Skip to main content

Manipulating Scrip Systems: Sybils and Collusion

  • Conference paper
Book cover Auctions, Market Mechanisms and Their Applications (AMMA 2009)

Abstract

Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strategic behavior involving more than one agent. We examine the effects of two types of strategic behavior involving more than one agent, sybils and collusion, in the context of scrip systems where agents provide each other with service in exchange for scrip. Sybils make an agent more likely to be chosen to provide service, which generally makes it harder for agents without sybils to earn money and decreases social welfare. Surprisingly, in certain circumstances it is possible for sybils to make all agents better off. While collusion is generally bad, in the context of scrip systems it actually tends to make all agents better off, not merely those who collude. These results also provide insight into the effects of allowing agents to advertise and loan money.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adar, E., Huberman, B.A.: Free riding on Gnutella. First Monday 5(10) (2000)

    Google Scholar 

  2. Aperjis, C., Johari, R.: A peer-to-peer system as an exchange economy. In: GameNets 2006: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks, p. 10 (2006)

    Google Scholar 

  3. Brunelle, J., Hurst, P., Huth, J., Kang, L., Ng, C., Parkes, D., Seltzer, M., Shank, J., Youssef, S.: Egg: An extensible and economics-inspired open grid computing platform. In: Third Workshop on Grid Economics and Business Models (GECON), pp. 140–150 (2006)

    Google Scholar 

  4. Chun, B., Buonadonna, P., AuYung, A., Ng, C., Parkes, D., Schneidman, J., Snoeren, A., Vahdat, A.: Mirage: A microeconomic resource allocation system for sensornet testbeds. In: Second IEEE Workshop on Embedded Networked Sensors, pp. 19–28 (2005)

    Google Scholar 

  5. Cover, T., Thomas, J.: Elements of Information Theory. John Wiley & Sons, Inc., New York (1991)

    Book  MATH  Google Scholar 

  6. Csiszár, I.: Sanov propery, generalized i-projection and a conditional limit theorem. The Annals of Probability 12(3), 768–793 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  7. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Friedman, E.J., Halpern, J.Y., Kash, I.A.: Efficiency and Nash equilibria in a scrip system for P2P networks. In: Proc. Seventh ACM Conference on Electronic Commerce (EC), pp. 140–149 (2006)

    Google Scholar 

  9. Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy 10(2), 173–199 (2001)

    Article  Google Scholar 

  10. Hens, T., Schenk-Hoppe, K.R., Vogt, B.: The great Capitol Hill baby sitting co-op: Anecdote or evidence for the optimum quantity of money? J. of Money, Credit and Banking 9(6), 1305–1333 (2007)

    Article  Google Scholar 

  11. Hughes, D., Coulson, G., Walkerdine, J.: Free riding on Gnutella revisited: The bell tolls? IEEE Distributed Systems Online 6(6) (2005)

    Google Scholar 

  12. Jaynes, E.T.: Where do we stand on maximum entropy? In: Levine, R.D., Tribus, M. (eds.) The Maximum Entropy Formalism, pp. 15–118. MIT Press, Cambridge (1978)

    Google Scholar 

  13. Kash, I.A., Friedman, E.J., Halpern, J.Y.: Manipulating scrip systems: Sybils and collusion. arXiv:0903.2278v1

    Google Scholar 

  14. Kash, I.A., Friedman, E.J., Halpern, J.Y.: Optimizing scrip systems: Efficiency, crashes, hoarders and altruists. In: Proc. Eighth ACM Conference on Electronic Commerce (EC), pp. 305–315 (2007)

    Google Scholar 

  15. Mas-Colell, A., Whinston, M.D., Green, J.R.: Microeconomic Theory. Oxford University Press, Oxford (1995)

    MATH  Google Scholar 

  16. Ng, C., Buonadonna, P., Chun, B., Snoeren, A., Vahdat, A.: Addressing strategic behavior in a deployed microeconomic resource allocator. In: Third Workshop on Economics of Peer-to-Peer Systems (P2PECON), pp. 99–104 (2005)

    Google Scholar 

  17. Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: KARMA: a secure economic framework for peer-to-peer resource sharing. In: First Workshop on Economics of Peer-to-Peer Systems (P2PECON) (2003)

    Google Scholar 

  18. Walsh, K., Sirer, E.G.: Experience with an object reputation system for peer-to-peer filesharing. In: Third Symp. on Network Systems Design & Implementation (NSDI), pp. 1–14 (2006)

    Google Scholar 

  19. Yokoo, M., Sakurai, Y., Matsubara, S.: The effect of false-name bids in combinatorial auctions: new fraud in internet auctions. Games and Economic Behavior 46(1), 174–188 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kash, I.A., Friedman, E.J., Halpern, J.Y. (2009). Manipulating Scrip Systems: Sybils and Collusion. In: Das, S., Ostrovsky, M., Pennock, D., Szymanksi, B. (eds) Auctions, Market Mechanisms and Their Applications. AMMA 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 14. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03821-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03821-1_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03820-4

  • Online ISBN: 978-3-642-03821-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics