65 research outputs found

    Sharing the cost of multicast transmissions in wireless networks

    Get PDF
    AbstractA crucial issue in non-cooperative wireless networks is that of sharing the cost of multicast transmissions to different users residing at the stations of the network. Each station acts as a selfish agent that may misreport its utility (i.e., the maximum cost it is willing to incur to receive the service, in terms of power consumption) in order to maximize its individual welfare, defined as the difference between its true utility and its charged cost. A provider can discourage such deceptions by using a strategyproof cost sharing mechanism, that is a particular public algorithm that, by forcing the agents to truthfully reveal their utility, starting from the reported utilities, decides who gets the service (the receivers) and at what price. A mechanism is said budget balanced (BB) if the receivers pay exactly the (possibly minimum) cost of the transmission, and Ī²-approximate budget balanced (Ī²-BB) if the total cost charged to the receivers covers the overall cost and is at most Ī² times the optimal one, while it is efficient if it maximizes the sum of the receiversā€™ utilities minus the total cost over all receiversā€™ sets. In this paper, we first investigate cost sharing strategyproof mechanisms for symmetric wireless networks, in which the powers necessary for exchanging messages between stations may be arbitrary and we provide mechanisms that are either efficient or BB when the power assignments are induced by a fixed universal spanning tree, or (3ln(k+1))-BB (k is the number of receivers), otherwise. Then we consider the case in which the stations lay in a d-dimensional Euclidean space and the powers fall as 1/dĪ±, and provide strategyproof mechanisms that are either 1-BB or efficient for Ī±=1 or d=1. Finally, we show the existence of 2(3d-1)-BB strategyproof mechanisms in any d-dimensional space for every Ī±ā©¾d. For the special case of d=2 such a result can be improved to achieve 12-BB mechanisms

    On Proportionate and Truthful International Alliance Contributions: An Analysis of Incentive Compatible Cost Sharing Mechanisms to Burden Sharing

    Get PDF
    Burden sharing within an international alliance is a contentious topic, especially in the current geopolitical environment, that in practice is generally imposed by a central authority\u27s perception of its members\u27 abilities to contribute. Instead, we propose a cost sharing mechanism such that burden shares are allocated to nations based on their honest declarations of the alliance\u27s worth. Specifically, we develop a set of multiobjective nonlinear optimization problem formulations that respectively impose Bayesian Incentive Compatible (BIC), Strategyproof (SP), and Group Strategyproof (GSP) mechanisms based on probabilistic inspection efforts and deception penalties that are budget balanced and in the core. Any feasible solution to these problems corresponds to a single stage Bayesian stochastic game wherein a collectively honest declaration is a Bayes-Nash equilibrium, a Nash Equilibrium in dominant strategies, or a collusion resistant Nash equilibrium, respectively, but the optimal solution considers the alliance\u27s central authority preferences. Each formulation is shown to be a nonconvex optimization problem. The solution quality and computational effort required for three heuristic algorithms as well as the BARON global solver are analyzed to determine the superlative solution methodology for each problem. The Pareto fronts associated with each multiobjective optimization problem are examined to determine the tradeoff between inspection frequency and penalty severity required to obtain truthfulness under stronger assumptions. Memory limitations are examined to ascertain the size of alliances for which the proposed methodology can be utilized. Finally, a full block design experiment considering the clustering of available alliance valuations and the member nations\u27 probability distributions therein is executed on an intermediate-sized alliance motivated by the South American alliance UNASUR

