Skip to main content

Equilibria for Networks with Malicious Users

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2906))

Abstract

We consider the problem of characterizing user equilibria and optimal solutions for selfish routing in a given network. We extend the known models by considering malicious behaviour. While selfish users follow a strategy that minimizes their individual cost, a malicious user will use his flow through the network in an effort to cause the maximum possible damage to this cost. We define a generalized model, present characterizations of flows at Wardrop equilibrium and prove bounds for the ratio of the social cost of a flow at Wardrop equilibrium over the cost when centralized coordination among users is allowed.

Extended Abstract. Detailed proofs appear in the full version.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aashtiani, H.Z., Magnanti, T.L.: Equilibria on a congested transportation network. SIAM J. on Algebraic and Discrete Methods 2(3), 213–226 (1981)

    Article  MATH  MathSciNet  Google Scholar 

  2. Beckmann, M., McGuire, C.B., Winsten, C.B.: Studies in the economics of transportation. Yale University Press (1956)

    Google Scholar 

  3. Czumaj, A., Vöcking, B.: Tight bounds for worst-case equilibria. In: 13th ACM-SIAM Symposium On Discrete Mathematics, pp. 413–420 (2002)

    Google Scholar 

  4. Dafermos, S., Sparrow, F.: The traffic assignment problem for a general network. J. of Research of the National Bureau of Standards 73B, 91–118 (1969)

    MathSciNet  Google Scholar 

  5. Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol. 1563, pp. 404–413. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  6. Mavronicolas, M., Spirakis, P.: The price of selfish routing. In: 33rd Annual ACM Symposium on Theory of Computing, pp. 510–519 (2001)

    Google Scholar 

  7. Rockafellar, R.T.: Convex Analysis. Princeton University Press, Princeton (1970)

    MATH  Google Scholar 

  8. Roughgarden, T.: Designing networks for selfish users is hard. In: 42nd IEEE Symposium on Foundations of Computer Science, pp. 472–481 (2001)

    Google Scholar 

  9. Roughgarden, T.: Stackelberg scheduling strategies. In: 33rd Annual ACM Symposium on Theory of Computing, pp. 104–113 (2001)

    Google Scholar 

  10. Roughgarden, T.: The price of anarchy is independent of the network topology. In: 34th Annual ACM Symposium on Theory of Computing, pp. 428–437 (2002)

    Google Scholar 

  11. Roughgarden, T., Tardos, É.: How bad is selfish routing? J. of the ACM 49(2), 236–259 (2002)

    Article  MathSciNet  Google Scholar 

  12. Schulz, A.S., Moses, N.S.: On the performance of user equilibria in traffic networks. In: 14th Symposium on Discrete Algorithms, pp. 86–87 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karakostas, G., Viglas, A. (2003). Equilibria for Networks with Malicious Users. In: Ibaraki, T., Katoh, N., Ono, H. (eds) Algorithms and Computation. ISAAC 2003. Lecture Notes in Computer Science, vol 2906. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24587-2_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24587-2_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20695-8

  • Online ISBN: 978-3-540-24587-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics