1/12 Project DIANE: Project KRASH: A Taxonomy of Incentive Patterns - The Design.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Trust Management of Services in Cloud Environments:
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
1/19 DIANE Project Philipp Obreiter, Birgitta König-Ries, Michael Klein Stimulating Cooperative Behavior of Autonomous.
On the Economics of P2P Systems Speaker Coby Fernandess.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
1 On Death, Taxes, & the Convergence of Peer-to-Peer & Grid Computing Adriana Iamnitchi Duke University “Our Constitution is in actual operation; everything.
Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.
DIANE Project Michael Klein, Birgitta König-Ries Multi-Layer Clusters in Ad-hoc Networks - An Approach to Service.
© 2004 Mobile VCE June 2004 Security – Requirements and approaches to securing future mobile services Malcolm K Payne BT.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
1/18 Philipp Obreiter 1, Birgitta König-Ries 2, Georgios Papadopoulos 1 Engineering Incentive Schemes for Ad Hoc.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
The Buddy System : A Distributed Reputation System Based on Social Structure Universität Karlsruhe Stefan Fähnrich 1, Philipp Obreiter 1, Birgitta König-Ries.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1/16 DIANE Project Philipp Obreiter, Michael Klein Vertical Integration of Incentives for Cooperation Universität.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
1/17 DIANE Project Birgitta König-Ries, Michael Klein Information Services to Support E-Learning in Ad-hoc Networks.
1/16 DIANE Project Philipp Obreiter A Case for Evidence-Aware Distributed Reputation Systems Overcoming the Limitations.
A Survey on Interfaces to Network Security
Mobility in the Virtual Office: A Document-Centric Workflow Approach Ralf Carbon, Gregor Johann, Thorsten Keuler, Dirk Muthig, Matthias Naab, Stefan Zilch.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Automatic Generation of B2C E-Commerce Payment Process By Jinglei Mei Thursday, November 09, 2000.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Lightweight Platform for Integration of Resource Limited Devices into Pervasive Grids Stavros Isaiadis and Vladimir Getov University of Westminster
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
September 23, 2015 Sacramento, CA Frédéric DINGUIRARD PMR Expert Overview Presentation on Registry Procurement and Specifications Workshop “Building Registries.
MobileMan IAB Meeting CORE: Design, Test-bed and Dissemination Pietro Michiardi Institut Eurecom.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
DynamicMR: A Dynamic Slot Allocation Optimization Framework for MapReduce Clusters Nanyang Technological University Shanjiang Tang, Bu-Sung Lee, Bingsheng.
Multi-Tier Communication Abstractions for Distributed Multi-Agent Systems Michael Thome
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Computer Science and Engineering 1 Mobile Computing and Security.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1/8 Project DIANE: How Social Structure Improves Distributed Reputation Systems Three Hypotheses Universität Karlsruhe.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Enabling Grids for E-sciencE Agreement-based Workload and Resource Management Tiziana Ferrari, Elisabetta Ronchieri Mar 30-31, 2006.
Grid Services for Digital Archive Tao-Sheng Chen Academia Sinica Computing Centre
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Presented by Edith Ngai MPhil Term 3 Presentation
Giannis F. Marias, Vassileios Tsetsos,
Presentation transcript:

1/12 Project DIANE: Project KRASH: A Taxonomy of Incentive Patterns - The Design Space of Incentives for Cooperation Universität Karlsruhe (TH), Germany Institute for Program Structures und Data Organization Universität Karlsruhe (TH) GERMANY Second International Workshop on Agents and Peer-to-Peer Computing (AP2PC 2003) held at AAMAS 2003 Melbourne, Australia, July 14th, 2003 Philipp Obreiter and Jens Nimis

2/12 Overview Project background and motivation –P2P, Ad-hoc systems –Multi-Agent Systems (Un-)Cooperative Behavior Incentive Patterns –Characteristics –Taxonomy Conclusion

3/12 Incentives in P2P and Ad Hoc Networks Example DIANE: E-Learning in Ad-hoc Networks Anna More on SQL? Official SQL Slides Summary on 2PC Exercise Sheet on UML Exercise Sheet on SQL Solution to SQL Sheet Bob  Carl

