Next Article in Journal
On Information Aggregation and Interim Efficiency in Networks
Previous Article in Journal
Interdependent Defense Games with Applications to Internet Security at the Level of Autonomous Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Swap Equilibria under Link and Vertex Destruction

by
Lasse Kliemann
*,
Elmira Shirazi Sheykhdarabadi
and
Anand Srivastav
Department of Computer Science, Kiel University, Christian-Albrechts-Platz 4, 24118 Kiel, Germany
*
Author to whom correspondence should be addressed.
Games 2017, 8(1), 14; https://doi.org/10.3390/g8010014
Submission received: 3 December 2016 / Revised: 6 February 2017 / Accepted: 14 February 2017 / Published: 22 February 2017

Abstract

:
We initiate the study of the destruction or adversary model (Kliemann 2010) using the swap equilibrium (SE) stability concept (Alon et al., 2010). The destruction model is a network formation game incorporating the robustness of a network under a more or less targeted attack. In addition to bringing in the SE concept, we extend the model from an attack on the edges to an attack on the vertices of the network. We prove structural results and linear upper bounds or super-linear lower bounds on the social cost of SE under different attack scenarios. For the case that the vertex to be destroyed is chosen uniformly at random from the set of max-sep vertices (i.e., where each causes a maximum number of separated player pairs), we show that there is no tree SE with only one max-sep vertex. We conjecture that there is no tree SE at all. On the other hand, we show that for the uniform measure, all SE are trees (unless two-connected). This opens a new research direction asking where the transition from “no cycle” to “at least one cycle” occurs when gradually concentrating the measure on the max-sep vertices.

1. Introduction

Game theoretic models for the study of the decentralized formation of networks have gained remarkable attention during the past two decades. In most of those models, the vertices of a graph correspond to players, and each player’s choice of action can have an influence on the structure of the graph. Models vary according to the different actions available to the players and regarding the criteria under which the quality of the graphs are evaluated. For the latter, most models have focused on centrality-type criteria, for example players aim to minimize the sum of distances over all other players. Recently, robustness aspects have been addressed in the form of the destruction model (also known as the adversary model) [1,2,3,4]. In this model, players anticipate the destruction of exactly one edge in the graph, and the cost function for each player v gives the expected number of other players that v will no longer be able to reach after the destruction. Social cost is the sum of all players’ costs, which is equal to the expected number of separated vertex pairs, that is the expected number of all ordered pairs ( v , w ) such that there is no path anymore between v and w after the destruction has taken place. The model allows many variations, since the edge to be destroyed is determined randomly according to a probability measure that may even depend on the graph (this dependence is known to the players)1.
In this work, we use the stability concept of swap equilibrium (SE) [5] for the destruction model. Moreover, we extend the model to the destruction of exactly one vertex instead of an edge. We will henceforth speak of the edge destruction model and the vertex destruction model in order to distinguish the two.

Previous and Related Work

Network formation games date back to the 1990s; see Jackson and Wolinsky [6] for an early publication. In computer science, network formation games have gained attention since the work by Fabrikant et al. [7] in 2003. The destruction model was introduced by Kliemann in 2010 [1] and subsequently studied in a series of publications [2,3,4]. The focus was on the price of anarchy for Nash equilibrium (NE) and pairwise stability (PS). We give a comparison between the NE and PS results for the destruction model with the results on SE in this work in Section 2.1. Earlier works on robustness in network formation include [6,8,9,10,11]. None of those earlier models allows a structure-dependent destruction probability as in the destruction model; for a detailed discussion, we refer to ([2] Section 4).
The stability concepts of NE and PS require an edge cost parameter α R > 0 . Computationally deciding whether a graph constitutes an NE is hindered by an exponential search space and can indeed be NP-hard [7]. This has raised concerns about the applicability of the model since we should not expect players to solve an NP-hard problem. Therefore, many variations have been introduced in order to make the model more tractable. Usually, the idea is to limit the choices of the players, for example to single-edge deviations [6,12]. An even more drastic approach was suggested by Alon et al. in 2010 [5]. They removed the α parameter and considered only edge swaps: a graph is a swap equilibrium if no player can improve his or her cost by removing an incident edge and then creating a new incident edge; this action is called an edge swap. It is also allowed to simply remove an incident edge without creating a new one, which usually makes sense if edges can be harmful, e.g., if cost incorporates the risk of contagion. A variation introduced by Mihalák and Schlegel in 2012 [13] is the inclusion of edge ownerships: each edge is owned by exactly one of its endpoints and may only be swapped (or removed) by its owner. The resulting stability concept is called asymmetric swap equilibrium (ASE). We will not consider edge ownerships or ASE in this work, but this extension is most certainly interesting for future work.
The following three recent publications address robustness in a network formation framework similar to ours:
  • Meirom et al. [14] consider a cost function that uses a linear combination of the lengths of two short disjoint paths. The idea is that the players build a graph where, for each shortest path, there is a backup path of reasonable length.
  • Goyal et al. [15] consider a model where each player, in addition to building edges, can choose to immunize themselves in exchange for a fee. Then, an adversary selects a connected component of non-immunized vertices to destroy; an alternative description is that the adversary picks a vertex, and then, the destruction spreads from there, while immunized vertices act as firewalls. A player’s utility is the expected size of his or her connected component after the destruction has taken place, which is zero if the player herself/himself is destroyed. This utility is almost exactly the positive version of our cost: if C ( v ) is the expected number of cut-off vertices, then n C ( v ) is the expected size of v’s component after the attack (we differ in that if the player herself/himself is attacked, we say that she/he is cut off from n 1 vertices, so her/his component size is one, not zero). However, the kind of destruction is very different from ours. Although it can be formulated as an attack on a vertex, the contagious properties of the attack move the focus to different connectivity properties of the attacked vertex in comparison to our model. For example, if a leaf (that is, a vertex of degree one) is attacked in our model, the overall damage is relatively small: namely, we have 2 ( n 1 ) separated vertex pairs. In their model, however, if the neighbor of the leaf is not immunized, the destruction will spread, and the overall damage can be much higher. For earlier work on network formation with contagious risk, see [16].
  • Chauhan et al. [17] extended the edge destruction model by incorporating distances: the cost for player v is the expected sum of distances to all other players after edge destruction.
In another line of research [18,19,20,21], the robustness of networks is studied in a two-player game. The first player is the designer and can choose which edges to form in the network, while the second player is the adversary or disruptor, who can destroy vertices or edges in the network. Some of those models allow immunization of vertices or edges. All of those models are very different from ours since the network is formed by a central authority, the designer, and not in a decentralized manner as in our model. Moreover, the adversaries in those models work differently from ours: they typically act more deterministically and not randomized as our adversaries (or they randomize in simpler ways than ours), but on the other hand, they are more powerful, since they can destroy more than one edge or one vertex.
If, for our type of adversary, we had a network designer, then that designer would simply build an optimal network. Optimal networks for the case that we have link costs α and edge destruction have been identified as cycle and star, independent of the adversary and only depending on the range of α [2,4]. Therefore, the designer’s job would be simple: look at α, and then, decide whether to build a cycle or a star. If there are no link costs, as in the SE model, the notion of optimality is not straightforward in the first place. However, given a fixed number of edges k, we can define optimal graphs as those with minimal cost among all graphs with k edges. If k n , then any graph with a cycle traversing all of the vertices is optimal in this sense, for edge and for vertex destruction independent of the actual destroyer. If k = n 1 , then for any edge destroyer, the star is optimal (optimality for vertex destruction is not straightforward for k = n 1 ).

