A cross-layer game theoretic solution for interference mitigation in wireless ad hoc networks

Hasan Mahmood, Cristina Comaniciu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

In this paper, we propose a game theoretic crosslayer framework to efficiently mitigate interference in wireless ad hoc networks. Our solution enforces cooperation between layers, through cross-layer design, as well as among nodes, through metrics that account for the potential impact of the nodes' individual decisions on their neighborhood. The proposed approach is to jointly design power control and topology/interference aware routing, and to model the behavior of the network using a game theoretic framework. The performance metrics considered are energy consumption and achievable throughput for an end-toend path. We prove the convergence of the joint interference mitigation algorithm at three levels: at the physical layer (convergence of the power control), at the network layer (convergence of routing game), and across layers (the joint algorithm does not lead to oscillatory behavior). Our simulation results show that significant performance gains in both energy and throughput are achieved compared to the current state-of-the-art approaches.

Original languageEnglish
Title of host publicationMilitary Communications Conference 2006, MILCOM 2006
DOIs
StatePublished - 2006
EventMilitary Communications Conference 2006, MILCOM 2006 - Washington, D.C., United States
Duration: 23 Oct 200625 Oct 2006

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Conference

ConferenceMilitary Communications Conference 2006, MILCOM 2006
Country/TerritoryUnited States
CityWashington, D.C.
Period23/10/0625/10/06

Keywords

  • Ad hoc networks
  • Crosslayer
  • Game theory
  • Interference aware routing
  • Location aware routing
  • Near-far effect
  • Power control

Fingerprint

Dive into the research topics of 'A cross-layer game theoretic solution for interference mitigation in wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this