    Computing with strategic agents

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.Includes bibliographical references (p. 179-189).This dissertation studies mechanism design for various combinatorial problems in the presence of strategic agents. A mechanism is an algorithm for allocating a resource among a group of participants, each of which has a privately-known value for any particular allocation. A mechanism is truthful if it is in each participant's best interest to reveal his private information truthfully regardless of the strategies of the other participants. First, we explore a competitive auction framework for truthful mechanism design in the setting of multi-unit auctions, or auctions which sell multiple identical copies of a good. In this framework, the goal is to design a truthful auction whose revenue approximates that of an omniscient auction for any set of bids. We focus on two natural settings - the limited demand setting where bidders desire at most a fixed number of copies and the limited budget setting where bidders can spend at most a fixed amount of money. In the limit demand setting, all prior auctions employed the use of randomization in the computation of the allocation and prices.(cont.) Randomization in truthful mechanism design is undesirable because, in arguing the truthfulness of the mechanism, we employ an underlying assumption that the bidders trust the random coin flips of the auctioneer. Despite conjectures to the contrary, we are able to design a technique to derandomize any multi-unit auction in the limited demand case without losing much of the revenue guarantees. We then consider the limited budget case and provide the first competitive auction for this setting, although our auction is randomized. Next, we consider abandoning truthfulness in order to improve the revenue properties of procurement auctions, or auctions that are used to hire a team of agents to complete a task. We study first-price procurement auctions and their variants and argue that in certain settings the payment is never significantly more than, and sometimes much less than, truthful mechanisms. Then we consider the setting of cost-sharing auctions. In a cost-sharing auction, agents bid to receive some service, such as connectivity to the Internet. A subset of agents is then selected for service and charged prices to approximately recover the cost of servicing them.(cont.) We ask what can be achieved by cost -sharing auctions satisfying a strengthening of truthfulness called group-strategyproofness. Group-strategyproofness requires that even coalitions of agents do not have an incentive to report bids other than their true values in the absence of side-payments. For a particular class of such mechanisms, we develop a novel technique based on the probabilistic method for proving bounds on their revenue and use this technique to derive tight or nearly-tight bounds for several combinatorial optimization games. Our results are quite pessimistic, suggesting that for many problems group-strategyproofness is incompatible with revenue goals. Finally, we study centralized two-sided markets, or markets that form a matching between participants based on preference lists. We consider mechanisms that output matching which are stable with respect to the submitted preferences. A matching is stable if no two participants can jointly benefit by breaking away from the assigned matching to form a pair.(cont.) For such mechanisms, we are able to prove that in a certain probabilistic setting each participant's best strategy is truthfulness with high probability (assuming other participants are truthful as well) even though in such markets in general there are provably no truthful mechanisms.by Nicole Immorlica.Ph.D

    On cost sharing in the provision of a binary and excludable public good

    Get PDF
    Jordi MassĆ³ acknowledges financial support from the Spanish Ministry of Economy and Competitiveness, through the Severo Ochoa Programme for Centers of Excellence in R&D (SEV-2011-0075) and FEDER grant ECO2008-04756 (Grupo Consilidado-C), and from the Generalitat de Catalunya, through the prize "ICREA Academia" for excellence in research and grant SGR2009-419. Antonio NicolĆ²'s work is partially supported by the project "Intelligent preference reasoning for multi-agent decision making" (Univ. of Padova).Altres ajuts: FEDER/ECO2008-04756We study efficiency and fairness properties of the equal cost sharing with maximal participation (ECSMP) mechanism in the provision of a binary and excludable public good. According to the maximal welfare loss criterion, the ECSMP is optimal within the class of strategyproof, individually rational and no-deficit mechanisms only when there are two agents. In general the ECSMP mechanism is not optimal: we provide a class of mechanisms obtained by symmetric perturbations of ECSMP with strictly lower maximal welfare loss. We show that if one of two possible fairness conditions is additionally imposed, the ECSMP mechanism becomes optimal

    Designing Network Protocols for Good Equilibria

    Get PDF
    Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol to optimize the equilibrium behavior of a network with selfish users. We consider network cost-sharing games, where the set of Nash equilibria depends fundamentally on the choice of an edge cost-sharing protocol. Previous research focused on the Shapley protocol, in which the cost of each edge is shared equally among its users. We systematically study the design of optimal cost-sharing protocols for undirected and directed graphs, single-sink and multicommodity networks, and different measures of the inefficiency of equilibria. Our primary technical tool is a precise characterization of the cost-sharing protocols that induce only network games with pure-strategy Nash equilibria. We use this characterization to prove, among other results, that the Shapley protocol is optimal in directed graphs and that simple priority protocols are essentially optimal in undirected graphs

