.. .. Summary,

. Iii-s-e-l-f-i-s-h-n-e-s-s-i-n-j-e-c-t-i-o-n-a-n-a-ly-s-i-s-i-n-c-o-o-p-e-r-at-i-v-e-s-y-s-t-e-m-s, , p.155

. .. Seine-l, Modelling

. .. Seine, Injecting selfishness in PeerSim using

.. .. Summary,

. &lt;/xs, element> <xs:simpleType name="deviationType"> <xs:restriction base="xs:string"> <xs:enumeration value="timeout"/> <xs:enumeration value="subset"/> <xs:enumeration value="multicast

, <xs:element name="design_objectives"> <xs:complexType> <xs:sequence> <xs:element maxOccurs="unbounded" ref="objective"/> <xs:element maxOccurs=, </xs:restriction> </xs:simpleType> Design Objectives

, </xs:sequence> </xs:complexType> </xs:element> <xs:element name="objective"> <xs:complexType> <xs:attribute name=

. &lt;/xs, complexType> </xs:element> <xs:element name="custom_objective"> <xs:complexType> <xs:attribute name=

. &lt;/xs, xs:string"> <xs:enumeration value="cooperation_level"/> <xs:enumeration value="cooperation_persistence"/> <xs:enumeration value="cooperation_attractiveness"/> <xs:enumeration value="audit_precision"/> <xs:enumeration value="audit_recall"/> <xs:enumeration value=, complexType> </xs:element> <xs:simpleType name="objId"> <xs:restriction base=

, </xs:restriction> </xs:simpleType> <xs:simpleType name="objPredicate"> <xs:restriction base="xs:string"> <xs:enumeration value="at_least"/> <xs:enumeration value="at_most

, </xs:restriction> </xs:simpleType> </xs:schema>

B. Live,

, The Network Simulator -ns-2

, Omnet++ -discrete event simulator

. Pplive,

, The Racoon Framework

, The SETI@Home Problem, 2000.

, SETI@home Frequently Asked Questions, 2002.

, BOINC stats, 2009.

. Primegrid-online-forum, Cheaters' credits rescinded, 2013.

, World Cummunity Grid online forum, 2013.

, BOINC user survey results, 2016.

I. Abraham, D. Dolev, R. Gonen, and J. Halpern, Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation, Proceedings of the 25th annual ACM symposium on Principles of distributed computing, pp.53-62, 2006.

P. Aditya, M. Zhao, Y. Lin, A. Haeberlen, P. Druschel et al., Reliable client accounting for p2p-infrastructure hybrids, Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp.8-8, 2012.

S. Amitanand, L. Aiyer, A. Alvisi, M. Clement, J. Dahlin et al., Bar fault tolerance for cooperative services, ACM SIGOPS operating systems review, vol.39, pp.45-58, 2005.

J. and A. E. Kamal, Routing techniques in wireless sensor networks: a survey, IEEE wireless communications, vol.11, issue.6, pp.6-28, 2004.

L. Anderegg and S. Eidenbenz, Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents, Proceedings of the 9th annual international conference on Mobile computing and networking, 2003.

. David-p-anderson, Boinc: A system for public-resource computing and storage, Proceedings. 5th IEEE/ACM International Workshop on, pp.4-10, 2004.

J. David-p-anderson, E. Cobb, M. Korpela, D. Lebofsky, and . Werthimer, Seti@ home: an experiment in public-resource computing, Communications of the ACM, vol.45, issue.11, pp.56-61, 2002.

C. Antonio-fernández-anta, M. A. Georgiou, and . Mosteiro, Algorithmic mechanisms for internet-based master-worker computing with untrusted and selfish workers, Parallel & Distributed Processing (IPDPS), pp.1-11, 2010.

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE transactions on dependable and secure computing, vol.1, issue.1, pp.11-33, 2004.

S. Bansal and M. Baker, Observation-based cooperation enforcement in ad hoc networks, 2003.

A. Salman, H. Baset, and . Schulzrinne, An analysis of the skype peer-to-peer internet telephony protocol, 2004.

A. Basu, S. Fleming, J. Stanier, S. Naicken, I. Wakeman et al., The state of Peer-to-Peer network simulators, ACM Computing Surveys (CSUR), vol.45, issue.4, 2013.

