Abstract
We consider the dynamic network formation problem under the requirement that the whole network be connected and remain connected after q nodes are destroyed. We propose the concept of dynamic -stability and characterize dynamic -stable networks for any . Comparison with the outcome in the static model is also discussed.
JEL Classification:
C72
1. Introduction
The value of a social network relies crucially on its connectivity and resilience, which can be defined by the ability to maintain connectivity even after unexpected trembles due to external shocks. In a prior paper [1], we considered the problem of forming a network under the requirement that the whole network be connected and remain connected after eliminating q nodes, and introduced the concept of the -stability of a network in a static setting. The -stability is, roughly speaking, to require connectivity in addition to pairwise stability defined by Jackson and Wolinsky [2] even after any at most q nodes are deleted. In the paper, we characterized the -stable networks without characterizing general -stable networks.
In this paper, we extend the network formation problem and the concept of -stability to a dynamic setting. In a dynamic model in which one player is spawned at each period, we characterize the dynamic -stable network for and compare the outcome with that in the static model of Jun and Kim [1]. Our concept of dynamic -stability will be also called intraperiod-farsighted stability, since it is defined based on our assumption that players are forward looking only within each period.
There are some papers on the resilience of a network. To the best of our knowledge, Jun and Kim [1] is the first paper to acknowledge the possibility of node destruction in the literature on (social or economic) network formation. After Jun and Kim [1], there have been some studies that added an attacker as an active player. In particular, Goyal and Vigier [3] considered a contest game between a network designer and an attacker. The designer first chooses a network and allocates defense resources across nodes, and then an adversary allocates attack resources to nodes. If the adversary’s attack on a node succeeds, he captures the node and any unprotected nodes connected with the nodes via contagion. Then, the designer cannot control the nodes anymore. The objective of the designer is to maximize the total value from the whole network. In Dziubiński and Goyal [4], there is no contagion but the model is quite similar. Unlike Jun and Kim [1], however, both are centralized network design problems rather than decentralized network formation problems. Moreover, information decay is assumed in neither model. Thus, in Goyal and Vigier [3], a network generates the same value insofar as it is connected. That is, how it is connected does not matter. In Dziubiński and Goyal [4] that considers the linking costs explicitly, it is not important, either, how a network is connected and, as a result, how much it can reduce communication delays, because information decay is not assumed. Hoyer and De Jaegher [5] also considers a centralized network design problem with linking costs and without information decay. They analyze both cases of node deletion and link deletion. Exceptionally, Haller and Hoyer [6] is a decentralized network formation model just like Jun and Kim [1], but it assumes no information decay, either. It uses the solution concept of Nash stability, whereas Jun and Kim [1] proposes a new solution concept of -stability which shares the spirit of pairwise stability but is stronger than that. It is well known that Nash stability and pairwise stability do not have any inclusion relation. On one hand, Nash stability could be stronger than pairwise stability because it requires a network to be robust against unilateral deviations involving more than two players (for example, cutting a link and at the same time linking with the third player) and only a pair’s deviation, but, on the other hand, pairwise stability could be stronger because it requires a network to be robust against any bilateral deviations of a pair of players to form a link and a unilateral deviation.
Our dynamic model of network formation is also similar to a sequential version of a network creation game which was introduced by Fabrikant et al. [7]. Both take the delay cost into account but Fabrikant et al. [7] used Nash stability as a solution concept, unlike our paper. Leme et al. [8] proposed subgame perfection as the solution concept in a model in which players arrive sequentially, just as we used the concept of intraperiod-farsighted stability to capture dynamic consistency, but neither of Fabrikant et al. [7] and Leme et al. [8] considered the possibility of attacks.
In Section 2, we introduce some preliminary definitions in graph theory. In Section 3, we set up a dynamic model of network formation. Section 4 provides an analysis for the dynamic model without faults and with faults. Concluding remarks follow in Section 5. All the proofs are provided in Appendix A.
2. Preliminaries
Let be the set of nodes representing agents with . Interactions among agents are formally represented by a graph (or network) g.1
If agents i and j are linked to each other in graph g, we denote it by . We also denote by the graph obtained from adding the link to g and by the graph obtained from deleting the link from g. A path between and in g is a set of distinct nodes such that . We will use more intuitive notation for a path as interchangeably.
A graph g is said to be connected if there is a path in g between any pair of agents i and j in N. Additionally, g is said to be q-connected if g is still connected even after q nodes are deleted.2 We will denote the set of all connected graphs by and the set of all q-connected graphs by . Then, it is obvious that graph g is q-connected whenever it is -connected for , that is, if for all where .
