game theory framework for mac parameter optimization in

35
10 Game Theory Framework for MAC Parameter Optimization in Energy-Delay Constrained Sensor Networks MESSAOUD DOUDOU, CERIST Research Center, Algiers, Algeria JOSE M. BARCELO-ORDINAS, Universitat Politecnica de Catalunya (UPC), Barcelona, Spain DJAMEL DJENOURI, CERIST Research Center, Algiers, Algeria JORGE GARCIA-VIDAL, Universitat Politecnica de Catalunya (UPC), Barcelona, Spain ABDELMADJID BOUABDALLAH, Universit´ e de Technologie de Compi` egne (UTC), Compi` egne, France NADJIB BADACHE, University of Sciences and Technology Houari-Boumediene (USTHB), Algiers, Algeria Optimizing energy consumption and end-to-end (e2e) packet delay in energy-constrained, delay-sensitive wireless sensor networks is a conflicting multiobjective optimization problem. We investigate the problem from a game theory perspective, where the two optimization objectives are considered as game players. The cost model of each player is mapped through a generalized optimization framework onto protocol-specific MAC parameters. From the optimization framework, a game is first defined by the Nash bargaining solution (NBS) to assure energy consumption and e2e delay balancing. Secondy, the Kalai-Smorodinsky bargaining solution (KSBS) is used to find an equal proportion of gain between players. Both methods offer a bargaining solution to the duty-cycle MAC protocol under different axioms. As a result, given the two performance requirements (i.e., the maximum latency tolerated by the application and the initial energy budget of nodes), the proposed framework allows to set tunable system parameters to reach a fair equilibrium point that dually minimizes the system latency and energy consumption. For illustration, this formulation is applied to six state-of-the-art wireless sensor network (WSN) MAC protocols: B-MAC, X-MAC, RI-MAC, SMAC, DMAC, and LMAC. The article shows the effectiveness and scalability of such a framework in optimizing protocol parameters that achieve a fair energy-delay performance trade-off under the application requirements. Categories and Subject Descriptors: C.2.2 [Computer-Communication Networks]: Network Protocols; G.1.6 [Mathematics of Computing]: Optimization—Convex programming General Terms: Theory, Performance Additional Key Words and Phrases: Wireless sensor networks, media access control, game theory, duty cycling, energy efficiency, end-to-end delay ACM Reference Format: Messaoud Doudou, Jose M. Barcelo-Ordinas, Djamel Djenouri, Jorge Garcia-Vidal, Abdelmadjid Bouabdallah, and Nadjib Badache. 2016. Game theory framework for MAC parameter optimization in energy-delay constrained sensor networks. ACM Trans. Sen. Netw. 12, 2, Article 10 (May 2016), 35 pages. DOI: http://dx.doi.org/10.1145/2883615 This work was supported by the Algerian Ministry of Higher Education through the DGRSDT and partly supported by Spanish National project TIN2013-47272-C2-2-R. Authors’ addresses: M. Doudou and D. Djenouri, DTISI, CERIST Research Center, Algiers, Algeria; emails: [email protected], [email protected]; J. M. Barcelo-Ordinas and J. Garcia-Vidal, Universitat Politecnica de Catalunya (UPC), Barcelona, Spain; emails: {joseb, jorge}@ac.upc.edu; A. Bouabdallah, Universit´ e de Technologie de Compi` egne, Lab. Heudiasyc UMR CNRS 7253, Compi` egne, France; email: [email protected]; N. Badache, University of Sciences and Technology Houari-Boumediene (USTHB), Algiers, Algeria; email: [email protected]. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212) 869-0481, or [email protected]. c 2016 ACM 1550-4859/2016/05-ART10 $15.00 DOI: http://dx.doi.org/10.1145/2883615 ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Upload: others

Post on 23-Jun-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Game Theory Framework for MAC Parameter Optimization in

10

Game Theory Framework for MAC Parameter Optimizationin Energy-Delay Constrained Sensor Networks

MESSAOUD DOUDOU, CERIST Research Center, Algiers, AlgeriaJOSE M. BARCELO-ORDINAS, Universitat Politecnica de Catalunya (UPC), Barcelona, SpainDJAMEL DJENOURI, CERIST Research Center, Algiers, AlgeriaJORGE GARCIA-VIDAL, Universitat Politecnica de Catalunya (UPC), Barcelona, SpainABDELMADJID BOUABDALLAH, Universite de Technologie de Compiegne (UTC),Compiegne, FranceNADJIB BADACHE, University of Sciences and Technology Houari-Boumediene (USTHB),Algiers, Algeria

Optimizing energy consumption and end-to-end (e2e) packet delay in energy-constrained, delay-sensitivewireless sensor networks is a conflicting multiobjective optimization problem. We investigate the problemfrom a game theory perspective, where the two optimization objectives are considered as game players. Thecost model of each player is mapped through a generalized optimization framework onto protocol-specificMAC parameters. From the optimization framework, a game is first defined by the Nash bargaining solution(NBS) to assure energy consumption and e2e delay balancing. Secondy, the Kalai-Smorodinsky bargainingsolution (KSBS) is used to find an equal proportion of gain between players. Both methods offer a bargainingsolution to the duty-cycle MAC protocol under different axioms. As a result, given the two performancerequirements (i.e., the maximum latency tolerated by the application and the initial energy budget of nodes),the proposed framework allows to set tunable system parameters to reach a fair equilibrium point thatdually minimizes the system latency and energy consumption. For illustration, this formulation is applied tosix state-of-the-art wireless sensor network (WSN) MAC protocols: B-MAC, X-MAC, RI-MAC, SMAC, DMAC,and LMAC. The article shows the effectiveness and scalability of such a framework in optimizing protocolparameters that achieve a fair energy-delay performance trade-off under the application requirements.

Categories and Subject Descriptors: C.2.2 [Computer-Communication Networks]: Network Protocols;G.1.6 [Mathematics of Computing]: Optimization—Convex programming

General Terms: Theory, Performance

Additional Key Words and Phrases: Wireless sensor networks, media access control, game theory, dutycycling, energy efficiency, end-to-end delay

ACM Reference Format:Messaoud Doudou, Jose M. Barcelo-Ordinas, Djamel Djenouri, Jorge Garcia-Vidal, AbdelmadjidBouabdallah, and Nadjib Badache. 2016. Game theory framework for MAC parameter optimization inenergy-delay constrained sensor networks. ACM Trans. Sen. Netw. 12, 2, Article 10 (May 2016), 35 pages.DOI: http://dx.doi.org/10.1145/2883615

This work was supported by the Algerian Ministry of Higher Education through the DGRSDT and partlysupported by Spanish National project TIN2013-47272-C2-2-R.Authors’ addresses: M. Doudou and D. Djenouri, DTISI, CERIST Research Center, Algiers, Algeria; emails:[email protected], [email protected]; J. M. Barcelo-Ordinas and J. Garcia-Vidal, Universitat Politecnicade Catalunya (UPC), Barcelona, Spain; emails: {joseb, jorge}@ac.upc.edu; A. Bouabdallah, Universite deTechnologie de Compiegne, Lab. Heudiasyc UMR CNRS 7253, Compiegne, France; email: [email protected];N. Badache, University of Sciences and Technology Houari-Boumediene (USTHB), Algiers, Algeria; email:[email protected] to make digital or hard copies of part or all of this work for personal or classroom use is grantedwithout fee provided that copies are not made or distributed for profit or commercial advantage and thatcopies show this notice on the first page or initial screen of a display along with the full citation. Copyrights forcomponents of this work owned by others than ACM must be honored. Abstracting with credit is permitted.To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of thiswork in other works requires prior specific permission and/or a fee. Permissions may be requested fromPublications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212)869-0481, or [email protected]© 2016 ACM 1550-4859/2016/05-ART10 $15.00DOI: http://dx.doi.org/10.1145/2883615

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 2: Game Theory Framework for MAC Parameter Optimization in

10:2 M. Doudou et al.

1. INTRODUCTION

Maximizing the network lifetime while ensuring the application requirements in termsof end-to-end (e2e) delay is challenging in distributed energy-constrained wireless net-works such as wireless sensor networks (WSNs), where there is an inherent conflictbetween the design consideration of the two performance goals. The MAC layer plays apivotal role in determining the system performance in terms of packet delay and powerconsumption (network lifetime), as it manages the radio that consumes the largestamount of a node’s battery [Doudou et al. 2013]. Energy saving is achieved at the MACprotocol by duty cycling the radio and repeatedly switching it between active and sleepmodes. In active mode, a node can receive and transmit packets, whereas in the sleepmode, it completely turns off its radio to save energy. However, forwarding a packetover multiple hops in duty-cycled MAC protocols often requires multiple operationalcycles, where nodes have to wait for the next cycle to forward data at each hop. Giventhe application constraints/requirements in terms of initial energy budget devoted toeach individual node and the maximum e2e packet delay tolerated, the choice of a MACprotocol’s parameters is of high importance; however, their choice is currently deter-mined by system designers based on repeated real experiences [Ceriotti et al. 2011] oron optimizing one objective subject to other objectives as constraints [Zimmerling et al.2012; Park et al. 2011].

In this article, we investigate the inherent trade-off between energy consumptionand e2e delay from a game theory perspective. The main result of this work is thento provide a framework that given two well-known system performance requirements,such as the maximum latency tolerated by the application and the initial energy budgetdevoted to nodes’ batteries, it enables the system designer1 to obtain tunable systemparameters that dually minimize latency and energy consumption. In the proposedframework, the players are the performance metrics (energy and delay) instead of theindividual nodes that are common in state-of-the-art models that use game theory foroptimizing wireless network MAC protocols. The cost function of each player is usedby the game theory optimization framework to determine the MAC protocol optimalparameters. Each player threatens the other by using his best optimal point obtainedfrom a noncooperative game in which the player finds his best optimal operating point(i.e., the delay player obtains its lowest delay at the cost of increasing energy consump-tion), whereas the energy player obtains its lowest energy consumption at the cost ofincreasing delay. A bargaining game is then defined to find an agreement operationalpoint that satisfies both players. Two bargaining solutions are met: the Nash bargain-ing solution (NBS) and the Kalai-Smorodinsky bargaining solution (KSBS). The choiceof the NBS model or the KSBS model as a solution is axiomatic dependent. The KSBSmodel has the advantage of equal proportion of gain between players, and it has aproperty of fairness between the two performance metrics. The fairness property hasits applicability in those cases where the network designer has no preference amongthe two metrics, while at the same time both application objectives are met. Due to thedifficulty of formulating the KSBS optimization problem in its convex form, we pro-pose an algorithm based on iterative NBS resolution, which provides an approximativeKSBS solution.

The remainder of the article is organized as follows. Section 2 presents the relatedwork. Section 3 introduces the general optimization model and the cooperative gametheory framework. Section 4 shows how to derive the energy-delay trade-off for the RI-MAC protocol. The optimization results and the NBS and KSBS models are given in this

1The network designer has to know as a prior the sampling frequency and the network topology and shouldbe able to characterize its MAC protocol energy consumption function and the delay from any node to thesink.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 3: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:3

section with some discussions for six illustrative energy-delay efficient MAC protocols:B-MAC, X-MAC, RI-MAC, SMAC, DMAC, and LMAC. All of these protocols and theiroptimization models, except RI-MAC, are described in Appendix A. In Section 5, wevalidate the results obtained by the proposed approach through extensive simulations.Finally, Section 6 concludes the article.

2. RELATED WORK

Performance optimization through protocol modeling is an appealing way to achieve thedesired design considerations for any application. Although most energy-efficient MACprotocol solutions for wireless networks follow pure experimental approaches, someworks (that are the most relevant to this one) have attempted to model and analyzethe protocols. Langendoen and Meier [2010] consider traffic and network models forvery low data rate applications and analyze energy consumption and average latencyof well-known MAC protocols. Markov models have been developed to evaluate theenergy consumption of some MAC protocols, such as SMAC [Yang and Heinzelman2009] and DMAC [Zheng et al. 2011]. Formal optimization for energy minimization ofthe SCP-MAC protocol has been investigated by Ye et al. [2006]. Although most modelsconsider single-objective optimization, protocol optimization under application needsin terms of both energy and e2e delay have been considered in Park et al. [2011] andZimmerling et al. [2012]. However, their approaches are based on optimizing energysubject to constraints on the delay.

Game theory is a practical way to solve many network optimization problems. Differ-ent game-theoretical models, including cooperative, noncooperative, Bayesian, differ-ential, and evolutionary games, have been explored to deal with common problems inwireless and communication networks [Han et al. 2011]. Resource allocation and band-width sharing have been addressed by many works using game-theoretical approaches,such as Kim et al. [2012] and Pandremmenou et al. [2013]. Route selection problemshave been studied by Ortn et al. [2013], where three games with different levels ofcomplexity have been proposed as a distributed self-configuring solution in multihopwireless systems. Chu and Sethu [2015] propose a cooperative game-theoretical topol-ogy control solution that allows a node to choose the set of neighbors with which itcommunicates directly while preserving global goals such as connectivity or coverage.Game theory has also been used to address energy efficiency and security problems inWSNs [Machado and Tekinay 2008]. Hayel et al. [2014] propose a decentralized opti-mal protection noncooperative game against virus propagation over a network througha susceptible infected susceptible (SIS) epidemic process. The performance of the equi-libria has been evaluated by finding the price of anarchy (PoA) in several networktopologies. Energy efficiency is also addressed by Voulkidis et al. [2013] using gametheory–based coalition formation between spatial correlated sensors that reduces theamount of transmitted packets. Mihaylov et al. [2011] present a game theory mecha-nism to save a node’s energy by playing the win-stay lose-shift (WSLS) game betweennodes to schedule radio transmissions. AlSkaif et al. [2015] give a taxonomy of gamesapplied to WSNs.

