Next Article in Journal
Some Connectivity Parameters of Interval-Valued Intuitionistic Fuzzy Graphs with Applications
Next Article in Special Issue
Evidential-Reasoning-Type Multi-Attribute Large Group Decision-Making Method Based on Public Satisfaction
Previous Article in Journal
A Novel PM2.5 Concentration Forecasting Method Based on LFIG_DTW_HC Algorithm and Generalized Additive Model
Previous Article in Special Issue
Development of an Intuitive GUI-Based Fuzzy Multi-Criteria Decision Model for Comprehensive Hospital Service Quality Evaluation and Indexing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficiency and Vulnerability in Networks: A Game Theoretical Approach

by
Conrado M. Manuel
*,† and
Eduardo Ortega
Faculty of Statistics, Complutense University of Madrid, Puerta de Hierro, 1, 28040 Madrid, Spain
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Axioms 2023, 12(12), 1119; https://doi.org/10.3390/axioms12121119
Submission received: 7 November 2023 / Revised: 5 December 2023 / Accepted: 7 December 2023 / Published: 13 December 2023
(This article belongs to the Special Issue Decision-Making Modeling and Optimization)

Abstract

:
Defining measures of network efficiency and vulnerability is a pivotal aspect of modern networking paradigms. We approach this issue from a game theoretical perspective, considering networks where actors have social or economic interests modeled through a cooperative game. This allows us to define, for each network, a family of efficiency measures and another of vulnerability measures, parameterized by the game. The proposed measures use the within groups’ and the between groups’ Myerson values. These values, respectively, measure the portion of the classical Myerson allocation corresponding to the productivity of players and the part related to intermediation costs. Additionally, they indicate the portion of total centrality in social networks attributed to communication or betweenness. In our proposal, the efficiency of a network is the proportion of total productivity (or centrality) that players can retain using the network topology. Intermediation costs (and betweenness centrality) can be seen as a weakness with a negative impact. Therefore, we suggest calculating vulnerability as the proportion of expenses players incur in intermediation payments. We explore the properties of these measures and tailor them to various structures and specific games, also analyzing their asymptotic behavior.

1. Introduction

Networks are the backbone of our interconnected world. They are therefore ubiquitous today. The internet, power grid, infrastructure, transportation, neural, computer and social networks play a crucial role in our daily lives.
Understanding the structural properties of networks is of paramount importance to provide a comprehensive perspective on network dynamics that can help decision-makers and stakeholders across different domains.
This paper focuses on studying two highly relevant properties of social and economic networks: efficiency and vulnerability.
In social networks, efficiency refers to the network’s ability to connect individuals, facilitate communication, optimize interactions and enhance social cohesion by improving the flow of information. In economic networks, efficiency pertains to the network’s capacity to allocate resources effectively, maximize productivity, reduce transaction costs and minimize waste.
Conversely, vulnerability in a social network indicates the exposure of the network or its members to external or internal risks, such as misinformation, loss of information and harmful interactions. In economic networks, vulnerability refers to the possibility of weaknesses that could disrupt economic activities, generating a negative impact on productivity.
Some authors have emphasized the relevance of the individual power of actors to the group outcomes of the network. Two prominent works in this regard are those of [1,2]. In both (although with different metrics), the importance of each individual in global efficiency is measured through the impact that their removal from the network generates on group activity.
Refs. [3,4] is the seminal work in which the relationship between individuals’ centrality in the network and their influence on group processes is assumed. Since then, different sociologists have proposed various measures of centrality, which, broadly speaking, we can classify into two groups: closeness measures [5,6,7] and betweenness [3,7,8,9,10].
However, the relationship between centrality and power generates controversy. Ref. [11] cast doubt on centrality and power being the same in exchange networks. Nevertheless, Ref. [12] introduced a family of measures that incorporates (according to the author) the usual positive relationship between centrality and power as well as exceptional situations in which this relationship does not occur.
Game theory is devoted to analyzing strategic interactions and decision-making processes, and thus it can be effectively used to study dynamics within networks. As mentioned, our objective in this paper is to analyze efficiency and vulnerability in a network, and we will approach this from a game theoretical perspective, which has also proven useful in the calculation of centralities in social networks. While the analysis of efficiency in networks from a game theoretical viewpoint is not a new concept, previous studies on wireline and wireless networks have primarily been conducted from a non-cooperative game perspective. The paper of [13] is a remarkable survey of this type of contribution. The analysis of efficiency and vulnerability in transportation networks has also attracted much interest, but primarily from the perspective of non-cooperative game theory. Refs. [14,15] introduced an efficiency measure for congested networks that [16] generalize to the case in which information about traffic demand is uncertain and modeled through random variables. In our framework, we assume that the nodes of the network simultaneously act as players in a TU-game (a cooperative game with transferable utility), which represents their social or economic interests. Consequently, we propose a family of game theoretical measures of efficiency and vulnerability for a network with the game as a parameter. This implies that efficiency and vulnerability are contingent on the purpose for which individuals use the network. Whether it involves information dissemination, economic productivity or communication, we model this purpose through a TU-game.
As mentioned, the analysis of networks from a game theory perspective has a long tradition. Ref. [17] laid the groundwork with his seminal work, where he proposed to examine the impact of communication restrictions among players in a TU-game using a network (graph). He introduced a new TU-game, known as the graph-restricted game. Given the prominence of the Shapley value [18], Myerson suggested the Shapley value as the solution for graph-restricted games. Following this pioneering work, there is extensive literature on games involving cooperation restricted by a graph. Refs. [19,20] used the Myerson value as a centrality measure for actors in a symmetrical TU-game with communication restricted by a graph. In an attempt to capture both communication and betweenness centrality, they decomposed the Myerson value into the within groups Myerson value (WG-Myerson value, for short) and the between groups Myerson value (BG-Myerson value, for short). These values, when calculated for a general game, respectively, measure the player’s productivity in the game and their intermediation opportunities, among others.
The proposed efficiency and vulnerability measures introduced in this paper use this decomposition of the Myerson value. In our approach, the efficiency of a network parameterized by a game is defined as the proportion of the value of the grand coalition that players can retain (this is calculated as the sum of the within groups Myerson values of all players) as a consequence of the network topology. Therefore, more efficient economic networks enable players to retain a greater proportion of productivity, thereby reducing intermediate costs. These intermediate costs are considered a weakness with a negative impact on productivity. In our proposal for the family of vulnerability measures (also parameterized by the game), we calculate the proportion of the value of the grand coalition that players must expend in intermediation payments (the sum of the between groups Myerson values of players). These payments reduce productivity and expose the players to the disruption of economic activities resulting from a lack of communication between different groups of players (coalitions). For social networks, roughly speaking, efficiency is seen as the proportion of total centrality in the network attributed to communication among players. Vulnerability, on the other hand, is the proportion of the total centrality attributed to betweenness. In this context, efficiency is measured in terms of the relational abilities of players, while vulnerability increases when third-party control of communication between pairs of players grows. After defining the measures, we explore their most relevant properties, including their asymptotic behavior for specific games.
In a fixed game, both the efficiency and vulnerability measures we introduce can be considered normalized value functions, following [21,22]. These functions assign an aggregated value to each network, which can then be distributed among its actors. In our case, the value function indeed arises from the sum of Myerson’s allocations (WG- or BG-) generated by the purpose (game) with which players use the network.
The remainder of the paper is organized as follows. After some preliminaries on games, graphs and communication situations (graph-games), in Section 3, we introduce the family of efficiency measures and analyze their properties. Section 4 focuses on specifying the values of this family for various games and structures, including an examination of their asymptotic behavior. In Section 5, we present the family of vulnerability measures. The paper concludes with a section summarizing conclusions and final remarks, followed by the references.