2. Results

We prove quantitative and structural results for two types of destroyers under the stability concept of swap equilibrium (SE): the uniform destroyer picks an edge or vertex uniformly at random, while the extreme destroyer picks an edge or vertex uniformly at random from the set of edges or vertices, respectively, where the destruction of each causes a maximum number of vertex pairs to be separated. An edge or vertex that does the latter is called a max-sep edge or max-sep vertex, respectively. In addition, we consider some variations. For edge destruction, the most notable variation is a destroyer that chooses an edge from the set of bridges uniformly at random. For vertex destruction, we consider that the probability for destruction of a vertex v is proportional to its degree deg ( v ) , which we call the degree-proportional destroyer.
We prove that for uniform and extreme edge destruction and uniform bridge destruction, an SE is bridgeless or has a star-like structure. A consequence of this is that in terms of social cost, those SE are very efficient, namely the social cost of any of those SE is 𝒪(n). For uniform vertex destruction, we prove that if an SE is not two-connected, then it is a tree. This again implies an 𝒪(n) bound on the social cost.
For the degree-proportional vertex destroyer, the situation is very different. Social cost of an SE can be as high as Ω ( n 2 ) , which is the highest order possible in this model. This lower bound is attained on a simple graph, namely a star.
For extreme vertex destruction, we also give a super-linear lower bound on the social cost of SE, namely Ω ( n 3 / 2 ) . The construction is still roughly star-like, but more complicated: we need a clique of certain size at the center unto which paths of a certain length are attached.
Finally, we prove a structural result for extreme vertex destruction: if n 8 , there is no tree SE with only one max-sep vertex. This means that in a tree SE (with n 8 ), the extreme destroyer will always have at least two vertices to choose from.

2.1. Discussion of Results and Comparison with Previous Work

What kind of (decentralized) network formation is most effective against a destroyer? This question cannot be fully answered yet. However, we can make the following observations.
Consider first that we face the uniform edge destroyer. All three models, namely Nash equilibrium (NE), pairwise stability (PS) and swap equilibrium (SE), provide relatively robust networks. For NE and PS, this has been shown in previous work [2,4] by proving a price of anarchy of 𝒪(1), meaning that the cost of an equilibrium network is at most a constant factor away from that of an optimal network. For SE, we prove here that the social cost of an equilibrium is upper-bounded by 2 ( n 1 ) , which means that the destroyer can cut off at most one vertex from the rest of the graph (resulting in 2 ( n 1 ) separated vertex pairs). This equates to relatively small damage. It is only beaten by a graph with a cycle that traverses all vertices, which has zero social cost. Note that non-equilibrium graphs can have super-linear social cost, e.g., the path has social cost Ω ( n 2 ) , following from the computation in ([2], Proposition 8.1).
In [17], the uniform edge destroyer is combined with a different cost function, which is the expected sum of distances to other players after destruction (instead of considering the number of cut-off vertices). NE is used as the equilibrium concept. A bound of 𝒪( 1 + α / n ) is proven on the price of anarchy, which is a good bound. Note in particular that it is constant for α n .
Now, consider that we face the extreme edge destroyer. One of the most striking previous results is that for NE, the price of anarchy is still 𝒪(1) ([2], Theorem 9.8). For PS, the situation flips, and the worst possible order is obtained for the price of anarchy ([4], Theorem 4), if α = Ω ( 1 ) . The lower-bound example used in the proof exploits the two properties of PS: we only consider single-edge deviations, and the agreement of both endpoints is required to build an edge. For SE, we prove here that the destroyer can cut off at most one vertex from the rest of the graph, just like for the uniform destroyer. Therefore, although NE and SE differ computationally (exponential versus quadratic search space), they both provide relatively robust networks when faced with the extreme edge destroyer.
For vertex destruction, NE and PS have not been studied previously, so we cannot make a comparison with those. The results that we prove here for SE resemble those for edge destruction and PS: relatively robust networks for the uniform destroyer and less robust ones for the extreme destroyer (linear social cost versus super-linear social cost). It should be emphasized that the degree-proportional destroyer, which arguably takes a simpler approach than the extreme destroyer, can have SE even with quadratic cost, which is the worst possible order. An explanation is that this destroyer combines the unpredictability of the uniform destroyer, on the one hand, with the focus on destruction expressed by the extreme destroyer, on the other hand (higher-degree vertices tend to cause more damage when destroyed). Indeed, the proof for the quadratic lower bound relies crucially on the way in which this destroyer randomizes.
A comparison between edge destruction and vertex destruction can be done only for SE currently. Removing an edge can leave us with at most two connected components. Removing a vertex v can leave us with deg ( v ) connected components (not counting v itself; cf. the exact definition in Section 3). This suggests that the model is theoretically harder to handle and that the destroyer can do more damage in terms of separated vertex pairs. However, for the uniform destroyer, the fundamental proof ideas turn out to be roughly similar (namely opening a cycle to capture more vertices and bounding the diameter of a tree SE), although technically much more involved for vertex destruction.
For the extreme destroyer, edge and vertex destruction are clearly more divergent from each other than for the uniform destroyer. This is reflected by our results: for edge destruction, we have a linear bound on the social cost of SE, while for vertex destruction, we have a super-linear lower bound and no upper bound at this time. The lower-bound example clearly does not work for extreme edge destruction, as explained in Remark 2. The difficulty with extreme vertex destruction is that already swapping a single leaf can have profound effects on the destroyer’s probability measure. That is, if a leaf a swaps its one edge a b for an edge a c , then the number of components when c is destroyed increases. This can lead to c becoming the only max-sep vertex in the new graph. This signifies a drastic change, provided that before the swap, there were many max-sep vertices in different parts of the graph. It should be noted that we have no lemma saying that max-sep vertices are distributed in a certain pattern in the graph, whereas for edge destruction, it is known that they form a star-like structure ([2], Proposition 9.1).

2.2. Open Problems

We have extensive experimental evidence and indications on the theory side that our structural result for the extreme vertex destroyer (that there is no SE tree with only one max-sep vertex for n 8 ) can be extended in two ways. We conjecture for n = Ω ( 1 ) :
(i)
There is no SE graph under extreme vertex destruction with only one max-sep vertex (this extends our result for trees to general graphs).
(ii)
There is no SE graph under extreme vertex destruction that is a tree (this extends our non-existence result for trees with one max-sep vertex to trees in general).
Recall that we prove that unless the graph is two-connected, an SE cannot contain cycles for the uniform vertex destroyer. On the other hand, for the extreme vertex destroyer, our Conjecture (ii) would imply that an SE is only possible if we have at least one cycle. It would then be interesting to find a family D ε ε [ 0 , 1 ] of vertex destroyers, such that D 0 is the uniform destroyer and D 1 is the extreme destroyer, and the others are something suitable in between. When moving ε from zero to one, the probability measure should concentrate more and more on the max-sep vertices. It would be interesting to find out at which values of ε the situation switches from no non-two-connected SE having a cycle to each SE having a cycle. Our Conjecture (ii) would imply that it must switch an odd number of times.
Other interesting directions include:
  • Closing the gap between our lower Ω ( n 3 / 2 ) bound and the trivial 𝒪( n 2 ) upper bound for social cost of extreme vertex destruction.
  • Extension to edge ownerships and the asymmetric swap equilibrium.
  • Study of the model from [17] under swap equilibrium or asymmetric swap equilibrium.
  • Study of vertex destruction under Nash equilibrium or pairwise stability as the equilibrium concept.