There is a wealth of literature that studies trade-offs between metrics in networkingapplying different approaches. One of the most investigated examples is the trade-off of delay throughput in mobile networks (e.g., in the work of Gamal et al. [2004]and Neely and Modiano [2005], among others). In these works, mostly based on theGupta-Kumar fixed traffic model [Gupta and Kumar 2000] or on the Grossglauser-Tse mobile model [Grossglauser and Tse 2001], the trade-off between throughput orcapacity and delay is investigated under several scenarios, such as the transmissionrange, interference, number of hops, degree of mobility, and draw throughput-delayscaling trade-off curves. Others like Ying et al. [2008] first characterize the maximum

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 4: Game Theory Framework for MAC Parameter Optimization in

10:4 M. Doudou et al.

throughput per source destination and then develop a joint coding-scheduling schemefor finding the delay-throughput optimal trade-off. The energy-delay trade-off has beenconsidered by Neely [2007] in multiuser wireless downlink and by Leow and Pishro-Nik[2007] in sensor networks using the stochastic optimal networking model. Zhang andTang [2013] studied the power-delay trade-off over OFDMA networks and proposedresource allocation schemes to minimize the power consumption subject to a delayquality-of-service (QoS) constraint, expressed in terms of queue length. Zhang et al.[2012] investigate the energy-delay trade-off in a wireless multihop network with anunreliable link model and provide a solution based on a single-objective optimizationmethod for different channel models (additive white Gaussian noise, Rayleigh fastfading, and Rayleigh block-fading). From a game theory perspective, Afghah et al.[2013] propose a Stackelberg game formulation to address spectrum allocation andinclude fairness and energy efficiency in the game definition. In the same area, Niyatoand Hossain [2008] investigate spectrum trading and propose several pricing modelsin cognitive radio environments. In our case, our approach to achieve fairness is basedon the two-person bargaining problem as a way of obtaining a Pareto-efficient point inwhich two players may find an agreement with an equal proportion of gain.

Numerous efforts have been devoted to address MAC optimization in wireless net-works using game theory. Nuggehalli et al. [2008] use game theory approaches toaddress the QoS support in 802.11 networks, which enables users with high-priority(HP) or low-priority (LP) traffic to fairly negotiate channel access. Similar approacheshave been introduced by Bacci et al. [2013], Ghasemi and Faez [2008], and Meshkatiet al. [2009a, 2009b] to limit the selfish behavior in using the medium resource by endusers controlled by the local power level in OFDMA systems, CDMA networks, andwireless networks, respectively. Zhao et al. [2009] propose to use a cooperative game tocontrol the contention window (CW) size of every node, which permits energy savingby estimating the number of competing nodes. Abrardo et al. [2013] propose a nonco-operative duty-cycle control game to reduce idle listening time in asynchronous MACprotocols. The energy-delay trade-off is considered by Nahir and Orda [2007], wheremultiple cost models (power level, direct/indirect transmissions) are used by each nodeto determine the Nash equilibrium point for different communication tasks (unicast,multicast, and broadcast) in wireless networks.

All of the preceding works consider nodes as players in the game and attempt to max-imize the defined utility function. In cooperative games, the coalition may be achievedby players’ coordination through message exchange, and thus the complexity of thesolution increases when the number of players involved in the competition scales up.Zhao et al. [2013] propose a game-theoretical solution where the performance goals areconsidered as peers (players) of the game. This is interesting, because considering thecooperative game between the two system performance objectives makes the complex-ity of the solution independent from the number of nodes. Although the authors do notdeal with WSN but consider the trade-off between load balancing and energy efficiencyfor traffic engineering in communication networks, their work is most related to thework presented in this article in terms of modeling and shares the way in which thegame players are represented. The proposed solution differs from that of Zhao et al. inthe way to achieve the fair trade-off point. In fact, Zhao et al. focus on the NBS modeland propose an iterative approach to reach the fair trade-off point, which updates thethreat values of players by halving on the line that connects (Xworst, Yworst) with thesolution of the NBS game at each iteration.2 The accuracy of their algorithm dependson how close the NBS point is from the KSBS point, which is something that dependson the problem and may not converge at all. Instead, we focus on the fairness usingthe theory of Kalai and Smorodinsky and propose an algorithm to approximate the

2(Xworst, Yworst) is the initial threat point of players X and Y.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 5: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:5

Fig. 1. Game theory optimization framework.

KSBS point from the NBS solution by adequately updating the threat values so thatthe solution converges to the KSBS point (the fair trade-off).

The optimization framework proposed in this article allows one to achieve a fairtrade-off between energy and delay performance for duty-cycled MAC protocols inWSNs. Tunable MAC parameters that enable the achievement of this trade-off areaccordingly determined. The proposed framework is based on the energy model derivedin Langendoen and Meier [2010], and it uses the bargaining solution to efficientlybalance objectives modeled as virtual players, which is inspired by the model proposedin Zhao et al. [2013]. Another feature of the proposed framework is fairness. In fact,the notion of fairness was defined by Kelly [1997] to allocate resources based on users’rate requirements. From the game theory point of view, fairness was introduced intothe bargaining model by Kalai and Smorodinsky [1975]. The KSBS solution keeps threeof the axioms required by the NBS and defines an equity constraint linking the utilitygains of each player to the player’s maximum achievable utilities (known as a claimspoint) by equalizing proportional gains of individual utilities. The KSBS model wasexplored by many works to address fair multimedia resource allocation and efficientbandwidth sharing in network traffic management [Park and van der Schaar 2007;Mazumdar et al. 1991] and wireless networks [Chen and Swindlehurst 2012; Bastaniet al. 2012], and lately applied to sensor networks [Pandremmenou et al. 2013; Ma et al.2011] for resource allocation and coverage efficiency [Truong et al. 2010]. Instead, inthis article, we propose to achieve the fair solution of KSBS through iterative NBSapplied to low data rate duty-cycled sensor networks. To the best of our knowledge,this work is the first that considers the energy/delay trade-off in duty-cycling MACprotocols using game theory.

3. GAME THEORY FRAMEWORK

In the proposed framework, the key performance metrics are the energy consumption,E, and the maximum e2e packet delay, L. The application requirements expressed asthe maximum energy budget per node, Ebudget, and the maximum allowed e2e delayper packet, Lmax, are used as inputs for the framework. The framework (Figure 1) thenbuilds a system model for energy and delay based on (1) the network and traffic modelsthat permit determination of the topology information and the traffic load at each nodeand (2) the specified MAC model defined by its operating modes, such as idle, transmis-sion, reception, and sleep modes. The network designer runs the optimization using

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 6: Game Theory Framework for MAC Parameter Optimization in

10:6 M. Doudou et al.

Fig. 2. Typical network topology with local node traffic flowing.

the game-theoretical framework and obtains the optimal values allowing a networkdeployment that fulfils the e2e delay and energy budget requirements.

3.1. Network and Traffic Model

Let us consider an unsaturated network with low traffic, which is typical in energy-constrained networks (e.g., WSN applications). A typical network model is considered,following the same analysis as in Langendoen and Meier [2010], where the authorsassume an arbitrary topology layered into rings with the sink node located at thecenter.3 A spanning tree is constructed where nodes are static and maintain a uniquepath to the sink, and they use the shortest path routing with a maximum length of Dhops (i.e., the depth or number of rings of the tree). We assume a network of N nodes,a uniform node density on the plane, and a unit disk graph communication model withdensity (average number of nodes), C (i.e., unit disks contain C +1 nodes (on average)).Refer to Figure 2, the nodes are layered into levels according to their distance to thesink in terms of minimal hop count, d (d = 1, . . . , D), where d = 0 is reserved forthe sink. Periodic traffic generation is considered, where every source node generatestraffic with frequency Fs. Consequently, the same input Fd

I , output Fdout, background

FdB traffic, and input links Id equations for nodes at ring d are similar to those derived

in Langendoen and Meier [2010]. The different symbols introduced in the analysisrelated to the network and traffic model are summarized in Table I with typical values.The neighboring nodes can then be classified as the set of children (input) nodes, I,and the set of overheard (background) nodes, B, such that C = |I| + |B|. Each nodeat the same level, d, has on average the same input, output, and background traffic.Thus, the average input traffic, Fn

I , output traffic, Fnout, and background traffic, Fn

B, fora specific node n at level d are defined as Fn

I = FdI |n∈d, Fn

out = Fdout|n∈d, and Fn

B = FdB|n∈d,

respectively.

3Other topologies, such as grid, or with the sink at different locations may also be considered. The modeldefined by Langendoen and Meier [2010] will give other average values for the input/output rates at eachnode that will impact the delay or energy consumption formulas, but the game theory framework can easilybe adapted to these cases.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 7: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:7

Table I. CC2420 Radio Constants [Texas Instruments 2010] and Network and Traffic Model with TypicalParameter Values

CC2420 Radio Parameter Description ValuesR Rate [kbyte/s] 31.25θ Frequency tolerance [ppm] 30Tcs Time [ms] to turn the radio on and probe the channel

(carrier sense)2.60

Tup Time [ms] to turn the radio on into RX or TX 2.40Lpbl Packet preamble length [byte] 4

Traffic and Network Parameter Description ValuesP Data payload [bytes] 32Fs Sampling rate [pkt/node/min] [1/60, 2] pkt/min

Fdout Node’s output traffic frequency at level d Fs

D2−d2+2d−12d−1

FdI Node’s input traffic frequency at level d Fd

out − Fs

FdB Background node’s traffic frequency at level d |Bd|Fd

outFn

out Output traffic frequency at node n Fnout = Fd

out|n∈d

FnI Input traffic frequency at node n Fn

I = FdI |n∈d

FnB Background traffic frequency at node n Fn

B = FdB|n∈d

D Network depth [#levels] [5, 12]C Network density (connectivity) [#neighbors] 8N Network size (number of nodes) [#nodes] D2C

3.2. Radio and MAC Model

The optimization framework requires information about the radio hardware conjointlywith the MAC layer model to build the system energy and delay model. The packet-based radio model is consider in our framework. The reason behind this choice istwofold. First, this model is used by most of the well-known hardware platforms, such asMicaZ and TelosB, which both use CC2420 Chipcon [Texas Instruments 2010]. Second,most of the current MAC implementations support this kind of radio that decouplesthe radio functionality from the link layer. For example, the current implementation oflow-power listening (LPL) MAC [Moss and Levis 2008], which originally was designedfor bit-stream radios, supports packet-based radio in the recent versions of TinyOS(Sensors operation system [Levis et al. 2004]). These facts lead us to adopt the CC2420radio model (packet based) as defined in Langendoen and Meier [2010], which modelsthe time needed to power the radio up (i.e., to transit from sleep into active mode),the radio data rate and the time needed for carrier sense (including power-up). Thecrystal frequency tolerance is another modeled hardware parameter. Due to the lowdata rate, the clocks of different nodes may drift apart and need to be accounted for.This parameter is very important in MAC protocols, which permits one to compensatefor eventual clock drift. The main modeled radio parameters used in this work aresummarized in Table I with typical values.

Many internal MAC layer parameters are related to the MAC protocol operation.The understanding of the MAC protocol behavior and operation mode is of pivotalimportance to determine the role of each parameter. Since the objective of this article isto optimize the MAC parameters that lead to a fair trade-off between energy and delayperformance, the main parameters that affect both performances, such as the wake-upperiod Tw, the slot period Tslot, or the frame size Tframe, can be captured, whereas otherdetails can be left out. By analyzing the operating modes of the MAC protocol, theparameters involved in the delay and energy consumption when the radio is switchedbetween different states (idle listening, transmitting, receiving, and sleeping) can beidentified. For example, consider the basic operation modes of the LPL [Hill and Culler2002] protocol depicted in Figure 3. Each node, when powered up, performs carrier

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 8: Game Theory Framework for MAC Parameter Optimization in

10:8 M. Doudou et al.

Fig. 3. States transition of different LPL operation modes.

sensing every wake-up period Tw. A node is likely to sleep most of the time to saveenergy and only wakes up if it has data to send or to check the channel for eventualincoming data packets. If no activity is detected, a node returns back to the sleepstate; otherwise, it keeps the radio in the receive state until the data packet headeris being detected to determine whether to receive the data. When a node has datapackets to be sent, it first samples the channel with a preamble that spans for thewhole wake-up period Tw to ensure that its receiver can hear the preamble. It canbe easily determined that the wake-up period Tw is the key parameter that affectsboth energy and delay performance. The same principal is followed through the article,where six MAC protocols are modeled according to their operation modes and a vectorof key tunable parameters that can be optimized are determined and used to derivethe energy consumption and the e2e packet delay function of a node. The consideredMAC model is mainly based on the analysis provided in Langendoen and Meier [2010]for low data rate applications and is extended for other protocols. We keep the sameassumptions regarding the absence of interferences and the low rate constraints, andwe provide for each protocol the per-node energy consumption based on the protocoloperation modes, the e2e packet delay, and the bottleneck constraint, which can beused as input for the optimization framework. An overview of these six protocols andtheir internal parameters is provided in Table II (RI-MAC) and Table V (BMAC, XMAC,SMAC, DMAC, and LMAC) for reference.

