On Achieving Group-Strategyproof Multicast

In computer networks, multicast models a class of data dissemination applications, where a common data item is routed to multiple receivers simultaneously. The routing of multicast flows across the network may incur a cost, and such a cost is to be recovered from payments by receivers who enjoy the multicast service. In reality, a group of potential multicast receivers exist at different network locations. Each receiver has a valuation for receiving the multicast service, but such valuation is private information known to itself. A multicast scheme asks each potential receiver to report her valuation, then decides which subset of potential receivers to serve, how to route the multicast flow to them, and how much to charge each of them. A multicast scheme is stragegyproof if no receiver has incentive to lie about her true valuation. It is further group strategyproof if no group of colluding receivers has incentive to lie. We study multicast schemes that target group strategyproofness, in both directed and undirected networks. Our main results reveal that under group strategyproofness, a compromise is necessary in either routing optimality or budget balance. We also design multicast schemes that pursue maximum budget balance while guaranteeing group stragetyproofness and routing optimality.

[1]  Ivan J. Fair,et al.  Density Evolution for Nonbinary LDPC Codes Under Gaussian Approximation , 2009, IEEE Transactions on Information Theory.

[2]  Zongpeng Li,et al.  On achieving optimal throughput with network coding , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[3]  A. RÉNY,et al.  ON THE EXISTENCE OF A FACTOR OF DEGREE ONE OF A CONNECTED RANDOM GRAPH , 2004 .

[4]  Amit Agarwal,et al.  On the advantage of network coding for improving network throughput , 2004, ITW.

[5]  P. Erdos,et al.  On the existence of a factor of degree one of a connected random graph , 1966 .

[6]  Dimitri P. Bertsekas,et al.  Network optimization : continuous and discrete models , 1998 .

[7]  Éva Tardos,et al.  Group strategy proof mechanisms via primal-dual algorithms , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[8]  Joseph Naor,et al.  Non-Cooperative Multicast and Facility Location Games , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Wei Yu,et al.  A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Zongpeng Li,et al.  On achieving group strategyproof information dissemination in wireless networks , 2009, 2009 International Conference on Game Theory for Networks.

[11]  H. Moulin Cooperative Microeconomics: A Game-Theoretic Introduction , 1995 .

[12]  Yunnan Wu,et al.  Network planning in wireless ad hoc networks: a cross-Layer approach , 2005, IEEE Journal on Selected Areas in Communications.

[13]  Joan Feigenbaum,et al.  Sharing the Cost of Multicast Transmissions , 2001, J. Comput. Syst. Sci..

[14]  Muriel Médard,et al.  An algebraic approach to network coding , 2003, TNET.

[15]  Zongpeng Li,et al.  On achieving maximum multicast throughput in undirected networks , 2006, IEEE Transactions on Information Theory.

[16]  Philip Wolfe,et al.  Contributions to the theory of games , 1953 .

[17]  Mohammad R. Salavatipour,et al.  Packing Steiner trees , 2003, SODA '03.

[18]  Ki Hang Kim Game theory in the social sciences , 1986 .

[19]  Zongpeng Li,et al.  Efficient and distributed computation of maximum multicast rates , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[20]  Martin Thimm,et al.  On the approximability of the Steiner tree problem , 2003, Theor. Comput. Sci..

[21]  Nicole Immorlica,et al.  Limitations of cross-monotonic cost sharing schemes , 2005, SODA '05.

[22]  Oktay Günlük,et al.  The multicast packing problem , 2000, TNET.

[23]  H. Moulin,et al.  Strategyproof sharing of submodular costs:budget balance versus efficiency , 2001 .

[24]  Ravindra K. Ahuja,et al.  Network Flows: Theory, Algorithms, and Applications , 1993 .

[25]  Jochen Könemann,et al.  A group-strategyproof mechanism for Steiner forests , 2005, SODA '05.

[26]  Kathryn Fraughnaugh,et al.  Introduction to graph theory , 1973, Mathematical Gazette.

[27]  Zongpeng Li,et al.  A Constant Bound on Throughput Improvement of Multicast Network Coding in Undirected Networks , 2009, IEEE Transactions on Information Theory.

[28]  Christos H. Papadimitriou,et al.  Algorithms, Games, and the Internet , 2001, ICALP.

[29]  Muriel Médard,et al.  Achieving minimum-cost multicast: a decentralized approach based on network coding , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[30]  Vijay V. Vazirani,et al.  Applications of approximation algorithms to cooperative games , 2001, STOC '01.

[31]  Yu Wang,et al.  Truthful Multicast in Selfish Wireless Networks , 2004 .

[32]  Zongpeng Li,et al.  Min-Cost Multicast of Selfish Information Flows , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[33]  Miguel Castro,et al.  SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.

[34]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[35]  L. Shapley A Value for n-person Games , 1988 .

[36]  H. Moulin Dominance solvability and cournot stability , 1984 .