{"title":"针对一般网络资源交换市场均衡的 Sybil 攻击的严密激励分析","authors":"Yukun Cheng , Xiaotie Deng , Yuhao Li , Xiang Yan","doi":"10.1016/j.geb.2024.10.009","DOIUrl":null,"url":null,"abstract":"<div><div>The BitTorrent network, a well-known Internet-scale P2P system, applies the proportional response protocol to exchange resource, where each participant contributes resource to neighbors in proportion to the amount it received in the previous round. The dynamics of this protocol is known to converge to a market equilibrium. However, an agent may manipulate this protocol by a Sybil attack to create fictitious identities and control them to gain more benefit. We apply the concept of <em>incentive ratio</em>, the percentage of the new utility after a Sybil attack over the benchmark, to measure the incentive of a strategic agent to play a Sybil attack, proving a tight bound of two over general networks. This finding completes the theoretical picture for incentive analysis on Sybil attacks facing the legendary tit-for-tat protocol for Internet bandwidth sharing and other applications.</div></div>","PeriodicalId":48291,"journal":{"name":"Games and Economic Behavior","volume":"148 ","pages":"Pages 566-610"},"PeriodicalIF":1.0000,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Tight incentive analysis of Sybil attacks against the market equilibrium of resource exchange over general networks\",\"authors\":\"Yukun Cheng , Xiaotie Deng , Yuhao Li , Xiang Yan\",\"doi\":\"10.1016/j.geb.2024.10.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The BitTorrent network, a well-known Internet-scale P2P system, applies the proportional response protocol to exchange resource, where each participant contributes resource to neighbors in proportion to the amount it received in the previous round. The dynamics of this protocol is known to converge to a market equilibrium. However, an agent may manipulate this protocol by a Sybil attack to create fictitious identities and control them to gain more benefit. We apply the concept of <em>incentive ratio</em>, the percentage of the new utility after a Sybil attack over the benchmark, to measure the incentive of a strategic agent to play a Sybil attack, proving a tight bound of two over general networks. This finding completes the theoretical picture for incentive analysis on Sybil attacks facing the legendary tit-for-tat protocol for Internet bandwidth sharing and other applications.</div></div>\",\"PeriodicalId\":48291,\"journal\":{\"name\":\"Games and Economic Behavior\",\"volume\":\"148 \",\"pages\":\"Pages 566-610\"},\"PeriodicalIF\":1.0000,\"publicationDate\":\"2024-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Games and Economic Behavior\",\"FirstCategoryId\":\"96\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0899825624001568\",\"RegionNum\":3,\"RegionCategory\":\"经济学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ECONOMICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Games and Economic Behavior","FirstCategoryId":"96","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0899825624001568","RegionNum":3,"RegionCategory":"经济学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ECONOMICS","Score":null,"Total":0}
Tight incentive analysis of Sybil attacks against the market equilibrium of resource exchange over general networks
The BitTorrent network, a well-known Internet-scale P2P system, applies the proportional response protocol to exchange resource, where each participant contributes resource to neighbors in proportion to the amount it received in the previous round. The dynamics of this protocol is known to converge to a market equilibrium. However, an agent may manipulate this protocol by a Sybil attack to create fictitious identities and control them to gain more benefit. We apply the concept of incentive ratio, the percentage of the new utility after a Sybil attack over the benchmark, to measure the incentive of a strategic agent to play a Sybil attack, proving a tight bound of two over general networks. This finding completes the theoretical picture for incentive analysis on Sybil attacks facing the legendary tit-for-tat protocol for Internet bandwidth sharing and other applications.
期刊介绍:
Games and Economic Behavior facilitates cross-fertilization between theories and applications of game theoretic reasoning. It consistently attracts the best quality and most creative papers in interdisciplinary studies within the social, biological, and mathematical sciences. Most readers recognize it as the leading journal in game theory. Research Areas Include: • Game theory • Economics • Political science • Biology • Computer science • Mathematics • Psychology