conference on Computer Communications, IEEE INFOCOM 2013 - Turin, Italy
Duration: Apr 14 2013Apr 19 2013

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X

Other

Other32nd IEEE Conference on Computer Communications, IEEE INFOCOM 2013
CountryItaly
CityTurin
Period4/14/134/19/13

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Evolutionary coalitional games for random access control'. Together they form a unique fingerprint.

Cite this