Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)

Slides:



Advertisements
Similar presentations
A Local Mean Field Analysis of Security Investments in Networks Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) NetEcon 2008.
Advertisements

Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.
Peter Key, Laurent Massoulie, Don Towsley Infocom 07 presented by Park HoSung 1 Path selection and multipath congestion control.
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Chapter 14 Infinite Horizon 1.Markov Games 2.Markov Solutions 3.Infinite Horizon Repeated Games 4.Trigger Strategy Solutions 5.Investing in Strategic Capital.
A Lightweight Currency-based P2P VoD Incentive Mechanism Presented by Svetlana Geldfeld by Chi Wang, Hongbo Wang, Yu Lin, and Shanzhi Chen.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
LIRA: Lightweight Incentivized Routing for Anonymity Rob Jansen Aaron Johnson Paul Syverson U.S. Naval Research Laboratory 20th Annual Network & Distributed.
P2P I NCENTIVES Dror Marcus. Yoni DenyConfess HadasHadas Deny Redo the testYoni is free Hadas is expelled from school Confess Yoni is expelled from school.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP Presented by Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Strategic Network Formation and Group Formation Elliot Anshelevich Rensselaer Polytechnic Institute (RPI)
An Energy Efficient Hierarchical Heterogeneous Wireless Sensor Network
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Communication Networks A Second Course Jean Walrand Department of EECS University of California at Berkeley.
Modeling and analysis of BitTorrent-like P2P network Fan Bin Oct,1 st,2004.
Pricing What Can Pricing Do In Wireless Networks? Jianning Mai and Lihua Yuan
Nov 2003Group Meeting #2 Distributed Optimization of Power Allocation in Interference Channel Raul Etkin, Abhay Parekh, and David Tse Spectrum Sharing.
A Payment-based Incentive and Service Differentiation Mechanism for P2P Streaming Broadcast Guang Tan and Stephen A. Jarvis Department of Computer Science,
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Game Theory and Pricing of Internet Services Jean Walrand (with Linhai He & John Musacchio)
A Scalable Network Resource Allocation Mechanism With Bounded Efficiency Loss IEEE Journal on Selected Areas in Communications, 2006 Johari, R., Tsitsiklis,
Free-rider problem in peer-to- peer networks Sumitra Ganesh.
1 CompuP2P: An Architecture for Sharing of Computing Resources In Peer-to-Peer Networks With Selfish Nodes Rohit Gupta and Arun K. Somani
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
1 An Incentive Mechanism for Message Relaying in Peer-to- Peer Discovery Cuihong Li (TSoB), Bin Yu (RI) and Katia Sycara (RI) Carnegie Mellon Unversity.
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
Modeling Quality-Quantity based Communication Orr Srour under the supervision of Ishai Menache.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
Collusion and the use of false names Vincent Conitzer
Bottom-Up Coordination in the El Farol Game: an agent-based model Shu-Heng Chen, Umberto Gostoli.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Internet Infrastructure and Pricing. Internet Pipelines Technology of the internet enables ecommerce –Issues of congestion and peak-load pricing –Convergence.
Learning dynamics,genetic algorithms,and corporate takeovers Thomas H. Noe,Lynn Pi.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
A Game Theoretic Framework for Incentives in P2P Systems --- CS. Uni. California Jun Cai Advisor: Jens Graupmann.
Yang Cai Sep 8, An overview of the class Broad View: Mechanism Design and Auctions First Price Auction Second Price/Vickrey Auction Case Study:
Revocation Games in Ephemeral Networks Maxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux CCS 2008.
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
ISMA 2004 Workshop on Internet Signal Processing (WISP) 1 Perspectives on Resource Allocation Kameswari Chebrolu, Bhaskaran Raman, Ramesh R. Rao November.
DELAYED CHAINING: A PRACTICAL P2P SOLUTION FOR VIDEO-ON-DEMAND Speaker : 童耀民 MA1G Authors: Paris, J.-F.Paris, J.-F. ; Amer, A. Computer.
Optimizing Scrip Systems: Efficiency, Crashes, Hoarders, and Altruists By Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern Presentation by Avner May 12/10/08.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing Weijie Shi*, Linquan Zhang +, Chuan Wu*, Zongpeng Li +, Francis C.M. Lau*
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
A Non-Monetary Protocol for P2P Content Distribution in Wireless Broadcast Networks with Network Coding I-Hong Hou, Yao Liu, and Alex Sprintson Dept. of.
1 [3] Jorge Martinez-Bauset, David Garcia-Roger, M a Jose Domenech- Benlloch and Vicent Pla, “ Maximizing the capacity of mobile cellular networks with.
The Design of A Distributed Rating Scheme for Peer-to-peer Systems Debojyoti Dutta 1, Ashish Goel 2, Ramesh Govindan 1, Hui Zhang 1 1 University of Southern.
FAIR CHARGES FOR INTERNET CONGESTION Damon Wischik Statistical Laboratory, Cambridge Electrical Engineering, Stanford
Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson.
May 8, Manipulating Scrip Systems: Sybils and Collusion Ian Kash Cornell University Joint work with Eric Friedman and Joe Halpern.
Cs286r Victor Chan Scrip Systems Victor Chan. CS286 Victor Chan Agenda  Scrip Systems  Peer to Peer Systems  Scrip Systems for P2P Networks  Adobe.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
Guard Sets for Onion Routing JOSHUA FREE. Tor Most popular low-latency distributed anonymity network Controversial decisions of guard selection strategies.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
O N THE O PTIMAL P LACEMENT OF M IX Z ONES : A G AME -T HEORETIC A PPROACH Mathias Humbert LCA1/EPFL January 19, 2009 Supervisors: Mohammad Hossein Manshaei.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
L EARNING BY C OPYING Francisco Martínez-Sánchez Universidad de Granada.
A useful reduction (SAT -> game)
Optimizing Scrip Systems: Efficiency, Crashes, Hoarders, and Altruists
Presentation transcript:

Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)

 Tor/anonymity networks [1]  Client software + network of servers/relays  Protect users’ personal freedom and privacy by keeping their Internet activities from being monitored  E.g., used to circumvent censorship in dictatorial countries; dramatic increase in Tunisia during the Jasmine Revolution 2 [1] R. Dingledine et al., Tor: The second-generation onion router. USENIX’04 Privacy-Enhancing Technologies (PETs)

[3] Tor metrics portal. September 2011http://metrics.torproject.org Cooperation Problem in PETs  Running a relay node is not free  Investments to setup the software  Bandwidth  Processing power  Lack of relays remains one of the main challenges [2]  Only 2’500 Tor relays for 300k to 400k users [3]  Need of incentives!  One solution: reward users relaying other users’ anonymous traffic with a virtual currency 3 $1 $2 $3$3$3$3+$1 +$1 +$1 [2] R. Dingledine et al., Challenges in deploying low-latency anonymity. Technical report (2005)

Micropayments into Tor  Anonymous micropayment schemes  First payment-based incentive mechanism for P2P anonymity systems [4]  Online bank issuing coins to Tor clients while handling deposits from Tor relays [5, 6]  Monetary issues not covered so far  How much «money» shall we inject into the system in order to optimize its performance?  It should encourage users to work for others (i.e., relay traffic)  It should allow a large majority of people (if not all of them) to reward relays and thus use the anonymity network 4 [4] D. Figueiredo et al., Incentives to promote availability in peer-to-peer anonymity systems. ICNP’05 [5] E. Androulaki et al., PAR: Payment for Anonymous Routing. PET’08 [6] Y. Chen et al., Xpay: Pratical anonymous payments for Tor routing and other networked services. WPES’09

Scrip Systems  Scrip = non-governmental or virtual currency  Developed to prevent free-riding in P2P file sharing [7, 8]  First scrip system model [7, 8]  An agent (requester) pays $1 to another agent (volunteer) that satisfies his request  The requester gains a utility b for having his request satisfied  The volunteer has a cost c < b for fulfilling the request 5 [7] E. J. Friedman et al., Efficiency and Nash equilibria in a scrip system for P2P networks. EC’06 [8] I. A. Kash et al., Optimizing scrip systems: efficiency, crashes, hoarders, and altruists. EC’07 $1 U 2 - c U 1 + b M M requestervolunteer

One-to-n Scrip Systems  One-to-one scrip systems not powerful enough to support micropayment distribution in anonymity networks or other types of PETs  One-to-n scrip systems 6 $1 … … n volunteers What’s the value of n? In current Tor implementation, n=3 Can be greater than 3 for other PETs

System Model 7  Closed system with N > n agents  At each round r, an agent is picked to make a request: this agent needs n other peers to fulfill his request  The agent’s type is characterized by a tuple t = (c t, b t,  t,  t,  t  t )  c t : cost of satisfying a request  b t : benefit of having a request satisfied (b t > nc t )   t : discount rate   t : probability of being able to satisfy a request   t : relative request rate   t : likelihood to be chosen when an agent volunteers Payoff-heterogeneous population   t =  t =  &  t =  for all t payoff-related parameters

Strategic Choices  Each agent that is able to satisfy a request decides whether to cooperate/volunteer or not  Decision made based on his/her current amount of money  Using threshold strategies  S k : agent cooperating if he has less than k dollars  S 0 : agent never volunteers  S  : agent always volunteers  Among the agents willing to cooperate, n are chosen uniformly at random to fulfill the request 8 M (= amount of money) k= f(t) cooperatedefect

Distribution of money  Example with 1000 agents  9 Simulation results: Averaged distribution of scrip after 10’000 steps peak at i = 4= n-1 small peak at i = 25= k t - n concentration of agents at i = k t Average amount of money in the system

Nash Equilibrium There exists an ε-Nash equilibrium where all agents play threshold strategies Sk, with k being a multiple of n This optimal threshold policy is an ε-best response for agent i There exists an optimal threshold policy for the MDP of agent i 10 From the point of view of a single agent i, the game can be modeled as a Markov Decision Process (MDP)

Social Welfare  Social welfare increases by b t – nc t only if a transaction happens (i.e., a request is satisfied)  The agent chosen to make a request must have $n; occuring with probability  There must be n volunteers able and willing to satisfy it; occuring with probability approximated by 1  Total expected social welfare:  Social welfare decreasing in n (for given values of b t, c t,  t, and average amount of money in the system m)  Social welfare increasing in m up to a certain point m * beyond which a monetary crash occurs (no agent willing to cooperate) 11 Fraction of agents owning less than $n

Social Welfare 12 Monetary crash when m ≥ 8 Monetary crash when m ≥ 10 m = average amount of money n = number of volunteers needed

Two application examples  Anonymity networks (e.g., Tor)  Settings: N = 300’000 users, n = 3 relays  Social welfare maximized at m=10  Only 2.5% of agents cannot afford a service  Thus, 10 x 300’000 = 3’000’000$ should be allocated into the system  Privacy in participatory sensing systems  Settings: N = 1’000 users, n = 6  Social welfare maximized at m=16 13

Conclusion  Extended scrip systems to one-to-n  Existence of Nash equilibrium with threshold strategies  Finding optimal amount of scrip to maximize social welfare  First application of scrip systems to PETs  Encouraging cooperation in PETs  Improving fairness in PETs  Better performance of cooperative PETs  Future work  Rate of convergence towards the steady-state distribution  Investigate other strategies than thresholds  Open system with newcomers and variable prices 14