M. Belenkiy, M. Chase, C. Erway, J. Jannotti, A. Küpçü et al., Making p2p accountable without losing privacy, Proceedings of the 2007 ACM workshop on Privacy in electronic society, pp.31-40, 2007.

S. Ben-mokhtar, A. Pace, and V. Quema, Firespam: Spam resilient gossiping in the bar model, Reliable Distributed Systems, 2010 29th IEEE Symposium on, pp.225-234, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00945724

S. Ben-mokhtar, G. Berthou, A. Diarra, V. Quéma, and A. Shoker, Rac: a freerider-resilient, scalable, anonymous communication protocol, Distributed Computing Systems (ICDCS), pp.520-529, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00945795

S. Ben-mokhtar, J. Decouchant, and V. Quéma, Acting: Accurate freerider tracking in gossip, 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, pp.291-300
URL : https://hal.archives-ouvertes.fr/hal-01198451

, IEEE, 2014.

L. Naouel-ben-salem, J. Buttyán, M. Hubaux, and . Jakobsson, Node cooperation in hybrid ad hoc networks. Mobile Computing, IEEE Transactions on, vol.5, issue.4, 2006.

. Radu-mihai and . Berciu, Designing incentives in P2P systems, 2013.

A. Blanc, Y. Liu, and A. Vahdat, Designing incentives for peer-to-peer routing, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.1, pp.374-385, 2005.

T. Buchert, C. Ruiz, L. Nussbaum, and O. Richard, A survey of general-purpose experiment management tools for distributed systems, Future Generation Computer Systems, vol.45, pp.1-12, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01087519

L. Buttyán and J. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, 2001.

L. Buttyán and J. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, Mobile Networks and Applications, vol.8, issue.5, pp.579-592, 2003.

L. Buttyán and J. Hubaux, Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing, 2007.

L. Buttyán, L. Dóra, M. Félegyházi, and I. Vajda, Barter trade improves message delivery in opportunistic networks, Ad Hoc Networks, vol.8, issue.1, pp.1-14, 2010.

F. Cappello, E. Caron, M. Dayde, F. Desprez, Y. Jégou et al., Grid'5000: a large scale and highly reconfigurable grid experimental testbed, Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, pp.99-106, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00684943

D. Christopher, R. Carothers, . Lafortune, D. William, M. Smith et al., A case study in modeling large-scale peer-to-peer file-sharing networks using discrete-event simulation, Proceedings of the 2006 European of Modeling and Simulation Symposium which is part of the I3M Multiconference), 2006.

A. Carzaniga, A. Gorla, and M. Pezzè, Handling software faults with redundancy, Architecting Dependable Systems VI, pp.148-171, 2009.

M. Castro and B. Liskov, Practical byzantine fault tolerance and proactive recovery, ACM Transactions on Computer Systems (TOCS), vol.20, issue.4, pp.398-461, 2002.

B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson et al., Planetlab: an overlay testbed for broad-coverage services, ACM SIGCOMM Computer Communication Review, vol.33, issue.3, pp.3-12, 2003.

P. Byung-gon-chun, S. Maniatis, J. Shenker, and . Kubiatowicz, Attested append-only memory: Making adversaries stick to their word, In ACM SIGOPS Operating Systems Review, vol.41, pp.189-204, 2007.

G. Ciccarelli and R. Lo-cigno, Collusion in peer-to-peer systems, Computer Networks, vol.55, issue.15, pp.3517-3532, 2011.

, White paper: Cisco vni forecast and methodology, 2015.

B. Cohen, Incentives build robustness in bittorrent, Workshop on Economics of Peer-to-Peer systems, vol.6, pp.68-72, 2003.

H. Thomas,

C. E. Cormen, R. L. Leiserson, C. Rivest, and . Stein, Introduction to algorithms, vol.6, 2001.

P. Landon, B. D. Cox, and . Noble, Samsara: Honor among thieves in peer-to-peer storage, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.120-132, 2003.

