A Taxonomy of Incentive Patterns - The Design Space of Incentives for Cooperation

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Incentives Patterns . . . . . . . . . . . . . . . . . . . . . . . . 22.1 Relevance of Incentive Patterns . . . . . . . . . . . . . 32.2 Economic Incentive Patterns . . . . . . . . . . . . . . 32.3 General Characteristics of Incentive Patterns . . . . . 43 Trust Based Incentive Patterns . . . . . . . . . . . . . . . . . 63.1 The Collective Pattern . . . . . . . . . . . . . . . . . . 63.2 The Community Pattern . . . . . . . . . . . . . . . . . 74 Trade Based Incentive Patterns . . . . . . . . . . . . . . . . . 84.1 Immediate Action in Return . . . . . . . . . . . . . . 84.2 Deferred Action in Return . . . . . . . . . . . . . . . . 105 Taxonomy and Characteristics of Incentive Patterns . . . . . 145.1 A Taxonomy of Incentive Patterns . . . . . . . . . . . 145.2 Characteristics of Incentive Patterns . . . . . . . . . . 146 Incentive Patterns for DIANE: A Case Study . . . . . . . . . 166.1 Specifics of the Application Environment . . . . . . . 176.2 Applicable Incentive patterns for DIANE . . . . . . . 177 Related Work and Contribution . . . . . . . . . . . . . . . . . 198 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Acknowledgement 22Bibliography 23Glossary 26I

[1]  Yoav Shoham,et al.  A Dynamic Theory of Incentives in Multi-Agent Systems , 1997, IJCAI.

[2]  Philipp Obreiter,et al.  Economic Incentive Patterns and their Application to Ad Hoc Networks , 2003 .

[3]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[4]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[5]  Rita H. Wouhaybi,et al.  Incentive engineering in wireless LAN based access networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[6]  Philippe A. Janson,et al.  The State of the Art in Electronic Payment Systems , 1997, Computer.

[7]  Nadarajah Asokan,et al.  Fairness in electronic commerce , 1998, Research report / RZ / IBM / IBM Research Division / Zürich Research Laboratory.

[8]  Birgitta König-Ries,et al.  Information Services to Support E-Learning in Ad-hoc Networks , 2002, Wireless Information Systems.

[9]  Birgitta König-Ries,et al.  Stimulating Cooperative Behavior of Autonomous Devices: An Analysis of Requirements and Existing Approaches , 2003, Wireless Information Systems.

[10]  K. Spremann,et al.  Agency Theory, Information and Incentives , 1987 .

[11]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  H. Fulton University of Wales Press , 1991 .

[13]  M. F.,et al.  Bibliography , 1985, Experimental Gerontology.

[14]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[15]  Charles A. Wilson,et al.  The Nature of Equilibrium in Markets with Adverse Selection , 1980 .

[16]  Philipp Obreiter,et al.  Vertical Integration of Incentives for Cooperation Inter-layer Collaboration as a Prerequisite for Eectively Stimulating Cooperation in Ad Hoc Networks , 2003 .

[17]  A. Oram Peer-to-Peer , 2001 .

[18]  Panayotis Antoniadis,et al.  Market Models for P2P Content Distribution , 2002, AP2PC.

[19]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[20]  J. R. Commons,et al.  Legal foundations of capitalism , 1925 .

[21]  Karl Aberer,et al.  Trust-Aware Delivery of Composite Goods , 2003, DBISP2P.

[22]  Kevin Leyton-Brown,et al.  Incentives for sharing in peer-to-peer networks , 2001, EC '01.

[23]  Pietro Michiardi,et al.  Making greed work in mobile ad hoc networks , 2002 .

[24]  Forrest Capie A History of Money From Ancient Times to the Present Day (3rd Edn.) , 2003 .

[25]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[26]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[27]  G. Davies,et al.  A history of money : from ancient times to the present day , 1995 .

[28]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[29]  Bernardo A. Huberman,et al.  The ecology of computation , 1988, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.

[30]  K. Eric Drexler,et al.  Comparative Ecology: A Computational Perspective , 1988 .