If g is not connected, it is possible that only a proper subset of N have links in g. We will denote the subset by and define it by .
3. Dynamic Model of Network Formation
We consider communication networks. If , both of agent i and agent j incur the cost of connecting the direct link. If agent i and j are directly linked, they can exchange information without delay (i.e., in one unit of time length). If agent i is indirectly linked to j, i.e., there is a path between i and j in g, a delay occurs in receiving information from each other. The delay cost can be represented by the distance between them in g which is defined by the number of links in the shortest path between i and j in g and denoted by . If there is no path between i and j for some , we define .
The total cost that each agent i incurs in graph g is the sum of the delay cost and the connecting cost, which is given by
where and . We will call and agent i’s delay status and connecting status respectively. Note that for any if , while for any if . Note that if an agent adds a link, it has a tradeoff between increasing his total linking cost and reducing the total delay cost which is the benefit of adding a link.
We consider the following model of dynamic network evolution. In each period t, player t is born. Thus, in the first period, the population consists of only one agent. In the t-th period, player t joins the population consisting of players. The stage game of the t-th period proceeds as follows: First, player 1 decides whether to propose connecting a link with the newcomer, player t.3 After the decision of player t whether to accept the proposal, player 2 decides whether to propose a link with player t and so on until player makes a decision. Players are forward-looking only within a period. In other words, players make backward inductions in a stage game of each period. When they make a decision at period t, they do not take into account the possibility of repeating this procedure against player . Once a link is formed, the connecting cost c is sunk, meaning that no agent considers the option of severing an already formed link because a player could not recover c by doing so. On the other hand, the communication costs are not sunk. Communications occur in every period. Thus, the delay costs are incurred in each period. For example, if , player t incurs delay costs at both period t and period and further incurs the additional delay cost of one for communication with a new entrant at period .
4. Analysis
In this section, we analyze the dynamic model with the constraint that the network is required to be connected.4 We consider both the case of no fault and the case of faults.
4.1. No Fault Case
First, we consider the case that there is no possibility that any node will be destroyed. Note that the network at each period t must be subgame perfect due to the prescribed sequential nature of a stage game. By a subgame perfect network, we mean a network that is realized in a subgame perfect equilibrium in the t-th stage game. Thus, under the requirement that a network be connected, i.e., , a dynamically -stable network at period t is defined by such that (i) is a subgame perfect network and (ii) , where . If is a dynamically -stable network at period t for all t, we call dynamically -stable. We will use dynamic -stability as our main solution concept. Additionally, note that a sequence of -stable networks at period t is strictly increasing in the sense that for any , because the assumption that the cost of linking in a period becomes sunk in the next period thereafter eliminates the possibility that an existing link is severed. This concept of -stability is based on pairwise stability by Jackson and Wolinsky [2] that requires a new link to be formed by mutual consent of the linking agents.5
It is worthwhile to mention the relations of our concept to other concepts in literature. Our definition of dynamic -stability is distinguished from that of Watts [9] and Jackson and Watts [10] who assume that players are myopic. In our definition, players are farsighted in the sense that they make linking decisions by comparing with that will be completed at the end of period t. In other words, player i does not compare with because he is farsighted enough to expect other links to follow in period t. However, they are not perfectly farsighted in the sense that they do not compare with , and ⋯. Thus, we call our definition of dynamic stability intraperiod-farsighted stability to distinguish it from farsighted stability by Chwe [11] and Page et al. [12].
To characterize dynamic -stable networks, we need several lemmas. Lemma 1 tells us whether two extreme players (the most senior player and the most junior player) in a line network have an incentive to link between them.
Lemma 1.
For any given t, define by
Then, (i) , (ii) for , and (iii) .
This lemma says that is a partition of that consists of a monotonically increasing sequence of intervals. The interval is essential to characterizing the stable network, because and have the interpretations as the benefits from node 1 linking with node and node t, respectively. Intuitively, if , node 1 will have no incentive to link with node at period because but he will have an incentive to link with node t at period t because , assuming that is a line.
To understand the intuition, let be the benefit of node k from linking with the new node t at period t. Then, the benefit is the difference in his delay status. Assuming that is a line, the incentive of node 1 to link with node t is exactly identical to the incentive of node to link with node t. Hence, implies .6 Thus, where . If is odd,
and if is even,
It is intuitively clear that node 1 has more incentive to link with the entrant as the length of the line network is longer. Thus, Lemma 2 follows.
Lemma 2.
Assume that is a line; i.e., . Then, is strictly decreasing in k, for .
This lemma implies that if node 1 has no incentive to link with node t, neither does node k for . The following lemma is helpful for understanding the incentive of node to link with node t.