P. Landon, . Cox, D. Christopher, B. D. Murray, and . Noble, Pastiche: Making backup cheap and easy, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.285-298, 2002.

K. Czarnecki, S. Helsen, and U. Eisenecker, Staged configuration using feature models, Software Product Lines, pp.266-283, 2004.

J. Peter and . Denning, Acm president's letter: What is experimental computer science?, Communications of the ACM, vol.23, issue.10, pp.543-544, 1980.

J. Peter and . Denning, Acm president's letter: performance analysis: experimental computer science as its best, Communications of the ACM, vol.24, issue.11, pp.725-727, 1981.

A. Diarra, S. B. Mokhtar, P. Aublin, and V. Quéma, Fullreview: Practical accountability in presence of selfish nodes -technical report

A. Diarra, S. B. Mokhtar, P. Aublin, and V. Quéma, Fullreview: Practical accountability in presence of selfish nodes, 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, pp.271-280, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01301079

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, DTIC Document, 2004.

. John-r-douceur, The sybil attack. In Peer-to-peer Systems, 2002.

K. Fall, A delay-tolerant network architecture for challenged internets, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pp.27-34, 2003.

J. Feigenbaum and S. Shenker, Distributed algorithmic mechanism design: Recent results and future directions, 2002.

A. Jerome, W. Feldman, and . Sutherland, Rejuvenating experimental computer science: a report to the national science foundation and others, Communications of the ACM, vol.22, issue.9, pp.497-502, 1979.

M. Feldman and J. Chuang, Overcoming free-riding behavior in peer-to-peer systems, ACM SIGecom Exchanges, vol.5, issue.4, 2005.

M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica, Free-riding and whitewashing in peer-to-peer systems. Selected Areas in Communications, IEEE Journal on, vol.24, issue.5, 2006.

R. Filman, T. Elrad, S. Clarke, and M. Ak?it, Aspect-Oriented software development, 2004.

I. Foster, C. Kesselman, and S. Tuecke, The anatomy of the grid: Enabling scalable virtual organizations, International journal of high performance computing applications, vol.15, issue.3, pp.200-222, 2001.

J. Freudiger, M. H. Manshaei, J. Hubaux, and D. Parkes, On noncooperative location privacy: a game-theoretic analysis, Proceedings of the 16th ACM conference on Computer and communications security, pp.324-337, 2009.

R. Friedman, A. Libov, and Y. Vigfusson, Molstream: A modular rapid development and evaluation framework for live p2p streaming, Distributed Computing Systems (ICDCS), 2014.

, IEEE 34th International Conference on, pp.278-287, 2014.

R. Friedman, A. Libov, and Y. Vigfussony, Distilling the ingredients of p2p live streaming systems, Peer-to-Peer Computing (P2P), 2015 IEEE International Conference on, pp.1-10, 2015.

W. Galuba, K. Aberer, Z. Despotovic, and W. Kellerer, Protopeer: a p2p toolkit bridging the gap between simulation and live deployement, Proceedings of the 2nd International Conference on Simulation Tools and Techniques, vol.60, 2009.

D. Flavio, J. Garcia, and . Hoepman, Off-line karma: A decentralized currency for peer-topeer and grid applications, International Conference on Applied Cryptography and Network Security, pp.364-377, 2005.

G. Gianini, E. Damiani, R. Tobias, D. Mayer, H. Coquil et al.,

, Many-player inspection games in networked environments, 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST), pp.1-6, 2013.

G. Gianini, M. Cremonini, A. Rainini, G. L. Cota, and L. G. Fossi, A game theoretic approach to vulnerability patching, Information and Communication Technology Research (ICTRC), International Conference on, pp.88-91, 2015.

D. Goldschlag, M. Reed, and P. Syverson, Onion routing, Communications of the ACM, vol.42, issue.2, pp.39-41, 1999.

M. Gramaglia, M. Urueña, and I. Martinez-yelmo, Off-line incentive mechanism for long-term p2p backup storage, Computer Communications, vol.35, issue.12, pp.1516-1526, 2012.