2. Preliminaries

2.1. Games

A cooperative n-person game of transferable utility (TU-game for short) is a pair ( N , v ) , where N = { 1 , , n } is the set of players and v : 2 N R , satisfying v ( ) = 0 , is the characteristic function that assigns to each coalition S N the payoff v ( S ) that its s = | S | members can obtain by cooperating.
We will denote by G N the vector space of all TU-games with player set N. A very useful basis of G N is the unanimity games basis { ( N , u S ) } S N , with characteristic functions given by
u S ( T ) = 1 , if   S T , 0 , otherwise .
Consequently, for each ( N , v ) G N , we can write v as the following linear combination, v = S N Δ v ( S ) u S , in which the coefficients, Δ v ( S ) , known as Harsanyi dividends ([23]), can be calculated as
Δ v ( S ) = T S ( 1 ) s t v ( T ) .
We will say that ( N , v ) G N is zero-normalized if v ( { i } ) = 0 for all i N , is superadditive if v ( S T ) v ( S ) + v ( T ) for all S , T N , S T = , is convex if v ( S T ) + v ( S T ) v ( S ) + v ( T ) for all S , T N , and is almost-positive if Δ v ( S ) 0 for all S N . Almost-positive games are superadditive and convex.
Given ( N , v ) G N , a player i N is a null player in ( N , v ) if v ( S { i } ) v ( S ) = 0 for all S N { i } and is a necessary player ([24]) if v ( S ) = 0 for all S N { i } .
An allocation rule or point solution ψ on G N assigns to every ( N , v ) G N a vector ψ ( N , v ) R n , ψ i ( N , v ) representing the outcome of the player i in the game. A very relevant point solution was introduced by [18]. It assigns to every player i in the game ( N , v ) the following expected value of his marginal contributions:
S h i ( N , v ) = S N { i } ( n s 1 ) ! s ! n ! ( v ( S { i } ) v ( S ) ) , i N .

2.2. Graphs

A graph or a network is a pair ( N , γ ) , where N = { 1 , 2 , , n } is the set of nodes and γ is a set of links included in the complete graph γ N = { { i , j } | i , j N , i j } . If the link { i , j } γ , we will say that i and j are directly connected. In another case, i and j could be connected if there exists a path, i.e., a sequence of nodes (intermediaries) i 1 , i 2 , i k , k > 2 , with i 1 = i , i k = j , such that { i l , i l + 1 } γ , for l = 1 , , k 1 .
A set S N , S , is connected (internally connected) in ( N , γ ) if every pair of nodes in S are directly connected or they can be connected with intermediaries in S. Singletons will be considered connected. A connected component, C, of the graph ( N , γ ) is a maximal connected subset, that is, C is connected and, for all C N , if C C , then C is not connected. A graph ( N , γ ) induces a partition N / γ of the set N into connected components.
A connected set in ( N , γ ) , S * , is a minimal connection set of S S * if there is no S S * with S S and S connected. M C S ( S , N , γ ) will denote the family (occasionally empty) of all minimal connection sets of S in ( N , γ ) .
Given ( N , γ ) and S N , S / γ will denote the set of all connected components in the restriction of ( N , γ ) to S, i.e., in ( S , γ | S ) , where γ | S = { { i , j } γ | i , j S } .
A subgraph of a graph ( N , γ ) is ( N , γ ) with γ γ . Given ( N , γ ) and l γ , ( N , γ { l } ) is the subgraph obtained when the link l is removed; ( N , γ i ) is the subgraph of ( N , γ ) of the links incident on i, i.e., γ i = { l γ | i l } and ( N , γ i ) = ( N , γ γ i ) .
( N , γ ) is a tree if it is connected and it has no cycles. We will denote ( N , γ i S ) the star with center in the node i, and thus γ i S = { { i , j } , j N , j i } . ( N , γ C ) will denote the chain ordered in the natural way (from 1 to n). ( N , γ W ) is the wheel with γ W = { { 1 , 2 } , { 2 , 3 } , , { n , 1 } } .