3.3. System Energy and Delay Model

The energy consumption of node n, En, is defined as the amount of energy consumedby the radio duty of the node in the network according to its location and the amountof traffic it handles. Thus, the node’s energy consumption4 is the sum of energy con-sumed in each operating mode, which depends on the exchanged traffic load and the

4In this article, the term energy consumption refers to the duty cycle of the radio during the node’s lifetime,measured in the percentage of active periods.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 9: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:9

MAC intrinsic parameters. For example, let Enidle, En

tx, and Enrx be the energy consumed

fractions for node n in idle listening,5 transmitting and receiving modes, respectively.The node’s energy consumption can be calculated as En = En

idle + Entx + En

rx. The nor-malized energy consumption (in Joules) can be calculated by multiplying the obtainedexpressions in each mode by the current draws of the radio defined in the datasheet foreach mode (e.g., Iidle, Itx, and Irx). In general, for any MAC protocol in the literature,the node’s consumed energy is caused by carrier sensing Ecs, data transmission Etx,data receiving Erx, and overhearing Eovr, and by sending/receiving explicit synchro-nization, respectively denoted by Estx and Esrx. Given that the network lifetime can beexpressed as the expected shortest node lifetime [Zimmerling et al. 2012], we definethe system-wide energy consumption, E, as the maximum consumed energy in thenetwork,

E = maxn∈N

(En) = maxn∈N

(En

cs + Entx + En

rx + Enovr + En

stx + Ensrx

). (1)

More specific MAC protocols will present other energy consumption terms thatshould be added to Equation (1).

The e2e packet delay (latency), Ln, is defined as the expected time between thefirst transmission of a packet at node n ∈ N and its reception at the sink. It is thena per-topology parameter in the sense that it depends on the position of the nodethat generates the data. Ln denotes the sum of per-hop latencies of the shortest path,Pn, from node n to the sink, where Ln

l is the one-hop latency on each link l∈Pn. Themaximum e2e latency, L, is defined as the maximum latency from all nodes to the sinkas follows:

L = maxn∈N

(Ln) = maxn∈N

(∑l∈Pn

Lnl

). (2)

3.4. The Optimization Framework

Let � denote the set of system parameters at the MAC layer that appear in the energyand delay functions, such as sleep length, preambles, and packet sizes. Some of theseparameters (e.g., the MAC preamble) are not tunable by the network designer. However,other parameters (e.g., the duty cycle of the sensor) may be fixed by the designer. It isobvious that a long duty cycle reduces the latency but causes more energy consumptionat idle state. Given a specific duty-cycle MAC protocol, let X∈� be the vector of systemparameters that may be tuned and thus optimized. The following optimization problemis defined for energy consumption minimization:

(P1) min E(X)s. t. L(X) � Lmax

var. X,

where Lmax is the maximum latency tolerated by the application. On the other hand,the following optimization problem is defined for latency minimization:

(P2) min L(X)s. t. E(X) � Ebudget

var. X,

5The term idle listening is not explicitly mentioned in the equations. It is modeled under different namesthat differ from one protocol to another. For example, terms Tcs and Tup in Table I that are common for allMAC protocols are fractions of time where the node is in idle listening and the radio is consuming energy.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 10: Game Theory Framework for MAC Parameter Optimization in

10:10 M. Doudou et al.

Fig. 4. (a) NBS and KSBS for duty-cycling MACs.

where Ebudget is the energy budget (maximum duty cycle) that a node consumptioncannot exceed for fulfilling a lifetime target. Let us take, without loss of generality,a simple duty-cycled MAC protocol with the length of the wake-up period Tw as thesingle parameter to be optimized (i.e., X = Tw). Prolonging this time enables energysaving, as the energy consumption is proportional to the duty cycle and thus is inverselyproportional to the length of the wake-up period (e.g., E ∼ 1/Tw). However, this causeshigh latency for relaying data to the sink, as it increases the time that every node hasto wait for the next hop (parent) node before transmitting the data packet. The per-link latency will be uniformly distributed in [0, Tw] with average Tw/2 (plus the time totransmit the packet). Coming back to the problems (P1) and (P2), the optimal solutionof problem (P1), X∗

E = T ∗wE

, will result in the pair (Ebest, Lworst), where Ebest = E(X∗E)

and Lworst = L(X∗E). On the other hand, the optimal solution of problem (P2), X∗

L = T ∗wL

,will result in the pair (Eworst, Lbest), where Eworst = E(X∗

L) and Lbest = L(X∗L) (Figure 4).

Observing Figure 4, there is a clear trade-off between minimizing energy consump-tion and latency in duty-cycled wireless MAC protocols. Deployments in which delay isnot a requirement will use optimization problem (P1) to model the MAC parametersat the cost of increasing delay. Deployments in which energy is not a requirement andlow delay is a must will use optimization problem (P2) to model the MAC parametersat the cost of increasing energy consumption. However, deployments in which bothmetrics are a must need to find a fair trade-off operational point. To find the optimaltrade-off solution for both optimization problems, we define a bargaining problem inwhich each optimization problem represents a player (i.e., the energy player and thelatency player). The bargaining problem is a problem of understanding how severalagents should cooperate when noncooperation leads to Pareto-inefficient results. Thesolution of the problem is one that coincides to the solution that an arbitrator wouldrecommend. Various solutions6 to the bargaining problem exist, depending on the de-sired properties of the solution. Two of the most applied axiomatic solutions are theNBS [Nash 1950] and the KSBS [Kalai and Smorodinsky 1975].

3.5. The NBS for Duty-Cycled MAC

A bargaining game with two players selects one of the possible player’s outcomes of ajoint collaboration [Nash 1950; Nissan et al. 2007]. Let A ⊂ R2 be the set of alternativesthe players face, let S = {s = (u1(a),u2(a)) | a ∈ A} be the set of feasible utility payoffs,

6There are other points that lie in the Pareto frontier and thus fulfill the Ebudget and Lmax constraints.However, these may not necessarily lead to an agreement by both players.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 11: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:11

and let v ∈ S be a disagreement or threat point. Each point in S corresponds to theoutcome of the bargaining and specifies the utility for this outcome. The disagreementor threat point, v = (v1, v2), represents the value that each player expects to receive if thenegotiation breaks down. The goal of the bargaining is to choose a feasible agreement,�:(S, v) → S, that results from the negotiation.

The NBS considers that S is convex and compact, and there exists an s ∈ S such thats > v for both players. Players have complete information over S, v. The NBS dealswith the bargaining game by solving the following optimization problem when thereare two players:

(NBS) max (s1 − v1)(s2 − v2)s. t. s ∈ S

(s1, s2) ≥ (v1, v2)var. s.

The NBS has the following axioms [Nash 1950]: (1) Pareto optimality, (2) symmetry,(3) invariant to affine transformations, and (4) independence of irrelevant alternatives.The Pareto efficiency axiom specifies that any bargaining solution, �(S, v), is preferredto a disagreement point. The symmetry axiom specifies that the utilities of the decisionmakers at the solution are equal if set S is symmetric. The invariance to affine transfor-mations specifies that the solution is independent of the units of the decision makers.Finally, the independence of irrelevant alternatives specifies that if negotiation set Sis narrowed to produce a smaller set, say S′, then the solution �(S′, v) = �(S, v). TheNBS theorem specifies that there exists an optimal solution since S is compact and theobjective function is continuous. The uniqueness of the optimal solution is guaranteedwhen the objective function is quasiconcave. The NBS, �(S, v), is the unique bargainingsolution that satisfies the previous four axioms.

Let intervals AE = [Eworst, Ebest] and AL = [Lworst, Lbest] be the set of strategies7 thatthe energy player and delay player respectively may take, and let sE ∈ AE, sL ∈ AL bethe strategies chosen by the players. The threat strategy for the delay player is to playstrategy Lbest, which makes the energy player get Eworst. On the other hand, the threatstrategy for the energy player is to play strategy Ebest, which makes the delay player getLworst. Let vE = Eworst and vL = Lworst be the threat values of each player, where eachthreat value represents the utility threshold of each player to sign the agreement. If nofeasible solution is found, then each player gets a cost �(S, v) = ∞. Note that E(X) andL(X) are cost functions instead of utility functions (i.e., signs have to be reversed), andthe term (E(X), L(X)) ∈ S represents the intrinsic conditions that each MAC protocolhas to fulfill. The (NBS) problem is expressed as:

(P3-NBS) max (Eworst − E(X))(Lworst − L(X))s. t. (Ebudget, Lmax) ≥ E(X), L(X)

(Eworst, Lworst) ≥ E(X), L(X)(E(X), L(X)) ∈ S

var. X.

If a player unilaterally reduces its threat and no feasible solution to the problem(P3-NBS) is found, then each player obtains a cost of ∞. The (NBS) problem ensuresthat the solution belongs to the Pareto frontier (axiom (i)). This axiom states that abargaining solution (s∗

1,s∗2) is Pareto efficient if for any other solution (s1,s2) ∈S, then

7The strategy is chosen by selecting the corresponding system parameters X ∈ �. For example, the delayplayer chooses X = Tw , which produces a utility of Lbest. The delay player is said to choose the strategy Lbest.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 12: Game Theory Framework for MAC Parameter Optimization in

10:12 M. Doudou et al.

(s∗1,s∗

2) ≥ (s1,s2). This condition, then, ensures that there is no feasible point (s1,s2) ∈ Sthat is Pareto superior to the solution. A Pareto frontier is the set of solutions that arePareto efficient. Figure 4(a) shows how the NBS works. Each player can prevent theagreement threatening with a worst value or can reduce its threat looking for a feasiblepoint that satisfies both players. The solution (E∗, L∗) of the optimization problem (P3)where E∗ = E(X∗) and L∗= L(X∗) will be the optimal cost for both players under theagreement. However, although the solution of the Nash bargaining problem lies in thePareto frontier, the axiomatic solution does not ensure the fairness of the solution. Thismeans that in the obtained solution, one player may reduce/increase its cost/utilitymore than the other. As Kalai and Smorodinsky [1975] illustrate, let us assume anormalized cooperative game with convex hull in the area S1 = {(1,0), (0,1), (3/4,3/4)}.The NBS solution with threat point (0,0) is (3/4,3/4). Let us now assume a convex hullin the area S2 = {(1,0), (0,1), (1,0.7)}. The NBS solution with threat point (0,0) is (1,0.7),but player 2 has reasons to demand more in (0,S2) than he does in (0,S1). A fair trade-off solution requires that each player reduces/increases its cost/utility function withthe same percentage. The KSBS deals with this problem and defines an equity (fair)solution.

3.6. The KSBS for Duty-Cycled MAC

The main idea behind the KSBS [Kalai and Smorodinsky 1975] is that each playermaximizes its utility while obtaining the same fraction of utility as any other player.Let us define the ideal point8 b(S,v) as the bargainers’ expectations before coming tothe negotiation table in the energy-delay game. The KSBS deals with the bargaininggame by solving the following optimization problem when there are two players:

(KSBS) max rs. t. s ∈ S

(s1, s2) ≥ (v1, v2)s1 − v1

b1 − v1= r

s2 − v2

b2 − v2= r

var. s.

The KSBS [Kalai and Smorodinsky 1975] has the following axioms: (1) Pareto opti-mality, (2) symmetry, (3) invariant to affine transformations, and (4) monotonicity. TheKSBS modifies the NBS axioms by dropping the independence of irrelevant alternativeaxioms and adding the monotonicity axiom. This axiom states that if for every utilitylevel that player 1 may demand, the maximum feasible utility level that player 2 cansimultaneously reach is increased, then the utility level assigned to player 2 accordingto the solution should also be increased. Naming the three first axioms as the stan-dard axioms, Nash [1950] shows that there is a unique standard independent solution,whereas Kalai and Smorodinsky [1975] show that there is a unique standard monotonesolution, and both are incompatible. The Kalai-Smorodinsky theorem states that for apair (S,v), the maximal element of S on the line v to b(S,v) is the solution of the KSBS.In other words, the KSBS point is in the cross point between the Pareto frontier andthe line that connects the threat value point and the ideal/aspiration point.

8The ideal point is also called the aspiration point or utopia point by many authors (e.g., Balakrishnan et al.[2011]).

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 13: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:13

Table II. RI-MAC Symbols Used in Energy and Delay Equations

MAC Parameter and Description Values

Tw : RI-MAC wake-up period [ms] T ∗w

Tbeacon: Wake-up beacon duration [ms]9+Lpbl

R

RI-MAC Twait: Waiting time until the receiver wakes up [ms] Tw/2

Tcw: CW size [ms] 15 * 0.62

Ttimeout: Waiting time for incoming data packets [ms] Tcw

Thdr, Tack: Pkt header and Ack duration [ms]9+Lpbl

R

Defining the ideal point as b(S,v) = (Ebest, Lbest), and remembering that E and L arecost functions, the KSBS game for the two players (energy and delay) is expressed as

(P3-KSBS) max rs. t. (Ebudget, Lmax) ≥ E(X), L(X)

(Eworst, Lworst) ≥ E(X), L(X)Eworst − E(X)Eworst − Ebest

= r

Lworst − L(X)Lworst − Lbest

= r

(E(X), L(X)) ∈ Svar. X.