4/12 Incentives in Multi-Agent Systems Example Agent.Enterprise : Distributed Supply Chain Management intraplantinterplantexternal controlexecuteplan KRASH- System IntaPS- System Internal PPC MAS dispoweb Supply Chain Control MAS Supply Chain Scheduling MAS OEM Customer

5/12 Common Characteristics P2P-Networks, Ad-Hoc-Networks and Multi-Agent Systems consist of autonomous entities, need cooperation to exploit synergies, and consume (scarce) resources when cooperating. service consumerprovider remuneration Abstract model of elementary cooperation:  Cooperative behaviour must be stimulated.

6/12 Taxonomy of Uncooperative Behavior uncooperative behavior misbehavior venial noncooperation reasonableunreasonable malicious behavior profitable misbehavior unprofitableprofitable lavish behaviorselfish behavior by providerby consumer

7/12 Incentive Schemes and Incentive Patterns Incentive Pattern pattern of stimulating cooperation – comprises set of abstract mechanisms – generally introduces a specific type of remuneration Incentive Scheme applies specific incentive patterns aims at – restricting misbehavior – exempting venial noncooperation from punishment

8/12 General Characteristics of Incentive Patterns Roles (symmetric vs. asymmetric) Remuneration Type (e.g. checks, reputation,…) Storage (Where is the remuneration stored?) Granularity (regarding the provided service) Assessment (Who assesses the remuneration ? ) Coping with Selfishness Lavishness Venial noncooperation Trust Trusted entities Anonymity Scalability (number of entities)

9/12 Taxonomy of Incentive Patterns incentive patterns trust based patterns stimulated by trust trade based patterns stimulated by action in return collective static community (remuneration) dynamic barter trade immediate bond based deferred Debtor Issuer Any party Dedicated third party is debtor bearer notes pattern banknotes pattern is not debtor bearer bills pattern banking pattern

10/12 Characteristics of Incentive Patterns - Summary Pattern Characteristics Collec- tives Commu- nities Barter Trade Bearer Banking Bank Notes Bills Rolesasymmetricsymmetricasymmetric Remu- neration Type none reputation service in return notebillcheckbanknote Storage Site consumer−provider/bearer Remu- neration Granularity none arbitraryservice fraction of service arbitrarybanknote Assess- ment consumer provider/ consumer provider/bearermarket Copes with Selfishness + − ++ Lavishness++o+ Venial non- cooperation o−−o Trust Trustedconsumer none cons. cons./ debtor cons./ bank (cons./) centr. auth. Anonymity−+−(−)(−)o+ Scalability− −+o+++

11/12 Conclusion and Current Work Conclusion In presence of autonomous entities cooperative behaviour must be stimulated. Stimulating cooperative behavior –means restricting uncooperative behavior. –can be achieved by incentive schemes according to certain incentive patterns. Incentive patterns open up a design space that can be exploited by comparing their characteristics to the requirements of the target system. Current Work More Characteristics  finer granularity of patterns Composition of incentive pattern in one and over different entity layers

12/12 Thank you! More information (especially the technical report) on our project web page: Are there any questions? Thank you for your attention!

13/12 Backup Slides

14/12 Taxonomy of Incentive Patterns incentive patterns trust based patternstrade based patterns stimulated by trust stimulated by action in return collective static

15/12 The Collective Pattern Incentive: Membership in the same collective Properties: Mutual trust Unconditional operation PatternCollective Rolesasymetric Remuneration Typenone Storage Site none Remuneration Granularitynone Assessmentnone Copes with Selfishness+ Lavishness+ Venial non- cooperation + Trust Trustedconsumer Anonymity- Scalability--

16/12 Taxonomy of Incentive Patterns incentive patterns trust based patternstrade based patterns stimulated by trust stimulated by action in return collective static community (remunerating) dynamic