2.3. Communication Situations

Refs. [17,25] introduced games with cooperation restricted by a graph (also graph-games or communications situations), ( N , v , γ ) , in which the players in the game ( N , v ) are restricted to communicate using only the links in the graph ( N , γ ) . C S N will denote the set of all communication situations with a set of player-nodes N, and C S 0 N will denote the subclass of C S N of those communication situations in which the game is zero-normalized. Finally C S * N will be the subset of C S 0 N in which the game ( N , v ) is non-null and superadditive.
An allocation rule  ψ on C S N is a map ψ : C S N R n , ψ i ( N , v , γ ) representing the outcome for player i in the communication situation ( N , v , γ ) . An allocation rule ψ defined on C S N satisfies component efficiency if for all ( N , v , γ ) C S N and all C N / γ , i C ψ i ( N , v , γ ) = v ( C ) .
Following [17], for ( N , v , γ ) C S N , a new game ( N , v γ ) captures the impact in the formation of coalitions (and thus in their value) of the restrictions in the communications imposed by ( N , γ ) . The characteristic function is given by
v γ ( S ) = C S / γ v ( C ) ,   for   all   S N .
Given the relevance of the Shapley value, Myerson defined μ , the allocation rule in C S N (nowadays known as the Myerson value), given by μ ( N , v , γ ) = S h ( N , v γ ) . Exploring the possibilities of the Myerson value as a centrality measure, Refs. [19,20] highlight the vector character of the Myerson value, decomposing it into two new allocation rules: the within groups Myerson value, μ W , (WG-Myerson value, for short) and the between groups Myerson value, μ B , (BG-Myerson value, for short). For each ( N , v , γ ) C S N and each i N , they are defined as μ i W ( N , v , γ ) = μ i ( N , v i , γ ) and μ i B ( N , v , γ ) = μ i ( N , v i , γ ) , where v i = S N : i S Δ v ( S ) u S and v i = v v i .