The KSBS solution ensures that the solution belongs to the Pareto frontier and thatit lies in the segment that connects the threat point, (Eworst, Lworst), to the ideal point,(Ebest, Lbest) (Figure 4(b)), which provides the following equity solution:

Eworst − E∗

Eworst − Ebest= Lworst − L∗

Lworst − Lbest. (3)

4. APPLICATION TO A SET OF WSN MAC PROTOCOLS

We apply the optimization framework to six state-of-the-art energy-delay efficient MACprotocols, B-MAC [Polastre et al. 2004], X-MAC [Buettner et al. 2006], RI-MAC [Sunet al. 2008], SMAC [Ye et al. 2004], DMAC [Lu et al. 2007], and LMAC [van Hoesel andHavinga 2004], as representatives of the main categories of duty-cycled MAC protocols,preamble sampling (B-MAC and X-MAC), beacon based (RI-MAC), slotted contentionbased (SMAC), and frame based (DMAC and LMAC). These protocols are considered ascanonical MAC in Langendoen and Meier [2010], and we refer to the elaborated surveyof energy-efficient MAC protocols available online [MACsoup 2011], where most ofthe recent protocols extend upon their canonicals like ContikiMAC [Dunkels 2011],A-MAC [Dutta et al. 2012], and CyMAC [Peng et al. 2011], which make the analysisvalid for them. The choice of these protocols is to exemplify the framework and show itsusefulness to optimize different MAC parameters that permit to achieve a fair energy-delay trade-off. For the sake of clarity, the formulation derived by the analysis made inLangendoen and Meier [2010] is used. Some of the formulas were obtained by originalauthors of the proposed protocols, whereas others are derived in that work. For thesake of space reduction, we summarize the formulation of only the RI-MAC protocol;those of B-MAC, X-MAC, SMAC, DMAC, and LMAC are given in Appendix A. Theresults of optimization and simulations are provided for the six MAC protocols.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 14: Game Theory Framework for MAC Parameter Optimization in

10:14 M. Doudou et al.

Fig. 5. RI-MAC’s beaconing, waiting in idle listening, transmitting, and receiving modes.

4.1. Protocol Description

RI-MAC (beacon based) [Sun et al. 2008] is a receiver-initiated asynchronous protocolthat tries to reduce the amount of time a pair of nodes occupy the medium by preamblesbefore they reach a rendezvous time for data exchange. This is to reduce the globalnetwork delivery delay. Every node periodically wakes up and broadcasts a beacon afterTw (1) (Figure 5). When a node wants to send a data packet, it stays silently active for aperiod of Twait (2) until the wake-Up of its receiver, and it starts contending to send itspackets upon receiving a beacon from its receiver (3). Multiple nodes can contend in theCW’s Tcw, where the receiver keeps its radio on waiting for eventual data packets andreturns back to sleep after Ttimeout. The winer among the contending nodes transmitsthe data packet, Tdata, which spans for the transmission of the header and the payload(4). The receiver acknowledges the data packet with another beacon that spans forthe transmission of the wake-up beacon Tack = Tbeacon (5). Note that this beacon’s roleis twofold. First, it acknowledges the correct receipt of the sent data packet. Second,it invites for new data packets from other senders before returning back to sleep.Following the defined energy model in Section 3.3, the energy consumption is modeledby the effective duty cycle (i.e., the fraction of time the radio is switched on). Knowingthe duty cycle, the node’s lifetime can easily be determined given the current draws, Ionand Ioff, of the radio in active and sleep modes, respectively. For example, let En be theeffective duty cycle (energy consumption), and let Q be the battery capacity of a node n;then, the node’s lifetime can be calculated by T n = Q/(EnIon + (1 − En)Ioff) [Zimmerlinget al. 2012]. This allows one to omit the physical energy consumption expression andonly focus on the effective duty-cycle aspects [Langendoen and Meier 2010]. Followingthe RI-MAC operation model, the key adjustable parameter that affects the energyand delay performance is the wake-up period Tw. The vector parameter for RI-MACprotocol is thus given by XRI-MAC = [Tw]. The per-node energy consumption based onthe protocol operation modes, the e2e packet delay, and the bottleneck constraint9 areprovided in the following equations (a description of every term used in the formulascan be found in Tables I and II):

(a) The energy of node n at level d. Remembering that the average input traffic, FnI ,

output traffic, Fnout, and background traffic, Fn

B, for a node n at level d are respectivelydefined as Fn

I = FdI |n∈d, Fn

out = Fdout|n∈d, and Fn

B = FdB|n∈d, and the energy in RI-MAC is

consumed each time a node performs beacon sending, Ebeacon, data transmission, Etx,

9Since the defined traffic model is targeted to low data rate applications, this constraint is used to avoid thebottleneck at the sink.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 15: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:15

and data reception, Erx, and in the traffic overhearing mode, Eovr10:

En = Enbeacon + En

tx + Enrx + En

ovr, (4)

where Enbeacon = Tup+Tbeacon

Tw, Twait = Tw/2, Ttx = Tcs + Tdata + Tack, En

tx = (Twait + Ttx) Fnout,

Enrx = (Ttimeout/2 + Tcs + Tdata + Tack) Fn

I , and Enovr = Ttx

Tw(Tcs + Thdr) Fn

B.The energy consumption, En, is a per-node function that depends on the intrinsic

parameters of the MAC protocol and the traffic it generates and relays. Therefore,since nodes belonging to the same ring d will generate and relay, on average, the sametraffic, they will consume the same energy.

(b) The delay of node n at level d. The average e2e delay of a node is determined bythe summation of one-hop delays, which include the waiting time before the receiverwakes up, the time to receive the beacon, the contention time, and the time to send andacknowledge the data packet:

Ln =d∑

i=1

(Tw

2+ Tbeacon + Tcw

2+ Tdata + Tack

), (5)

where Tdata = Thdr + P/R. Again, all nodes at the same ring d will have the sameaverage e2e delay.

(c) The bottleneck constraint:

|I0| E1tx < 1/4, (6)

where I0 is the number of input links at level 0 (at the sink). From Equations (4)through (6), the following system-wide energy-delay functions are defined where thenontunable parameters are grouped as constants:

(a) The network energy consumption function:

ERI-MAC = maxn∈N

(En) = maxn∈N

(η1

Tw

+ η2Tw + η3

), (7)

where η1 = Tup + Tbeacon + (Tcs + Tdata + Tack)(Tcs + Thdr)FnB, η2 = Fn

out/2, and η3 =(Tcs + Tdata + Tack)Fn

out + (Ttimeout/2 + Tcs + Tdata + Tack)FnI .

(b) The e2e packet delay function:

LRI-MAC = maxn∈N

(Ln) = maxn∈N

(ε1Tw + ε2), (8)

where ε1 = ∑di=1 1/2 and ε2 = ∑d

i=1(Tbeacon + Tcw2 + Tdata + Tack).

Let us define the network lifetime as the time until the first battery exhaustion ofany node. Nodes that are placed in the nearest ring to the sink (d = 1) are the onesthat convey more traffic toward the sink, as they have to forward their own traffic andthe traffic that flows from all other rings (d > 1). These nodes are the most energyconsuming and will be the first ones to die. Since all nodes at d = 1 have the sametraffic on average, Equation (7) reduces to

ERI-MAC = maxn∈N

(En) = η1

Tw

+ η2Tw + η3, (9)

with η1, η2, and η3 having FnB = Fd

B|d=1, Fnout = Fd

out|d=1, and FnI = Fd

I |d=1.

10The duty cycle is calculated by multiplying the time spent in a given mode by the frequency of its occurrence(e.g., 1/Tw , Fn

out).

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 16: Game Theory Framework for MAC Parameter Optimization in

10:16 M. Doudou et al.

Fig. 6. The e2e delay versus energy consumption for different values of the wake-up period Tw , slot sizeTslot, and frame size Tframe of B-MAC, X-MAC, RI-MAC, SMAC, DMAC, and LMAC.

On the other hand, the maximum e2e delay occurs in nodes placed at the outer ring,d = D. Then, Equation (8) reduces to11

LRI-MAC = maxn∈N

(Ln) = ε1Tw + ε2, (10)

with ε1 = D/2 and ε2 = D(Tbeacon + Tcw2 + Tdata + Tack).

4.2. Framework Application

Before applying the game theory framework, the energy consumption and the e2edelay resulted in different values for the wake-up period Tw, the slot size Tslot (Tslot =Tsync+Tactive+Tsleep), and frame size Tframe of B-MAC, X-MAC, RI-MAC, SMAC, DMAC,and LMAC are plotted in Figure 6. It can be observed that each protocol reducesits average e2e delay at the cost of rising energy consumption, and vice versa, aspredicted in Figure 4. For analyzing this trade-off, the general optimization problems(P1) and (P2) are first used to determine the best parameters’ values that permit theachievement of optimal energy and delay objectives. In the following, RI-MAC is usedas a baseline example for the framework application.

The network designer, with the knowledge of the network topology and the samplingrate, may characterize functions for the energy consumption, ERI-MAC, and e2e delay,LRI-MAC, as described in Equations (9) and (10). The objective of the network designeris to obtain the optimal value for the tuning parameter, Tw, that minimizes energyconsumption and e2e delay in a fair manner. For that purpose, the specific energyconsumption optimization problem (P4) is first defined to obtain the threat valuevRI-MAC

L = LRI-MACworst . Second, the specific e2e delay optimization problem (P4′) is defined

to obtain the threat value vRI-MACE = ERI-MAC

worst . The NBS optimization problem (P4∗) isthen defined and solved. Finally, the KSBS is solved with a heuristic from the NBSoptimization problem. The optimal value, T ∗

w , used by the network designer is the valuegiven by the optimization problem (P4∗) if the NBS axioms are met or the value givenby the heuristic if the KSBS axioms are met.

11The same hypothesis is used in the protocols described in the Appendix.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 17: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:17

4.2.1. Energy Optimization. Given the application requirements in terms of e2e packetdelay bound Lmax, energy optimization derives optimal MAC parameters that give theminimal network energy consumption subject to Lmax:

(P4) min ERI-MAC(Tw)s. t. LRI-MAC(Tw) � Lmax

Tw � T minw

|I0| E1tx � 1/4

var. Tw

Equations (9) and (10) are posynomials, whereas the second and third constraintsof (P4) are monomials. A monomial is an expression of the type c xa(1)

1 xa(2)

2 ...xa(n)

n , withc ≥ 0 and a( j) ∈ R for j = 1, . . . , n, whereas posynomials are the summation of mono-

mials. In other words, an expression of the type∑K

k=1 ckxa(1)k

1 xa(2)k

2 ...xa(n)k

n , with ck ≥ 0 fork = 1, . . . , K and a( j)∈R for j = 1, . . . , n. Optimization problem (P4) is a geometricoptimization problem that is nonconvex and nonlinear. A geometric problem is a prob-lem in which the objective function and the inequality constraints are posynomialsand the equality constraints are monomials. Geometric problems may be easily trans-formed to convex problems [Boyd and Vandenberghe 2004] using a logarithmic changeof variables and a logarithmic transformation of the objective and constraint functions.Let us define vector ak = (a(1)

k , . . . , a(n)k ), vector x = (x1, . . . , xn), yj = log(xj), and bk =

log(ck). Posynomial∑K

k=1 ckxa(1)k

1 xa(2)k

2 . . . xa(n)k

n is transformed in a log-sum-exp function ofthe type log

∑Kk=1 e(bk+aT

k y), where vector aTk is the transpose of vector ak. Monomials

are transformed in linear expressions of the type b + aT y. It may be easily provedthat log-sum-exp functions are convex, and then optimization problem (P4) may betransformed in a convex form. Solving now problem (P4), the optimal point X∗

RI-MAC= [T ∗

w] is obtained, the optimal value of (P4) is ERI-MACbest = ERI-MAC(X∗

RI-MAC), and thecorresponding e2e packet delay is obviously nonoptimal, LRI-MAC

worst = LRI-MAC(X∗RI-MAC).

Energy optimization for B-MAC, X-MAC, SMAC, DMAC, and LMAC protocols is pro-vided in Section A.2.1 of the Appendix by solving problems (P5), (P6), (P7), (P8),and (P9), respectively. Problems (P5) through (P8) again are geometric optimizationproblems. On the other hand, the energy consumption for LMAC is in the form of asum of linear fractions, and optimization problem (P9) is not a geometric optimizationproblem. However, this problem may be transformed to an equivalent convex problemusing a primal-relaxed dual global optimization approach [Floudas and Visweswaran1993; Benson 2004].

