By Topic

Incentives Against Hidden Action in QoS Overlays

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Landa, R. ; Dept. of Electron. & Electr. Eng. Networks, Networks & Services Res. Lab., Univ. Coll. London, London ; Rio, M. ; Griffin, D. ; Clegg, R.
more authors

Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services from it. This is because server peers can choose to strategically minimize their effort, and client peers may be unable to distinguish between cases where the server exerted insufficient effort and cases where the server kept its advertised effort levels but the end-to-end conditions in the network were sufficiently adverse. We propose a principal-agent model for hidden action that gives server peers sufficient incentives to meet their advertised effort levels, without client peers having to decide for each transaction whether the outcome was due to server behavior or network conditions. This allows peers to draft contracts that provide incentives for truthful revelation of QoS capabilities, and to have predictable transaction quality. We then exemplify the model for the case of a mesh-based, pull-oriented streaming system with low delay requirements. For this case, we show how to estimate the model parameters a function of the prevailing network conditions, and how to enforce contract fulfillment through a reciprocative strategy.

Published in:

Peer-to-Peer Computing , 2008. P2P '08. Eighth International Conference on

Date of Conference:

8-11 Sept. 2008