Not logged in.

Contribution Details

Type Conference or Workshop Paper
Scope Discipline-based scholarship
Published in Proceedings Yes
Title PSH: A private and shared history-based incentive mechanism
Organization Unit
Authors
  • Thomas Bocek
  • W Kun
  • Fabio Victora Hecht
  • D Hausheer
  • Burkhard Stiller
Editors
  • D Hausheer
  • J Schönwälder
Presentation Type paper
Item Subtype Original Work
Refereed Yes
Status Published in final form
Language
  • English
ISBN 978-3-540-70586-4
ISSN 0302-9743
Page Range 15 - 27
Event Title Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008
Event Type conference
Event Location Bremen, Germany
Event Start Date July 1 - 2008
Event End Date July 3 - 2008
Series Name Lecture Notes in Computer Science
Number 5127/2
Place of Publication Berlin
Publisher Springer
Abstract Text Fully decentralized peer-to-peer (P2P) systems do not have a central control mechanism. Thus, different forms of control mechanisms are required to deal with selfish peers. One type of selfish behavior is the consumption of resources without providing sufficient resources. Therefore, incentive schemes encourage peers to share resources while punishing selfish peers. A well-known example of an incentive scheme is Tit-for-Tat (TFT), as used in BitTorrent. With this scheme, a peer can only consume as much resources as it provides. TFT is resilient to collusion due to relying on private histories only. However, TFT can only be applied to peers with direct reciprocity. This paper presents a private and shared history (PSH) based incentive mechanism, which supports transitive relations (indirect reciprocity). Furthermore, it is resilient to collusion and it combines private and shared histories in an efficient manner. The PSH approach uses a shared history for identifying transitive relations. Those relations are verified using private histories. Simulations show that the PSH mechanism has a higher transaction success ratio than TFT.
Official URL http://www.springer.com/computer/communications/book/978-3-540-70586-4
Digital Object Identifier 10.1007/978-3-540-70587-1_2
Other Identification Number merlin-id:299
PDF File Download from ZORA
Export BibTeX
EP3 XML (ZORA)
Additional Information Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008, July 1-3, 2008 The original publication is available at www.springerlink.com