3. Model and Notation

Fix the number of players n N 3 . All our graphs are finite, simple and undirected. The undirected edge { v , w } between vertices v and w is denoted v w or w v . Denote G n the set of all graphs on the vertex set V n : = [ n ] : = { 1 , , n } . We use the term player and vertex synonymously for graphs in G n . A swap for a graph G G n is a triple of players ( a , b , c ) , such that a b E ( G ) and a c E ( G ) . Denote S ( G ) V n 3 the set of all swaps of G. Denote G + ( a , b , c ) the graph that is obtained from G by removing a b and inserting a c ; we say that player a swaps her/his edge a b for the new edge a c . A cost function C G for G G n assigns to each player v V n a number C G ( v ) R 0 . The social cost of G is SC ( G ) : = v V n C G ( v ) . We call G a swap equilibrium (SE) if C G ( a ) C G + ( a , b , c ) ( a ) for all ( a , b , c ) S ( G ) and C G ( a ) C G a b ( a ) for all a b E ( G ) .
Edge destruction: Let G G n be connected. For v , w V n , denote R G ( v , w ) the set of all v-w paths in G. The relevance of e E ( G ) for v V n is:
rel G ( e , v ) : = | { w V n ; P R ( v , w ) : e E ( P ) } | .
That is, the number of those vertices where for each of them holds: in order to reach it from v, we necessarily have to traverse edge e. When e is removed from the graph, then there will be exactly rel G ( e , v ) vertices that v will no longer be able to reach; we also say that those vertices are cut off from v or that v is cut off from them. An edge destroyer D is a map that associates with each G G n a probability measure D G on E ( G ) , that is D G ( e ) [ 0 , 1 ] for each e, and e E ( G ) D G ( e ) = 1 . Given D , we define the cost for player v in G as:
C G ( v ) : = e E rel G ( e , v ) D G ( e ) ,
that is, the expected number of vertices from which v will be cut off after one edge is removed randomly according to the measure D G . If G is disconnected, cost is defined to be ∞.
The separation sep ( e ) of an edge e E ( G ) is the number of ordered player pairs ( v , w ) such that the removal of e will destroy all v-w paths in G. If e is a non-bridge, then clearly sep ( e ) = 0 . Otherwise, G e has exactly two components, say K 1 , K 2 V n , and we call ν ( v ) : = min { | K 1 | , | K 2 | } the minimal-component size of e. Then, sep ( e ) = 2 ν ( e ) ( n ν ( e ) ) . It is easy to see that SC ( G ) = e E ( G ) sep ( e ) D G ( e ) .
Vertex destruction: For the vertex destruction model, the destroyer D associates each G G n with a probability measure on the vertices of G, that is D G ( v ) [ 0 , 1 ] for each v V n , and v V n D G ( v ) = 1 . We define the destruction of a vertex not as its removal from the graph, but as the removal of all of its incident edges. This is reflected by the following definition of relevance and cost. The relevance of u V n for v V n is:
rel G ( u , v ) : = | { w V n ; P R ( v , w ) : u V ( P ) } | .
Note that since v is in every v-w path, we have rel G ( v , v ) = n 1 , which is exactly the number of vertices that will be cut off from v if all edges incident with v are removed. Given a vertex destroyer D , we define the cost for player v in G as:
C G ( v ) : = u V rel G ( u , v ) D G ( u ) .
Again, a disconnected graph induces infinite cost for each player.
The separation sep ( u ) of a vertex u V n is the number of ordered player pairs ( v , w ) such that the removal of u will destroy all v-w paths in G. It is again easy to see that SC ( G ) = u V n sep ( u ) D G ( u ) . Moreover, if removal of u creates k components (not counting u itself) of sizes β 1 , , β k , we have:
sep ( u ) = n 2 1 i = 1 k β i 2 .
When the graph G is clear from context, we omit the G subscripts or arguments. When a graph G is defined, we write C , rel , SC , etc., instead of C G , rel G , SC ( G ) , etc., respectively. The same goes for G .
For any connected graph G = ( V , E ) , we call I V an island if it is inclusion-maximal under the condition that the induced subgraph G [ I ] is bridge-free (it does not matter whether we mean bridges of G or bridges of G [ I ] ). The bridge tree G ˜ of G is obtained by collapsing each island I of G to a single vertex I ˜ and inserting an edge between I ˜ and J ˜ if and only if an edge runs in G between a vertex of I and a vertex of J. Obviously, I J I ˜ J ˜ is a bijection between the set of bridges of G and the set of bridges of G ˜ , and we will often identify those two sets. We refer to [2] for a more formal treatment of the bridge tree.
We will also use the better-known block-cut-vertex tree; see, e.g., the book by Diestel [22] for a definition.

