skip to main content
research-article

An exercise in selfish stabilization

Published:12 December 2008Publication History
Skip Abstract Section

Abstract

Stabilizing distributed systems expect all the component processes to run predefined programs that are externally mandated. In Internet scale systems, this is unrealistic, since each process may have selfish interests and motives related to maximizing its own payoff. This article formulates the problem of selfish stabilization to show how competition blends with cooperation in a stabilizing environment.

References

  1. Arora, A. and Gouda, M. G. 1993. Closure and convergence: a foundation of fault-tolerant computing. IEEE Trans. Softw. Eng. 19, 11, 1015--1027. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aumann, R. 1959. Acceptable points in general cooperative n-person games. In Contributions to the Theory of Games IV. Annals of Math. Study.Google ScholarGoogle Scholar
  3. Cao, H., Ertin, E., Kulathumani, V., Sridharan, M., and Arora, A. 2006. Differential games in large-scale sensor-actuator networks. In Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN), J. A. Stankovic, P. B. Gibbons, S. B. Wicker, and J. A. Paradiso, Eds. ACM, New York, NY, 77--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cobb, J. A., Gouda, M. G., and Musunuri, R. 2003. A stabilizing solution to the stable path problem. In Self-Stabilizing Systems, S.-T. Huang and T. Herman, Eds. Lecture Notes in Computer Science, vol. 2704. Springer, Berlin, Heidelberg, Germany. 169--183. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dijkstra, E. W. 1974. Self-stabilizing systems in spite of distributed control. Comm. ACM 17, 11, 643--644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dolev, S. 2000. Self-Stabilization. MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dolev, S., Schiller, E., and Spirakis, P. 2006. Game authority: for robust distributed selfish-computer systems. Tech. rep., DELIS. http://delis.upb.de/docs/.Google ScholarGoogle Scholar
  8. Griffin, T., Shepherd, F. B., and Wilfong, G. T. 2002. The stable paths problem and interdomain routing. IEEE/ACM Trans. Netw. 10, 2, 232--243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Halpern, J. 2000. A computer scientist looks at game theory. In Proceedings of the 1st World Congress of the Game Theory Society (GAMES).Google ScholarGoogle Scholar
  10. Hoefer, M. 2006. Non-cooperative tree creation. In Proceedings of the 31st International Symposium on Mathematical Foundations of Computer Science (MFCS), R. Kralovic and P. Urzyczyn, Eds. Lecture Notes in Computer Science, vol. 4162. Springer, Berlin, Germany. 517--527. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Huang, S.-T. and Chen, N.-S. 1992. A self-stabilizing algorithm for constructing breadth-first trees. Inf. Process. Lett. 41, 2, 109--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Keidar, I., Melamed, R., and Orda, A. 2006. Equicast: scalable multicast with selfish users. In Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing (PODC). ACM, New York, NY, 63--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mavronicolas, M., Papadopoulou, V. G., Philippou, A., and Spirakis, P. G. 2005. A graph-theoretic network security game. In Proceedings of the 1st International Workshop on Internet and Network Economics (WINE), X. Deng and Y. Ye, Eds. Lecture Notes in Computer Science, vol. 3828. Springer, Berlin, Germany. 969--978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Milchtaich, I. 1996. Congestion games with player-specific payoff functions. Games Eco. Behav. 13, 1 (March), 111--124.Google ScholarGoogle Scholar
  15. Moscibroda, T., Schmid, S., and Wattenhofer, R. 2006a. On the topologies formed by selfish peers. In Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing (PODC). ACM, New York, NY, 133--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Moscibroda, T., Schmid, S., and Wattenhofer, R. 2006b. When selfish meets evil: byzantine players in a virus inoculation game. In Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing (PODC). ACM, New York, NY, 35--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nash, J. 1950. Equilibrium points in n-person games. In Proceedings of the National Academy of Sciences USA 36, 48--49.Google ScholarGoogle ScholarCross RefCross Ref
  18. Simon, H. 1982. Models of Bounded Rationality: Vols. 1 and 2. MIT Press.Google ScholarGoogle Scholar

Index Terms

  1. An exercise in selfish stabilization

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Transactions on Autonomous and Adaptive Systems
                ACM Transactions on Autonomous and Adaptive Systems  Volume 3, Issue 4
                November 2008
                171 pages
                ISSN:1556-4665
                EISSN:1556-4703
                DOI:10.1145/1452001
                Issue’s Table of Contents

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 12 December 2008
                • Accepted: 1 September 2008
                • Revised: 1 August 2008
                • Received: 1 March 2007
                Published in taas Volume 3, Issue 4

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Research
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader