IDEAS home Printed from https://ideas.repec.org/p/bbk/bbkefp/1506.html
   My bibliography  Save this paper

Decentralised Defence of a (Directed) Network Structure

Author

Listed:
  • Marco Pelliccia

    (Department of Economics, Mathematics & Statistics, Birkbeck)

Abstract

We model the decentralised defence choice of agents connected in a directed graph and exposed to an external threat. The network allows the players to receive goods from one or more producers through directed paths. Each agent is endowed with a finite and divisible defence resource that can be allocated to their own security or to that of their peers. The external threat is represented by an intelligent attacker who aims to maximise the flow-disruption by seeking to destroy one node. The set of the attackerÂ’s potential targets is a subset of the set of middleman nodes and producers. These are the critical nodes with highest brokerage power in a directed network and therefore crucial to the system-flow. We show that a decentralised defence allocation is efficient when we assume perfect information: a centralised allocation of defence resources which minimises the flow-disruption coincides with a decentralised allocation. On the other hand, when we assume imperfect information, the decentralised allocation is inefficient and involves no reallocation of defence resources between the nodes. Finally, for a given connected graph, by increasing the link-density we can reduce the set of middleman nodes and thus the number of the potential targets. This also decreases the probability of a successful attack.

Suggested Citation

  • Marco Pelliccia, 2015. "Decentralised Defence of a (Directed) Network Structure," Birkbeck Working Papers in Economics and Finance 1506, Birkbeck, Department of Economics, Mathematics & Statistics.
  • Handle: RePEc:bbk:bbkefp:1506
    as

    Download full text from publisher

    File URL: https://eprints.bbk.ac.uk/id/eprint/15273
    File Function: First version, 2015
    Download Restriction: no
    ---><---

    Other versions of this item:

    References listed on IDEAS

    as
    1. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    2. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    3. Cerdeiro, Diego & Dziubinski, Marcin & Goyal, Sanjeev, 2015. "Contagion Risk and Network Design," Climate Change and Sustainable Development 206416, Fondazione Eni Enrico Mattei (FEEM).
    4. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    5. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    6. Lapan, Harvey E. & Sandler, Todd, 1993. "Terrorism and signalling," European Journal of Political Economy, Elsevier, vol. 9(3), pages 383-397, August.
    7. repec:oup:restud:v:81:y:2014:i:4:p:1518-1542. is not listed on IDEAS
    8. Geoffrey Heal & Howard Kunreuther, 2004. "Interdependent Security: A General Model," NBER Working Papers 10706, National Bureau of Economic Research, Inc.
    9. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    10. Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Sonja Brangewitz & Behnud Mir Djawadi & Angelika Endres & Britta Hoyer, 2017. "Network Formation and Disruption - An Experiment. Are efficient networks too complex?," Working Papers CIE 101, Paderborn University, CIE Center for International Economics.
    2. Sonja Brangewitz & Behnud Mir Djawadi & Angelika Endres & Britta Hoyer, 2017. "Network Formation and Disruption - An Experiment - Are Efficient Networks too Complex?," Working Papers 2017.30, Fondazione Eni Enrico Mattei.
    3. Djawadi, Behnud Mir & Endres, Angelika & Hoyer, Britta & Recker, Sonja, 2019. "Network formation and disruption - An experiment are equilibrium networks too complex?," Journal of Economic Behavior & Organization, Elsevier, vol. 157(C), pages 708-734.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    2. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    3. Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
    4. Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
    5. Marcin Dziubinski & Sanjeev Goyal & Adrien Vigier, 2015. "Conflict and Networks," Cambridge Working Papers in Economics 1565, Faculty of Economics, University of Cambridge.
    6. Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
    7. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    8. Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017. "Optimal design and defense of networks under link attacks," Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
    9. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    10. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    11. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    12. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    13. Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
    14. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    15. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    16. Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
    17. Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
    18. Landwehr, Jakob, 2015. "Network design and imperfect defense," Center for Mathematical Economics Working Papers 537, Center for Mathematical Economics, Bielefeld University.
    19. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    20. Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.

    More about this item

    Keywords

    Networks; Network defence; Security.;
    All these keywords.

    JEL classification:

    • C69 - Mathematical and Quantitative Methods - - Mathematical Methods; Programming Models; Mathematical and Simulation Modeling - - - Other

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bbk:bbkefp:1506. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: the person in charge (email available below). General contact details of provider: https://www.bbk.ac.uk/departments/ems/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.