skip to main content
10.1145/1160633.1160846acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
Article

A robust combinatorial auction mechanism against shill bidders

Published: 08 May 2006 Publication History

Abstract

This paper presents a method for discovering and detecting shill bids in combinatorial auctions. The Vickrey-Clarke-Groves Mechanism is one of the most important combinatorial auctions because it can satisfy the strategy-proof property, individual rationality, and Pareto efficiency, that is, it is the only mechanism that simultaneously satisfies these properties. As Yokoo et al. pointed out, false-name bids and shill bids pose an emerging problem for auctions, since on the Internet it is easy to establish different e-mail addresses and accounts for auction sites. Yokoo et al. proved that VCG cannot satisfy the false-name-proof property, and they also proved that no auction protocol can satisfy all three of the above properties and the false-name proof property simultaneously. Their approach concentrates on designing a new mechanism that has desirable properties, but this is quite complicated. As a new approach against shill-bids, in this paper, we design a mechanism that utilizes VCG and an algorithm for finding potential shill bids. Our mechanism is quite simple compared with Yokoo's approaches [11][12][13]. Our mechanism can judge whether there might be a shill bid from the results of the VCG procedure. We prove a theorem stating that shill bidders cannot increase their utilities unless all shill bidders win in the auction. Based on this theorem, our proposed mechanism compares the agents' utilities in a conventional auction with those in an auction where a shill bidder does not join in the auction. When these agents' utilities are different between the above cases, such agents might be shill bidders. Then, our mechanism allocates items to the shill bidders as a group from the set of items obtained through successful bids by the agent in the conventional auction. This process prevents shill bidders from increasing unfair profits. Furthermore, even though shill bidders participate in the auction, the seller's profit does not decrease using our proposed method. Thus, our mechanism detects shill bids when it only detects the possibility of shill bids. Our proposed method has the following three key advantages. First, we propose a method to detect shill bidders by comparison between bidders utilities. Our method is superior than existing complex mechanisms in the point of view of generalization and wide-use, because our auction mechanism employs only VCG. Second, even though there are shill bidders in an auction, incentive compatibility property is preserved using our mechanism. Finally, the schemer, in our mechanism, does never have incentive to make shill bidders. The schemer's utility does not increase in our mechanism even though a schemer make shill bidders. Namely, not to make shill bidders is dominant strategy for the schemer.

References

[1]
L. M. Ausubel and P. Milgrom. Ascending auctions with package bidding. Frontiers of Theoretical Economics, 1(1), 2002.
[2]
E. H. Clarke. Multipart pricing of public goods. Public Choice, 11:17--33, 1971.
[3]
Y. Fujishima, K. Leyton-Brown, and Y. Shoham. Taming the computational complexity of combinatorial auctions: Optimal and approximate approaches. In Proc. of the 16th International Joint Conference on Artificial Intelligence (IJCAI99), pages 548--553, 1999.
[4]
T. Groves. Incentives in teams. Econometrica, 41:617--631, 1973.
[5]
D. Lehmann, L. I. O'Callaghan, and Y. Shoham. Truth revelation in approximately efficient combinatorial auctions. Journal of the ACM, 49(5):577--602, 2002.
[6]
K. Leyton-Brown, M. Tennenholtz, and Y. Shoham. An algorithm for multi-unit combinatorial auctions. In Proc. of 17th National Conference on Artificial Intelligence (AAAI2000), 2000.
[7]
P. Milgrom. Putting Auction Theory to Work. Cambridge University Press, 2004.
[8]
T. Sandholm. An algorithm for optimal winner determination in combinatorial auctions. In Proc. of the 16th International Joint Conference on Artificial Intelligence(IJCAI'99), pages 542--547, 1999.
[9]
T. Sandholm, S. Suri, A. Gilpin, and D. Levine. Winner determination in combinatorial auction generalizations. In Proc. of the 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS02), pages 69--76, 2002.
[10]
W. Vickrey. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance, XVI:8--37, 1961.
[11]
M. Yokoo, Y. Sakurai, and S. Matsubara. Bundle design in robust combinatorial auction protocol against false-name bids. In Proceedings of the 17th International Joint Conference on Artificial Intelligence (IJCAI-2001), pages 1095--1101, 2001.
[12]
M. Yokoo, Y. Sakurai, and S. Matsubara. Robust multi-unit auction protocol against false-name bids. In Proceedings of the 17th International Joint Conference on Artificial Intelligence (IJCAI-2001), pages 1089--1094, 2001.
[13]
M. Yokoo, Y. Sakurai, and S. Matsubara. The effect of false-name bids in combinatorial auctions: New fraud in Internet auctions. Games and Economic Behavior, 46(1):174--188, 2004.

Cited By

View all
  • (2014)Mechanism design for sustainable virtual power plant formation2014 IEEE International Conference on Automation Science and Engineering (CASE)10.1109/CoASE.2014.6899306(67-72)Online publication date: Aug-2014
  • (2012)AN EFFICIENT TRADING MODEL FOR HYBRID TRADERSApplied Artificial Intelligence10.1080/08839514.2012.71330626:8(715-732)Online publication date: 1-Sep-2012
  • (2011)Optimal Combinatorial Auction for Initial Commitment Decision Problem in Virtual OrganizationsProceedings of the 2011 IEEE 13th Conference on Commerce and Enterprise Computing10.1109/CEC.2011.15(89-95)Online publication date: 5-Sep-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AAMAS '06: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
May 2006
1631 pages
ISBN:1595933034
DOI:10.1145/1160633
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 May 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. combinatorial auctions
  2. computational mechanism design
  3. incentive compatibility
  4. pareto efficiency
  5. shill bids
  6. vickrey-clarke-groves mechanism

Qualifiers

  • Article

Conference

AAMAS06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Mechanism design for sustainable virtual power plant formation2014 IEEE International Conference on Automation Science and Engineering (CASE)10.1109/CoASE.2014.6899306(67-72)Online publication date: Aug-2014
  • (2012)AN EFFICIENT TRADING MODEL FOR HYBRID TRADERSApplied Artificial Intelligence10.1080/08839514.2012.71330626:8(715-732)Online publication date: 1-Sep-2012
  • (2011)Optimal Combinatorial Auction for Initial Commitment Decision Problem in Virtual OrganizationsProceedings of the 2011 IEEE 13th Conference on Commerce and Enterprise Computing10.1109/CEC.2011.15(89-95)Online publication date: 5-Sep-2011
  • (2010)Tâtonnement Mechanisms for Combinatorial ExchangesProceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing10.1109/CEC.2010.24(25-31)Online publication date: 10-Nov-2010
  • (2010)Optimal shill bidding in the VCG mechanismEconomic Theory10.1007/s00199-010-0566-650:2(341-387)Online publication date: 29-Sep-2010
  • (2010)Shill Bidder Detection for Online AuctionsPRICAI 2010: Trends in Artificial Intelligence10.1007/978-3-642-15246-7_33(351-358)Online publication date: 2010
  • (2009)Characterizing false-name-proof allocation rules in combinatorial auctionsProceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 110.5555/1558013.1558049(265-272)Online publication date: 10-May-2009
  • (2007)Limited verification of identities to induce false-name-proofnessProceedings of the 11th conference on Theoretical aspects of rationality and knowledge10.1145/1324249.1324265(102-111)Online publication date: 25-Jun-2007
  • (undefined)Optimal Shill Bidding in the VCG MechanismSSRN Electronic Journal10.2139/ssrn.1321783

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media