Lemma 3.
Assume that is a line. Then, implies .
This lemma implies that the incentive of node to link with the entrant t in a line network is congruent with the incentive of node 1.
Lemma 4.
For given t, if , i.e., , is a line.
The main insight behind this lemma is that the most senior player enjoys the first mover advantage. He can save the connecting cost by taking advantage of juniors who must link with the newcomers. We can call this the deferral principle.7 The first mover (senior) advantage is mainly due to the requirement that the network must be connected.
To illustrate -stable networks, consider . It is clear that , since . At , node 1 would not link with node 3 if , because he knows that if he does not, node 2 must link to node 3. Accordingly, for any . This is contrasted with the case that in which node 1 will link to the new node 3 even if he knows that a direct link between node 2 and node 3 will follow his linking with node 3 because the benefit of reducing a delay by the direct link with node 3 exceeds the linking cost (). At , node 3 must link with the new node 4 (i.e., ) if for all . If , node 3 will not link with node 4 (i.e., ), as far as . If , if because the linking cost c is smaller than the benefit of reducing delay which is 2. If , would lead to and . Therefore, node 1 would prefer not to link to node 4, because in that case, node 3 must link with node 4 and this is better for node 1. Thus, if and only if . The resulting stable network at is a circle if and a line if . This argument can be generalized for by the following proposition.
Proposition 1.
If , the complete graph is the only dynamically -stable network. For any , there exists a finite time such that, for all , is a line, and is a circle if . In particular, is determined by t such that , and is strictly increasing in c.
In Appendix B, we will provide an algorithm which we call optimal deferral algorithm to find the -stable network for any t.
By varying c instead of varying t and fixing c, Proposition 1 can be interpreted as follows.
Corollary 1.
Suppose that for some . Then, is a circle if (), and is a line if .
We can compare the result in this dynamic model of network formation with that of a static model that was obtained in Jun and Kim [1]. First, the complete network is uniquely -stable if in both the dynamic model and the static model. Second, the line network is statically -stable if for even k and for odd k. Proposition 1 shows that the line network is dynamically -stable in the same range of c. Third, the circle network is dynamically -stable if . Let be the range of c in which a circle is -stable in a static model. Then, we have
by Proposition 1 of Jun and Kim [1]. Since for all , the dynamic -stability of a circle implies static -stability, but not vice versa.
4.2. Fault Case
Now, we consider the possibility that nodes are destroyed due to exogenous shocks, for example, an enemy’s attack.8 Thus, in this section, besides connectivity, we impose a further requirement that a graph remains connected even after the deletion of any at most q nodes and their direct links. Then a graph at period t is dynamically -stable if and only if (i) is subgame perfect and (ii) , .
Proposition 2.
If , the complete graph is the only -stable network. For any , if , the unique dynamically -stable network is the complete graph. If , it must be a graph such that there are centers called hubs forming a complete subnetwork among them and the rest of the nodes have links to the centers.
Without the possibility of node extinction, hubs would not be necessary for stability, but hubs are essential for stability in the presence of a possibility of attacks on nodes, and furthermore, more hubs are necessary in the presence of attacks on more nodes (larger q).
It is easy to see that a dynamically -stable network is, in general, not -stable in a static model. Dynamic -stability requires centers that form a clique.9 If a pair of centers delete the link between them, it is profitable if , because the delay cost per each node increases by one and . Therefore, if , no dynamically -stable network is -stable in a static model. This disparity mainly comes from our assumption that c is sunk. Once a link is formed in a previous period, it is never severed in our dynamic model, even if it may become redundant by subsequently formed links. Thus, the resulting dynamically -stable network may not be -stable in a static sense because such a link may not be formed in a static model. To elaborate, note that all nodes must have at least degrees in a q-connected network (see Lemma 2 of Jun and Kim [1]). In our dynamic model, centers form links with all the other center nodes and then the -th node form links with center nodes. Let be the remaining center node; i.e., . Similarly, if -th node forms links with center nodes except node , it is dynamically -stable. It is, however, not statically -stable, because two other center nodes for could benefit from severing their direct link if , while the remaining graph is still q-connected, although severing the link is not permissible in the dynamic model in which the linking cost is sunk.
Clearly, there is a coordination problem,10 because no player would want to be a hub if hubs are more likely to be attacked.11 In our dynamic model, however, such a coordination problem is easily resolved by seniority. The most senior players must form the hubs to maintain q-connectivity. In this sense, the possibility of external attacks gives seniors a disadvantage to becoming a hub.