3. A Family of Efficiency Measures

In the following definition, we introduce a family of game theoretical measures for the efficiency of a network. We will assume that nodes in the network are players in a TU-game, which represents the economic or social interests that motivate the interaction of players. The network represents the feasible communications between players (and also, as a consequence, the existing restrictions that motivate the need for intermediaries when players have no direct communication). The proposed family of efficiency measures assigns to each network and each TU-game a value representing which part of the total productivity of the game, v ( N ) , players can maintain given the geometry of the network.
We will use superadditive games in which cooperation between individuals is not detrimental to them. We will also assume that the games are zero-normalized so that the total absence of communication between players—the impossibility to cooperate or empty graph—corresponds to the minimum (and null) efficiency.
Definition 1. 
We define a measure of efficiency, E , for each communication situation ( N , v , γ ) C S * N as
E ( N , v , γ ) = i N μ i W ( N , v , γ ) v ( N ) .
Remark 1. 
In the special case in which ( N , v ) is a symmetric game and ( N , γ ) is a connected graph, the defined measure represents the proportion of v ( N ) corresponding to the total communication centrality of players introduced by [19].
To motivate our definition, let us consider the following example, in which we will use several specific games and communication centrality measures also considered in [19].
Example 1. 
Let us denote by ( N , v 1 ) , ( N , v 2 ) and ( N , v 3 ) , respectively, the messages game, the zero-normalized overhead game and the conference game with characteristic functions given by the following:
(i)  
v 1 ( S ) = s ( s 1 ) ,
(ii) 
v 2 ( S ) = s 1 ,
(ii) 
v 3 ( S ) = 2 s s 1 ,
for S N = { 1 , 2 , 3 , 4 } .
The characteristic function of the messages game, v 1 , assigns to each coalition the number of messages that can be exchanged among all pairs of players within that coalition. In terms of Harsanyi’s dividends, each coalition of two players receives a dividend of two units, while the remaining coalitions receive no dividends. Similarly, the conference game, v 3 , assigns to each coalition the number of non-unitary subsets (conferences) that can be formed with its members. In this case, each non-trivial coalition receives a unitary dividend. Finally, in the zero-normalized overhead game, v 2 , each player contributes one monetary unit to each coalition it belongs to, and then all coalition members collectively face a unitary cost. The three games are symmetric and convex, and both, the first and the third, are almost-positive. Therefore, in all of them, there is a strong incentive for cooperation.
Suppose ( N , γ ) is one of the four-node connected graphs. Then, the efficiency (calculated with the proposed measure) of the (eighteen) different communication situations is given in Table 1. For the within groups Myerson values of the nodes–players (communication centrality of the nodes), see Table 2 in [19].
To illustrate the previous calculations, we will reproduce those corresponding to obtaining the efficiency of the star for the messages game, which is 5 6 .
Let us recall that, for a game ( N , v ) and player i N , the characteristic function v i , which gives the marginal contributions of player i to different coalitions S, is obtained as S N : i S Δ v ( S ) u S .
For the messages game, ( N , v 1 ) , with characteristic function 2 ( u { 1 , 2 } + u { 1 , 3 } + u { 1 , 4 } + u { 2 , 3 } + u { 2 , 4 } + u { 3 , 4 } ) and for players i = 1 , 2 , 3 , 4 , we have
( v 1 ) 1 = 2 ( u { 1 , 2 } + u { 1 , 3 } + u { 1 , 4 } ) ,
( v 1 ) 2 = 2 ( u { 1 , 2 } + u { 2 , 3 } + u { 2 , 4 } ) ,
( v 1 ) 3 = 2 ( u { 1 , 3 } + u { 2 , 3 } + u { 3 , 4 } ) ,
( v 1 ) 4 = 2 ( u { 1 , 4 } + u { 2 , 4 } + u { 3 , 4 } ) .
Then, if ( N , γ 3 S ) is the four-nodes star centered at node 3, for player-satellite 1, we have
μ 1 W ( N , v 1 , γ S ) = μ 1 ( N , ( v 1 ) 1 , γ S ) = S h 1 ( N , 4 u { 1 , 2 , 3 } + 2 u { 1 , 3 } ) = 4 3 + 1 = 7 3 .
Symmetrically, for the other two satellites,
μ 2 W ( N , v 1 , γ S ) = μ 4 W ( N , v 1 , γ S ) = 7 3 , and for the player-hub,
μ 3 W ( N , v 1 , γ S ) = μ 3 W ( N , ( v 1 ) 3 , γ S ) = S h 3 ( N , 2 ( u { 1 , 3 } + u { 2 , 3 } + u { 3 , 4 } ) ) = 3 .
Finally, E ( N , v 1 , γ S ) = 7 3 + 7 3 + 7 3 + 3 12 = 5 6 .
In the different communication situations, E ( N , v 1 , γ ) can be seen as a measure of the efficiency of the network ( N , γ ) in achieving the purpose of communicating pairs of players/nodes. For this purpose, the measure is conceptually very close to that of [1]. Similarly, E ( N , v 2 , γ ) and E ( N , v 3 , γ ) , respectively, measure the efficiency of networks in achieving the goals of facing a unitary cost and making the maximum number of conferences viable.
As shown by the figures in the table above, efficiency remains between zero and one. It increases when adding edges if the game is convex, it equals 1 if the graph is complete, it equals 0 for the empty graph, and among all trees, it is maximum in the star and minimum in the chain, provided that the game is almost-positive, as in cases v 1 and v 3 . In this paper, we will prove that this behavior of the metrics is not limited to these specific cases but responds to general properties.
The following proposition includes some properties related to the range of values of the defined measures. The corresponding proofs can be found in Appendix A.
Proposition 1. 
Given ( N , v , γ ) C S * N , we have the following:
(i) 
0 E ( N , v , γ ) v γ ( N ) v ( N ) .
Moreover, if ( N , γ ) is also a connected graph, then 0 E ( N , v , γ ) 1 .
(ii) 
The lower and upper bounds of E are reached, respectively, for the empty and the complete network. If ( N , γ N ) is the complete graph and ( N , γ ) is the empty graph, then
E ( N , v , γ N ) = 1   a n d   E ( N , v , γ ) = 0 ,
and if the game is not zero-normalized, then E ( N , v , γ ) i N v ( { i } ) v ( N ) .
The following proposition lists some properties regarding the behavior of these measures in the face of changes in the network, ceteris paribus. Again, the corresponding proofs can be found in Appendix A.
Proposition 2. 
Given ( N , v , γ ) C S * N , the following apply:
(i) 
The disconnection of a player who is simultaneously null in the game and terminal in the graph does not affect the efficiency of the network. Then, the network can be lightened by eliminating both null and terminal players, i.e., if i N is a null player in ( N , v ) such that | γ i | = 1 , we have that E ( N , v , γ ) = E ( N , v , γ γ i ) .
(ii) 
If we isolate an essential player in the game, the efficiency of the network, whatever it is, becomes zero. This property can be seen as a possibility to override the efficiency of potentially dangerous networks (e.g., terrorist networks). Formally, if i N is an essential player in ( N , v ) and isolated in the graph ( N , γ ) , then E ( N , v , γ ) = 0 .
(iii) 
The star whose center is an essential player has maximum efficiency. This justifies that, when building certain networks, a key player controls the entire communication flow. Formally, if i N is an essential player in ( N , v ) , which is also the hub of the star ( N , γ i S ) , then E ( N , v , γ i S ) = 1 .
(iv) 
If the game is convex, the efficiency of a network does not decrease when adding a new link, i.e., if ( N , v ) is a convex game, then
E ( N , v , γ ) E ( N , v , γ { l } ) ,   f o r   a l l   l γ .
Remark 2. 
