Abstract
We consider the problem of characterizing user equilibria and optimal solutions for selfish routing in a given network. We extend the known models by considering malicious behaviour. While selfish users follow a strategy that minimizes their individual cost, a malicious user will use his flow through the network in an effort to cause the maximum possible damage to this cost. We define a generalized model, present characterizations of flows at Wardrop equilibrium and prove bounds for the ratio of the social cost of a flow at Wardrop equilibrium over the cost when centralized coordination among users is allowed.
Extended Abstract. Detailed proofs appear in the full version.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Aashtiani, H.Z., Magnanti, T.L.: Equilibria on a congested transportation network. SIAM J. on Algebraic and Discrete Methods 2(3), 213–226 (1981)
Beckmann, M., McGuire, C.B., Winsten, C.B.: Studies in the economics of transportation. Yale University Press (1956)
Czumaj, A., Vöcking, B.: Tight bounds for worst-case equilibria. In: 13th ACM-SIAM Symposium On Discrete Mathematics, pp. 413–420 (2002)
Dafermos, S., Sparrow, F.: The traffic assignment problem for a general network. J. of Research of the National Bureau of Standards 73B, 91–118 (1969)
Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol. 1563, pp. 404–413. Springer, Heidelberg (1999)
Mavronicolas, M., Spirakis, P.: The price of selfish routing. In: 33rd Annual ACM Symposium on Theory of Computing, pp. 510–519 (2001)
Rockafellar, R.T.: Convex Analysis. Princeton University Press, Princeton (1970)
Roughgarden, T.: Designing networks for selfish users is hard. In: 42nd IEEE Symposium on Foundations of Computer Science, pp. 472–481 (2001)
Roughgarden, T.: Stackelberg scheduling strategies. In: 33rd Annual ACM Symposium on Theory of Computing, pp. 104–113 (2001)
Roughgarden, T.: The price of anarchy is independent of the network topology. In: 34th Annual ACM Symposium on Theory of Computing, pp. 428–437 (2002)
Roughgarden, T., Tardos, É.: How bad is selfish routing? J. of the ACM 49(2), 236–259 (2002)
Schulz, A.S., Moses, N.S.: On the performance of user equilibria in traffic networks. In: 14th Symposium on Discrete Algorithms, pp. 86–87 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karakostas, G., Viglas, A. (2003). Equilibria for Networks with Malicious Users. In: Ibaraki, T., Katoh, N., Ono, H. (eds) Algorithms and Computation. ISAAC 2003. Lecture Notes in Computer Science, vol 2906. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24587-2_71
Download citation
DOI: https://doi.org/10.1007/978-3-540-24587-2_71
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20695-8
Online ISBN: 978-3-540-24587-2
eBook Packages: Springer Book Archive