A study of sybil manipulations in hedonic games

Hedonic games model agents that decide which other agents they will join, given some preferences on other agents. We study Sybil attacks on such games, by a malicious agent which introduces multiple false identities, so that the outcome of the game is more interesting for itself. First taking Nash stability as the solution concept, we consider two simple manipulations, and show that they are essentially the only possible Sybil manipulations. Moreover, small experiments show that they are seldom possible in random games. We exhibit another simple manipulation on the concepts of (contractual) individual stability afterwards. Then we show that such hedonic games are very sensitive to Sybil manipulations, which contrasts sharply with the Nash case.

[1]  Piotr Faliszewski,et al.  Cloning in Elections , 2010, AAAI.

[2]  Edith Elkind,et al.  False-Name Manipulations in Weighted Voting Games , 2014, J. Artif. Intell. Res..

[3]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[4]  Sarvapali D. Ramchurn,et al.  Trust in Multiagent Systems , 2004 .

[5]  Vincent Conitzer,et al.  Using Mechanism Design to Prevent False-Name Manipulations , 2010, AI Mag..

[6]  Samir Aknine,et al.  Coalition Formation Strategies for Self-Interested Agents in Hedonic Games , 2010, ECAI.

[7]  Michael Wooldridge,et al.  Hedonic coalition nets , 2009, AAMAS.

[8]  Piotr Faliszewski,et al.  Cloning in Elections: Finding the Possible Winners , 2011, J. Artif. Intell. Res..

[9]  Sarvapali D. Ramchurn,et al.  Trust in multi-agent systems , 2004, The Knowledge Engineering Review.

[10]  Makoto Yokoo,et al.  The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..

[11]  M. Trick,et al.  The computational difficulty of manipulating an election , 1989 .

[12]  Vincent Conitzer,et al.  False-name-proof matching , 2013, AAMAS.

[13]  Thomas F. La Porta,et al.  Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[14]  Toby Walsh,et al.  Where are the hard manipulation problems? , 2010, J. Artif. Intell. Res..

[15]  Vincent Conitzer,et al.  False-Name-Proofness in Social Networks , 2010, WINE.

[16]  Matthew O. Jackson,et al.  The Stability of Hedonic Coalition Structures , 2002, Games Econ. Behav..

[17]  Carmelo Rodríguez-Álvarez,et al.  Strategy-proof coalition formation , 2009, Int. J. Game Theory.

[18]  Coralio Ballester,et al.  NP-completeness in hedonic games , 2004, Games Econ. Behav..

[19]  Shao Chin Sung,et al.  Enemies and Friends in Hedonic Games: Individual Deviations, Stability and Manipulation , 2004 .

[20]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[21]  Grégory Bonnet A Protocol Based on a Game-Theoretic Dilemma to Prevent Malicious Coalitions in Reputation Systems , 2012, ECAI.

[22]  K. Arrow,et al.  Social Choice and Individual Values , 1951 .