4. Uniform Edge and Uniform Bridge Destruction

Denote B ( G ) E ( G ) the set of all of the bridges of G G n and:
S B ( G ) : = { ( a , b , c ) S ( G ) ; a b B ( G ) G + ( a , b , c ) is connected }
the set of bridge swaps (the case that G + ( a , b , c ) is disconnected is not interesting since such a swap can never bring an improvement). Clearly, a c B ( G + ( a , b , c ) ) for each ( a , b , c ) S B ( G ) .
An edge destroyer D is called the uniform edge destroyer if D G ( e ) = 1 | E ( G ) | for each e E ( G ) and each G G n . It is called the uniform bridge destroyer if D G ( e ) = 1 | B ( G ) | for each e B ( G ) and D G ( e ) = 0 for each e E ( G ) B ( G ) , for each G G n (if B ( G ) = , the graph is two-edge-connected, and we can take any probability measure for D G since the cost for each player is zero in any case).
In order to point out what are some of the essential properties of those destroyers, we look at more general destroyers first. Consider the following condition on a destroyer:
G G n s = ( a , b , c ) S B ( G ) : sep G ( a b ) = sep G + s ( a c ) D G ( a b ) = D G + s ( a c ) e E ( G ) E ( G + s ) : sep G ( e ) = sep G + s ( e ) D G ( e ) = D G + s ( e )
This means that if after a bridge swap an edge maintains its separation, then it also maintains its probability. This clearly includes the uniform edge destroyer and the uniform bridge destroyer. The next proposition shows that (2) is equivalent to the following simpler condition:
G G n s = ( a , b , c ) S B ( G ) : D G ( a b ) = D G + s ( a c ) e E ( G ) E ( G + s ) : D G ( e ) = D G + s ( e )
This means that each edge carries its fixed probability that, in the case of a bridge, sticks to it even when it is swapped for another edge.
Proposition 1.
(2) and (3) are equivalent.
Proof. 
It is clear that (3) implies (2). Therefore, let D be a destroyer with property (2). Let G G n and s = ( a , b , c ) S B ( G ) . Since ν G ( a b ) = ν G + s ( a c ) , we have sep G ( a b ) = sep G + s ( a c ) ; hence, D G ( a b ) = D G + s ( a c ) . Now, consider the special case first that ( a , b , c ) is a path in the bridge tree. Then, the only separation that changes due to s is that of b c . Since separations of all other edges are maintained, they also maintain their probabilities. Since all of the probabilities add up to one, the edge b c also maintains its probability. In the general case, we have a path ( v 0 = b , v 1 , , v k = c ) . Conducting the sequence of swaps ( a , v 0 , v 1 ) , ( a , v 1 , v 2 ) , , ( a , v k 1 , v k ) gives the graph G + s , and in each step, the edges maintain their probability. ☐
The following proof uses the basic idea from ([5], Theorem 1).
Lemma 1.
Let D be a destroyer with property (3). Then, the bridge tree of an SE with respect to D has a diameter at most two.
Proof. 
Let G be an SE, and for contradiction, assume that ( a , b , c , d ) is a path in its bridge tree. Denote n a , n b , n c , n d the number of vertices in the subtrees rooted at a , b , c and d, respectively; hence, n = n a + n b + n c + n d . Consider the swap s = ( a , b , c ) . By (3), we have D G ( a b ) = D G + s ( a c ) , and all of the other edges maintain their probabilities, as well. We have rel G ( a b , a ) = rel G + s ( a c , a ) , and for all of the other edges, from the view of a, the only relevance that changes is that of b c , namely from n c + n d to n b . Since G is an SE, this means n c + n d n b . Likewise, we consider the swap ( d , c , b ) and obtain n a + n b n c . Together, this implies n a 0 , which is impossible. ☐
Theorem 1.
Let G be an SE for the uniform edge destroyer. Then, G is bridgeless or a star; hence, SC ( G ) 2 ( n 1 ) = 𝒪 ( n ) .
Proof. 
If G is bridgeless, then SC ( G ) = 0 . Therefore, assume that G contains a bridge. We want to show that G is a tree, so for contradiction, assume that G is not a tree. Let I be an island containing a cycle, and let b c be a bridge with b I (and c I for some island I ). Then, there is a cycle C in I that traverses b. Choose a so that a b E ( C ) . Then, the swap ( a , b , c ) puts the bridge b c on a cycle and makes it part of the island, so its relevance for a drops from a positive value to zero. No new bridges are introduced, and the relevance of all other edges remains the same for player a. Hence, this is an improving swap, a contradiction to SE. The situation is depicted in Figure 1.
Since we know that G is a tree, G coincides with its bridge tree. By Lemma 1, diam ( G ) 2 . Since n 3 , we conclude that G is a star. It follows that SC ( G ) = 2 ( n 1 ) . ☐
Theorem 2.
Let G be an SE for the uniform bridge destroyer. Then, G is bridgeless or G ˜ is a star, where each of the outer islands has exactly one vertex2. Hence, SC ( G ) 2 ( n 1 ) = 𝒪 ( n ) .
Proof. 
If G is bridgeless, then SC ( G ) = 0 . Therefore, assume that G contains a bridge. By Lemma 1, G ˜ is a star. Let I be an island that is not the center of the star (i.e., it is an outer island) and that contains more than one vertex. Then, I contains a cycle. By a swap as in the proof of Theorem 1, the one bridge e between the center of the star and I can be put on a cycle. For the players in I, this is a strict improvement since for them, e had the strictly highest relevance of all bridges in G. The statement on the social cost follows since only one vertex can be separated from the rest of the graph by the removal of a bridge. ☐

5. Extreme Edge Destruction

For G G n , denote sep max ( G ) : = max e E ( G ) sep ( e ) and:
E max ( G ) : = { e E ( G ) ; sep ( e ) = sep max ( G ) } .
We call the edges in E max ( G ) the max-sep edges. Recall sep ( e ) = 2 ν ( e ) ( n ν ( e ) ) and note that x x ( n x ) is strictly increasing on [ 0 , n / 2 ] ; hence, ν ( e ) = ν ( e ) for all e , e E max ( G ) . Moreover, if ν ( e ) = ν ( e ) for some e E max ( G ) and e E ( G ) , then e E max ( G ) . In other words: exactly all of the edges with maximum ν ( e ) are max-sep.
An edge destroyer D is called the extreme edge destroyer if D G ( e ) = 1 | E max ( G ) | for each e E max ( G ) and D G ( e ) = 0 for each e E ( G ) E max ( G ) .
Theorem 3.
Let G be an SE under the extreme edge destroyer. Then, G is bridgeless or G ˜ is a star, where each of the outer islands has exactly one vertex. Hence, SC ( G ) 2 ( n 1 ) = 𝒪 ( n ) .
Proof. 
The expression for the social cost follows from the structural statement. Assume for contradiction that G contains bridges and is not of the stated form.
Case 1: E max = { e 1 , , e k } with k 2 . This situation is depicted in Figure 2. By ([2] Proposition 9.1), the max-sep edges form a star in the bridge tree. For each i [ k ] , denote K i V n the (unique) minimal component of G e i , and denote K 0 the island at the center of the star formed by E max . Then, V n = i = 0 k K i and | K i | = | K j | for all i , j [ k ] . By assumption, | K i | 2 for each i.
Case 1.1: There is a leaf a K 1 . Denote b the neighbor of a, and let v K 0 . Define G : = G + ( a , b , v ) . When moving from G to G , all of the edges e 2 , , e k , and the edges in G [ K 2 ] , , G [ K k ] have their separation maintained. Edges in G [ K 1 ] have their separation maintained or reduced since their minimal-component size reduces. The edge e 1 has its separation reduced since its minimal-component size reduces. The new edge a v cannot become max-sep since ν ( a v ) = 1 while ν ( e 2 ) 2 . It follows that E max = { e 2 , , e k } . We have rel ( e i , a ) = rel ( e i , a ) < rel ( e 1 , a ) for all i 2 . Hence, C ( a ) < C ( a ) , a contradiction to SE.
Case 1.2: There is a cycle C in K 1 . Let a b E ( C ) and v K 0 . By essentially the same arguments as in Case 1.1, we show that player a improves by the swap ( a , b , v ) .
Case 2: E max = { e 1 } . This case is more difficult since after reducing the separation of e 1 , we have no other max-sep edges that could act as a reference. Denote K 1 a component of G e 1 with minimum size (if both components of G e 1 have the same size, then pick one arbitrarily), and denote K 0 the island containing the endpoint of e 1 that is not in K 1 .
Case 2.1: There is a leaf a K 1 . Denote b the neighbor of a, and let v K 0 . Define G : = G + ( a , b , v ) . We have ν ( e 1 ) = ν ( e 1 ) 1 , so sep ( e 1 ) has the next lower possible value below sep ( e 1 ) . Hence, E max = { e 1 , e 2 , , e k } for zero or more additional edges e 2 , , e k . Since they all have the same minimum-component size, they cannot be in G [ K 1 ] ; hence, they form a star with K 0 as the center (this is the only way that they can form a star in the bridge tree). If a v E max , then C ( a ) = ν ( e 1 ) 1 < n ν ( e 1 ) = C ( a ) ; hence, the swap is an improvement. If a v E max , then ν ( e 1 ) 1 = ν ( a v ) = 1 ; so | K 1 | = 2 and n 4 . Moreover, k 2 . It follows that C ( a ) = 1 k ( n 1 + ( k 1 ) ( ν ( e 1 ) 1 ) ) = n 2 k + 1 . On the other hand, C ( a ) = n 2 . If n 5 or k 3 , this implies an improvement. The remaining case of n = 4 and k = 2 is impossible, since for such n, the graph G is a star, and thus, k = 3 .
Case 2.2: There is a cycle C in K 1 . We consider a swap like the one in Case 1.2. It is not difficult to see that rel ( e , a ) < rel ( e 1 , a ) for each e E max ; hence, the swap is an improvement. ☐

