Abstract
In this work, we discuss the sybil attack to a sharing economic system where each participant contributes its own resource for all to share. We are interested in the robustness of the market equilibrium mechanism in withstanding such an attack, in terms of the incentive ratio to measure how much one could gain by splitting its identity and reconstructing its communication connections with others. On one hand, weshow that no player can increase more than \(\sqrt{2}\) times of their original share from the market equilibrium solution, by characterizing the worst case under which strategic agent can obtain the maximum utility gain after manipulation. On the other hand, such a bound of \(\sqrt{2}\) is proved to be tight by constructing a proper instance, for which this bound is reached.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adsul, B., Babu, C.S., Garg, J., Mehta, R., Sohoni, M.: Nash equilibria in fisher market. In: Kontogiannis, S., Koutsoupias, E., Spirakis, P.G. (eds.) SAGT 2010. LNCS, vol. 6386, pp. 30–41. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16170-4_4
Arrow, K., Debreu, G.: Existence of an equilibrium for a competitive economy. Econometrica 22(3), 265–290 (1954)
Alkalay, C., Vetta, A.: False-name bidding and economic efficiency in combinatorial auctions. In: AAAI, pp. 538–544 (2014)
Braanzei, S., Chen, Y., Deng, X., Filos-Ratsikas, A., Kristoffer, S., Frederiksen, S., Zhang, J.: The fisher market game: equilibrium and welfare. In: AAAI (2014)
Dalakov, G.: History of computers and computing, internet, internet conquers the world, BitTorrent. http://historycomputer.com/Internet/Conquering/BitTorrent.html
Chen, Z., Cheng, Y., Deng, X., Qi, Q., Yan, X.: Agent incentives of strategic behavior in resource exchange. In: Bilò, V., Flammini, M. (eds.) SAGT 2017. LNCS, vol. 10504, pp. 227–239. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66700-3_18
Chen, Z., Cheng, Y., Qi, Q., Yan, X.: Incentive ratios of a proportional sharing mechanism in resource sharing. In: Cao, Y., Chen, J. (eds.) COCOON 2017. LNCS, vol. 10392, pp. 137–149. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62389-4_12
Chen, N., Deng, X., Zhang, H., Zhang, J.: Incentive ratios of fisher markets. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.) ICALP 2012. LNCS, vol. 7392, pp. 464–475. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31585-5_42
Chen, N., Deng, X., Zhang, J.: How profitable are strategic behaviors in a market? In: Demetrescu, C., Halldórsson, M.M. (eds.) ESA 2011. LNCS, vol. 6942, pp. 106–118. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23719-5_10
Cheng, Y., Deng, X., Pi, Y., Yan, X.: Can bandwidth sharing be truthful? In: Hoefer, M. (ed.) SAGT 2015. LNCS, vol. 9347, pp. 190–202. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48433-3_15
Cheng, Y., Deng, X., Qi, Q., Yan, X.: Truthfulness of a proportional sharing mechanism in resource exchange. In: IJCAI, pp. 187–193 (2016)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24
Duan, R., Garg, J., Mehlhorn, K.: An improved combinatorial polynomial algorithm for the linear Arrow-Debreu market. In: SODA (2016)
Deng, X., Papadimitriou, C., Safra, S.: On the complexity of equilibria. In: STOC, pp. 67–71 (2002)
Devanur, N., Papadimitriou, C., Saberi, A., Vazirani, V.: Market equilibrium via a primal-dual-type algorithm. In: FOCS, pp. 389–389 (2002)
Feldman M., Lai, K., Stoica, I.: Robust incentive techniques for peer-to-peer networks. In: EC, pp. 102–111 (2004)
Iwasaki, A., Conitzer, V., Omori, Y.: Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms. In: AMMAS, pp. 633–640 (2010)
Jain, K.: A polynomial time algorithm for computing an Arrow-Debreu market equilibrium for linear utilities. SIAM J. Comput. 37(1), 303–318 (2007)
Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol. 1563, pp. 404–413. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-49116-3_38
Lange, O.: The computer and the market. Socialism, Capitalism and Economic Growth, pp. 158–161 (1967)
Polak, I.: The incentive ratio in exchange economies. In: Chan, T.-H.H., Li, M., Wang, L. (eds.) COCOA 2016. LNCS, vol. 10043, pp. 685–692. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48749-6_49
Papadimitriou, C.: Algorithms, games, and the internet. In: STOC, pp. 749–753 (2001)
Roughgarden, T., Tardos, E.: How bad is selfish routing. J. ACM 49(2), 236–259 (2002)
Sybil attack. https://en.wikipedia.org/wiki/Sybil-attack
Wang, L., Kangasharju, J.: Real-world sybil attacks in BitTorrent mainline DHT. In: IEEE GLOBECOM (2012)
Wang, L., Kangasharju, J.: Measuring large-scale distributed systems: case of BitTorrent mainline DHT. In: IEEE Peer-to-Peer (2013)
Wu, F., Zhang, L.: Proportional response dynamics leads to market equilibrium. In: STOC, pp. 354–363 (2007)
Ye, Y.: A path to the Arrow-Debreu competitive market equilibrium. Math. Program. 111(1–2), 315–348 (2008)
Yokoo, M.: False-name bids in combinatorial auctions. ACM SIGecom Exch. 7(1), 1–4 (2007)
Yokoo, M., Sakurai, Y., Matsubara, S.: The effect of false-name bids in combinatorial auctions: new fraud in Internet auctions. Games Econ. Behav. 46, 174–188 (2004)
Acknowledgments
This research was partially supported by the National Nature Science Foundation of China (Nos. 11301475, 11426026, 61632017, 61173011), by a Project 985 grant of Shanghai Jiao Tong University, by the Research Grant Council of Hong Kong (ECS Project Nos. 26200314, GRF Project No. 16213115 and GRF Project No. 16243516), and by Ant Finantial.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chen, Z., Cheng, Y., Deng, X., Qi, Q., Yan, X. (2017). Limiting User’s Sybil Attack in Resource Sharing. In: R. Devanur, N., Lu, P. (eds) Web and Internet Economics. WINE 2017. Lecture Notes in Computer Science(), vol 10660. Springer, Cham. https://doi.org/10.1007/978-3-319-71924-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-71924-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71923-8
Online ISBN: 978-3-319-71924-5
eBook Packages: Computer ScienceComputer Science (R0)