Floudas and Visweswaran [1993] propose a deterministic global optimization ap-proach for nonconvex constrained nonlinear programming problems. The idea is todecompose the original nonconvex problem into primal and relaxed dual subproblemsby introducing new transformation variables, if necessary, and partitioning of the re-sulting variable set. Partitioning of the variable set means to divide the variable setinto two parts in such a way that the objective and constraint functions are convexfor one part of the variables given that the other part is fixed. Then, the projection ofthe problem into the space of a subset of the variables results in a convex program-ming problem. The method is useful in quadratic optimization problems with linearand/or quadratic constraints, as well as in optimization problems involving polynomialfunctions of one or more variables in the objective function and/or the constraint set.Since the primal problem still may be nonconvex in the projected set, Floudas andVisweswaran [1993] propose the use of the dual representation and the relaxation of

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 18: Game Theory Framework for MAC Parameter Optimization in

10:18 M. Doudou et al.

the constraint region for the problem, thus obtaining a lower bound for the solutionto the problem. Finally, iterating the process, a global solution is determined. Benson[2004] applies the process of Floudas and Visweswaran [1993] to a nonconvex optimiza-tion problem with a sum of linear fractions. Let us consider the following optimizationproblem:

(PN) minK∑

k=1

(aTk x + bk)

(cTk x + dk)

s. t. x ∈ X,

where X ⊆ Rn is a nonempty, compact convex set and aTk x + bk, cT

k x + dk are positivelyvalued functions on X. To solve this problem [Benson 2004], let us define the following:

mk = minx∈X(cT

k x + dk)

Mk = maxx∈X(cT

k x + dk)

Lk = 1.0/Mk

LLk = 1.0/mk.

Then, x∗ is a globally optimal solution for problem (PN) if and only if for some y∗ ∈ RK,(x∗,y∗) is a global optimal solution for the problem:

(PN1) minK∑

k=1

(aTk x + bk)

s. t. −yk(cTk x + dk) + 1.0 ≤ 0 k = 1, . . . , K

−yk − LLk ≤ 0 k = 1, . . . , K−yk + Lk ≤ 0 k = 1, . . . , Kx ∈ X.

Finally, Floudas and Visweswaran [1993] give an algorithm that solves optimizationproblems such as (PN1) via branch and bound.

Figure 7(a) shows the optimal solution obtained for each protocol when varying thedelay bound Lmax from 500ms to 3,000ms using the network topology model and trafficmodel described in Section 3.1. Optimization problems (P4) through (P8) have beensolved using CVX, a Matlab-based modeling system for disciplined convex optimizationthat supports geometric programming (GP) [Boyd and Vandenberghe 2004]. Optimiza-tion problem (P9) has been solved using the Benson [2004] primal-relaxed dual globaloptimization approach. It is observed that by relaxing the Lmax constraint, the energyconsumption is lowered for all MAC protocols until a given value of Lmax where thereis no space for improvement. The difference between protocols is due to the intrinsicdesign of the MAC protocols, which is outside the scope of this article.

Figure 7(b) through (e) show how the optimal point values T ∗w (B-MAC, XMAC, and

RI-MAC), T ∗active and T ∗

sleep (SMAC), T ∗sync (DMAC), and T ∗

frame (DMAC and LMAC)increase as the e2e packet delay bound Lmax increases. From the figure, it can beobserved that the increase at the beginning was proportional to the e2e delay bound(low values of Lmax), but it becomes stable for some protocols. This means that relaxingthe e2e delay bound beyond those values has no effect on the energy optimizationparameters and the consumed energy. The reason again is due to the intrinsic behaviorof the MAC protocols. For example, taking the RI-MAC protocol, relaxing the Lmaxbound would allow one to increase the T ∗

w, and thus the node would stay longer in thesleep mode, saving energy. However, a transmitting node would have to wait in the idlestate for more time to transmit a packet, increasing the energy consumption. Similarbehavior occurs with the other MAC protocols.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 19: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:19

Fig. 7. The optimized energy Ebest for all MACs (a), the wake-up period Tw for B-MAC, X-MAC, and RI-MAC(b), the active period Tactive and sleep period Tsleep for SMAC (c), the synchronization period Tsync for DMAC(d), and the frame size Tframe for DMAC and LMAC (e) obtained by varying Lmax ∈ [500, 3000] ms.

4.2.2. Delay Optimization. Now, given the application requirements in terms of max-imum energy budget Ebudget expressed as the maximum allowed duty cycle, we areinterested in finding the optimal MAC parameters that give the minimum e2e packetdelay subject to the maximum energy budget:

(P4′) min LRI-MAC(Tw)s. t. ERI-MAC(Tw) � Ebudget

Tw � T minw

|I0| E1tx � 1/4

var. Tw

The delay optimization problems (P4′) through (P9′) can be solved similarly to theenergy optimization. Let Y ∗

RI-MAC = [T ∗w] denote the optimal point of problem (P4′). The

optimal delay value of problem (P4′) is denoted by LRI-MACbest = LRI-MAC(Y ∗

RI-MAC). The cor-responding energy consumption is obviously nonoptimal, ERI-MAC

worst = ERI-MAC(Y ∗RI-MAC).

Figure 8(a) shows the optimal solution obtained for each protocol when varying themaximum energy budget Ebudget from 1.2% to 20%. The e2e packet delay is lowered forall MAC protocols as the maximum energy budget increases up to a given value, fromwhich there is no more delay reduction for some protocols, such as B-MAC, X-MAC,and RI-MAC. The difference in e2e packet delay between both protocols is again dueto the intrinsic design of the MAC protocols, which is outside the scope of this article.Figure 8(b) through (e) depict the decrease of the optimal point values of T ∗

w (B-MAC,XMAC, and RI-MAC), T ∗

active and T ∗sleep (SMAC), T ∗

sync (DMAC), and T ∗frame (DMAC and

LMAC) as a function of the energy budget Ebudget. The figure shows that the decreaseis significant at the beginning (low values of Ebudget), but it becomes insignificant asEbudget increases. This means that increasing the maximum energy budget beyond thosevalues has no effect on the delay optimization parameters and the achieved delay. The

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 20: Game Theory Framework for MAC Parameter Optimization in

10:20 M. Doudou et al.

Fig. 8. The optimized e2e delay Lbest for all MACs (a), the wake-up period Tw for B-MAC, X-MAC, andRI-MAC (b), the active period Tactive and sleep period Tsleep for SMAC (c), the synchronization period Tsyncfor DMAC (d), and the frame size Tframe for DMAC and LMAC (e) obtained by varying Ebudget ∈ [1.25, 20]%.

main reason for this behavior, taking again RI-MAC as an example, is the Tw ≥ T minw

constraint, where Tw cannot be decreased as much as Ebudget is increased, as the Tw

constraint has to be fulfilled. Similar constraints hold for the other MAC protocols.

4.2.3. Energy-Delay Trade-Off: NBS Model. NBS (P3-NBS) is applied to find an energy-delay trade-off. Let the point (Ei

worst, Liworst) be the disagreement point, with i= {BMAC,

XMAC, RI-MAC, SMAC, DMAC, LMAC}. The problem (P3-NBS) is nonlinear and non-convex, but this kind of problem can be transformed into a standard convex optimiza-tion problem without changing its solution [Zhao et al. 2013]. The idea is to defineauxiliary variables E1 and L1 such that E1 ≥ Ei(X) and L1 ≥ Li(X), which should besatisfied by the optimal solution. The proof comes from the fact that to attain the max-imum in the objective function, E1 and L1 have to be minimum and thus be equal toEi(X) and Li(X), respectively (second constraint). Moreover, since Ei(X) and Li(X) areless than or equal to (Ei

worst, Liworst) (first constraint), the solution is feasible whenever

the problem (P3-NBS) is feasible, and application of (P3-NBS) to the MAC protocolsyields a concave problem:

(P3 ∗ -NBS) max log(Ei

worst − E1) + log

(Li

worst − L1)

s. t.(Ei

worst, Liworst

)� (Ei(X), Li(X))

(E1, L1) � (Ei(X), Li(X))(E1, L1) ≤ (Ebudget, Lmax)(E1, L1) ∈ S

var. E1, L1, X.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 21: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:21

Fig. 9. (a) KSBS solution obtained from iterating over the NBS problem. (b) Execution trace of the KSBSalgorithm showing different threat and trade-off points before achieving the target threat point and theKSBS optimal point for the SMAC protocol.

Consequently, the equivalent concave problem for RI-MAC is as follows:

(P4∗) max log(ERI-MAC

worst − E1) + log

(LRI-MAC

worst − L1)

s. t. ERI-MACworst � ERI-MAC(Tw)

E1 � ERI-MAC(Tw)LRI-MAC

worst � LRI-MAC(Tw)

L1 � LRI-MAC(Tw)Tw � T min

w

|I0| E1tx � 1/4

var. E1, L1, Tw.

4.2.4. Energy-Delay Trade-Off: KSBS Model. The problem (P3-KSBS) is nonlinear andnonconvex. Due to the difficulty in finding an equivalent convex problem, such as inthe NBS optimization problem, we provide an iterative method using the NBS modelthat converges to the KSBS solution. Let (E0

0 , L00) be the initial threat value of each

player.12 Whenever a player has larger gain than the other, this occurs because itsthreat point is better than its adversary’s threat point. Thus, the player with lowergain has to decrease its threat value13, whereas the player with larger gain maintainsits threat value. Let (Ek, Lk) be the optimal point obtained by the NBS model at thek-th step. The objective is to use a new initial threat value (Ek

0, Lk0) such that the new

NBS optimal point approximates the KSBS optimal point. Figure 9(a) illustrates howthe solution is obtained. Let the error δk be defined as the difference between the gainsobtained by each player at the k-th step using the NBS model:

δk =∣∣∣∣ Eworst − Ek

Eworst − Ebest− Lworst − Lk

Lworst − Lbest

∣∣∣∣ . (11)

12The point (Eworst, Lworst) is a first candidate as the initial threat point (E00 , L0

0). However, since the Pareto

frontier is convex, the middle point ( Ebest+Eworst2 , Lbest+Lworst

2 ) also lies in the line connecting (Eworst, Lworst)and (Ebest, Lbest), and it is nearer to the optimal KSBS point. Thus, selecting this point as the initial threatpoint will speed up the convergence of the algorithm.13Decrease the threat value because L and E are cost functions.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 22: Game Theory Framework for MAC Parameter Optimization in

10:22 M. Doudou et al.

Table III. Convergence of the KSBS Mechanism in SMAC. Initial Threat Point (E0, L 0) = (Eworst, L worst)

k 0 1 2 3 4 5 6 7Ek

0 0.9000 0.9000 0.9000 0.9000 0.9000 0.9000 0.9000 0.9000Lk

0 1239.9 1077.4 952.1 860.9 801.6 795.7 795.4 795.4KSBS algorithm Ek 0.2444 0.2498 0.2554 0.2611 0.2708 0.2719 0.2719 0.2719

Lk 287.91 280.22 273.79 268.24 259.53 258.64 258.593 258.591δk 0.0655 0.0505 0.0368 0.0239 0.0024 0.0001 0.0000 0.0000

ALGORITHM 1: KSBS Optimal PointInput: Problem (P3*-NBS), Eworst, Lworst, Ebest, and Lbest.Output: The KSBS solution (E∗, L∗) = (Ek, Lk) and the optimal corresponding parameters X∗.Set ε as a stop criterion value;k = 0;Set the initial threat point (E0

0 ,L00);

repeat

Solve (P3*-NBS) max log(Ek0 − E1) + log(Lk

0 − L1)s. t. (Ek

0, Lk0) � (E(X), L(X))

(E1, L1) � (E(X), L(X))(E1, L1) ≤ (Ebudget, Lmax)(E1, L1) ∈ S

var. E1, L1, X

;Ek = E1;Lk = L1;k = k + 1;

δk = | Eworst−Ek

Eworst−Ebest− Lworst−Lk

Lworst−Lbest|;

if ( Eworst−Ek

Eworst−Ebest< Lworst−Lk

Lworst−Lbest) then

;Ek

0 = Ek−10 - 2E0

0δk;Lk

0 = Lk−10 ;

elseLk

0 = Lk−10 - 2L0

0δk;

Ek0 = Ek−1

0 ;end

until δk < ε;

Now, the threat value of the player that results in less gain is decreased by a factorcorresponding to the absolute difference between the gains obtained by each player atthat iteration. This is illustrated in Algorithm 1 and Figure 9(a). In the first step, theNBS optimal point is obtained from the initial threat point (E0

0, L00) = (Eworst, Lworst) as

the supporting hyperplane at (E0, L0) of the objective function (E00-E)(L0

0-L) with thePareto frontier. Since the gain of the delay player is less than the gain of the energyplayer, the threat point L0

0 is decreased by a factor of 2δ0, where δ0 is the differencebetween the two obtained gains. In the following steps, the threat point of the playerthat obtains less gain, in our example the delay player, is decreased proportionallyto δk. The new NBS optimal points with the new threat points converge to the KSBSoptimal point. Figure 9(b) and Table III show how the proposed algorithm convergesfast after eight iterations for the SMAC protocol with an error lower than 10−5, where

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 23: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:23

Fig. 10. Energy-Delay KSBS optimal points when fixing Ebudget= 50% and varying the maximum e2e delaybound Lmax ∈ [500, 3000]ms for (a) B-MAC, (b) X-MAC, (c) RI-MAC, (d) SMAC, (e) DMAC, and (f) LMAC.