R. Guerraoui, K. Huguenin, A. Kermarrec, M. Monod, and S. Prusty, Lifting: lightweight freerider-tracking in gossip, Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, pp.313-333, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00505268

R. Gupta, K. Arun, and . Somani, Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networks, Proceedings. 11th International Conference on, vol.1, 2005.

J. Gustedt, E. Jeannot, and M. Quinson, Experimental validation in large-scale systems: a survey of methodologies, Parallel Processing Letters, 2009.

F. Lamia-haddi and M. Benchaïba, A survey of incentive mechanisms in static and mobile p2p systems, Journal of Network and Computer Applications, vol.58, pp.108-118, 2015.

A. Haeberlen, P. Kouznetsov, and P. Druschel, Peerreview: Practical accountability for distributed systems, ACM SIGOPS operating systems review, vol.41, pp.175-188, 2007.

A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel, Accountable virtual machines, OSDI, pp.119-134, 2010.

A. Sidath-b-handurukande, F. L. Kermarrec, L. Fessant, S. Massoulié, and . Patarin, Peer sharing behaviour in the edonkey network, and implications for the design of server-less file sharing systems, vol.40, 2006.

O. Hasan, L. Brunie, E. Bertino, and N. Shang, A decentralized privacy preserving reputation protocol for the malicious adversarial model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.949-962, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01339185

M. Thomas-r-henderson, . Lacage, F. George, C. Riley, J. Dowell et al., Network simulations with the ns-3 simulator, SIGCOMM demonstration, vol.15, p.17, 2008.

V. Heorhiadi, H. Shriram-rajagopalan, . Jamjoom, K. Michael, V. Reiter et al., Gremlin: systematic resilience testing of microservices, Distributed Computing Systems (ICDCS), pp.57-66, 2016.

E. Hernandez-orallo, M. Olmos, J. Cano, C. T. Calafate, and P. Manzoni, Cocowa: a collaborative contact-based watchdog for detecting selfish nodes, IEEE Transactions on Mobile Computing, vol.14, issue.6, pp.1162-1175, 2015.

K. Hoffman, D. Zage, and C. Nita-rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys (CSUR), vol.42, issue.1, 2009.

E. John, R. Hopcroft, J. D. Motwani, and . Ullman, Introduction to automata theory, languages, and computation, vol.32, pp.60-65, 2001.

Y. Hu, D. Dong, J. Li, and F. Wu, Efficient and incentive-compatible resource allocation mechanism for p2p-assisted content delivery systems, Future Generation Computer Systems, vol.29, issue.6, pp.1611-1620, 2013.

C. Hua, Y. Mao, H. Jinqiang, D. Haiqing, and L. Xiaoming, Maze: a social peer-to-peer network, E-Commerce Technology for Dynamic E-Business, pp.290-293, 2004.

D. Hughes, G. Coulson, and J. Walkerdine, Free riding on gnutella revisited: the bell tolls? IEEE distributed systems online, vol.6, 2005.

N. Idika and A. P. Mathur, A survey of malware detection techniques, p.48, 2007.

R. Jansen, N. Hopper, and Y. Kim, Recruiting new tor relays with braids, Proceedings of the 17th ACM conference on Computer and communications security, pp.319-328, 2010.

H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. Fallah, A secure creditbased cooperation stimulating mechanism for manets using hash chains, Future Generation Computer Systems, vol.25, issue.8, 2009.

M. Jelasity, S. Voulgaris, R. Guerraoui, A. Kermarrec, and M. Van-steen, Gossip-based peer sampling, ACM Transactions on Computer Systems (TOCS), vol.25, issue.3, 2007.

M. Jelasity, A. Montresor, and O. Babaoglu, A modular paradigm for building selforganizing peer-to-peer applications, Engineering Self-Organizing Systems Workshop (ESOA), pp.265-282, 2009.

S. Jun and M. Ahamad, Incentives in bittorrent induce free riding, Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pp.116-121, 2005.

M. T. Sepandar-d-kamvar, H. Schlosser, and . Garcia-molina, The eigentrust algorithm for reputation management in p2p networks, Proceedings of the 12th international conference on World Wide Web, 2003.

