Skip to main content
Log in

Equilibria for networks with malicious users

  • Full Length Paper
  • Published:
Mathematical Programming Submit manuscript

Abstract

We consider the problem of characterizing user equilibria and optimal solutions for selfish routing in a given network. We extend the known models by considering malicious behavior. While selfish users follow a strategy that minimizes their individual cost, a malicious user will use his flow through the network in an effort to cause the maximum possible damage to the overall cost. We define a generalized model, present characterizations of flows at equilibrium and prove bounds for the ratio of the social cost of a flow at equilibrium over the cost when centralized coordination among users is allowed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Aashtiani H.Z., Magnanti T.L.(1981). Equilibria on a congested transportation network. SIAM J. Algebraic Discrete Methods 2(3): 213–226

    MATH  MathSciNet  Google Scholar 

  2. Beckmann, M., McGuire, C.B., Winsten, C.B.: Studies in the Economics of Transportation. Yale University Press (1956)

  3. Czumaj, A., Vöcking, B.: Tight bounds for worst-case equilibria. In: Proceedings of the 13th Annual ACM–SIAM Symposium On Discrete Mathematics, pp. 413–420 (2002)

  4. Dafermos S., Sparrow F.(1969). The traffic assignment problem for a general network. J. Res. Nat. Bureau Standards 73B: 91–118

    MathSciNet  Google Scholar 

  5. Haurie A., Marcotte P.(1985). On the relationship between Nash–Cournot and Wardrop equilibria. Networks 15, 295–308

    Article  MATH  MathSciNet  Google Scholar 

  6. Karakostas, G., Viglas, A.: Equilibria for networks with malicious users. In: Proceedings of the 14th Annual International Symposium on Algorithms and Computation (ISAAC), pp. 696–704 (2003)

  7. Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, LNCS 1563, pp. 404–413 (1999)

  8. Mavronicolas, M., Spirakis, P.: The price of selfish routing. In: Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, pp. 510–519 (2001)

  9. Pigou A.(1920). The economics of Welfare. Macmillan, London

    Google Scholar 

  10. Rockafellar R.T.(1970). Convex Analysis. Princeton University Press, New Jersey

    MATH  Google Scholar 

  11. Roughgarden, T.: Designing networks for selfish users is hard. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, pp. 472–481 (2001)

  12. Roughgarden, T.: Stackelberg scheduling strategies. In: Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, pp. 104–113(2001)

  13. Roughgarden T.(2003). The price of anarchy is independent of the network topology. J. Comput. Syst. Sci. 67(2): 341–364

    Article  MATH  MathSciNet  Google Scholar 

  14. Roughgarden T., Tardos É.(2002). How bad is selfish routing?. J. ACM 49(2): 236–259

    Article  MathSciNet  Google Scholar 

  15. Schulz, A.S., Stier Moses, N.E.: On the performance of user equilibria in traffic networks. In: 14th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 86–87 (2003)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anastasios Viglas.

Additional information

An extended abstract of this work appeared in the Proceedings of the 14th Annual International Symposium on Algorithms and Computation (ISAAC) 2003.

G. Karakostas’ research was supported by an NSERC Discovery research grant and MITACS.

Part of this research was done when Viglas was a postdoctoral fellow at the University of Toronto, Canada.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Karakostas, G., Viglas, A. Equilibria for networks with malicious users. Math. Program. 110, 591–613 (2007). https://doi.org/10.1007/s10107-006-0015-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10107-006-0015-2

Keywords

Navigation