17/12 The Community Pattern Incentive: Reputation within a group Properties: Reputation gained by providing services Good reputation required in order to consume services PatternCommunity Rolesasymmetric Remuneration Typereputation Storage Site consumer Remuneration Granularityarbitrary Assessmentconsumer Copes with Selfishness- Lavishness- Venial non- cooperation o Trust Trustedconsumer Anonymity - Scalability-

18/12 Taxonomy of Incentive Patterns incentive patterns trust based patternstrade based patterns stimulated by trust stimulated by action in return collective static community (remuneration) dynamic barter trade immediate

19/12 The Barter Trade Pattern Incentive: Direct exchange of services Properties: Consumer acts as provider simultaneously PatternBarter Trade Rolessymmetric Remuneration Type service in return Storage Site - Remuneration Granularity- Assessment consumer/ provider Copes with Selfishness+ Lavishness+ Venial non- cooperation - Trust Trustednone Anonymity+ Scalability+

20/12 Taxonomy of Incentive Patterns incentive patterns trust based patternstrade based patterns stimulated by trust stimulated by action in return collective static community (remuneration) dynamic barter trade immediate bond based deferred Debtor Issuer Any party Dedicated third party is debtor bearer notes pattern banknotes pattern is not debtor bearer bills pattern banking pattern

21/12 The Bearer Notes Pattern Incentive: Consumer promises service in return Properties: Similarity with community pattern (explicit) Pattern Bearer Notes Rolesasymmetric Remuneration Typenote Storage Site provider/ bearer Remuneration Granularity fraction of service Assessment provider/ bearer Copes with Selfishness+ Lavishness+ Venial non- cooperation − Trust Trustedconsumer Anonymity− Scalabilityo Debtor Issuer Any party Dedicated third party is debtor bearer notes pattern banknotes pattern is not debtor bearer bills pattern banking pattern

22/12 The Bearer Bills Pattern Incentive: Consumer promises the provision of a service in return by the debtor Properties: Provider has to trust in the relationship between consumer and debtor PatternBearer Bills Rolesasymmetric Remuneration Typebill Storage Site provider/ bearer Remuneration Granularity fraction of service Assessment provider/ bearer Copes with Selfishness+ Lavishnesso Venial non- cooperation o Trust Trusted consumer/ debtor Anonymity(−) Scalabilityo Debtor Issuer Any party Dedicated third party is debtor bearer notes pattern banknotes pattern is not debtor bearer bills pattern banking pattern

23/12 The Banking Pattern Incentive: Balance of one's account Properties: Consumer hands over a check Provider cashes it PatternBanking Rolesasymmetric Remuneration Typecheck Storage Site provider/ bearer Remuneration Granularityarbitrary Assessment provider/ bearer Copes with Selfishness+ Lavishness+ Venial non- cooperation o Trust Trusted consumer/ bank Anonymityo Scalability+ Debtor Issuer Any party Dedicated third party is debtor bearer notes pattern banknotes pattern is not debtor bearer bills pattern banking pattern

24/12 The Bank Notes Pattern Incentive: Consumer hands over banknotes to the provider Properties: Bank notes promises a service in return by a central authority PatternBank Notes Rolesasymmetric Remuneration Typebanknote Storage Site provider/ bearer Remuneration Granularitybanknote Assessmentmarket Copes with Selfishness+ Lavishness+ Venial non- cooperation o Trust Trusted (consumer)/ centr. auth. Anonymity+ Scalability++ Debtor Issuer Any party Dedicated third party is debtor bearer notes pattern banknotes pattern is not debtor bearer bills pattern banking pattern

25/12 Backup Slides 2

26/12 Ad Hoc Networks: Absence of Infrastructure

27/12 Conceptual Layering Application Discovery Transport Network Link User Interface Application Discovery Transport Network Link User Interface device Adevice B autonomy border

28/12 Exemplification of Uncooperative Behavior Application Discovery Transport Network Link User Interface Application Discovery Transport Network Link User Interface Dropping packets under heavy load  venial noncooperation Application Network Transport Discovery DoS attack  malicious behavior Drop other devices' advertisements  selfish behavior Wastefully consume other devices' services  lavish behavior