6. Uniform and Degree-Proportional Vertex Destruction

A vertex destroyer D is called the uniform vertex destroyer if D G ( u ) = 1 n for each u V n and each G G n .
For any connected graph G = ( V , E ) , denote B ( G ) the set of its blocks and A ( G ) V the set of its cut-vertices (also known as articulation points). Denote G ^ the block-cut-vertex tree of G, that is V ( G ^ ) = B ( G ) A ( G ) , and each edge in G ^ runs between a block and a cut-vertex, namely B v E ( G ^ ) if B B ( G ) and v B A ( G ) . We have | B | 2 for each B B ( G ) . If | B | 3 , then G [ B ] is two-connected; we also say that B is two-connected in G. Recall also that in a two-connected graph, for each vertex v, we can find a cycle that visits v.
The following remark is proven by standard arguments, which are included here for completeness.
Remark 1.
Let G = ( V , E ) be any two-connected graph.
(i) 
Let x , y , v V be three distinct vertices. Then, there exist paths P = ( v , , x ) and Q = ( v , , y ) with V ( P ) V ( Q ) = { v } .
(ii) 
Let W V with | W | 2 and v V W . Then, there are x , y W with x y and paths P = ( v , , x ) and Q = ( v , , y ) with V ( P ) V ( Q ) = { v } and V ( P ) W = { x } and V ( Q ) W = { y } .
Proof. 
(i) Add a new vertex z to the graph, and connect it with x and with y. The resulting graph is again two-connected. Using the global version of Menger’s theorem (see, e.g., ([22] Theorem 3.3.6)), we find two independent (that is, internally vertex-disjoint) v-z paths. Taking subpaths yields the result.
(ii) Let x , y W , x y be any two distinct vertices in W. By (i), we find P = ( v , , x ) and Q = ( v , , y ) with:
V ( P ) V ( Q ) = { v } .
Let x be the first vertex on P that is also in W. Define P : = ( v , , x ) as a subpath of P . Likewise, let y be the first vertex on Q that is also in W, and define Q : = ( v , , y ) as a subpath of Q . By (4), we get x y , and the other properties follow from the choice of x and y. ☐
Definition 1.
Let G = ( V , E ) be any graph and ( B 1 , b 1 , , B k , b k , B k + 1 ) , k 1 , be a path in its block-cut-vertex tree G ^ . Assume | B 1 | 3 , and let C = ( b 1 , a , , b 1 ) be a cycle in B 1 . Let c B k + 1 { b k } . Then, we call the swap ( a , b 1 , c ) a cycle extension with respect to ( B 1 , B k + 1 ) ; note that B 2 , , B k and b 1 , , b k are uniquely determined by the pair ( B 1 , B k + 1 ) since G ^ is a tree.
The name “cycle extension” is chosen since the cycle C is extended into a larger cycle, thereby merging the blocks that are traversed by the new cycle. The merging property is proven in the next proposition.
Proposition 2.
With notation as in Definition 1, denote G : = G + ( a , b 1 , c ) . Then, in G , all of the blocks B 1 , , B k + 1 are merged into one block, and the remaining blocks are maintained; in particular, no new cut-vertices emerge in G , and the separation values of maintained cut-vertices do not increase.
Proof. 
The only non-obvious part is that B : = B 1 B k + 1 is two-connected in G , which we will prove now. Denote C = ( b 1 , a , a 1 , , a t , b 1 ) for some t. There is a cycle of the form C = ( b 1 , , b k , , c , a , a 1 , , a t , u 1 ) that starts in B 1 , runs through B 2 , , B k + 1 and finally re/enters B 1 .
Let i [ k + 1 ] with | B i | 3 and v B i V ( C ) . Claim: in G , there are paths P = ( v , , x ) and Q = ( v , , y ) with x , y V ( C ) and x y , such that V ( P ) V ( Q ) = { v } and V ( P ) V ( C ) = { x } and V ( Q ) V ( C ) = { y } .
Proof of claim: Denote W : = V ( C ) B i , then | W | 2 . By Remark 1(ii) applied with W as defined here, the claim is clear for i 2 , since such B i is two-connected in G (and in G). Hence, we consider i = 1 . The difficulty is that B 1 may not be two-connected in G , since we removed the edge a 1 u 1 . However, none of the paths P or Q guaranteed to exist by Remark 1(ii) in G can use a 1 u 1 since then, that path would have more than one vertex in common with W. This concludes the proof of the claim.
Now, let v , w B with v w . We show that in G , there are two independent v-w paths.
  • If v , w B i for some i k , then either B i is two-connected and the statement is clear, or | B i | = 2 in which case v , w V ( C ) , and the independent paths are given through C .
  • Let v B i and w B j for i j . If v or w is located on C , then nothing has to be done for that vertex; otherwise, we connect it with C via the paths guaranteed by the claim. It is easy to see that this gives two independent v-w paths.
  • Let v , w B 1 . In G, we find two independent v-w paths P and Q in B 1 . At most, one of them, say P, uses a b 1 . Instead of using that edge, we can, starting at b 1 , run along C until we reach a. That b 1 -a path runs outside of B 1 (except for a and b 1 ) and, thus, will not interfere with P or Q. ☐
Theorem 4.
An SE for the uniform vertex destroyer is two-connected (that is, it has only one block) or it does not contain any cycle and, thus, is a tree.
Proof. 
Let an SE graph G G n be given, and assume it contains more than one block. We only need to prove that no block has a cycle, or, equivalently, that each block consists of only two vertices. Suppose for contradiction that B 1 is a block with | B 1 | 3 , and let B 2 be another block. Let ( a , b , c ) be a cycle extension with respect to ( B 1 , B 2 ) and G : = G + ( a , b , c ) . By Proposition 2, it follows that rel ( b , a ) < rel ( b , a ) , since in G , removal of b cannot cut a off the one or more vertices in B 2 { b 1 } anymore (recall that a block always contains at least two vertices). All other relevance for a is maintained or also reduced. Therefore, we have an improvement in the cost of player a, contradicting the stability of G. ☐
Corollary 1.
Let G G n be an SE for the uniform vertex destroyer. Then, G is either two-connected or a star; hence, SC ( G ) = 2 ( n 1 ) = 𝒪 ( n ) or SC ( G ) = 3 n 5 + 2 n = 𝒪 ( n ) .
Proof. 
Let G be non-two-connected. Then, by Theorem 4, G is a tree. By applying the same argument as in the proof of Lemma 1, we obtain that the diameter of G is at most two, i.e., G is a star. The social cost of star is easily computed to be 1 n ( ( n 1 ) ( 3 n 4 ) + 2 ( n 1 ) ) = 3 n 5 + 2 n . ☐
A destroyer D is called the degree-proportional vertex destroyer if D G ( u ) = deg G ( u ) 2 m for each u V n and each G G n .
Proposition 3.
The star is an SE for the degree-proportional vertex destroyer, and its social cost is 1 2 ( n 2 + n ) 1 = Ω ( n 2 ) .
Proof. 
Let S G n be a star. First, we prove that S is an SE. Clearly, by just removing an edge (without creating a new one), no player can improve. It is also obvious that the only possibility for swapping is from one leaf to another leaf. Let a , c V be leaves and b the center of the star. Denote S : = S + ( a , b , c ) . Although player a, by the swap ( a , b , c ) , decreases the number of cut-off vertices in the case that the center b is destroyed, this does not improve her/his cost. This is because at the same time, the degree of c is increased, and destruction of c in G will cut off a from all other vertices. The following calculations show that a indeed does not improve her/his cost by the swap. We have:
C S ( a ) = 1 2 ( n 1 ) w V rel ( w , a ) · deg ( w ) = 1 2 ( n 1 ) ( ( n 1 ) + ( n 2 ) + ( n 1 ) ( n 1 ) ) = 1 2 ( n + 1 1 n 1 )
After swapping:
C S ( a ) = 1 2 ( n 1 ) ( 3 ( n 1 ) + ( n 2 ) 2 + ( n 3 ) ) = 1 2 ( n + 1 1 n 1 )
Hence, C S ( a ) = C S ( a ) . Therefore, the star is an SE (an example for n = 6 is given in Figure 3). Its social cost is:
SC ( S ) = 1 2 ( n 1 ) v V w V rel ( w , v ) · deg ( w ) = ( n 1 ) ( 1 2 ( n + 1 1 n 1 ) ) + 1 2 ( n 1 ) · ( n 1 ) n = 1 2 ( ( n 2 1 ) 1 ) + n 2 = 1 2 n 2 + n 1
Corollary 2.
The social cost of SE for the degree-proportional vertex destroyer can be as high as Ω ( n 2 ) , which is the worst possible order in the destruction model.