5. Conclusions
In this paper, we characterized the -stable network and the -stable network in a dynamic model in which players enter the population sequentially. We believe that it is worthwhile to examine how robust our characterization is to variations of the model. We look forward to more enriched models in this direction.
Author Contributions
Formal analysis, T.J. and J.-Y.K.; writing–original draft preparation, J.-Y.K.; writing–review and editing, J.-Y.K. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A. Proofs
Proof of Lemma 1.
(i) If t is odd, . If t is even, . (ii) and (iii) are clear from (i). □
Proof of Lemma 2.
We have
by relabeling to , where , for any . Since is a circle with t nodes for any t, this is strictly increasing in (circle size), so it is strictly decreasing in k. □
Proof of Lemma 3.
Consider the incentive of node 1 to link with node t. If he does not link, neither does node by Lemma 2. Thus, node must link with node t since . In this case, is a line such that , and node 1 becomes the extreme node of the line network. On the other hand, if node 1 links with node t, node will link with node t, too, because node would otherwise become an extreme node of a line network . Therefore, if node 1 prefers a circle to a line (with himself being an extreme node of the line), node also prefers a circle to a line in which he is one of the extreme nodes. This implies that node prefers to link with node t, whenever node 1 prefers to link with node t. □
Proof of Lemma 4.
Since , we have for any by Lemma 1. This implies that node 1 has no incentive to link with the entrant k for . Then, by Lemma 2, node j has no incentive to link with the entrant for any , either. Thus, connectivity requires node to link with node . (I.e., node has an incentive to link with node , considering if g is not connected). This implies that the resulting network is a line. □
Proof of Proposition 1.
It is trivial that the complete graph is the only dynamically -stable network if . For , suppose . Then, it is clear from Lemma 1 that , .
(i) We will show that for any , no node has an incentive to form a link with a new entrant t. By Lemma 4, is a line. Now, since , node 1 has no incentive to link with node t. Then, by Lemma 2, node k for will not link with node t, implying that node must link with node t due to the requirement of connectivity. Therefore, is a line for any .
(ii) We will show that is a circle. Since , . This implies that node 1 has an incentive to link with node t. Note that node 2 has no incentive to link with node t, because . Moreover, by Lemma 4, no node has an incentive to link with node t. The incentive of node to link with node t is identical with node 1’s incentive. Additionally, the incentive of node t to connect two links instead of one link is exactly identical with the incentives of node 1 and node . Thus, . Therefore, is a circle.
(iii) Since both increases in t and , for any , there exists such that ; i.e., is a circle and is a line for any . □
Proof of Proposition 2.
(i) It is trivial that the complete graph is the only -stable network if .
(ii) It is clear that is a complete graph for any . (If , deleting () nodes except i and j would make it disconnected. Thus, .)
(iii) We can show that is a complete graph for . If for or and for some , deleting all other nodes than node and node t would make the graph disconnected.
(iv) If , we will first show that . Let , and . We may call an insider and an outsider. Let S be any subset of T with . We will denote the graph obtained by deleting all the nodes in S from by . Now, if , two nodes will remain in hub H. Let the nodes be i and . Then, because and . Since any outsider j has links with insiders, or . If and for any , it implies that , so there is a path between j and , in . If for the same i, there is a path between j and , in . If or , it is trivial that .
(v) It remains to show that is -stable. First, any outsider would not connect more than nodes with insiders from the assumption that , since additional link will reduce delay cost by one. Second, any outsider could not have less than nodes with insiders. If for some , choose . Then, there is no path between i and j in , i.e., . Therefore, in a -stable network, any outsider must have exactly links with nodes in H. □
Appendix B. Optimal Deferral Algorithm
Lemma A1.
For given t, if , a necessary condition for to be -stable is that for all .
Proof.
Suppose that for some . Let the shortest path between them be with and . We can relabel by . Since and , we have by Lemma 1. This implies that one extreme node 1 (or node i) has an incentive to link with the other extreme node (or node j) directly or indirectly via a more junior node. Thus, it must be that . This is a contradiction. □
Optimal Deferral Algorithm:
If for some t, is a circle, while is a line for any by Proposition 1. Now, the following steps will generate for any .
- Step 1:
In period l, link players l and and let . Define . If , define . If , let and define .
- Step 2:
For , let . If , . If , let and define .
- Step 3:
Repeat step 1 and step 2 until . Define .
We will sketch the proof of why the network that is obtained by the optimal deferring algorithm is dynamic -stable.