J. Katz, Bridging game theory and cryptography: Recent results and future directions, Theory of Cryptography Conference, pp.251-272, 2008.

A. Kermarrec, L. Massoulié, and A. J. Ganesh, Probabilistic reliable dissemination in large-scale systems, IEEE Transactions on Parallel and Distributed systems, vol.14, issue.3, pp.248-258, 2003.

G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm et al., An overview of AspectJ, European Conf. on Object-Oriented Programming, 2001.

C. E. Killian, J. W. Anderson, R. Braud, R. Jhala, and A. Vahdat, Mace: language support for building distributed systems, In ACM SIGPLAN Notices, vol.42, pp.179-188, 2007.

D. Koller, N. Megiddo, and B. V. Stengel, Fast algorithms for finding randomized strategies in game trees, Proceedings of the 26th annual ACM symposium on Theory of computing, pp.750-759, 1994.

Z. Kong and Y. Kwok, Efficient wireless packet scheduling in a non-cooperative environment: Game theoretic analysis and algorithms, Journal of Parallel and Distributed Computing, vol.70, issue.8, pp.790-799, 2010.

, Hartmut König. Protocol Engineering, 2012.

E. Koutrouli and A. Tsalgatidou, Taxonomy of attacks and defense mechanisms in p2p reputation systems-lessons for reputation system designers, Computer Science Review, vol.6, issue.2, pp.47-70, 2012.

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton et al., Oceanstore: An architecture for global-scale persistent storage, ACM Sigplan Notices, vol.35, issue.11, pp.190-201, 2000.

Y. Kwok, K. Hwang, and S. Song, Selfish grids: Game-theoretic modeling and nas/psa benchmark evaluation, IEEE Transactions on Parallel and Distributed Systems, vol.18, issue.5, pp.621-636, 2007.

. Butler-w-lampson, Computer security in the real world, Computer, vol.37, issue.6, pp.37-46, 2004.

S. B. Guido-lena-cota, J. Mokhtar, G. Lawall, G. Muller, E. Gianini et al., A framework for the design configuration of accountable selfish-resilient peer-to-peer systems, Reliable Distributed Systems (SRDS), IEEE 34th Symposium on, pp.276-285

, IEEE, 2015.

J. K. Lenstra, Local search in combinatorial optimization, 2003.

L. Leonini, É. Rivière, and P. Felber, Splay: Distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze), NSDI, vol.9, pp.185-198, 2009.

D. Levin, R. John, J. R. Douceur, T. Lorch, and . Moscibroda, Trinc: Small trusted hardware for large distributed systems, NSDI, vol.9, pp.1-14, 2009.

B. N. Levine, C. Shields, and . Boris-margolin, A survey of solutions to the sybil attack, 2006.

C. Harry, A. Li, E. L. Clement, J. Wong, I. Napper et al., Bar gossip, Proceedings of the 7th symposium on Operating systems design and implementation, pp.191-204, 2006.

C. Harry, A. Li, M. Clement, M. Marchetti, L. Kapritsos et al., Flightpath: Obedience vs. choice in cooperative services, OSDI, vol.8, 2008.

Q. Li, S. Zhu, and G. Cao, Routing in socially selfish delay tolerant networks, INFOCOM, 2010 Proceedings IEEE, pp.1-9, 2010.

Q. Lian, Z. Zhang, M. Yang, Y. Ben, Y. Zhao et al., An empirical study of collusion behavior in the maze p2p file-sharing system, 27th International Conference on Distributed Computing Systems (ICDCS'07), pp.56-56, 2007.

J. Liang, R. Kumar, Y. Xi, and K. Ross, Pollution in p2p file sharing systems, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.2, pp.1174-1185, 2005.

T. Locher, P. Moor, S. Schmid, and R. Wattenhofer, Free riding in bittorrent is cheap, Proc. Workshop on Hot Topics in Networks (HotNets), pp.85-90, 2006.

N. Looker, M. Munro, and J. Xu, Ws-fit: A tool for dependability analysis of web services, 2004.

R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, Experiences applying game theory to system design, Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems, pp.183-190, 2004.

M. Mohamed, X. Mahmoud, and . Shen, A secure payment scheme with low communication and processing overhead for multihop wireless networks. Parallel and Distributed Systems, IEEE Transactions on, vol.24, issue.2, 2013.

J. George and . Mailath, Do people play nash equilibrium? lessons from evolutionary game theory, Journal of Economic Literature, vol.36, issue.3, pp.1347-1374, 1998.

S. Marti and H. Garcia-molina, Taxonomy of trust: Categorizing p2p reputation systems, Computer Networks, vol.50, issue.4, pp.472-484, 2006.

R. Tobias, D. Mayer, C. Coquil, H. Schoernich, and . Kosch, Rcourse: a robustness benchmarking suite for publish/subscribe overlay simulations with peersim, Proceedings of the First Workshop on P2P and Dependability, p.3, 2012.

J. Mccoy, , 2001.

A. Mei and J. Stefa, Give2get: Forwarding in social mobile wireless networks of selfish individuals, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.4, pp.569-582, 2012.

J. Miao, O. Hasan, S. B. Mokhtar, L. Brunie, and K. Yim, An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing, International Journal of Information Management, vol.33, issue.2, pp.252-262, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01351700

N. Michalakis, R. Soulé, and R. Grimm, Ensuring content integrity for untrusted peer-to-peer content distribution networks, Proceedings of the 4th USENIX conference on Networked systems design & implementation, pp.11-11, 2007.

C. John, V. Mitchell, and . Teague, Autonomous nodes and distributed mechanisms, Software Security-Theories and Systems, pp.58-83, 2003.

A. Montresor and M. Jelasity, Peersim: A scalable p2p simulator, IEEE 9th International Conference on Peer-to-Peer Computing, pp.99-100, 2009.

H. Mousa, S. B. Mokhtar, O. Hasan, O. Younes, M. Hadhoud et al., Trust management and reputation systems in mobile participatory sensing applications: A survey, Computer Networks, vol.90, pp.49-73, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01952236

. Roger-b-myerson, Game theory, 2013.

S. Naicken, A. Basu, B. Livingston, and S. Rodhetbhai, A survey of peerto-peer network simulators, Proceedings of The 7th Annual Postgraduate Symposium, vol.2, 2006.

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

A. Nandi, T. Ngan, A. Singh, P. Druschel, and D. S. Wallach, Scrivener: Providing incentives in cooperative content distribution systems, Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware, pp.270-291, 2005.

T. J. Ngan, D. S. Wallach, and P. Druschel, Incentives-compatible peer-to-peer multicast, 2004.

R. Tsuen-wan-ngan, D. S. Dingledine, and . Wallach, Building incentives into tor, International Conference on Financial Cryptography and Data Security, pp.238-256, 2010.

T. Ngan, A. Nandi, A. Singh, D. S. Wallach, and P. Druschel, On designing incentives-compatible peer-to-peer systems, 2004.

S. J. Nielson, A. Scott, D. S. Crosby, and . Wallach, A taxonomy of rational attacks, International Workshop on Peer-to-Peer Systems, pp.36-46, 2005.

N. Nisan and A. Ronen, Algorithmic mechanism design, Proceedings of the 31st annual ACM symposium on Theory of computing, pp.129-140, 1999.

N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic game theory, vol.1, 2007.

P. Obreiter, B. König-ries, and M. Klein, Stimulating cooperative behavior of autonomous devices: An analysis of requirements and existing approaches, 2003.

F. A. Joao, Í. Oliveira, . Cunha, C. Eliseu, . Miguel et al., Can peer-to-peer live streaming systems coexist with free riders, IEEE P2P 2013

, Proceedings, pp.1-5, 2013.

E. Palomar, A. Alcaide, A. Ribagorda, and Y. Zhang, The peer's dilemma: A general framework to examine cooperation in pure peer-to-peer systems, Computer Networks, vol.56, issue.17, 2012.

C. Papadimitriou, Algorithms, games, and the internet, Proceedings of the 33rd annual ACM symposium on Theory of computing, pp.749-753, 2001.