Lmax = 5000ms and Ebudget = 90%. Similar convergence results have been obtained forthe other MAC protocols. Figure 10(a) through (f) plot the results for the KSBS modelobtained by solving problems (P4∗), (P5∗), (P6∗), (P7∗), (P = 8∗), and (P9∗)14 for thenetwork topology described in Section 3.1 using Algorithm 1. The Ebudget has been fixedto 50%, and Lmax has been varied in the interval [500, 3000] ms. Figure 12(a) through(f) plot the results obtained by solving the same problems when fixing Lmax to 3, 000msand varying the Ebudget in the interval [1.2, 20]%. As it can be observed from Figure 10,relaxing the e2e packet delay bound (Lmax) will result in a new application requirementconfiguration for every protocol, and the game leads to an agreement at different trade-off points. Decreasing the Lmax value for a fixed Ebudget produces a lower Lworst valueand thus a smaller interval [Lbest, Lworst]. This results in a shorter space for gain (e.g.,trade-off points with letters a, b, c). On the other hand, when Lmax increases, Lworstalso increases, which produces a large interval [Lbest, Lworst]. This gives space for alarge gain improvement (e.g., trade-off points with letters g, h, i). Moreover, the energygain is proportionally equal to the latency gain. Thus, any energy gain is constrainedby Lmax. Figure 11(a) through (d) show how the correspondent optimal parametersincrease as Lmax increases (i.e., increasing Lmax allows low duty cycles).

A similar behavior occurs when Lmax is fixed to 3, 000ms and Ebudget is varied (Fig-ure 12(a) through (f)). Small values of Ebudget produce small values of Eworst and thenshort intervals of [Ebest, Eworst]. This results in limited gains (e.g., trade-off points withletters a, b, c). Large values of Ebudget produce large values of Eworst and then long inter-vals of [Ebest, Eworst]. This results in larger gains (e.g., trade-off points with letters h, i,j). Figure 13(a) through (d) show how the correspondent optimal parameters decreaseas Ebudget increases. In other words, increasing energy budgets allows for high dutycycle designs.

14Problems P(5∗) through (P9∗) for BMAC, X-MAC, SMAC, DMAC, and LMAC are given in Appendix A.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 24: Game Theory Framework for MAC Parameter Optimization in

10:24 M. Doudou et al.

Fig. 11. The obtained optimal parameters using the KSBS model: (a) the wake-up period T ∗w for B-MAC,

X-MAC, and RI-MAC, and (c) the active period T ∗active and sleep period T ∗

sleep for SMAC, and (d) the synchro-nization period T ∗

sync for DMAC and (e) the frame size T ∗frame for DMAC and LMAC as trade-off points for

different values of maximum e2e delay bound Lmax ∈ [500, 3000]ms.

Fig. 12. Energy-delay KSBS optimal points when fixing Lmax = 3000 ms and varying the maximum energybudget Ebudget ∈ [1.2, 20]% for B-MAC (a), X-MAC (b), RI-MAC (c), SMAC (d), DMAC (e), and LMAC (f).

Fig. 13. The obtained optimal parameters using the KSBS model: the wake-up period T ∗w for B-MAC, X-

MAC, and RI-MAC (a), the active period T ∗active and sleep period T ∗

sleep for SMAC (b), the synchronizationperiod T ∗

sync for DMAC (c), and the frame size T ∗frame for DMAC and LMAC (d) as trade-off points for different

values of maximum energy budget Ebudget ∈ [1.2, 20]%.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 25: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:25

Fig. 14. The gain obtained by each player to achieve the KSBS solution for different values of the maximume2e delay bound Lmax and Ebudget = 50% (a) and different values of the maximum energy budget Ebudget andLmax = 3000ms (b).

4.2.5. NBS and KSBS Gains. The gain obtained by energy consumption and e2e delayplayers in the KSBS game is plotted in Figure 14. The gain is expressed in Equation (3).It illustrates how much each player has proportionally reduced its cost, starting fromits worst-case value until each one achieves the agreement point. Figure 12(a) depictsthe gains of different MAC protocols when the maximum e2e delay bound, Lmax, isvaried between 500 and 3,000 ms and when Ebudget is fixed to 50%. Figure 12(b) depictsthe gains obtained when the maximum energy budget, Ebudget, is varied between 5%and 15%, and Lmax is fixed to 3,000ms. The figure shows increasing gain with the delaybound increase, as well as the energy budget increase. The different MAC protocolsbehave differently as the application requirements, Lmax and Ebudget, are modified. Onone hand, all MAC protocols have obtained similar gains for large values of Lmax (largerthan 1,500ms), whereas for lower values of Lmax (500 to 1,500 ms), B-MAC, DMAC, andSMAC have achieved better gains compared to X-MAC, RI-MAC, and LMAC. In fact,to satisfy the constraint on the small values of Lmax (in problem (P1)), each protocolattempts to minimize the energy while ensuring the e2e delay bound. For instance,following the design of B-MAC, SMAC, and DMAC, respectively, this constraint forcesB-MAC to use small wake-up periods, as its one-hop delay spans for a whole wake-up period (the size of the long preamble). The same constraint requires that SMACincreases its active period and DMAC increases the size of active slots, as packetsin intermediate nodes can only be forwarded during these periods. Otherwise, thesepackets will be delayed to the next operating cycle. As a result, these protocols increasetheir energy consumption. The application of the game theory optimization frameworkenables the energy player to considerably reduce its cost value at the cost of relaxingthe e2e delay cost. On the other hand, most of the MAC protocols, except LMAC, haveachieved similar incremental gains when the Ebudget of each node is relaxed. This isbecause the solution of problem (P2) will give lower values of Lbest and higher values ofEworst. However, following the design of the LMAC protocol, each node randomly choosesone transmission slot and communicates it to its neighbors and must perform carriersensing in each slot to check for eventual incoming data packets. This makes the dutycycle of nodes high (over 9% in Figure 6) compared to other MACs, and varying Ebudgetin 5% to 15% will not allow for better e2e delay reduction Lbest due to the constraint onthe maximum energy budget (see (P9′)). The solution of problem (P1) will make allMACs use longer sleep periods (due to the increase in the wake-up period for B-MAC,

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 26: Game Theory Framework for MAC Parameter Optimization in

10:26 M. Doudou et al.

Fig. 15. Obtained gains by each player for the NBS and KSBS models: Ebudget = 15% and Lmax = 1200ms(a) and Ebudget = 30% and Lmax = 3000ms (b).

Table IV. Existence of the Trade-Off Solution Between Energy and Delay of MAC Protocolsfor Different Sampling Rates

B-MAC X-MAC RI-MAC SMAC DMAC LMACFs Threshold (pkt/min) 1/2 1/10 1/20 2 1/5 2

X-MAC, and RI-MAC; the sleep period for SMAC; and the frame period for DMAC andLMAC), which results in low Ebest and high Lworst. Consequently, the application of thegame theory optimization framework will enable the delay player to reduce much fromits cost value at the cost of relaxing the energy cost.

From the comparison between NBS and KSBS models, the gains obtained by theenergy consumption player and the e2e delay using the KSBS and the NBS models forall duty-cycled MAC protocols are plotted in Figure 15(a) and (b) for different maximumdelay and budget thresholds, namely (15%, 1,200ms) and (30%, 3,000ms). It is clearthat the use of each model depends on the assumption on whether the players followthe independent axiom defined by Nash or the monotonicity axiom defined by Kalai-Smorodinsky. We believe that in the energy-delay game, there is no preference for anyof the players, and thus the proportional solution to the KSBS model gives a definitionof fairness between players.

4.3. KSBS Optimal Points Versus Sampling Rate (Fs)

Another important factor in the proposed optimization framework is the sampling rate,which is an application-dependent parameter. Note that our traffic model is designedfor very low data rate sampling applications. A sampling rate above a given thresholdmay not result in the desired trade-off between energy consumption and the e2e delayobjectives. In the following, we study how the sampling rate impacts the optimiza-tion model. Table IV shows the obtained sampling rate thresholds for different MACprotocols when the maximum e2e delay bound and the maximum energy budget areLmax = 5000ms and Ebudget = 50%, respectively. The consider network contains 200nodes, where the node density is fixed to C = 8 and the network depth has been set toD = 5 levels. The thresholds are mainly defined by the bottleneck constrains for everyprotocol. From the table, the obtained thresholds were 1pkt/2min for B-MAC, 1 pkt/minfor X-MAC, 1 pkt/20min for RI-MAC, 2 pkt/min for SMAC, 1pkt/5min for DMAC, and2 pkt/min for LMAC. The results reveal that each MAC protocol has its own maximumsampling frequency defined by its bottleneck constrain over which the trade-off pointcannot be reached for the given application requirement configuration.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 27: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:27

Fig. 16. KSBS optimal points of energy consumption E versus different sampling rates Fs (a), e2e delay Lversus different sampling rates Fs (b), energy consumption E versus different network depths D (c), and e2edelay L versus different network depths D (d) for each MAC protocol.

On the other hand, playing with the sampling rate under the maximum thresholdcan lead to different trade-off points between the two performance metrics (energy anddelay), as decreasing the sampling rate will consume less energy, which gives moreoptimization space for both players. Given the same application requirements config-uration (Lmax = 5000ms and Ebudget = 50%), we run the optimization framework foreach MAC protocol and vary the sampling rate Fs ∈ [1/10, 1/60]pkt/min. Figure 16(a)and (b) plot the energy consumption E∗ and the average e2e delay L∗ correspondingto each obtained trade-off point for different sampling rates. The results show thatdecreasing the sampling frequency gives different behavior depending on the intrinsicdefinition of the MAC protocols. For example, SMAC and LMAC obtain flat responseswith respect to the sampling frequency. In fact, the traffic rate threshold of SMAC andLMAC is 2pkt/min (Table IV), and varying the traffic in [1/10, 1/60] pkt/min has lesseffect on the duty cycle of SMAC and LMAC, which is mainly impacted by the activeperiod duration and the carrier sensing in each slot for SMAC (see Section A.1.2 of theAppendix) and LMAC (see Appendix A.1.3), respectively. As a consequence, decreasingthe traffic rate under 1/10 pkt/min will not enable for more energy saving and thusno more optimization space for SMAC and LMAC under these configurations, whereasreducing the traffic rate from 1/10 to 1/60 pkt/min has allowed for more energy saving,in transmitting/receiving modes (Etx and Erx , respectively), for other MAC (B-MAC, X-MAC, RI-MAC, and DMAC) protocols. This will give more optimization space for bothplayers and consequently will result in different trade-off points for these protocols(Figure 16(a) and (b)).

4.4. Scalability of the Solution

The network depth and the node density (D and C in Table I) are two other systemparameters that can affect the system optimization, and they have a direct relationto the scalability of the solution. In this article, a two-player game is defined, whichis independent of the number of nodes and the topology of the network. Topology andnumber of nodes impact in the delay and energy equations, and mainly the bottleneckconditions of each protocol that fix the applicability of the model. To show the effect ofthe network topology, we have run the optimization framework for every MAC protocolunder several network depths (D). The sampling rate has been fixed to 1pkt/30minand the application requirements Lmax and Ebudget to 5,000ms and 40%, respectively.D has been varied from 5 to 12 levels, which results in a network size from 200 to1, 152 nodes, and the density has also been fixed to C = 8. Figure 16(c) and (d) plot theenergy consumption E∗ and the average e2e delay L∗, corresponding to each trade-offpoint obtained for the different network depths. It can be observed from the figure thatboth players increase their cost functions to reach the desired trade-off. This is becauseincreasing the network depth increases the e2e average delay, as this yields routes withmore hops and increases the amount of packets that the nodes at the first level have to

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 28: Game Theory Framework for MAC Parameter Optimization in

10:28 M. Doudou et al.

relay. In other words, changing the topology, the aggregated sampling rate is increasedand the e2e delay equations are modified, but this has no effect on the convergence orcomplexity of the game model. The most interesting is that the framework is still ableto find the trade-off points even in large networks, which makes the model appropriatefor arbitrary network sizes.

5. RESULTS VALIDATION

Protocol optimization and the optimal parameters that permit achievement of trade-offbetween the energy consumption and the average e2e delay performance metrics areevaluated in this section through an extensive set of simulations under the traffic,network, and radio models defined in Section 3. The objective is to show the closenessof analytical results from the simulations. All of the optimized MAC protocols areimplemented using a TinyOS operating system [Levis et al. 2004], and the evaluation iscarried out with simulations using TOSSIM [Levis et al. 2003] (the TinyOS simulator).A very low data rate is considered ([0.01, 10]pkt/min. The simulated network topologyis depicted in Figure 2, where nodes are uniformly deployed with unit disk of C = 8(the density), and the number of levels in the network is set to D = 5 (the networkdepth). Tables I and II sketch all of the setup configuration parameters of the networkand traffic models, as well as the typical parameter values for the CC2420 radio. Inthe simulation, a phase of neighbor discovery and tree construction with minimumhop-count routes, according to the network model of Section 3.1, is executed beforeentering the sampling phase. In this phase, every node periodically generates traffic(i.e., a packet) with frequency Fs = 1pkt/10min. A node either transmits its local dataor forwards data packets being received to the base station located at the center ofthe network. The validation has been performed using the NBS model described inSection 4.2.3.15 The network is layered into levels and packets are forwarded fromouter to inner levels until reaching the sink node. Every simulation is repeated at least33 times, and each point in the following curves comes from the average result of allexperiments, where bars are represented with a 95% confidence interval.

5.1. Average e2e Delay Versus Max Delay Bound (L max)

As the framework has two different application-specific requirements inputs—themaximum e2e delay bound and the maximum energy budget—we have applied andtested the proposed framework for different configurations of these application re-quirements. In the first scenario, the MAC protocols are optimized where the trade-offpoints for different values of the maximum e2e delay bound were found. The protocolsare then tuned and simulated with the optimal optimization parameters obtainedby solving problems (P4∗), (P5∗), (P6∗), (P7∗), (P8∗), and (P9∗) when fixing themaximum energy budget Ebudget to 50% and varying the maximum e2e delay boundof the application Lmax ∈ [500, 1600]ms. The average e2e delay of the network is mea-sured and plotted in Figure 17(a) for B-MAC and X-MAC, in Figure 17(b) for RI-MACand SMAC, and in Figure 17(c) for B-MAC and X-MAC protocols. It can be observedfrom the figure that the average e2e delay of the network increases by increasing themaximum delay bound Lmax of the application. The figure shows that all protocols haveraised their average e2e delay: 47% for B-MAC, 95% for X-MAC, 68% for RI-MAC, 81%for SMAC, 62% for DMAC, and 77% for LMAC when relaxing the maximum e2e delaybound Lmax from 500 to 1,600 ms. This can be explained by the increase in the wake-upperiod Tw, the sleep period Tsleep, and the frame size Tframe parameters to reduce energyconsumption in favor of the energy efficiency player. In fact, the e2e delay is considered

15Although the NBS has been used for simplicity to validate numerical results by simulations, this willimplicitly validate the KSBS model since it is achieved by iterative NBS.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 29: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:29

Fig. 17. Simulation results of average e2e delay for different values of the maximum latency Lmax of theapplication for (a) B-MAC and X-MAC, (b) RI-MAC and SMAC, (c) DMAC and LMAC.

Fig. 18. Simulation results of energy consumption for different values of the maximum latency Lmax of theapplication for B-MAC and X-MAC (a), RI-MAC and SMAC (b), and DMAC and LMAC (c).

the sum of the one-hop delay along the path toward the sink. Since each node mustwait half the wake-up time of its receiver on average before sending the data packet,the increase of this parameter (the wake-up time) when relaxing the e2e delay boundyields the increase in the one-hop delay and thus in the average e2e delay. It is clearfrom the figure that the obtained e2e delay in simulation is similar and their plots havethe same shapes as those obtained analytically. The closest result has been obtainedfor X-MAC, SMAC, and DMAC. The e2e delay B-MAC has some fluctuations that canbe due to the randomization of the wake-up times of nodes. The e2e delay of RI-MACis more fluctuating, and this can be explained by the losses in beacon transmissionsthat result in increased delays. Finally, LMAC has a simulation e2e delay a bit higherthan the one obtained analytically. This is due to the position of transmission slots inthe frame, where each node randomly chooses one slot to send its data (see Figure 25).

5.2. Energy Versus Max Delay Bound (L max)

Figure 18 shows results for the same setting (Ebudget = 50% and Lmax ∈ [500, 1600]ms),but it plots the maximum energy consumption (duty cycle) as Lmax varies: Figure 18(a)for B-MAC and X-MAC, Figure 18(b) for RI-MAC and SMAC, and Figure 18(c) for B-MAC and X-MAC. The figure shows that the measured energy consumption, which isthe maximum consumed energy in the network, decreases with the increase in the max-imum delay bound Lmax of the application. This is due to the increase in the wake-upperiod Tw, the sleep period Tsleep, and the frame size Tframe. All protocols have achievedclear reduction in their respective duty cycles (over 34%), which reduces energy con-sumption. Referring to Table V, which sketches the obtained results, the reduction was−34% for B-MAC, −43% for X-MAC, −45% for RI-MAC, −41% for SMAC, −46% for

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 30: Game Theory Framework for MAC Parameter Optimization in

10:30 M. Doudou et al.

Fig. 19. Simulation results of average e2e delay for different values of the maximum energy budget Ebudgetof the application for B-MAC (a), X-MAC (b), RI-MAC (c), SMAC (d), DMAC (e), and LMAC (f).

Table V. Summary of the Obtained Gain and the Paid Cost of Each Player per MAC Protocol for DifferentApplication Requirement Configurations

B-MAC X-MAC RI-MAC SMAC DMAC LMAC

Lmax∈[500, 1600]msAverage e2e Delay L +47% +95% +68% +81% +62% +77%Max Energy E −34% −43% −45% −41% −46% −42%Ebudget∈[1.25, 20]%Average e2e Delay L −32% −44% −41% −54% −39% −18%Max Energy E +42% +65% +39% +5% +57% +18%

DMAC, and −42% for LMAC. Furthermore, the measured energy consumption is quiteclose to the analytical results for all protocols.

5.3. Average e2e Delay Versus Max Energy Budget (Ebudget)

Now, the maximum e2e delay bound, Lmax, is fixed to 1,600ms, and the maximumenergy budget devoted to each node in the network, Ebudget, is varied in the interval[1.25, 15]%. The MAC protocols are configured with the optimal values obtained bysolving problems (P4∗), (P5∗), (P6∗), (P7∗), (P8∗), and (P9∗). The resulting averagee2e delay in the network is measured and plotted in Figure 19(a) through (e) forall protocols. It can be observed from the figure that the average e2e delay of thenetwork decreases when allowing nodes to increase their duty cycle through relaxingthe maximum energy budget of the application (Ebudget). This is achieved by decreasingthe wake-up period Tw, the sleep period Tsleep, and the frame size Tframe such thateach node can quickly reach its receiver, which reduces the one-hop delay. The cost ofincreasing the duty cycle by the energy player goes in favor of the e2e delay player. Thereduction in the e2e delay of each protocol when increasing the maximum allowed dutycycle is shown in Table V, which varies between −18% and −54%. The measured e2edelay from the simulations are close to the analytical e2e delay for all protocols. It can

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 31: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:31

Fig. 20. Simulation results of energy consumption for different values of the maximum energy budgetEbudget of the application for B-MAC (a), X-MAC (b), RI-MAC (c), SMAC (d), DMAC (e), and LMAC (f).

be observed that the protocols with the most convergent results are X-MAC, SMAC, andDMAC. Lower active periods Tactive cause some packets to be delayed, which explainsthe large average e2e delay for SMAC (for low values of Ebudget). The e2e delays ofB-MAC and RI-MAC have some fluctuations for reasons explained earlier, whereas thee2e delay of LMAC is a bit over that of the analytical model. This may be explained bythe randomness of the reception slot position in the transmission frame.

5.4. Energy Versus Max Energy Budget (Ebudget)

Finally, the maximum consumed energy in the network is also measured during thesimulations, and the results are depicted in Figure 20(a) through (e) As expected fromthe analytical results and confirmed by the simulations, the figure shows that thenodes increase their duty cycle (between +5% and +65%) when they are allocatedmore energy budget, Ebudget. This loss in energy savings goes in favor of the e2e delayplayer, as seen in Section 5.3. This is due to the decrease in the wake-up period Tw, thesleep period Tsleep, and the frame size Tframe. The simulations show that the protocolscan achieve the desired trade-off and provide results close to the analytically calculatedenergy. All obtained gains and paid costs of each player for different configurations ofthe application requirements are summarized in Table IV for comparison. Althoughthe gains and the costs between the energy and the delay players were not the same,there is a clear trading between them to achieve the desired proportional optimization.These results reveal that tuning the MAC protocols with optimized parameters givesbetter balance between energy efficiency and e2e delay performance.

6. CONCLUSION

The problem of optimizing system performance subject to conflicting needs has beentargeted in this article, where a general optimization framework for duty-cycled MACprotocols in low data rate wireless networks is proposed. The energy-delay trade-offs have been investigated from a game theory perspective and have shown how to

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 32: Game Theory Framework for MAC Parameter Optimization in

10:32 M. Doudou et al.

appropriately achieve a fair trade-off between them. Different from multiobjective op-timization methods, which either optimize one performance objective and treat theothers as constraints of the problem, or aggregate all performance metrics into a singleobjective function with different weights and from the cooperative games that use thenodes as the players, we have treated the two objectives as two players in a coopera-tive game. We accordingly proposed an appealing method to find the fair performancetrade-off between energy consumption and the e2e delay, where each of the two playersreduces its cost function that is minimized with the same order of magnitude, whichmakes the solution equally fair. First, the players negotiate with each other to achievean agreement under the Nash bargaining equilibrium. Then, an iterative algorithm isproposed that uses the Nash bargaining model in a repeated game to find the solutionunder the Kalai-Smorodinsky bargaining model. The framework is scalable with thenumber of nodes and is general enough to be applied to any wireless MAC protocol,notably those proposed for WSN. The framework has been applied to determine theoptimal MAC parameters of six WSN duty-cycled MAC protocols—B-MAC, X-MAC,RI-MAC, SMAC, DMAC, and LMAC—and then to achieve a fair energy-delay trade-offin the long run according to the application requirements. Furthermore, the optimiza-tion results have been supported by extensive simulations where the MAC protocolsare implemented and tuned with the corresponding optimal parameters. The energyconsumption and the average e2e delay were measured and compared to the analyticalresults. We found that when tuning the duty-cycled MAC protocols with the optimalparameters, they map the obtained trade-off performance and confirm the effectivenessof the proposed framework. The impact of the sampling frequency was also analyzed,and we showed that the framework is able to find the maximum sampling rate thateach protocol must not violate to achieve the target trade-off for a given applicationrequirement. Finally, to demonstrate the capability of the framework to run over largenetworks, the optimization of different MAC protocols has been tested under increasingvalues of the network size. This makes it scalable and suitable for arbitrary networksizes.

Although the proposed framework allows one to optimize MAC protocols and findthe fair trade-off between energy consumption and e2e delay objectives, there are somefactors that have been simplified by the traffic model considered (e.g., the absenceof interference and retransmissions). This hides some features of the real conditionsof wireless environments that are not captured by this model. We believe that thesesimplifications are somehow reasonable due to the very low data rate nature of thetargeted applications, where the tight traffic minimizes the impact of interferencesand retransmissions due to congestion and collisions. We are working to extend thismodel to capture these factors and to include other kinds of traffic models, such asPoisson arrivals.

ELECTRONIC APPENDIX

The electronic appendix for this article can be accessed in the ACM Digital Library.

REFERENCES

Andrea Abrardo, Lapo Balucanti, and Alessandro Mecocci. 2013. A game theory distributed approachfor energy optimization in WSNs. ACM Transactions on Sensor Networks 9, 4, Article No. 44.DOI:http://dx.doi.org/10.1145/2489253.2489261

F. Afghah, M. Costa, A. Razi, A. Abedi, and A. Ephremides. 2013. A reputation-based Stackelberg gameapproach for spectrum sharing with cognitive cooperation. In Proceedings of the 2013 IEEE 52nd AnnualConference on Decision and Control (CDC’13). 3287–3292.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 33: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:33

Tarek AlSkaif, Manel Guerrero Zapata, and Boris Bellalta. 2015. Game theory for energy efficiency inwireless sensor networks: Latest trends. Journal of Network and Computer Applications 54, 33–61.

G. Bacci, L. Sanguinetti, M. Luise, and H. V. Poor. 2013. A game-theoretic approach for energy-efficientcontention-based synchronization in OFDMA systems. IEEE Transactions on Signal Processing 61,1258–1271.

P. V. (Sundar) Balakrishnan, Juan Camilo Gomez, and Rakesh V. Vohra. 2011. The tempered aspirationssolution for bargaining problems with a reference point. Mathematical Social Sciences 62, 3, 144–150.DOI:http://dx.doi.org/10.1016/j.mathsocsci.2011.09.003

Saeed Bastani, Bjorn Landfeldt, Christian Rohner, and Per Gunningberg. 2012. A social node model forrealising information dissemination strategies in delay tolerant networks. In Proceedings of the 15thACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems(MSWiM’12). ACM, New York, NY, 79–88.

H. P. Benson. 2004. On the global optimization of sums of linear fractional functions over a convex set.Journal of Optimization Theory and Applications 121, 1, 19–39.

S. Boyd and L. Vandenberghe. 2004. Convex Optimization. Cambridge University Press.Michael Buettner, Gary V. Yee, Eric Anderson, and Richard Han. 2006. X-MAC: A short preamble MAC pro-

tocol for duty-cycled wireless sensor networks. In Proceedings of the 4th ACM Conference on EmbeddedNetworked Sensor Systems (SenSys’06). 307–320.

Matteo Ceriotti, Michele Corra, Leandro D’Orazio, Roberto Doriguzzi, Daniele Facchin, Stefan Guna, GianPaolo Jesi, Renato Lo Cigno, Luca Mottola, Amy L. Murphy, Massimo Pescalli, Gian Pietro Picco, DenisPregnolato, and Carloalberto Torghele. 2011. Is there light at the ends of the tunnel? Wireless sen-sor networks for adaptive lighting in road tunnels. In Proceedings of the International Conference onInformation Processing in Sensor Networks (ISPN’11). 187–198.

