A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks

Although direct reciprocity (Tit-for-Tat )c ontribu- tion systems have been successful in reducing freeloading in peer- to-peer overlays, it has been shown that, unless the contribution network is dense, they tend to be slow (or may even fail) to converge (1). On the other hand, current indirect reciprocity mechanisms based on reputation systems tend to be susceptible to sybil attacks, peer slander and whitewashing. In this paper we present PledgeRoute, an accounting mech- anism for peer contributions that is based on social capital. This mechanism allows peers to contribute resources to one set of peers and use this contribution to obtain services from a different set of peers, at a different time. PledgeRoute is completely decentralised, can be implemented in both structured and unstructured peer-to-peer systems, and it is resistant to the three kinds of attacks mentioned above. To achieve this, we model contribution transitivity as a routing problem in the contribution network of the peer-to-peer overlay, and we present arguments for the routing behaviour and the sybilproofness of our contribution transfer procedures on this basis. Additionally, we present mechanisms for the seeding of the contribution network, and a combination of incentive mechanisms and reciprocation policies that motivate peers to adhere to the protocol and maximise their service contributions to the overlay.

[1]  R. Trivers The Evolution of Reciprocal Altruism , 1971, The Quarterly Review of Biology.

[2]  Xin Yao,et al.  The Iterated Prisoners' Dilemma - 20 Years On , 2007, Advances in Natural Computation.

[3]  Béla Bollobás,et al.  Random Graphs: Notation , 2001 .

[4]  Dick H. J. Epema,et al.  An Amortized Tit-For-Tat Protocol for Exchanging Bandwidth instead of Content in P2P Networks , 2007, First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007).

[5]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[6]  Arun K. Somani,et al.  Reputation management framework and its use as currency in large-scale peer-to-peer networks , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[7]  R. K. Shyamasundar,et al.  Introduction to algorithms , 1996 .

[8]  Béla Bollobás,et al.  Random Graphs , 1985 .

[9]  Kostas G. Anagnostakis,et al.  Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[10]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[11]  W. Hamilton,et al.  The Evolution of Cooperation , 1984 .

[12]  Ion Stoica,et al.  Incentives for Cooperation in Peer-to-Peer Networks , 2003 .

[13]  Zhan Zhang,et al.  MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[14]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[15]  Nazareno Andrade,et al.  Influences on cooperation in BitTorrent communities , 2005, P2PECON '05.

[16]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[17]  J. Coleman,et al.  Social Capital in the Creation of Human Capital , 1988, American Journal of Sociology.

[18]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[19]  Arun Venkataramani,et al.  Do Incentives Build Robustness in BitTorrent? (Awarded Best Student Paper) , 2007, NSDI.

[20]  Flavio D. Garcia,et al.  Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications , 2005, ACNS.

[21]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[22]  Alice Cheng,et al.  Sybilproof reputation mechanisms , 2005, P2PECON '05.