G. Thanasis, G. D. Papaioannou, and . Stamoulis, Reputation-based policies that provide the right incentives in peer-to-peer environments, Computer Networks, vol.50, issue.4, pp.563-578, 2006.

J. Park and M. Van-der-schaar, Pricing and incentives in peer-to-peer networks, 2010.

T. Parr, The definitive ANTLR 4 reference, 2013.

A. Passarella, A survey on content-centric technologies for the current internet: Cdn and p2p solutions, Computer Communications, vol.35, issue.1, pp.1-32, 2012.

M. Piatek, A. Krishnamurthy, A. Venkataramani, Y. R. Yang, D. Zhang et al., Contracts: Practical contribution incentives for p2p live streaming, NSDI, pp.81-94, 2010.

D. Qiu and R. Srikant, Modeling and performance analysis of bittorrent-like peerto-peer networks, ACM SIGCOMM computer communication review, vol.34, pp.367-378

R. Rahman, T. Vinkó, D. Hales, J. Pouwelse, and H. Sips, Design space analysis for modeling incentives in distributed systems, In ACM SIGCOMM Computer Communication Review, vol.41, 2011.

R. Rodrigues and P. Druschel, Peer-to-peer systems, Communications of the ACM, vol.53, issue.10, pp.72-82, 2010.

G. Ruffo and R. Schifanella, Fairpeers: Efficient profit sharing in fair peer-to-peer market places, Journal of Network and Systems Management, vol.15, issue.3, pp.355-382, 2007.

N. Samian, Z. Ahmad-zukarnain, K. G. Winston, A. Seah, Z. Abdullah et al., Cooperation stimulation mechanisms for wireless multihop networks: A survey, Journal of Network and Computer Applications, vol.54, 2015.

R. Sandhu and X. Zhang, Peer-to-peer access control architecture using trusted computing technology, Proceedings of the 10th ACM symposium on Access control models and technologies, pp.147-158, 2005.

A. Sangroya, D. Serrano, and S. Bouchenak, Benchmarking dependability of mapreduce systems, Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on, pp.21-30, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00950645

K. Scarfone and P. Mell, Guide to intrusion detection and prevention systems (idps). NIST special publication, vol.800, p.94, 2007.

A. Schaub, R. Bazin, O. Hasan, and L. Brunie, A trustless privacy-preserving reputation system, IFIP International Information Security and Privacy Conference, pp.398-411
URL : https://hal.archives-ouvertes.fr/hal-01369572

. Springer, , 2016.

B. Schneier and J. Kelsey, Cryptographic support for secure logs on untrusted machines, USENIX Security, 1998.

H. Shen and Z. Li, Arm: An account-based hierarchical reputation management system for wireless ad hoc networks, Distributed Computing Systems Workshops, 2008. ICDCS'08. 28th International Conference on, 2008.

J. Shneidman, C. David, and . Parkes, Rationality and self-interest in peer to peer networks, International Workshop on Peer-to-Peer Systems, pp.139-148, 2003.

J. Shneidman, C. David, and . Parkes, Specification faithfulness in networks with rational nodes, Proceedings of the 23rd annual ACM symposium on Principles of distributed computing, 2004.

C. Siaterlis, A. P. Garcia, and B. Genge, On the use of emulab testbeds for scientifically rigorous experiments, IEEE Communications Surveys & Tutorials, vol.15, issue.2, pp.929-942, 2013.

T. Silverston, O. Fourmaux, and J. Crowcroft, Towards an incentive mechanism for peer-to-peer multimedia live streaming systems, 8th International Conference on Peer-to-Peer Computing, pp.125-128, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01303447

A. Singh, P. Tsuen-wan-ngan, D. S. Druschel, and . Wallach, Eclipse attacks on overlay networks: Threats and defenses, IEEE INFOCOM. Citeseer, 2006.

M. Sirivianos, J. H. Park, X. Yang, and S. Jarecki, Dandelion: Cooperative content distribution with robust incentives, USENIX Annual Technical Conference, vol.7, 2007.

S. Traverso, L. Abeni, R. Birke, C. Kiraly, E. Leonardi et al., Experimental comparison of neighborhood filtering strategies in unstructured p2p-tv systems, IEEE 12th International Conference on Peer-to-Peer Computing (P2P), pp.13-24, 2012.