The analysis of terrorist networks has garnered significant interest in recent times for reasons that are readily apparent. In this context, it is worth highlighting the works of [26,27,28], wherein the centrality of terrorists (and efficient calculation methods) in the WTC 9/11 attack is examined through the Shapley value calculation in the connectivity game [29] corresponding to the network formed by the terrorists. A connectivity game is dichotomic, assigning a unit value to connected coalitions in the network and zero otherwise. The game is thus created from the network, not given exogenously. It presents an alternative approach to that proposed by [19] but undeniably suggests defining network efficiency based on centralities given by the Shapley value in the connectivity game and comparing that measure with the one defined here by exploring advantages and disadvantages.
Similarly, other terrorist networks, such as that of Khalid Zercani, have been analyzed using connectivity games but with different allocation rules, such as Owen values and Banzhaf values, as in [30,31].
In (iv) of Proposition 2, the convexity condition cannot be weakened, as is seen in the following example.
Example 2. 
Consider ( N , v ) with N = { 1 , 2 , 3 } and v = u { 1 , 2 } + u { 1 , 3 } + u { 2 , 3 } 2 u { 1 , 2 , 3 } , which is a superadditive but not convex game. Let γ 1 = { { 1 , 2 } } and γ 2 = γ 1 { { 2 , 3 } } , then
E ( N , v , γ 1 ) = 1 1 = 1   a n d   E ( N , v , γ 2 ) = 2 3 .
As this example shows, in the case of a non-convex game, it may happen that a non-connected network is more efficient than a connected one.
The following proposition includes some properties relating to the value of the measures for different games. The proofs can be found in Appendix A.
Proposition 3. 
E satisfies the following properties:
(i) 
It is invariant by strategic equivalence of the game. That is to say, the efficiency is not changed if we transform the economic units in which the outcome of coalitions are measured, i.e., given ( N , v , γ ) and ( N , w , γ ) C S * N with ( N , v ) and ( N , w ) strategically equivalent, we have E ( N , v , γ ) = E ( N , w , γ ) .
(ii) 
The measures of communication situations in which the network is not connected can be obtained as a linear combination of the efficiencies corresponding to the respective (component) communication situations, i.e., given ( N , v , γ ) C S * N , if N / γ = { C 1 , , C r } , then
E ( N , v , γ ) = k = 1 r v ( C i ) v ( N ) E ( C k , v | C k , γ | C k ) .
(iii) 
It is not linear in the game, ceteris paribus. Nevertheless, the efficiency of a communication situation in which the game is the sum of other games can be calculated as a convex linear combination of the efficiencies in the corresponding games’ communication situations, i.e., if ( N , v 1 , γ ) , , ( N , v r , γ ) , ( N , k = 1 r v k , γ ) C S * N , then it holds that
E ( N , k = 1 r v k , γ ) = k = 1 r v k ( N ) ( k = 1 r v k ) ( N ) E ( N , v k , γ ) .
(iv) 
In a fixed network, we can obtain the efficiency in a communication situation in terms of efficiencies in communication situations with unanimity games, i.e., if ( N , v , γ ) C S * N , then
E ( N , v , γ ) = 1 v ( N ) S N Δ v ( S ) E ( N , u S , γ ) .
(v) 
The efficiency of a connected network to communicate the coalition S is s times the probability of that coalition being connected in the graph, i.e., if ( N , u S , γ ) C S * N , then
E ( N , u S , γ ) = s α γ ( S ) , i f M C S ( S , N , γ ) = { S 1 , , S r } 0 , o t h e r w i s e ,
where
α γ ( S ) = i = 1 r 1 | S i | i < j 1 | S i S j | + ( 1 ) r + 1 1 | i = 1 r S i | .
As a consequence of (iv) and (v) of the previous proposition, we can easily obtain the expression of E ( N , v , γ ) in terms of the Harsanyi dividends for some particular structures, such as trees, stars and chains.
Example 3. 
For ( N , v ) a superadditive and zero-normalized game,
(i) 
If ( N , γ T ) is a tree, then
E ( N , v , γ T ) = 1 v ( N ) S N Δ v ( S ) s | H ( S ) | ,
where H ( S ) is the connected hull of S in ( N , γ T ) , i.e., the unique minimal connection set of S in ( N , γ T ) .
(ii) 
If ( N , γ C ) is a chain ordered in the natural way, then
E ( N , v , γ C ) = 1 v ( N ) S N Δ v ( S ) s max j { S } min j { S } + 1 .
(iii) 
If ( N , γ 1 S ) is a star with center at node 1, then
E ( N , v , γ 1 S ) = 1 v ( N ) S N , 1 S Δ v ( S ) + S N , 1 S Δ v ( S ) s s + 1 .
In the following proposition, we prove that if the game is zero-normalized, symmetric and almost positive, then the maximum efficiency of the trees is reached at the star.
Proposition 4. 
Let ( N , v , γ 1 S ) and ( N , v , γ T ) be two communication situations in which ( N , v ) is a zero-normalized, symmetric and almost positive game, ( N , γ 1 S ) is the star with 1 N as its hub and ( N , γ T ) is a tree. Then,
E ( N , v , γ 1 S ) E ( N , v , γ T ) .
Proof. 
We have
E ( N , v , γ 1 S ) = 1 v ( N ) S N , 1 S Δ v ( S ) + S N , 1 S Δ v ( S ) s s + 1 ,
and
E ( N , v , γ T ) = 1 v ( N ) S N Δ v ( S ) s | H ( S ) |
= 1 v ( N ) S N S   connected Δ v ( S ) + S N S   not   connected Δ v ( S ) s | H ( S ) | .
As for S N , S not connected in ( N , γ T ) , | H ( S ) | s + 1 , to obtain the result it is sufficient to prove that, for s = 2 , , n , the number of connected sets in ( N , γ S ) with s elements is greater than or equal to the number of connected sets in ( N , γ T ) .
Effectively, for s = 2 , , n , the number of connected sets in ( N , γ 1 S ) of size s is n 1 s 1 , the total number of choosing s 1 links from the n 1 total links of the star. Clearly, the number of connected sets of size s = 2 , , n in a tree is upper bounded by n 1 s 1 . This is because the set of s nodes incident on s 1 links of a tree is not necessarily connected. □
In the following proposition, we prove that if the game is zero-normalized, symmetric and almost positive, among all the trees, the minimum efficiency is reached in the chain.
Proposition 5. 
Let ( N , v , γ T ) and ( N , v , γ C ) be two communication situations in which ( N , v ) is a zero-normalized, symmetric and almost positive game, ( N , γ C ) is a chain and ( N , γ T ) is a tree. Then,
E ( N , v , γ T ) E ( N , v , γ C ) .
Let us consider in ( N , γ T ) the longest path (chain) and, without loss of generality, let us suppose that γ T is labeled so that path is { 1 , 2 } , { 2 , 3 } , . . . , { r 1 , r } .
If r = n , then ( N , γ T ) = ( N , γ C ) , and the result is proven.
Otherwise, we will transform ( N , γ T ) in other ( N , γ T ) , in which the longest path has a length strictly greater than r and such that E ( N , v , γ T ) E ( N , v , γ T ) . It is clear that repeating this process a finite number of times will prove the result.
Let us denote h = min j { 1 , . . . r } { j | d e g ( j ) > 2 } , the first node from 1 to r having degree greater than 2. As the longest path of ( N , γ T ) differs from ( N , γ T ) , this node must exist.
Let k be a node directly connected with h, k h 1 and k h + 1 , and let us define A = { i N | the   path   joining   i   with   h   contains   k } .
Consider the new tree ( N , γ T ) defined as γ T = ( γ T { { h , k } } ) { { 1 , k } } .
To prove that E ( N , v , γ T ) E ( N , v , γ T ) , let S N . Then, we can distinguish three different situations:
(a)
h H γ T ( S ) .
Then, H γ T ( S ) = H γ T ( S ) , and for these sets,
s | H γ T ( S ) | = s | H γ T ( S ) | .
(b)
h H γ T ( S ) H γ T ( S ) .
Then, clearly H γ T ( S ) H γ T ( S ) , and thus,
s | H γ T ( S ) | s | H γ T ( S ) | .
(c)
h H γ T ( S ) and h H γ T ( S ) .
In this case, h S . Let us denote B S = S { 1 , . . . , h } . Then,
| H γ T ( S ) | | H γ T ( S ) | = h min i B S { i } + 1 max i B S { i } .
If h min i B S { i } + 1 max i B S { i } 0 , then the result is proven.
Otherwise, there is exactly one coalition S N , such that
| S | = | S | and | H γ T ( S ) | | H γ T ( S ) | = | H γ T ( S ) | | H γ T ( S ) | .
S is defined as S = ( S B S ) { h j + 1 , j B S } . If B S = S { 1 , . . . , h } , then
| H γ T ( S ) | | H γ T ( S ) | = h min i B S { i } + 1 max i B S { i }
= h ( h max i B S { i } + 1 ) + 1 ( h min i B S { i } + 1 )
= min i B S { i } 1 + max i B S { i } h = | H γ T ( S ) | | H γ T ( S ) | ,
which concludes the proof.
Remark 3. 
If the game is not almost-positive, even if it is superadditive or even convex, the efficiency of a chain can be higher than the efficiency of the star, as can be seen in Example 1 for the overhead game.

