A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications

In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to effectively complete certain tasks such as forwarding files, delivering messages, or uploading data. Nevertheless, users are selfish in nature and they may refuse to cooperate due to their concerns on energy and bandwidth consumption. Thus each user should receive a satisfying reward to compensate its resource consumption for cooperation. However, suitable incentive mechanisms that can meet the diverse requirements of users in dynamic and distributed P2P environments are still missing. On the other hand, we observe that Blockchain is a decentralized secure digital ledger of economic transactions that can be programmed to record not just financial transactions and Blockchain-based cryptocurrencies get more and more market capitalization. Therefore in this paper, we propose a Blockchain based truthful incentive mechanism for distributed P2P applications that applies a cryptocurrency such as Bitcoin to incentivize users for cooperation. In this mechanism, users who help with a successful delivery get rewarded. As users and miners in the Blockchain P2P system may exhibit selfish actions or collude with each other, we propose a secure validation method and a pricing strategy, and integrate them into our incentive mechanism. Through a game theoretical analysis and evaluation study, we demonstrate the effectiveness and security strength of our proposed incentive mechanism.

[1]  Alessandro Aldini,et al.  Virtual currency and reputation-based cooperation incentives in user-centric networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[2]  Levente Buttyán,et al.  Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[3]  Marcin Andrychowicz,et al.  Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[4]  Jason Teutsch,et al.  Demystifying Incentives in the Consensus Computer , 2015, CCS.

[5]  Prem Prakash Jayaraman,et al.  Using On-the-Move Mining for Mobile Crowdsensing , 2012, 2012 IEEE 13th International Conference on Mobile Data Management.

[6]  Raphael M. Reischuk,et al.  IKP: Turning a PKI Around with Decentralized Automated Incentives , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[7]  Mun Choon Chan,et al.  MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.

[8]  Janise McNair,et al.  In Vivo Evaluation of the Secure Opportunistic Schemes Middleware Using a Delay Tolerant Social Network , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[9]  Luca Foschini,et al.  Quantifying User Reputation Scores, Data Trustworthiness, and User Incentives in Mobile Crowd-Sensing , 2017, IEEE Access.

[10]  Hongyi Wu,et al.  Incentive-aware data dissemination in delay-tolerant mobile networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[11]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Luca Foschini,et al.  Crowdsensing with Social Network-Aided Collaborative Trust Scores , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[13]  Azzedine Boukerche,et al.  Opportunistic Routing in Wireless Networks: Models, Algorithms, and Classifications , 2014 .

[14]  Pedro Moreno-Sanchez,et al.  P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.

[15]  Levente Buttyán,et al.  Barter-based cooperation in delay-tolerant personal wireless networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[16]  Iddo Bentov,et al.  How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.

[17]  Mohsen Guizani,et al.  On WiFi Offloading in Heterogeneous Networks: Various Incentives and Trade-Off Strategies , 2016, IEEE Communications Surveys & Tutorials.

[18]  Christos H. Papadimitriou,et al.  Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.

[19]  Iddo Bentov,et al.  How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.

[20]  Jiguo Yu,et al.  An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets , 2014, IEEE Transactions on Cognitive Communications and Networking.

[21]  Suvadip Batabyal,et al.  Mobility Models, Traces and Impact of Mobility on Opportunistic Routing Algorithms: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[22]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[23]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[24]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[25]  Youngbin Im,et al.  SVC-TChain: Incentivizing good behavior in layered P2P video streaming , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[26]  Xiaodong Lin,et al.  A secure incentive scheme for delay tolerant networks , 2008, 2008 Third International Conference on Communications and Networking in China.

[27]  Rami Khalil,et al.  Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..

[28]  Marcin Andrychowicz,et al.  Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.

[29]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[30]  Honggang Zhang,et al.  Incentive mechanism for proximity-based Mobile Crowd Service systems , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[31]  Inseok Hwang,et al.  CoMon+: A Cooperative Context Monitoring System for Multi-Device Personal Sensing Environments , 2016, IEEE Transactions on Mobile Computing.

[32]  Kyunghan Lee,et al.  Mobile Data Offloading: How Much Can WiFi Deliver? , 2013, IEEE/ACM Transactions on Networking.

[33]  Lionel Brunie,et al.  Trust management and reputation systems in mobile participatory sensing applications: A survey , 2015, Comput. Networks.

[34]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[35]  Yang Gao,et al.  An incentive mechanism with privacy protection in mobile crowdsourcing systems , 2016, Comput. Networks.

[36]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[37]  Mahfoud Benchaïba,et al.  A survey of incentive mechanisms in static and mobile P2P systems , 2015, J. Netw. Comput. Appl..