    Computing Stable Coalitions: Approximation Algorithms for Reward Sharing

    Full text link
    Consider a setting where selfish agents are to be assigned to coalitions or projects from a fixed set P. Each project k is characterized by a valuation function; v_k(S) is the value generated by a set S of agents working on project k. We study the following classic problem in this setting: "how should the agents divide the value that they collectively create?". One traditional approach in cooperative game theory is to study core stability with the implicit assumption that there are infinite copies of one project, and agents can partition themselves into any number of coalitions. In contrast, we consider a model with a finite number of non-identical projects; this makes computing both high-welfare solutions and core payments highly non-trivial. The main contribution of this paper is a black-box mechanism that reduces the problem of computing a near-optimal core stable solution to the purely algorithmic problem of welfare maximization; we apply this to compute an approximately core stable solution that extracts one-fourth of the optimal social welfare for the class of subadditive valuations. We also show much stronger results for several popular sub-classes: anonymous, fractionally subadditive, and submodular valuations, as well as provide new approximation algorithms for welfare maximization with anonymous functions. Finally, we establish a connection between our setting and the well-studied simultaneous auctions with item bidding; we adapt our results to compute approximate pure Nash equilibria for these auctions.Comment: Under Revie

    Bounds on the Cost of Stabilizing a Cooperative Game

    Get PDF
    This is the author accepted manuscript. The final version is available from the AI Access Foundation via the DOI in this record.A key issue in cooperative game theory is coalitional stability, usually captured by the notion of the coreā€”the set of outcomes that are resistant to group deviations. However, some coalitional games have empty cores, and any outcome in such a game is unstable. We investigate the possibility of stabilizing a coalitional game by using subsidies. We consider scenarios where an external party that is interested in having the players work together offers a supplemental payment to the grand coalition, or, more generally, a particular coalition structure. This payment is conditional on players not deviating from this coalition structure, and may be divided among the players in any way they wish. We define the cost of stability as the minimum external payment that stabilizes the game. We provide tight bounds on the cost of stability, both for games where the coalitional values are nonnegative (profit-sharing games) and for games where the coalitional values are nonpositive (cost-sharing games), under natural assumptions on the characteristic function, such as superadditivity, anonymity, or both. We also investigate the relationship between the cost of stability and several variants of the least core. Finally, we study the computational complexity of problems related to the cost of stability, with a focus on weighted voting games.DFGEuropean Science FoundationNRF (Singapore)European Research CouncilHorizon 2020 European Research Infrastructure projectIsrael Science FoundationIsrael Ministry of Science and TechnologyGoogle Inter-University Center for Electronic Markets and AuctionsEuropean Social Fund (European Commission)Calabria Regio

    Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach

    Get PDF
    Most distributed systems comprise autonomous entities interacting with each other to achieve their objectives. These entities behave selfishly when making decisions. This behavior may result in strategical manipulation of the protocols thus jeopardizing the system wide goals. Micro-economics and game theory provides suitable tools to model such interactions. We use game theory to model and study three specific problems in distributed systems. We study the problem of sharing the cost of multicast transmissions and develop mechanisms to prevent cheating in such settings. We study the problem of antisocial behavior in a scheduling mechanism based on the second price sealed bid auction. We also build models using extensive form games to analyze the interactions of the attackers and the defender in a security game involving honeypots. Multicast cost sharing is an important problem and very few distributed strategyproof mechanisms exist to calculate the costs shares of the users. These mechanisms are susceptible to manipulation by rational nodes. We propose a faithful mechanism which uses digital signatures and auditing to catch and punish the cheating nodes. Such mechanism will incur some overhead. We deployed the proposed and existing mechanisms on planet-lab to experimentally analyze the overhead and other relevant economic properties of the proposed and existing mechanisms. In a second price sealed bid auction, even though the bids are sealed, an agent can infer the private values of the winning bidders, if the auction is repeated for related items. We study this problem from the perspective of a scheduling mechanism and develop an antisocial strategy which can be used by an agent to inflict losses on the other agents. In a security system attackers and defender(s) interact with each other. Examples of such systems are the honeynets which are used to map the activities of the attackers to gain valuable insight about their behavior. The attackers want to evade the honeypots while the defenders want them to attack the honeypots. These interesting interactions form the basis of our research where we develop a model used to analyze the interactions of an attacker and a honeynet system
    • ā€¦
    corecore