R. Trestian, O. Ormond, and G. Muntean, Game theory-based network selection: Solutions and challenges, IEEE Communications surveys & tutorials, vol.14, issue.4, pp.1212-1231, 2012.

A. Vahdat, K. Yocum, K. Walsh, P. Mahadevan, D. Kosti? et al., Scalability and accuracy in a large-scale network emulator, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.271-284, 2002.

V. Athanasios, Y. Vasilakos, T. Zhang, and . Spyropoulos, Delay tolerant networks: Protocols and applications, 2016.

V. Vishnumurthy, S. Chandrakumar, and E. Sirer, Karma: A secure economic framework for peer-to-peer resource sharing, Workshop on Economics of Peer-to-Peer Systems, p.35, 2003.

Y. Wang, A. Nakao, V. Athanasios, J. Vasilakos, and . Ma, P2p soft security: On evolutionary dynamics of p2p incentive mechanism, Computer Communications, vol.34, issue.3, pp.241-249, 2011.

W. Jörgen and . Weibull, Evolutionary game theory, 1997.

B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad et al., An integrated experimental environment for distributed systems and networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.255-270, 2002.

Z. Xiao and Y. Xiao, Peerreview re-evaluation for accountability in distributed systems or networks, International Journal of Security and Networks, vol.7, issue.1, pp.40-58, 2012.

M. Yang, Z. Zhang, X. Li, and Y. Dai, An empirical study of free-riding behavior in the maze p2p file-sharing system, International Workshop on Peer-to-Peer Systems, pp.182-192

. Springer, , 2005.

Y. Yoo and . Dharma, Why does it pay to be selfish in a manet?, vol.13, pp.87-97, 2006.

R. Aydan, J. Yumerefendi, and . Chase, Trust but verify: accountability for network services, Proceedings of the 11th workshop on ACM SIGOPS European workshop, p.37, 2004.

R. Aydan, J. Yumerefendi, and . Chase, The role of accountability in dependable distributed systems, Proceedings of HotDep, vol.5, pp.3-3, 2005.

R. Aydan, J. Yumerefendi, and . Chase, Strong accountability for network storage, ACM Transactions on Storage (TOS), vol.3, issue.3, p.11, 2007.

M. Yurkewych, N. Brian, A. Levine, and . Rosenberg, On the cost-ineffectiveness of redundancy in commercial p2p computing, Proceedings of the 12th ACM conference on Computer and communications security, 2005.

M. Zghaibeh, C. Fotios, and . Harmantzis, Revisiting free riding and the tit-for-tat in bittorrent: A measurement study. Peer-to-Peer Networking and Applications, vol.1, pp.162-173, 2008.

M. Zghaibeh, G. Kostas, F. Anagnostakis, and . Harmantzis, The behavior of free riders in bit torrent networks, Handbook of Peer-to-Peer Networking, pp.1207-1230, 2010.

. Bridge-qiao, . Zhao, C. S. John, D. Lui, and . Chiu, A mathematical framework for analyzing adaptive incentive protocols in p2p networks, IEEE/ACM Transactions on Networking, vol.20, issue.2, pp.367-380, 2012.

S. Zhong, J. Chen, and Y. R. Yang, Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks, INFOCOM 2003. 22nd Annual Joint Conference of the IEEE Computer and Communications, vol.3, pp.1987-1997, 2003.

R. Zhou and K. Hwang, Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. Parallel and Distributed Systems, IEEE Transactions on, vol.18, issue.4, 2007.

R. Zhou, K. Hwang, and M. Cai, Gossiptrust for fast reputation aggregation in peer-to-peer networks. Knowledge and Data Engineering, IEEE Transactions on, vol.20, issue.9, 2008.

H. Zhu, X. Lin, R. Lu, and X. Shen, A secure incentive scheme for delay tolerant networks, Communications and Networking in China, pp.23-28, 2008.

H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks, IEEE Transactions on Vehicular Technology, vol.58, issue.8, pp.4628-4639, 2009.