4. Efficiency and Its Asymptotic Behavior in Some Specific Cases

In this section, we calculate the efficiency of the star, the chain and the wheel for a general superadditive symmetric and zero-normalized game. We particularize the obtained results for the three games considered in Example 1. Moreover, we analyze the asymptotic behavior of these efficiencies as the number of players/nodes increases.

4.1. The Star

Consider the communication situation ( N , v , γ 1 S ) in which ( N , v ) is a superadditive, symmetric and zero-normalized game and ( N , γ 1 S ) is a star with node 1 at the hub.
In this case,
μ 1 W ( N , v , γ 1 S ) = S N { 1 } ( n s 1 ) ! s ! n ! [ v ( C 1 S { 1 } , γ 1 S ) v ( C 1 S { 1 } , γ 1 S { 1 } ) ]
= S N { 1 } ( n s 1 ) ! s ! n ! [ v ( S { 1 } ) v ( S ) ]
= s = 0 n 1 ( n s 1 ) ! s ! n ! n 1 s [ v ( s + 1 ) v ( s ) ] = s = 0 n 1 1 n [ v ( s + 1 ) v ( s ) ] ,
where the symmetry of the game is used in the third equality.
The within groups Myerson value for node 2 (and thus for any other node different from the node 1) is
μ 2 W ( N , v , γ 1 S ) = S N { 2 } ( n s 1 ) ! s ! n ! [ v ( C 2 S { 2 } , γ 1 S ) v ( C 2 S { 2 } , γ 1 S { 2 } ) ]
= S N { 2 } , 1 S ( n s 1 ) ! s ! n ! v ( S { 2 } ) v ( S )
= s = 1 n 1 ( n s 1 ) ! s ! n ! n 2 s 1 [ v ( s + 1 ) v ( s ) ] = s = 1 n 1 s n ( n 1 ) [ v ( s + 1 ) v ( s ) ] .
The second equality holds as if the player at the hub does not belong to a coalition, the connected components of that coalition are singletons and worthless (as the game is zero-normalized). The third equality is due to the symmetry of the game.
Then,
E ( N , v , γ 1 S ) = 1 v ( n ) i = 1 n μ i W ( N , v , γ 1 S )
= 1 v ( n ) s = 0 n 1 1 n [ v ( s + 1 ) v ( s ) ] + ( n 1 ) s = 1 n 1 s n ( n 1 ) [ v ( s + 1 ) v ( s ) ]
= 1 n v ( n ) s = 1 n 1 ( s + 1 ) [ v ( s + 1 ) v ( s ) ] = 1 s = 2 n 1 v ( s ) n v ( n ) .
Particularizing to game ( N , v 1 ) , with characteristic function v 1 ( S ) = s ( s 1 ) for all s 1 , we have
E ( N , v 1 , γ 1 S ) = 1 1 n 2 ( n 1 ) s = 2 n 1 ( s 2 s ) = 2 ( n + 1 ) 3 n ,
and thus
lim n E ( N , v 1 , γ 1 S ) = 2 3 .
This means that when the number of players increases, the proportion of messages that can be sent without intermediaries approaches 2 3 .
If the game is ( N , v 2 ) , which has a characteristic function equal to v 2 ( S ) = s 1 , for all s 1 , we have
E ( N , v 2 , γ 1 S ) = 1 1 + 2 + 3 + + ( n 2 ) n ( n 1 ) = n + 2 2 n ,
which converges to 1 2 , and thus, in the limit, only half of the total value can be retained by the grand coalition.
Finally, for the game ( N , v 3 ) , with v 3 ( S ) = 2 s s 1 for all s 1 , we have
E ( N , v 3 , γ 1 S ) = 1 2 n 1 ( 2 s s 1 ) n ( 2 n n 1 ) ,
and, after some manipulations,
E ( N , v 3 , γ 1 S ) = ( n 1 ) 2 n + 1 n 2 n + 2 2 n ( s n n 1 ) ,
which converges to 1 when n tends to infinity.
In this case, the star is “efficient” in the sense that the total worth of the grand coalition can be retained by players as their number increases.
As it can be seen, the asymptotic behavior of the efficiency also depends on the game considered.