7. Extreme Vertex Destruction

This model is defined similarly to the extreme edge destruction model. Denote V max the set of max-sep vertices and n max : = | V max | . The extreme vertex destroyer picks the vertex to destroy uniformly at random from V max .
We start with a first step toward understanding the worst-case order of social cost of an SE in this model, by giving an SE example with super-linear social cost, namely Ω ( n 3 / 2 ) . The construction is shown in Figure 4. It is unknown at this time whether there is a matching upper bound. Before reading the proof of the following theorem, the reader is encouraged to take look at Remark 3 in order to obtain an idea why we have to limit the length of the paths attached to the clique.
Theorem 5.
Let t 4 and 0 k 4 t 5 = Θ ( t ) . Let G = ( V , E ) be the graph consisting of a clique C on t vertices, and to each vertex of C, there is a path of length k attached (so, n : = | V | = t ( k + 1 ) ). Then, G is an SE with SC ( G ) = Ω ( n 3 / 2 ) .
Proof. 
For each player v at distance 0 i k from C, we have:
sep ( v ) = 2 ( ( n 1 ) + ( k i ) ( n 1 ( k i ) ) )
Since k i ( n 1 ) / 2 and since the function x x ( n 1 x ) is strictly increasing on [ 0 , ( n 1 ) / 2 ] , separation is strictly largest when i = 0 , that is when v C . It follows V max = C and:
SC ( G ) = 2 ( n 1 ) + k ( n 1 k ) = 2 ( t ( k + 1 ) 1 + k ( t ( k + 1 ) 1 k ) ) = 2 t k + t 1 + k 2 t + k t k k 2 2 ( ( 2 t 1 ) k + k 2 ( t 1 ) ) 2 k 2 ( t 1 ) k 2 t
If we choose k maximal, that is k = 4 t 5 , we get:
SC ( G ) k 2 t = ( 4 t 5 ) 2 t = ( 16 t 2 40 t + 25 ) t ( 6 t 2 + t ( 10 t 40 ) ) t 6 t 3
Now, for this k, we have n = t ( k + 1 ) = t ( 4 t 4 ) 4 t 2 ; hence, n 3 / 2 8 t 3 . It follows SC ( G ) 6 8 n 3 / 2 = 3 4 n 3 / 2 = Ω ( n 3 / 2 ) (in short: we have SC ( G ) = Ω ( t k 2 ) ; if we choose k maximal, then k = Θ ( t ) ; hence, SC ( G ) = Ω ( t 3 ) = Ω ( n 3 / 2 ) ).
We prove the SE property. Just removing an edge (without building a new one) is clearly not an option for the players on the paths. For a player of the clique C, nothing changes when removing an edge, since because of t 4 , the set C remains two-connected.
For u C , denote V u the k vertices on the path attached to u (note that u V u ). In the following, whenever we consider a swap, by G , we refer to the graph we obtain from G by applying the swap.
We start with the different swaps available to a player a C . We have rel ( u , a ) = k + 1 for each u V max { a } ; hence:
C ( a ) = ( n 1 ) + ( t 1 ) ( k + 1 ) t .
(i)
Consider a swap ( a , b , c ) with b C N ( a ) and c V u for u C { a } , that is player a swaps an edge from the clique to some path, but not the one connected to a itself. Since t 4 , the set C remains two-connected. Separation of u and of some vertices in V u is reduced. All other separations are maintained. It follows:
C ( a ) C ( a ) = ( n 1 ) + ( t 1 ) ( k + 1 ) t ( n 1 ) + ( t 2 ) ( k + 1 ) t 1 = k n + 2 t ( t 1 ) < 0
Hence, the swap is no improvement for player a.
(ii)
Consider a swap ( a , b , c ) with b C N ( a ) and c V a , that is player a swaps an edge from the clique to its own path. Again, since t 4 , the set C remains two-connected. The separation values on some vertices in V a decrease, but that does not change the set of max-sep vertices, nor their relevance for a. Hence, player a’s cost is maintained.
(iii)
Consider a swap ( a , b , c ) with b V a ; then, in order to keep the graph connected, we have c V a . That is, player a swaps the first edge on its path to some vertex on that path. We only have to exclude that c becomes max-sep; if we achieve that, then, we know that a’s cost is maintained. Let 2 l k 1 be the distance between a and c. Then, by (1):
sep ( c ) < sep max n 2 1 ( l 1 ) 2 ( k l ) 2 ( n k ) 2 < n 2 1 k 2 ( n 1 k ) 2 k 2 + ( n 1 k ) 2 < ( l 1 ) 2 + ( k l ) 2 + ( n k ) 2 ( n 1 k ) 2 < 2 l ( k + 1 l ) + 1 + ( n k ) 2 2 ( n k ) < 2 l ( k + 1 l ) n k > l ( k + 1 l ) n k > ( k + 1 ) 2 4 t ( k + 1 ) > ( k + 1 ) 2 4 + k t > k + 1 4 + 1 1 k + 1 4 t 5 k
The latter is true by the restriction on k in the statement of the theorem. In this computation, we used again that the function x x ( k + 1 x ) is increasing on [ 0 , ( k + 1 ) / 2 ] .
We continue with the swaps available to a player a V u for some u C .
(iv)
Consider a swap ( a , b , c ) with dist ( u , a ) < dist ( u , b ) . Then, c V u with dist ( u , b ) < dist ( u , c ) ; since otherwise, the graph would become disconnected. From a computation like in (iii), it follows that this swap cannot make c max-sep. Hence, the cost of player a does not change.
(v)
