1,206 research outputs found
An Improved Tax Scheme for Selfish Routing
We study the problem of routing traffic for independent selfish users in a congested network to minimize the total latency. The inefficiency of selfish routing motivates regulating the flow of the system to lower the total latency of the Nash Equilibrium by economic incentives or penalties. When applying tax to the routes, we follow the definition of [Christodoulou et al, Algorithmica, 2014] to define ePoA as the Nash total cost including tax in the taxed network over the optimal cost in the original network. We propose a simple tax scheme consisting of step functions imposed on the links. The tax scheme can be applied to routing games with parallel links, affine cost functions and single-commodity networks to lower the ePoA to at most 4/3 - epsilon, where epsilon only depends on the discrepancy between the links. We show that there exists a tax scheme in the two link case with an ePoA upperbound less than 1.192 which is almost tight. Moreover, we design another tax scheme that lowers ePoA down to 1.281 for routing games with groups of links such that links in the same group are similar to each other and groups are sufficiently different
Applications of Repeated Games in Wireless Networks: A Survey
A repeated game is an effective tool to model interactions and conflicts for
players aiming to achieve their objectives in a long-term basis. Contrary to
static noncooperative games that model an interaction among players in only one
period, in repeated games, interactions of players repeat for multiple periods;
and thus the players become aware of other players' past behaviors and their
future benefits, and will adapt their behavior accordingly. In wireless
networks, conflicts among wireless nodes can lead to selfish behaviors,
resulting in poor network performances and detrimental individual payoffs. In
this paper, we survey the applications of repeated games in different wireless
networks. The main goal is to demonstrate the use of repeated games to
encourage wireless nodes to cooperate, thereby improving network performances
and avoiding network disruption due to selfish behaviors. Furthermore, various
problems in wireless networks and variations of repeated game models together
with the corresponding solutions are discussed in this survey. Finally, we
outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference
Collusion in Peer-to-Peer Systems
Peer-to-peer systems have reached a widespread use, ranging from academic and industrial applications to home entertainment. The key advantage of this paradigm lies in its scalability and flexibility, consequences of the participants sharing their resources for the common welfare. Security in such systems is a desirable goal. For example, when mission-critical operations or bank transactions are involved, their effectiveness strongly depends on the perception that users have about the system dependability and trustworthiness. A major threat to the security of these systems is the phenomenon of collusion. Peers can be selfish colluders, when they try to fool the system to gain unfair advantages over other peers, or malicious, when their purpose is to subvert the system or disturb other users. The problem, however, has received so far only a marginal attention by the research community. While several solutions exist to counter attacks in peer-to-peer systems, very few of them are meant to directly counter colluders and their attacks. Reputation, micro-payments, and concepts of game theory are currently used as the main means to obtain fairness in the usage of the resources. Our goal is to provide an overview of the topic by examining the key issues involved. We measure the relevance of the problem in the current literature and the effectiveness of existing philosophies against it, to suggest fruitful directions in the further development of the field
When Efficiency meets Equity in Congestion Pricing and Revenue Refunding Schemes
Congestion pricing has long been hailed as a means to mitigate traffic
congestion; however, its practical adoption has been limited due to the
resulting social inequity issue, e.g., low-income users are priced out off
certain roads. This issue has spurred interest in the design of equitable
mechanisms that aim to refund the collected toll revenues as lump-sum transfers
to users. Although revenue refunding has been extensively studied, there has
been no thorough characterization of how such schemes can be designed to
simultaneously achieve system efficiency and equity objectives.
In this work, we bridge this gap through the study of congestion pricing and
revenue refunding (CPRR) schemes in non-atomic congestion games. We first
develop CPRR schemes, which in comparison to the untolled case, simultaneously
(i) increase system efficiency and (ii) decrease wealth inequality, while being
(iii) user-favorable: irrespective of their initial wealth or values-of-time
(which may differ across users) users would experience a lower travel cost
after the implementation of the proposed scheme. We then characterize the set
of optimal user-favorable CPRR schemes that simultaneously maximize system
efficiency and minimize wealth inequality. These results assume a well-studied
behavior model of users minimizing a linear function of their travel times and
tolls, without considering refunds. We also study a more complex behavior model
wherein users are influenced by and react to the amount of refund that they
receive. Although, in general, the two models can result in different outcomes
in terms of system efficiency and wealth inequality, we establish that those
outcomes coincide when the aforementioned optimal CPRR scheme is implemented.