4.2. The Chain

Consider the communication situation ( N , v , γ C ) in which ( N , v ) is a superadditive, symmetric and zero-normalized game and ( N , γ C ) is a chain of n nodes, which we assume to be numbered consecutively starting with 1 at one end.
In this case, we have
E ( N , v , γ C ) = 1 v ( n ) s = 2 n 1 2 ( n + 1 ) ( s + 2 ) ( s + 1 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 1 ) ] .
The proof of this result is in Appendix B.
In the following, we particularize the previous expression to the three games considered above. Also, we analyze their asymptotic behavior.
For game ( N , v 1 ) , with characteristic function v 1 ( S ) = s ( s 1 ) for all s 1 , we have
E ( N , v 1 , γ C ) = 1 n ( n 1 ) s = 2 n 1 2 ( n + 1 ) ( s + 2 ) ( s + 1 ) 2 ( s 1 ) + 2 ( n 1 )
= 1 n ( n 1 ) 4 ( n + 1 ) s = 2 n 1 s 1 ( s + 2 ) ( s + 1 ) + 2 ( n 1 )
= 4 ( n + 1 ) n ( n 1 ) s = 2 n 1 1 ( s + 1 ) + 6 2 n n ( n 1 ) .
If H n = i = 1 n 1 i , we have H n = 0 1 1 x n 1 x d x l n ( n ) + K , with K a constant between 0 and 1, and thus,
lim n E ( N , v 1 , γ C )
= lim n 4 ( n + 1 ) n ( n 1 ) l n ( n ) 3 2 + K + lim n 6 2 n n ( n 1 ) = 0 .
For game ( N , v 2 ) , with characteristic function v 2 ( S ) = s 1 for all s 1 , we have
E ( N , v 2 , γ C ) = 1 n 1 s = 2 n 1 2 ( n + 1 ) ( s + 2 ) ( s + 1 ) + 1 ]
= 2 ( n + 1 ) n 1 s = 2 n 1 1 ( s + 2 ) ( s + 1 ) + 1 n 1
= 2 ( n + 1 ) ( n 1 ) ( 1 3 1 ( n + 1 ) ) + 1 ( n 1 ) = 2 n 1 3 ( n 1 ) ,
and thus, lim n E ( N , v 2 , γ C ) = 2 3 .
For game ( N , v 3 ) , with characteristic function v 3 ( S ) = 2 s s 1 for all s 1 , we have
E ( N , v 3 , γ C ) = 2 ( n + 1 ) 2 n n 1 s = 2 n 1 2 s 1 1 ( s + 2 ) ( s + 1 ) + 1 2 n n 1 ( 2 n 1 1 ) ,
and thus, lim n E ( N , v 3 , γ C ) = 1 2 .

4.3. The Wheel

Consider the communication situation ( N , v , γ W ) in which ( N , v ) is a superadditive, symmetric and zero-normalized game and ( N , γ W ) is a wheel of n nodes, which we assume to be numbered consecutively. We have
i = 1 n μ i W ( N , v , γ W )
= s = 1 n 2 n s k = 0 n s 2 n s 2 k ( n s k ) ! ( s + k 1 ) ! n ! [ v ( s ) v ( s 1 ) ]
+ n ( n 1 ) 1 ! ( n 2 ) ! n ! [ v ( n 1 ) v ( n 2 ) ] + n 0 ! ( n 1 ) ! n ! [ v ( n ) v ( n 1 ) ]
= s = 1 n 2 2 n s ! ( s + 2 ) ! k = 0 n s 2 n s k n s k 2 s + k 1 k n n s 2 [ v ( s ) v ( s 1 ) ]
+ [ v ( n 1 ) v ( n 2 ) ] + [ v ( n ) v ( n 1 ) ]
= s = 1 n 2 2 n ( s + 1 ) ( s + 2 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 2 ) ] ,
and thus,
E ( N , v , γ W ) = 1 v ( n ) s = 2 n 2 2 n ( s + 1 ) ( s + 2 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 2 ) ] .
In the following, we calculate expressions for the efficiency of the wheel in the three games considered, and its asymptotic behavior as the number of players increases.
For game ( N , v 1 ) , with characteristic function v 1 ( S ) = s ( s 1 ) for all s 1 , we have
E ( N , v 1 , γ W ) = 1 v ( n ) s = 2 n 2 2 n ( s + 1 ) ( s + 2 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 2 ) ]
= 2 n n ( n 1 ) s = 2 n 2 s ( s 1 ) ( s 1 ) ( s 2 ) ( s + 1 ) ( s + 2 ) + 1 n ( n 1 ) [ n ( n 1 ) ( n 2 ) ( n 3 ) ]
= 4 ( n 1 ) s = 2 n 2 s 1 ( s + 1 ) ( s + 2 ) + [ 1 ( n 2 ) ( n 3 ) n ( n 1 ) ]
= 4 ( n 1 ) s = 2 n 2 2 s + 1 + 3 s + 2 + [ 1 ( n 2 ) ( n 3 ) n ( n 1 ) ]
= 4 ( n 1 ) s = 4 n 1 1 s + 3 n 2 3 + [ 1 ( n 2 ) ( n 3 ) n ( n 1 ) ] ,
and thus, lim n E ( N , v 1 , γ W ) = 0 .
For game ( N , v 2 ) , with characteristic function v 2 ( S ) = s 1 for all s 1 , we have
E ( N , v 2 , γ W ) = 1 v ( n ) s = 2 n 2 2 n ( s + 1 ) ( s + 2 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 2 ) ]
= 2 n ( n 1 ) s = 2 n 2 1 ( s + 1 ) ( s + 2 ) + 2 ( n 1 ) = 2 n ( n 1 ) s = 2 n 2 1 s + 1 1 s + 2 + 2 ( n 1 )
= 2 n ( n 1 ) ( 1 3 1 n ) + 2 ( n 1 ) = 2 n ( n 3 ) 3 n ( n 1 ) + 2 ( n 1 ) ,
and thus, lim n E ( N , v 2 , γ W ) = 2 3 .
For game ( N , v 3 ) , with characteristic function v 3 ( S ) = 2 s s 1 for all s 1 , we have
E ( N , v 3 , γ W ) 1 v ( n ) s = 2 n 2 2 n ( s + 1 ) ( s + 2 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 2 ) ]
= 2 n ( 2 n n 1 ) s = 2 n 2 1 ( s + 1 ) ( s + 2 ) ( 2 ( s 1 ) + 1 ) + 3 . 2 ( n 2 ) 2 ( 2 n n 1 ) ,
and lim n E ( N , v 3 , γ W ) = 3 4 .
In the following Table 2, we summarize the asymptotic behavior of the efficiency of chains, stars and wheels for the tree games considered. It can be seen that the introduced measure is sensitive to the geometry of the network and the considered game.