Consider a swap ( a , b , c ) with dist ( u , a ) > dist ( u , b ) . If c V u , then again, a’s cost will not change. If c C , then c will become the only max-sep vertex in the new graph, clearly increasing a’s cost.
Now, let c V w for some w u , that is some vertices migrate from u’s path to w’s path. Separation of w and separation of the vertices v V w with dist ( w , v ) dist ( w , c ) will increase. All other separations are reduced or maintained, so we have V max V w { w } . In the best case, k vertices migrate to w’s path; only w becomes max-sep, and rel ( w , a ) = n 2 k . In this case:
C ( a ) C ( a ) = ( t 1 ) ( k + 1 ) + ( n k ) t ( n 2 k ) = ( t 1 ) ( k + 1 ) + ( t ( k + 1 ) k ) t ( t ( k + 1 ) 2 k ) t = ( k + 1 ) ( 2 t t 2 1 ) + ( 2 t 1 ) k t ( k + 1 ) ( 2 t ) + 2 k 2 ( k + 1 ) + 2 k < 0
Hence, the swap is no improvement for player a. ☐
Remark 2.
The graph in Theorem 5 is no SE for extreme edge destruction.
Proof. 
The max-sep edges are the edges on the paths that have one endpoint in the clique. This will not change when a leaf swaps to the clique; hence, this leaf will experience an improvement. ☐
Remark 3.
The graph in Theorem 5 is no SE if k 4 t 4 = 4 ( t 1 ) , that is if k is larger than the upper bound in the theorem.
Proof. 
Let a C and b be her/his neighbor in V a . Let c C be at distance l from a, to be specified later. Denote G : = G + ( a , b , c ) . If c becomes max-sep in G , then player a’s cost will decrease, since rel ( c , a ) = k , whereas the relevance of a max-sep vertex in G for a is k + 1 or n 1 . By the computation in Theorem 5(iii), we see that c becomes max-sep if n k l ( k + 1 l ) . We have:
n k l ( k + 1 l ) t l ( k + 1 l ) k + 1 + 1 1 k + 1 t l ( k + 1 l ) k + 1 + 4 5
For odd k 4 ( t 1 ) and l : = k + 1 2 , we have:
t l ( k + 1 l ) k + 1 + 4 5 t ( k + 1 ) 2 / 4 k + 1 + 4 5 t k + 1 4 + 4 5 t 4 t 3 4 + 4 5 0 3 4 + 4 5 0 1 20
For even k 4 ( t 1 ) and l : = k 2 , we have:
t l ( k + 1 l ) k + 1 + 4 5 t k 2 4 + k 2 k + 1 + 4 5 t k 2 + k 4 ( k + 1 ) + k 4 ( k + 1 ) + 4 5 t k 4 + 1 4 4 5 + 4 5 t k 4 + 1 t t 1 + 1
In the remainder of this work, we provide more insight into the structure of tree SE graphs for the extreme vertex destroyer. The next theorem says that in a tree with only one max-sep vertex (and n 8 ), there is always an improving swap, so it cannot be an SE. The main concepts are that having a single max-sep vertex makes the destroyer very predictable and that swapping to a leaf, that leaf (which will have degree two in the new graph) can become max-sep only under specific conditions.
Theorem 6.
There is no SE tree with n max = 1 , provided that n 8 .
Proof. 
Let T = ( V , E ) be an SE tree with n max = 1 and u V max . It is clear that u is a cut-vertex, otherwise G is two-connected, and thus, n max = n . Denote K 1 , , K k , with k 2 , the components of T u ordered by non-decreasing sizes | K 1 | | K 2 | | K k | . For convenience, denote n i : = | K i | for each i.
Let v K 1 and u v E and w K 2 with deg ( w ) = 1 . We consider T : = T + ( v , u , w ) , that is we detach K 1 from u and re-attach it to a leaf of K 2 . The situation is depicted in Figure 5.
Then, rel ( w , v ) = rel ( u , v ) and rel ( w , v ) > rel ( w , v ) for all w w , and so, we have an improvement for v whenever V max contains at least one vertex distinct from w. The latter is the case if sep ( w ) sep ( u ) . Using (1), we compute:
sep ( w ) sep ( u ) n 2 1 n 1 2 ( n n 1 1 ) 2 n 2 1 ( n 1 + n 2 ) 2 i = 3 k n i 2 n 1 2 + ( n n 1 1 ) 2 ( n 1 + n 2 ) 2 + i = 3 k n i 2 ( n n 1 1 ) 2 2 n 1 n 2 + i = 2 k n i 2 ( i = 2 k n i ) 2 2 n 1 n 2 + i = 2 k n i 2 2 i < j k n i n j n 1 n 2
Now, Condition (∗) is true if k 3 , since n 1 n 3 .
Hence, we may assume that k = 2 . Let x be the only vertex in N ( u ) K 2 . If deg ( x ) 3 , then:
sep ( x ) n 2 1 1 ( n 2 2 ) 2 ( n 1 + 1 ) 2 = n 2 1 1 n 2 2 + 4 n 2 4 n 1 2 2 n 1 1 = sep ( u ) 1 + 4 n 2 4 2 n 1 1 = sep ( u ) + 2 ( 2 n 2 n 1 ) 6 sep ( u ) + 2 n 2 6 sep ( u )
The last step is true since n 2 ( n 1 ) / 2 > 3 . We conclude that deg ( x ) 2 . Since n 8 , there is y N ( x ) { u } with deg ( y ) 2 . We consider T : = T + ( u , x , y ) , as shown in Figure 6. We have:
sep ( u ) < sep ( y ) n 1 2 + n 2 2 > 1 + ( n 2 2 ) 2 + ( n 1 + 1 ) 2 0 > 1 4 n 2 + 4 + 2 n 1 + 1 0 > 2 ( n 1 2 n 2 ) + 6 0 > n 1 2 n 2 + 3 n 2 > 3
Since the last statement is true, we know that V max = { y } ; hence, C ( u ) = n 2 < n 1 = C ( u ) . ☐

Acknowledgments

L.K. contributed to this work while supported by DFG grants KL 2087/1-1 and SR 7/15-1. E.S.S. is supported by a Federal State Scholarship at Kiel University. We gratefully acknowledge this support.

