Overcoming Rational Manipulation in Distributed Mechanism Implementations

Distributed systems are increasingly made up of nodes governed by disparate self-interested parties. These parties can be modeled as rational (in a game theoretic sense) utility-maximizing players that participate in a distributed algorithm. These rational nodes may choose to deviate from a given specification to increase their utility, but alternatively can be incented to correctly implement part of a distributed mechanism. In dealing with rational agents in distributed systems, computer science has taken a cue from the economics subfield of mechanism design (MD) with recent work in distributed algorithmic mechanism design (DAMD). Previously, work in MD and DAMD has focused on manipulation in agent strategy. However, there are other manipulations available to agents that can damage mechanism implementations. As designers begin to inject mechanism design ideas into distributed systems, non-manipulatability of mechanisms becomes more important. The main contributions of this paper are as follows: We identify four areas of manipulation in mechanism implementations, as well as environmental assumptions that can affect agent behavior. We introduce two properties for non-manipulatable mechanism implementations, communicationand algorithm compatibility, and identify techniques that can be used to achieve these properties. Our wider agenda is that future mechanism design implementation work (centralized or distributed) be done with consideration of these two non-manipulatability properties. To illustrate how this might be done, we demonstrate one way to bring communicationand algorithm compatibility to a well-defined lowest cost interdomain routing problem proposed by Feigenbaum, Papadimitriou, Sami, and Shenker (FPSS) [11]. Our approach does not add significant new processing or communication overhead to the distributed FPSS algorithm. Our end result is an incentive-compatible, communication-compatible, and algorithm-compatible distributed mechanism.

[1]  M. Yokoo Characterization of Strategy/False-name Proof Combinatorial Auction Protocols: Price-oriented, Rationing-free Protocol , 2003, IJCAI.

[2]  David C. Parkes,et al.  Rationality and Self-Interest in Peer to Peer Networks , 2003, IPTPS.

[3]  J. Feigenbaum,et al.  A BGP-based mechanism for lowest-cost routing , 2002, ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing.

[4]  Vincent Conitzer,et al.  Vote elicitation: complexity and strategy-proofness , 2002, AAAI/IAAI.

[5]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[6]  Subhash Suri,et al.  Vickrey prices and shortest paths: what is an edge worth? , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[7]  David C. Parkes,et al.  Achieving Budget-Balance with Vickrey-Based Payment Schemes in Exchanges , 2001, IJCAI.

[8]  Joan Feigenbaum,et al.  Sharing the Cost of Multicast Transmissions , 2001, J. Comput. Syst. Sci..

[9]  Gerhard Weiß,et al.  Antisocial Agents and Vickrey Auctions , 2001, ATAL.

[10]  Christos H. Papadimitriou,et al.  Algorithms, games, and the internet , 2001, STOC '01.

[11]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[12]  Jesse A. Schwartz,et al.  Collusive Bidding: Lessons from the FCC Spectrum Auctions , 2000 .

[13]  Gordon T. Wilfong,et al.  An analysis of BGP convergence properties , 1999, SIGCOMM '99.

[14]  Makoto Yokoo,et al.  A Limitation of the Generalized Vickrey Auction in Electronic Commerce: Robustness against False-name Bids , 1999, AAAI/IAAI.

[15]  Moshe Tennenholtz,et al.  Distributed Games: From Mechanisms to Protocols , 1999, AAAI/IAAI.

[16]  Gerald Fortney A private conversation , 1997 .

[17]  E. H. Clarke Multipart pricing of public goods , 1971 .

[18]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[19]  Makoto Yokoo,et al.  The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..

[20]  Felix Brandt,et al.  A verifiable, bidder-resolved Auction Protocol , 2002 .

[21]  David C. Parkes,et al.  Iterative combinatorial auctions: achieving economic and computational efficiency , 2001 .

[22]  David C. Parkes Iterative combinatorial auctions: achieving economic and computational efficiency (chapter 2) , 2001 .

[23]  T. Sandholm Limitations of the Vickrey Auction in Computational Multiagent Systems , 1996 .

[24]  G. Hardin,et al.  The Tragedy of the Commons , 1968, Green Planet Blues.