IDEAS home Printed from https://ideas.repec.org/p/ash/wpaper/21.html
   My bibliography  Save this paper

A Game of Hide and Seek in Networks

Author

Listed:
  • Francis Bloch

    (Universit´e Paris 1 and Paris School of Economics)

  • Bhaskar Dutta

    (University of Warwick and Department of Economics, Ashoka University)

  • Marcin Dziubi´nski

    (Institute of Informatics, University of Warsaw)

Abstract

We propose and study a strategic model of hiding in a network, where the network designer chooses the links and his position in the network facing the seeker who inspects and disrupts the network. We characterize optimal networks for the hider, as well as equilibrium hiding and seeking strategies on these networks. We show that optimal networks are either equivalent to cycles or variants of a core-periphery networks where every node in the periphery is connected to a single node in the core.

Suggested Citation

  • Francis Bloch & Bhaskar Dutta & Marcin Dziubi´nski, 2019. "A Game of Hide and Seek in Networks," Working Papers 21, Ashoka University, Department of Economics.
  • Handle: RePEc:ash:wpaper:21
    as

    Download full text from publisher

    File URL: https://dp.ashoka.edu.in/ash/wpaper/paper21_0.pdf
    Download Restriction: no
    ---><---

    Other versions of this item:

    References listed on IDEAS

    as
    1. Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
    2. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 81(4), pages 1518-1542.
    3. Marcin Waniek & Tomasz P. Michalak & Michael J. Wooldridge & Talal Rahwan, 2018. "Hiding individuals and communities in a social network," Nature Human Behaviour, Nature, vol. 2(2), pages 139-147, February.
    4. Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
    5. Mariagiovanna Baccara & Heski Bar-Isaac, 2008. "How to Organize Crime -super-1," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 75(4), pages 1039-1067.
    6. repec:oup:restud:v:81:y:2014:i:4:p:1518-1542. is not listed on IDEAS
    7. Cerdeiro, Diego A. & Dziubiński, Marcin & Goyal, Sanjeev, 2017. "Individual security, contagion, and network design," Journal of Economic Theory, Elsevier, vol. 170(C), pages 182-226.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022. "Network defense and behavioral biases: an experimental study," Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
    2. Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2023. "Attack and interception in networks," Theoretical Economics, Econometric Society, vol. 18(4), November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
    2. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    3. Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2023. "Attack and interception in networks," Theoretical Economics, Econometric Society, vol. 18(4), November.
    4. Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022. "Network defense and behavioral biases: an experimental study," Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
    5. Marcin Dziubinski & Sanjeev Goyal & Adrien Vigier, 2015. "Conflict and Networks," Cambridge Working Papers in Economics 1565, Faculty of Economics, University of Cambridge.
    6. Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017. "Optimal design and defense of networks under link attacks," Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
    7. Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
    8. Belhaj, Mohamed & Deroïan, Frédéric, 2018. "Targeting the key player: An incentive-based approach," Journal of Mathematical Economics, Elsevier, vol. 79(C), pages 57-64.
    9. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    10. Djawadi, Behnud Mir & Endres, Angelika & Hoyer, Britta & Recker, Sonja, 2019. "Network formation and disruption - An experiment are equilibrium networks too complex?," Journal of Economic Behavior & Organization, Elsevier, vol. 157(C), pages 708-734.
    11. Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
    12. Manxi Wu & Saurabh Amin, 2019. "Securing Infrastructure Facilities: When Does Proactive Defense Help?," Dynamic Games and Applications, Springer, vol. 9(4), pages 984-1025, December.
    13. Goyal, S., 2016. "Networks and Markets," Cambridge Working Papers in Economics 1652, Faculty of Economics, University of Cambridge.
    14. Billand, Pascal & Bravard, Christophe & Iyengar, Sitharama S. & Kumar, Rajnish & Sarangi, Sudipta, 2016. "Network connectivity under node failure," Economics Letters, Elsevier, vol. 149(C), pages 164-167.
    15. Haller, Hans & Hoyer, Britta, 2019. "The common enemy effect under strategic network formation and disruption," Journal of Economic Behavior & Organization, Elsevier, vol. 162(C), pages 146-163.
    16. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
    17. Xu, Jin & Zenou, Yves & Zhou, Junjie, 2022. "Equilibrium characterization and shock propagation in conflict networks," Journal of Economic Theory, Elsevier, vol. 206(C).
    18. Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016. "Network security and contagion," Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
    19. Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Working Papers 2015.56, Fondazione Eni Enrico Mattei.
    20. Michel Grabisch & Agnieszka Rusinowska & Xavier Venel, 2019. "Diffusion in countably infinite networks," Documents de travail du Centre d'Economie de la Sorbonne 19017, Université Panthéon-Sorbonne (Paris 1), Centre d'Economie de la Sorbonne.

    More about this item

    Keywords

    Hide and Seek;

    JEL classification:

    • D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
    • D62 - Microeconomics - - Welfare Economics - - - Externalities
    • C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ash:wpaper:21. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Ashoka University (email available below). General contact details of provider: https://www.ashoka.edu.in .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.