Maya-Pyramid: A Scalable and Self-Organizing Unstructured P2P Overlay
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
Nash equilibria in bandwidth allocation for non-cooperative peer-to-peer networks
Journal of Systems Architecture: the EUROMICRO Journal
HELC: a High Efficiency and Low Cost structured Peer-to-Peer overlay without Distributed Hash Table
International Journal of Autonomous and Adaptive Communications Systems
Identifying user behavior in online social networks
Proceedings of the 1st Workshop on Social Network Systems
Cooperation through self-similar social networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Incentivizing connectivity in structured Peer-to-Peer systems
Web Intelligence and Agent Systems
On desideratum for B2C E-commerce reputation systems
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
A secure model for controlling the hubs in P2P wireless network based on trust value
Computer Communications
Pollution-resistant peer-to-peer live streaming using trust management
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Probabilistic packet relaying in wireless mobile ad hoc networks
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
A formal credit-based incentive model for sharing computer resources
EuroPar'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part I
A simple public-goods game based incentive mechanism for resource provision in P2P networks
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
P2P soft security: On evolutionary dynamics of P2P incentive mechanism
Computer Communications
Bootstrapping accountability in the internet we have
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Interest-Intended Piece Selection in BitTorrent-like peer-to-peer file sharing systems
Journal of Parallel and Distributed Computing
Punishment or reward: it is a problem in anonymous, dynamic and autonomous networking environments
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cooperating with free riders in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing P2P systems from Sybil attacks through adaptive identity management
Proceedings of the 7th International Conference on Network and Services Management
Evaluating stranger policies in P2P file-sharing systems with reciprocity mechanisms
Computer Networks: The International Journal of Computer and Telecommunications Networking
Solving soft security problem in MANETs using an evolutionary approach
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Agents and peer-to-peer computing: towards p2p-based resource allocation in competitive environments
AP2PC'08 Proceedings of the 7th international conference on Agents and Peer-to-Peer Computing
The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Sophia: A local trust system to secure key-based routing in non-deterministic DHTs
Journal of Parallel and Distributed Computing
Analysing the development of cooperation in MANETs using evolutionary game theory
The Journal of Supercomputing
On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Resilience and opportunistic forwarding: beyond average value analysis
Proceedings of the 8th ACM MobiCom workshop on Challenged networks
Hi-index | 0.07 |
We devise a model to study the phenomenon of free-riding and free-identities in peer-to-peer systems. At the heart of our model is a user of a certain type, an intrinsic and private parameter that reflects the user's willingness to contribute resources to the system. A user decides whether to contribute or free-ride based on how the current contribution cost in the system compares to her type. We study the impact of mechanisms that exclude low type users or, more realistically, penalize free-riders with degraded service. We also consider dynamic scenarios with arrivals and departures of users, and with whitewashers -users who leave the system and rejoin with new identities to avoid reputational penalties. We find that imposing penalty on all users that join the system is effective under many scenarios. In particular, system performance degrades significantly only when the turnover rate among users is high. Finally, we show that the optimal exclusion or penalty level differs significantly from the level that optimizes the performance of contributors only for a limited range of societal generosity levels.