J. Chen and A. L. Swindlehurst. 2012. Applying bargaining solutions to resource allocation in multiuserMIMO-OFDMA broadcast systems. IEEE Journal of Selected Topics in Signal Processing 6, 2, 127–139.

Xiaoyu Chu and Harish Sethu. 2015. Cooperative topology control with adaptation for improved lifetime inwireless sensor networks. Ad Hoc Networks 30, 99–114.

Messaoud Doudou, Djamel Djenouri, and Nadjib Badache. 2013. Survey on latency issues of asynchronousMAC protocols in delay-sensitive wireless sensor networks. IEEE Communications Surveys and Tutori-als 15, 2, 528–550.

Adam Dunkels. 2011. The ContikiMAC Radio Duty Cycling Protocol. Technical Report T2011:13. SwedishInstitute of Computer Science. http://dunkels.com/adam/dunkels11contikimac.pdf.

Prabal Dutta, Stephen Dawson-Haggerty, Yin Chen, Chieh-Jan Mike Liang, and Andreas Terzis. 2012. A-MAC: A versatile and efficient receiver-initiated link layer for low-power wireless. ACM Transactionson Sensor Networks 8, 4, 30:1–30:29.

C. A. Floudas and V. Visweswaran. 1993. Primal-relaxed dual global optimization approach. Journal ofOptimization Theory and Applications 78, 2, 187–225.

A. El Gamal, James Mammen, Bharat Prabhakar, and Devavrat Shah. 2004. Throughput-delay trade-offin wireless networks. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer andCommunications Societies (INFOCOM’04), Vol. 1. IEEE, Los Alamitos, CA.

A. Ghasemi and K. Faez. 2008. A Nash power-aware MAC game for ad hoc wireless networks. In Proceedingsof the IEEE 19th International Symposium on Personal, Indoor, and Mobile Radio Communications(PIMRC’08). 1–5.

Matthias Grossglauser and David Tse. 2001. Mobility increases the capacity of ad-hoc wireless networks. InProceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM’01), Vol. 3. IEEE, Los Alamitos, CA, 1360–1369.

Piyush Gupta and Panganmala R. Kumar. 2000. The capacity of wireless networks. IEEE Transactions onInformation Theory 46, 2, 388–404.

Zhu Han, Dusit Niyato, Walid Saad, Tamer Baar, and Are Hjrungnes. 2011. Game Theory in Wireless andCommunication Networks. Cambridge University Press.

Y. Hayel, S. Trajanovski, E. Altman, H. Wang, and P. Van Mieghem. 2014. Complete game-theoretic char-acterization of SIS epidemics protection strategies. In Proceedings of the IEEE 53rd Annual Conferenceon Decision and Control (CDC’14). 1179–1184.

Jason L. Hill and David E. Culler. 2002. Mica: A wireless platform for deeply embedded networks. IEEEMicro 22, 6, 12–24.

Ehud Kalai and Meir Smorodinsky. 1975. Other solutions to Nash’s bargaining problem. Econometrica 43,3, 513–518. http://www.jstor.org/stable/1914280.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 34: Game Theory Framework for MAC Parameter Optimization in

10:34 M. Doudou et al.

F. Kelly. 1997. Charging and rate control for elastic traffic. European Transactions on Telecommunications8, 1, 33–37.

E. Kim, H. Park, and P. Frossard. 2012. Low complexity iterative multimedia resource allocation based ongame theoretic approach. In Proceedings of the 2012 IEEE International Symposium on Circuits andSystems (ISCAS’12). 1099–1102.

K. Langendoen and A. Meier. 2010. Analyzing MAC protocols for low data-rate applications. ACM Transac-tions on Sensor Networks 7, 1, Article No. 10.

W. L. Leow and H. Pishro-Nik. 2007. Delay and energy tradeoff in multi-state wireless sensor networks. InProceedings of the IEEE Telecommunications Conference (GLOBECOM’07). 1028–1032.

Philip Levis, Nelson Lee, Matt Welsh, and David Culler. 2003. TOSSIM: Accurate and scalable simulation ofentire tinyOS applications. In Proceedings of the 1st International Conference on Embedded NetworkedSensor Systems (SenSys’03). ACM, New York, NY, 126–137.

Philip Levis, Sam Madden, Joseph Polastre, Robert Szewczyk, Alec Woo, David Gay, Jason Hill, Matt Welsh,Eric Brewer, and David Culler. 2004. TinyOS: An operating system for sensor networks. In AmbientIntelligence. Springer.

Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra. 2007. An adaptive energy-efficient and low-latency MAC for tree-based data gathering in sensor networks. Wireless Communications and MobileComputing 7, 7, 863–875.

Kai Ma, Xinping Guan, Bin Zhao, and Juan Wang. 2011. A cooperation strategy based on bargaining solutionin wireless sensor networks. Journal of Control Theory and Applications 9, 1, 121–126.

Renita Machado and Sirin Tekinay. 2008. A survey of game-theoretic approaches in wireless sensor networks.Computer Networks 52, 16, 3047–3061.

MACsoup. 2011. Taxonomy: The MAC Alphabet Soup Served in Wireless Sensor Networks. Retrieved March21, 2016, from http://www.st.ewi.tudelft.nl/∼koen/MACsoup/taxonomy.

R. Mazumdar, L. G. Mason, and C. Douligeris. 1991. Fairness in network optimal flow control: Optimality ofproduct forms. Communications, IEEE Transactions on 39, 5 (May 1991), 775–782.

F. Meshkati, H. V. Poor, and S. C. Schwartz. 2009a. Energy efficiency-delay tradeoffs in CDMA networks: Agame-theoretic approach. IEEE Transactions on Information Theory 55, 7, 3220–3228.

F. Meshkati, H. V. Poor, S. C. Schwartz, and R. V. Balan. 2009b. Energy-efficient resource allocation inwireless networks with quality-of-service constraints. IEEE Transactions on Communications 57, 11,3406–3414.

Mihail Mihaylov, Yann-Ael Le Borgne, Karl Tuyls, and Ann Nowe. 2011. Distributed cooperation in wire-less sensor networks. In Proceedings of the 10th International Conference on Autonomous Agents andMultiagent Systems (AAMAS’11), Vol. 1. 249–256.

David Moss and Philip Levis. 2008. BoX-MACs: Exploiting Physical and Link Layer Boundaries in Low-PowerNetworking. Technical Report. Technical Report SING-08-00, Stanford University.

A. Nahir and A. Orda. 2007. The Energy-Delay Tradeoff in Wireless Networks—System-Wide Optimizationand Game-Theoretic Perspectives. Technical Report. Technion University, Haifa, Israel.

John F. Nash Jr. 1950. The bargaining problem. Econometrica: Journal of the Econometric Society 18, 2,155–162.

M. J. Neely. 2007. Optimal energy and delay tradeoffs for multiuser wireless downlinks. IEEE Transactionson Information Theory 53, 9, 3095–3113.

Michael J. Neely and Eytan Modiano. 2005. Capacity and delay tradeoffs for ad hoc mobile networks. IEEETransactions on Information Theory 51, 6, 1917–1937.

N. Nissan, T. Roughgarden, E. Tardos, and V. V. Vazirani. 2007. Algorithmic Game Theory. CambridgeUniversity Press.

Dusit Niyato and Ekram Hossain. 2008. Market-equilibrium, competitive, and cooperative pricing for spec-trum sharing in cognitive radio networks: Analysis and comparison. IEEE Transactions on WirelessCommunication 7, 11, 4273–4283.

P. Nuggehalli, M. Sarkar, K. Kulkarni, and R. R. Rao. 2008. A game-theoretic analysis of QoS in wirelessMAC. In Proceedings of the 27th Conference on Computer Communications (INFOCOM’08). 1903–1911.

Jorge Ortn, Jos Ramn Gllego, and Mara Canales. 2013. Joint route selection and resource allocation inmultihop wireless networks based on a game theoretic approach. Ad Hoc Networks 11, 8, 2203–2216.

K. Pandremmenou, L. P. Kondi, and K. E. Parsopoulos. 2013. Geometric bargaining approach for optimizingresource allocation in wireless visual sensor networks. IEEE Transactions on Circuits and Systems forVideo Technology 23, 8, 1388–1401.

Hyunggon Park and M. van der Schaar. 2007. Bargaining strategies for networked multimedia resourcemanagement. IEEE Transactions on Signal Processing 55, 7, 3496–3511.

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.

Page 35: Game Theory Framework for MAC Parameter Optimization in

Game Theory Framework for MAC Protocol Parameter Optimization 10:35

Pan Gun Park, Carlo Fischione, Alvise Bonivento, Karl Henrik Johansson, and Alberto L. Sangiovanni-Vincentelli. 2011. Breath: An adaptive protocol for industrial control applications using wireless sensornetworks. IEEE Transactions on Mobile Computing 10, 6, 821–838.

Yang Peng, Zi Li, Daji Qiao, and Wensheng Zhang. 2011. Delay-bounded MAC with minimal idle listeningfor sensor networks. In Proceedings of the 30th IEEE International Conference on Computer Communi-cations (INFOCOM’11). 1314–1322.

Joseph Polastre, Jason Hill, and David Culler. 2004. Versatile low power media access for wireless sensornetworks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems(SenSys’04). ACM, New York, NY, 95–107.

Yanjun Sun, Omer Gurewitz, and David B. Johnson. 2008. RI-MAC: A receiver-initiated asynchronous dutycycle MAC protocol for dynamic traffic loads in wireless sensor networks. In Proceedings of the 6th ACMConference on Embedded Network Sensor Systems (SenSys’08). ACM, New York, NY, 1–14.

Texas Instruments. 2010. CC2420, Single-Chip 2.4 GHz RF Transceiver. Retrieved March 21, 2016, fromhttp://focus.ti.com/lit/ds/symlink/cc2420.pdf.

C. D. Truong, M. A. Khan, F. Sivrikaya, and S. Albayrak. 2010. Cooperative game theoretic approach toenergy-efficient coverage in wireless sensor networks. In Proceedings of the 2010 7th InternationalConference on Networked Sensing Systems (INSS’10). 73–76.

L. F. W. van Hoesel and P. J. M. Havinga. 2004. A lightweight medium access protocol (LMAC) for wirelesssensor networks: Reducing preamble transmissions and transceiver state switches. In Proceedings ofthe 1st International Workshop on Networked Sensing Systems (INSS’04). 205–208.

Artemis C. Voulkidis, Markos P. Anastasopoulos, and Panayotis G. Cottis. 2013. Energy efficiency in wirelesssensor networks: A game-theoretic approach based on coalition formation. ACM Transactions on SensorNetworks 9, 4, 43:1–43:27.

O. Yang and W. R. Heinzelman. 2009. Modeling and throughput analysis for S-MAC with a finite queuecapacity. In Proceedings of the 5th International Conference on Intelligent Sensors, Sensor Networks, andInformation Processing (ISSNIP’09). 409–414.

Wei Ye, John Heidemann, and Deborah Estrin. 2004. Medium access control with coordinated, adaptivesleeping for wireless sensor networks. ACM/IEEE Transactions on Networking 12, 3, 493–506.

Wei Ye, Fabio Silva, and John Heidemann. 2006. Ultra-low duty cycle MAC with scheduled channel polling. InProceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys’06). 321–334.

L. Ying, S. Yang, and R. Srikant. 2008. Optimal delay–throughput tradeoffs in mobile ad hoc networks. IEEETransactions on Information Theory 54, 9, 4119–4143.

Ruifeng Zhang, Olivier Berder, Jean-Marie Gorce, and Olivier Sentieys. 2012. Energy delay tradeoff inwireless multihop networks with unreliable links. Ad Hoc Networks 10, 7, 1306–1321.

Xi Zhang and Jia Tang. 2013. Power-delay tradeoff over wireless networks. IEEE Transactions on Commu-nications 61, 9, 3673–3684.

Liqiang Zhao, Le Guo, Cong Li, and Hailin Zhang. 2009. An energy-efficient MAC protocol for WSNs: Game-theoretic constraint optimization with multiple objectives. Wireless Sensor Network 1, 4, 358–364.

Yangming Zhao, Sheng Wang, Sizhong Xu, Xiong Wang, Xiujiao Gao, and Chunming Qiao. 2013. Load balancevs energy efficiency in traffic engineering: A game theoretical perspective. In Proceedings of the 32ndIEEE International Conference on Computer Communications (INFOCOM’13). 530–534.

Tao Zheng, Sridhar Radhakrishnan, and Venkatesh Sarangan. 2011. Modeling and performance analysisof DMAC for wireless sensor networks. In Proceedings of the 14th ACM International Conference onModeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM’11). 119–128.

Marco Zimmerling, Federico Ferrari, Luca Mottola, Thiemo Voigt, and Lothar Thiele. 2012. PTunes: Runtimeparameter adaptation for low-power MAC protocols. In Proceedings of the 11th ACM/IEEE Conferenceon Information Processing in Sensor Networks (IPSN’12). 173–184.

Received April 2015; revised October 2015; accepted January 2016

ACM Transactions on Sensor Networks, Vol. 12, No. 2, Article 10, Publication date: May 2016.