29/12 Autonomy Autonomous devices devices are free to cooperate or not Sound assumption tampered devices re-engineered protocol stacks absence of an enforcing authority Devices tend to be uncooperative scarceness of resources (e.g. battery power)  cooperative behavior must be stimulated

30/12 Abstract Model of Elementary Cooperation PrincipalAgent action remuneration service ConsumerProvider check Application Layer forwarding SenderRouter reputation Network Layer

31/12 Incentive Scheme Issues (1): Trust Trust prerequisite for remuneration mechanisms an incentive for cooperation Static Trust certification of an entity's trustworthiness requires cryptographic infrastructure Dynamic Trust arises from prior experiences need for reputation management considers behavioral change

32/12 Incentive Scheme Issues (2): Transactions Transaction encompasses elementary cooperation agent executes action iff principal remunerates agent Negotiation phase agreement on the action and remuneration determined by the respective cost/profit ratios Processing phase assertion of atomicity seems daunting approximated atomicity by interleaving action and remuneration efficient low value transactions by aggregating actions and remunerations

33/12 Incentive Scheme Issues (3): Remuneration Remuneration type different types have been proposed most popular types checks, e.g., TermiNodes reputation, e.g., Marti et al 2000 Transferability passing on checks disseminating reputation Convertibility cashing checks reconciling user and device views of reputation

34/12 Account Based Incentive Schemes: Properties Remuneration mechanism every entity possesses an account accounts stored on virtual banks principal issues a check agent accesses a virtual bank in order to credit its account Implementation requires static trust mechanisms virtual banks managed by dedicated devices banker nodes accessibility? accounts distributed to account holders tamper resistant hardware

35/12 Reputation Based Incentive Schemes: Properties Remuneration mechanism principal adapts agent's reputation according to its action agent might decrease principal's reputation agent only cooperative if principal has good reputation Implementation couple trust and remuneration local views of reputation may be kept local shared, i.e., disseminated increases effectiveness introduces further opportunities for misbehavior requires stable or localized cooperation patterns

36/12 Taxonomy of Incentive Patterns incentive patterns trust based patternstrade based patterns stimulated by trust stimulated by action in return collective static community (remuneration) dynamic barter trade immediate bank notesbearer notesbearer billsbanking bond based deferred

37/12 Incentive Schemes: Classification Approach Properties Termi- Nodes SpriteAPERPG Watchdog/ Pathrater CON- FIDANT CORE Scope Coop. domainN/T NNNNN Selfishnessyes - Lavishnessyes ---- Maliciousnessyes- - - Remuneration typechecksreputation Transferability/ Dissemination yes--- only positive Convertibility-yes ---- Sniffing----yes Truststaticdynamic Implemen- tation Tamper resistance security modules Cryptographic infrastructure public key ---- Trans- action Negotiationyes Processingaction/remuneration Flex. remunerationyes ----

38/12 Incentive Patterns and Their Representatives Pattern Characteristics CollectivesCommunities Barter Trade Bearer Banking Bank Notes Bills Rolesasymmetricsymmetricasymmetric Remu- neration Type none reputation service in return notebillcheckbanknote Storage Siteconsumer−provider/bearer Remu- neration Granularity none arbitraryservice fraction of service arbitrarybanknote Assess- ment consumer provider/ consumer provider/bearermarket Copes with Selfishness + − ++ Lavishness++o+ Venial non- cooperation o−−o Trust Trustedconsumernonecons. cons./ debtor cons./ bank (cons./) centr. auth. Anonymity−+−(−)(−)o+ Scalability− −+o+++ Existing approaches various (mil., corp., sens.,priv.) RPG,CORE, Watchdog, Confidant none APE, Ter- miNodes, Sprite none

39/12 Conclusion Summary cooperation beyond autonomy borders requires stimulation cooperation of protocol entities on different layers taxonomy and exemplification of uncooperative behavior discussion of incentive schemes trust transactions remuneration classification of existing approaches for ad hoc networks account vs. reputation based Future work incentive scheme for the discovery and application layer analysis of suitable remuneration types integration of incentive schemes