Overall, our work demonstrates that through appropriate refunding policies we
can achieve system efficiency while reducing wealth inequality.Comment: This paper was submitted to the inaugural ACM conference on Equity
and Access in Algorithms, Mechanisms, and Optimization (EAAMO
Recommended from our members
Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature Review
Centralized networks inevitably exhibit single points of failure that malicious actors regularly target. Decentralized networks are more resilient if numerous participants contribute to the network’s functionality. Most decentralized networks employ incentive mechanisms to coordinate the participation and cooperation of peers and thereby ensure the functionality and security of the network. This article systematically reviews incentive mechanisms for decentralized networks and networked systems by covering 165 prior literature reviews and 178 primary research papers published between 1993 and October 2022. Of the considered sources, we analyze 11 literature reviews and 105 primary research papers in detail by categorizing and comparing the distinctive properties of the presented incentive mechanisms. The reviewed incentive mechanisms establish fairness and reward participation and cooperative behavior. We review work that substitutes central authority through independent and subjective mechanisms run in isolation at each participating peer and work that applies multiparty computation. We use monetary, reputation, and service rewards as categories to differentiate the implementations and evaluate each incentive mechanism’s data management, attack resistance, and contribution model. Further, we highlight research gaps and deficiencies in reproducibility and comparability. Finally, we summarize our assessments and provide recommendations to apply incentive mechanisms to decentralized networks that share computational resources
Endeavouring to be in the good books : awarding DTN network use for acknowledging the reception of bundles
This paper describes an incentive scheme for promoting the cooperation, and, therefore, avoiding selfish behaviours, in Delay Tolerant Networks (DTN) by rewarding participant nodes with cryptographic keys that will be required for sending bundles. DTN are normally sparse, and there are few opportunistic contacts, so forwarding of other's bundles can be left out. Moreover, it is difficult to determine the responsible nodes in case of bundle loss. The mechanism proposed in this paper contributes to both problems at the same time. On one hand, cryptographic receipts are generated using time-limited Identity Based Cryptography (IBC) keys to keep track of bundle transmissions. On the other hand, these receipts are used to reward altruistic behaviour by providing newer IBC keys. Finally, these nodes need these IBC keys to send their own bundles. When all nodes behave in a cooperative way, this incentive scheme works as a virtuous circle and achieves a Nash equilibrium, improving very much the network performance in terms of latency. The scheme is not difficult to implement, and it can use an already existing IBC infrastructure used for other purposes in a DTN
Improving Approximate Pure Nash Equilibria in Congestion Games
Congestion games constitute an important class of games to model resource
allocation by different users. As computing an exact or even an approximate
pure Nash equilibrium is in general PLS-complete, Caragiannis et al. (2011)
present a polynomial-time algorithm that computes a ()-approximate pure Nash equilibria for games with linear cost
functions and further results for polynomial cost functions. We show that this
factor can be improved to and further improved results for
polynomial cost functions, by a seemingly simple modification to their
algorithm by allowing for the cost functions used during the best response
dynamics be different from the overall objective function. Interestingly, our
modification to the algorithm also extends to efficiently computing improved
approximate pure Nash equilibria in games with arbitrary non-decreasing
resource cost functions. Additionally, our analysis exhibits an interesting
method to optimally compute universal load dependent taxes and using linear
programming duality prove tight bounds on PoA under universal taxation, e.g,
2.012 for linear congestion games and further results for polynomial cost
functions. Although our approach yield weaker results than that in Bil\`{o} and
Vinci (2016), we remark that our cost functions are locally computable and in
contrast to Bil\`{o} and Vinci (2016) are independent of the actual instance of
the game
- …