Permanent URL to this publication: http://dx.doi.org/10.5167/uzh-4787
Bocek, T; Kun, W; Hecht, F V; Hausheer, D; Stiller, B (2008). PSH: A private and shared history-based incentive mechanism. In: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008, Bremen, Germany, 1 July 2008 - 3 July 2008, 15-27.
View at publisher
Fully decentralized peer-to-peer (P2P) systems do not have a central control mechanism. Thus, different forms of control mechanisms are required to deal with selfish peers. One type of selfish behavior is the consumption of resources without providing sufficient resources. Therefore, incentive schemes encourage peers to share resources while punishing selfish peers. A well-known example of an incentive scheme is Tit-for-Tat (TFT), as used in BitTorrent. With this scheme, a peer can only consume as much resources as it provides. TFT is resilient to collusion due to relying on private histories only. However, TFT can only be applied to peers with direct reciprocity.
This paper presents a private and shared history (PSH) based incentive mechanism, which supports transitive relations (indirect reciprocity). Furthermore, it is resilient to collusion and it combines private and shared histories in an efficient manner. The PSH approach uses a shared history for identifying transitive relations. Those relations are verified using private histories. Simulations show that the PSH mechanism has a higher transaction success ratio than TFT.
254 downloads since deposited on 13 Nov 2008
8 downloads since 12 months
|Item Type:||Conference or Workshop Item (Paper), refereed, original work|
|Communities & Collections:||03 Faculty of Economics > Department of Informatics|
|Dewey Decimal Classification:||000 Computer science, knowledge & systems|
|Event End Date:||3 July 2008|
|Deposited On:||13 Nov 2008 08:41|
|Last Modified:||23 Nov 2012 13:09|
|Series Name:||Lecture Notes in Computer Science|
|Additional Information:||Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008, July 1-3, 2008 The original publication is available at www.springerlink.com|
Users (please log in): suggest update or correction for this item
Repository Staff Only: item control page