Abstract
Forming, in a decentralized fashion, an optimal network topology while balancing multiple, possibly conflicting objectives like cost, high performance, security and resiliency to viruses is a challenging endeavor. In this paper, we take a game-formation approach to network design where each player, for instance an autonomous system in the Internet, aims to collectively minimize the cost of installing links, of protecting against viruses, and of assuring connectivity. In the game, minimizing virus risk as well as connectivity costs results in sparse graphs. We show that the Nash Equilibria are trees that, according to the Price of Anarchy (PoA), are close to the global optimum, while the worst-case Nash Equilibrium and the global optimum may significantly differ for small infection rate and link installation cost. Moreover, the types of trees, in both the Nash Equilibria and the optimal solution, depend on the virus infection rate, which provides new insights into how viruses spread: for high infection rate τ, the path graph is the worst- and the star graph is the best-case Nash Equilibrium. However, for small and intermediate values of τ, trees different from the path and star graphs may be optimal.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2015 IEEE 54th Annual Conference on Decision and Control, CDC'15 |
Editors | Y. Ohta, M. Sampei, A. Astolfi |
Place of Publication | Piscataway, NJ |
Publisher | IEEE |
Pages | 294-299 |
Number of pages | 6 |
ISBN (Electronic) | 978-1-4799-7886-1 |
DOIs | |
Publication status | Published - Dec 2015 |
Event | 54th IEEE Conference on Decision and Control, CDC 2015 - Osaka, Japan Duration: 15 Dec 2015 → 18 Dec 2015 Conference number: 54 |
Conference
Conference | 54th IEEE Conference on Decision and Control, CDC 2015 |
---|---|
Abbreviated title | CDC 2015 |
Country/Territory | Japan |
City | Osaka |
Period | 15/12/15 → 18/12/15 |
Keywords
- Games
- Nash equilibrium
- Viruses (medical)
- Network topology
- Peer-to-peer computing
- Stability analysis
- Security