| As one of brand new Internet technology, P2P networks are developingrapidly in recent years. Characterized by openness, autonomy, dynamics,anonymity and so on, P2P system is used more and more widely and receivingmore and more attention. One of main tasks of P2P system is resource sharing,such as computing ability, network bandwidth, storage space, resource service,etc. At the present, most of P2P networks are built based on the hypothesis thatthe users volunteer to provide the resources services which neglects the privatebehaviors of network users, and leads to the built system’s lacks of credit andmotivation mechanism, many questions arise such as free-riding, the tragedy ofthe commons, faked files and so on. It brings to many problems, for example,the system can’t make full use of the idle resource and can’t get healthy andsustainable developments. Based on the reasons mentioned above, it is essentialto build an effective regime for the P2P system.The academics pay great attention to P2P system. At present, most of theresearches are focused on the trust model and incentive mechanism design.Based on the spirit of mechanism design theory, this paper proposes twomechanisms, namely, serve node mechanism and consume node mechanism bysimulating the transaction mode in the commerce society. It regards the nodes ofP2P networks as participants of commerce society and regards resources of P2Pnetworks as goods of commerce society. There are two problems to be solved,which are information costs and incentive. According to the definition ofVCG(Vickrey-Clark-Groves) mechanism and the philosophy of incentivecompatibility, collecting rules and paying rules are designed. The problem whichmechanisms mainly solve is how to provide incentives to let competitors speaktrue words. This paper uses the mechanism of incentive compatibility whichbelongs to VCG mechanism.This paper introduces Peersim simulation platform, which can simulate alarge number of nodes. Pastry protocol and Peersim software package areimplanted into eclipse to run. The simulation results indicate the effectiveness and robustness of the mechanism on the conditions that malicious nodes areinvolved. |