Start from period t such that is a circle, i.e., . In step 1, for , is the set of nodes i such that the (shortest) distance from in is not less than . If , i.e., for all , need not have other link than , because . So, is -stable. If , the nodes needs an additional link to maintain by Lemma 4. By the senior advantage, the most junior, i.e., takes the role of linking with . We denote the resulting network by .
Now, it is still possible that for some i. It is the reason why we need step 2. In step 2, define by the set of nodes i in such that the shortest distance from in is not less than . If , take again by the senior advantage and link to . We define the resulting network by .
We repeat this process for any and for any , until . If we define by j such that , it is clear that is -stable.
References
- Jun, T.; Kim, J.-Y. Connectivity, Stability and Efficiency in a Network as Information Flow. Math. Soc. Sci. 2007, 53, 314–331. [Google Scholar] [CrossRef]
- Jackson, M.; Wolinsky, A. A Strategic Model of Social and Economic Networks. J. Econ. Theory 1996, 71, 44–74. [Google Scholar] [CrossRef]
- Goyal, S.; Vigier, A. Attack, defence, and contagion in networks. Rev. Econ. Stud. 2014, 81, 1518–1542. [Google Scholar] [CrossRef]
- Dziubiźski, M.; Goyal, S. Network design and defence. Games Econ. Behav. 2013, 79, 30–43. [Google Scholar] [CrossRef]
- Hoyer, B.; De Jaegher, K. Strategic Network Disruption and Defense. J. Pub. Econ. Theory 2016, 18, 802–830. [Google Scholar] [CrossRef]
- Haller, H.; Hoyer, B. The common enemy effect under strategic network formation and disruption. J. Econ. Behav. Org. 2019, 162, 146–163. [Google Scholar] [CrossRef]
- Fabrikant, A.; Luthra, A.; Maneva, E.N.; Papadimitriou, C.H.; Shenker, S. On a network creation game. In Proceedings of the twenty-second annual symposium on Principles of distributed computing (PODC), Boston, MA, USA, 13–16 July 2003; pp. 347–351. [Google Scholar] [CrossRef]
- Leme, R.P.; Syrgkanis, V.; Tardos, É. The curse of simultaneity. In Proceedings of the 3rd Innovations in Theoretical Computer Science ConferenceJanuary (ITCS), Cambridge, MA, USA, 8–10 January 2012; pp. 60–67. [Google Scholar] [CrossRef]
- Watts, A. A Dynamic Model of Network Formation. Games Econ. Behav. 2001, 34, 331–341. [Google Scholar] [CrossRef]
- Jackson, M.; Watts, A. The Evolution of Social and Economic Networks. J. Econ. Theory 2002, 106, 265–295. [Google Scholar] [CrossRef]
- Chwe, M. Farsighted Coalitional Stability. J. Econ. Theory 1994, 63, 299–325. [Google Scholar] [CrossRef]
- Page, F., Jr.; Wooders, M.; Kamat, S. Network and Farsighted Stability. J. Econ. Theory 2005, 120, 257–269. [Google Scholar] [CrossRef]
| 1 | In this paper, we use the terms “graph” and “network” interchangeably. |
| 2 | By deletion of a node, we mean that all the incident links to the node are deleted together. |
| 3 | Since he is the most senior in the society, he is entitled to move first. |
| 4 | Requiring connectivity is reasonable, especially when pieces of information possessed by each agent are complementary. |
| 5 | Severing an existing link unilaterally does not occur in -stable networks due to the assumption of sunk linking costs. |
| 6 | For a formal proof, see Lemma 3. |
| 7 | The insight of the deferral principle is similar to the principle of last clear chance in law. In tort law, if several legal parties are jointly responsible for an accident but a second mover could have avoided the accident, the second mover tends to be placed in a disadvantageous position by the contributory negligence rule. It is referred to as the doctrine of last clear chance. In our model, all the players are jointly responsible for network disconnection. In this case, the last mover bears the burden of connecting with the entrant. |
| 8 | In the static model of Jun and Kim [1] in which the number of players is fixed, it is natural to adopt the interpretation that nodes naturally die with some exogenous probability, but in this dynamic model, it is less natural because an exogenously fixed probability of death must imply that q increases as the population size grows. Thus, in this paper, we adopt the interpretation of node destruction as a result of an enemy’s attack. An exogenous q in this dynamic model can be justified by the implicit assumption that the enemy’s ability to attack is limited only to q nodes. |
| 9 | A clique is defined by a maximal complete subgraph of a given graph. |
| 10 | Even without possibility of attacks, a coordination problem occurs in a static network formation model. See Jun and Kim [1]. |
| 11 | Since we do not assume a strategic enemy, there is no reason for a hub node to be more likely to be attacked in our model. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).