Author Contributions

L.K. and E.S.S. designed the study and proved the results. All authors wrote and approved the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SESwap equilibrium
max-sep edge/vertexAn edge/vertex whose removal causes a maximum number of separated player pairs

References

  1. Kliemann, L. Brief Announcement: The Price of Anarchy for Distributed Network Formation in an Adversary Model. In Proceedings of the 29th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, Zurich, Switzerland, 25–28 July 2010; pp. 229–230.
  2. Kliemann, L. The Price of Anarchy for Network Formation in an Adversary Model. Games 2011, 2, 302–332. [Google Scholar] [CrossRef] [Green Version]
  3. Kliemann, L. Price of Anarchy in the Link Destruction (Adversary) Model. In Proceedings of the International Conference on Operations Research, Aachen, Germany, 2–5 September 2014; Lübbecke, M., Koster, A., Letmathe, P., Madlener, R., Peis, B., Walther, G., Eds.; Springer: Cham, Switzerland, 2016; pp. 285–291. [Google Scholar]
  4. Kliemann, L. The Price of Anarchy in Bilateral Network Formation in an Adversary Model. Algorithmica 2017, 77, 921–941. [Google Scholar] [CrossRef]
  5. Alon, N.; Demaine, E.D.; Hajiaghayi, M.T.; Leighton, T. Basic Network Creation Games. In Proceedings of the 22nd ACM Symposium on Parallel Algorithms and Architectures, Santorini, Greece, 13–15 June 2010; pp. 106–113.
  6. Jackson, M.O.; Wolinsky, A. A strategic model of social and economic networks. J. Econ. Theory 1996, 71, 44–74. [Google Scholar] [CrossRef]
  7. Fabrikant, A.; Luthra, A.; Maneva, E.; Papadimitriou, C.H.; Shenker, S. On a Network Creation Game. In Proceedings of the 22nd Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, Boston, MA, USA, 13–16 July 2003; pp. 347–351.
  8. Chun, B.G.; Fonseca, R.; Stoica, I.; Kubiatowicz, J. Characterizing Selfishly Constructed Overlay Routing Networks. In Proceedings of the 23rd IEEE Conference on Computer Communications, Hong Kong, China, 7–11 March 2004.
  9. Bala, V.; Goyal, S. A strategic analysis of network reliability. Rev. Econ. Des. 2000, 5, 205–228. [Google Scholar] [CrossRef]
  10. Sarangi, S.; Haller, H. Nash Networks with Heterogeneous Agents; Departmental Working Papers 2003-06; Department of Economics, Louisiana State University: Baton Rouge, LA, USA, 2003. [Google Scholar]
  11. Haller, H.; Sarangi, S. Nash networks with heterogeneous links. Math. Soc. Sci. 2005, 50, 181–201. [Google Scholar] [CrossRef]
  12. Lenzner, P. Greedy Selfish Network Creation. In Proceedings of the 8th International Workshop on Internet and Network Economics, Liverpool, UK, 10–12 December 2012.
  13. Mihalák, M.; Schlegel, J.C. Asymmetric Swap-Equilibrium: A Unifying Equilibrium Concept for Network Creation Games. In Proceedings of the 37th International Symposium on Mathematical Foundations of Computer Science, Bratislava, Slovakia, 27–31 August 2012.
  14. Meirom, E.A.; Mannor, S.; Orda, A. Formation Games of Reliable Networks. In Proceedings of the 34th IEEE Conference on Computer Communications, Hong Kong, China, 26 April–1 May 2015.
  15. Goyal, S.; Jabbari, S.; Kearns, M.; Khanna, S.; Morgenstern, J. Strategic Network Formation with Attack and Immunization. In Proceedings of the International Conference on Web and Internet Economics, Montreal, QC, Canada, 11–14 December 2016.
  16. Blume, L.; Easley, D.; Kleinberg, J.; Kleinberg, R.; Tardos, É. Network Formation in the Presence of Contagious Risk. ACM Trans. Econ. Comput. 2013. [Google Scholar] [CrossRef]
  17. Chauhan, A.; Lenzner, P.; Melnichenko, A.; Münn, M. On Selfish Creation of Robust Networks. In Proceedings of the 9th Annual ACM-SIAM Symposium on Algorithmic Game Theory, Liverpool, UK, 19–21 September 2016. Lecture Notes in Computer Science.
  18. Dziubiński, M.; Goyal, S. Network Design and Defence. Games Econ. Behav. 2013, 79, 30–43. [Google Scholar] [CrossRef]
  19. Hoyer, B.; Jaegher, K.D. Strategic Network Disruption and Defense. J. Public Econ. Theory 2016, 18, 802–830. [Google Scholar] [CrossRef]
  20. Haller, H. Network Vulnerability: A Designer-disruptor Game. Available online: ftp://repec.econ.vt.edu/Papers/Haller/Network_Vulnerability.pdf (accessed on 19 February 2017).
  21. Bravard, C.; Charroin, L.; Touati, C. Optimal Design and Defense of Networks under Link Attacks. J. Math. Econ. 2017, 68, 62–79. [Google Scholar] [CrossRef]
  22. Diestel, R. Graph Theory, 3rd ed.; Springer: Heidelberg, Germany, 2005. [Google Scholar]
  • 1.The name “adversary model” is the original one. However, “adversary” was found to be more suited to describe an entity that aims at maximizing cost under equilibrium. This is not necessarily the case in our model.
  • 2.If the star has only one edge and thus there are exactly two islands, this statement means that one of the two islands has exactly one vertex.
Figure 1. Proof of Theorem 1.
Figure 1. Proof of Theorem 1.
Games 08 00014 g001
Figure 2. Proof of Theorem 3, Case 1.
Figure 2. Proof of Theorem 3, Case 1.
Games 08 00014 g002
Figure 3. Example for Proposition 3. Numbers give probabilities for the vertices to be picked for destruction. By computing cost, we see that an outer player cannot benefit from a swap.
Figure 3. Example for Proposition 3. Numbers give probabilities for the vertices to be picked for destruction. By computing cost, we see that an outer player cannot benefit from a swap.
Games 08 00014 g003
Figure 4. Construction from Theorem 5 for t = 4 .
Figure 4. Construction from Theorem 5 for t = 4 .
Games 08 00014 g004
Figure 5. Proof of Theorem 6, Case 1.
Figure 5. Proof of Theorem 6, Case 1.
Games 08 00014 g005
Figure 6. Proof of Theorem 6, Case 2.
Figure 6. Proof of Theorem 6, Case 2.
Games 08 00014 g006

Share and Cite

MDPI and ACS Style

Kliemann, L.; Shirazi Sheykhdarabadi, E.; Srivastav, A. Swap Equilibria under Link and Vertex Destruction. Games 2017, 8, 14. https://doi.org/10.3390/g8010014

AMA Style

Kliemann L, Shirazi Sheykhdarabadi E, Srivastav A. Swap Equilibria under Link and Vertex Destruction. Games. 2017; 8(1):14. https://doi.org/10.3390/g8010014

Chicago/Turabian Style

Kliemann, Lasse, Elmira Shirazi Sheykhdarabadi, and Anand Srivastav. 2017. "Swap Equilibria under Link and Vertex Destruction" Games 8, no. 1: 14. https://doi.org/10.3390/g8010014

APA Style

Kliemann, L., Shirazi Sheykhdarabadi, E., & Srivastav, A. (2017). Swap Equilibria under Link and Vertex Destruction. Games, 8(1), 14. https://doi.org/10.3390/g8010014

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop