Not logged in.
Quick Search - Contribution
Contribution Details
Type | Conference or Workshop Paper |
Scope | Discipline-based scholarship |
Published in Proceedings | Yes |
Title | PSH: A private and shared history-based incentive mechanism |
Organization Unit | |
Authors |
|
Editors |
|
Presentation Type | paper |
Item Subtype | Original Work |
Refereed | Yes |
Status | Published in final form |
Language |
|
ISBN | 978-3-540-70586-4 |
ISSN | 0302-9743 |
Page Range | 15 - 27 |
Event Title | Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 |
Event Type | conference |
Event Location | Bremen, Germany |
Event Start Date | July 1 - 2008 |
Event End Date | July 3 - 2008 |
Series Name | Lecture Notes in Computer Science |
Number | 5127/2 |
Place of Publication | Berlin |
Publisher | Springer |
Abstract Text | Fully decentralized peer-to-peer (P2P) systems do not have a central control mechanism. Thus, different forms of control mechanisms are required to deal with selfish peers. One type of selfish behavior is the consumption of resources without providing sufficient resources. Therefore, incentive schemes encourage peers to share resources while punishing selfish peers. A well-known example of an incentive scheme is Tit-for-Tat (TFT), as used in BitTorrent. With this scheme, a peer can only consume as much resources as it provides. TFT is resilient to collusion due to relying on private histories only. However, TFT can only be applied to peers with direct reciprocity. This paper presents a private and shared history (PSH) based incentive mechanism, which supports transitive relations (indirect reciprocity). Furthermore, it is resilient to collusion and it combines private and shared histories in an efficient manner. The PSH approach uses a shared history for identifying transitive relations. Those relations are verified using private histories. Simulations show that the PSH mechanism has a higher transaction success ratio than TFT. |
Official URL | http://www.springer.com/computer/communications/book/978-3-540-70586-4 |
Digital Object Identifier | 10.1007/978-3-540-70587-1_2 |
Other Identification Number | merlin-id:299 |
PDF File | Download from ZORA |
Export |
BibTeX
EP3 XML (ZORA) |
Additional Information | Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008, July 1-3, 2008 The original publication is available at www.springerlink.com |