5. A Family of Vulnerability Measures

In this section, we introduce a game theoretic family of measures for vulnerability of a network. We will assume the same setting of communication situations used for efficiency measures. In our approach, the vulnerability in ( N , v , γ ) can have two different origins.
On one hand it can be due to lack of connection between components of the graph. This causes a portion of the value of the grand coalition, v ( N ) , to be lost, and then players can only obtain v γ ( N ) = C N / γ v ( C ) . Then, we define the vulnerability due to disconnection in ( N , v , γ ) as
V d ( N , v , γ ) = v ( N ) v γ ( N ) v ( N ) ,
i.e., as the proportion of the total productivity in the game that is lost due to lack of connection in the graph.
On the other hand, by looking inside the components, the lack of links generates costs of intermediation. The proportion of the productivity lost because of these intermediation costs can be seen as another type of vulnerability of the network, the betweenness vulnerability V b . In our definition, it is given by
V b ( N , v , γ ) = i N μ i B ( N , v , γ ) v ( N ) .
We will assume that these two types of vulnerability are additive, and thus we propose the following definition.
Definition 2. 
Given a communication situation ( N , v , γ ) C S * N , we define a measure of vulnerability of the network ( N , γ ) for the game ( N , v ) as
V ( N , v , γ ) = v ( N ) v γ ( N ) v ( N ) + i N μ i B ( N , v , γ ) v ( N ) = V d ( N , v , γ ) + V b ( N , v , γ ) .
The following proposition includes some properties related to the range of values of the defined measures. The corresponding proofs can be found in Appendix C.
Proposition 6. 
Given ( N , v , γ ) CS * N , we have the following:
(i)  
0 V ( N , v , γ ) 1 .
(ii) 
V ( N , v , γ ) + E ( N , v , γ ) = 1 .
(iii) 
For connected graphs (ceteris paribus), the disconnection vulnerability vanishes, i.e., if ( N , γ ) is a connected graph, then
V ( N , v , γ ) = V b ( N , v , γ ) .
(iv) 
In any communication situation in which the network is complete, vulnerabilities due to lack of connection and intermediation are both null, i.e., for all ( N , v , γ N ) CS * N , where ( N , γ N ) is the complete graph, we have
V d ( N , v , γ N ) = V b ( N , v , γ N ) = 0 .
(v) 
In the case of an empty graph, all vulnerability is due to disconnection, i.e., for all ( N , v , γ ) CS * N , where ( N , γ ) is the empty graph, we have
V ( N , v , γ ) = V d ( N , v , γ ) = 1 .
The following proposition lists some properties regarding the behavior of these measures in the face of changes in the network, ceteris paribus. Again, the corresponding proofs can be found in Appendix C.
Proposition 7. 
Given ( N , v , γ ) CS * N .
(i) 
If i 0 N is a terminal node in the graph and additionally it is a null player in the game, the disconnection of i 0 neither V b ( N , v , γ ) nor V d ( N , v , γ ) changes, i.e., if i 0 N is a null player in ( N , v ) such that | γ i 0 | = 1 , it holds that V b ( N , v , γ ) = V b ( N , v , γ γ i 0 ) and V d ( N , v , γ ) = V d ( N , v , γ γ i 0 ) .
(ii) 
If all the links incident in the node of an essential player in the game are broken, the disconnection vulnerability becomes 1 and the betweenness vulnerability vanishes, i.e., if i 0 N is an essential player in ( N , v ) , we have that V b ( N , v , γ γ i 0 ) = 0 and V d ( N , v , γ γ i 0 ) = 1 .
(iii) 
V d ( N , v , γ ) reduces when adding links to a graph, ceteris paribus, i.e., given ( N , v , γ ) and ( N , v , γ ) CS * N with γ γ , we have V d ( N , v , γ ) V d ( N , v , γ ) . This property is not satisfied for the other component of the vulnerability, the betweenness vulnerability, as the intermediation can increase. This is shown in the example following this proposition.
Example 4. 
Consider ( N , v , γ ) and ( N , v , γ ) CS * N with v = u { 1 , 2 } + u { 1 , 3 } u { 1 , 2 , 3 } , γ = { { 1 , 2 } } and γ = { { 1 , 2 } , { 2 , 3 } } . Then, it is easy to verify that V d ( N , v , γ ) = 0 and V d ( N , v , γ ) = 1 3 .
The following proposition includes other properties relating to the efficiency measures corresponding to communication situations with different games. The proofs can be found in Appendix C.
Proposition 8. 
V satisfies the following properties:
(i) 
The strategic equivalence of games preserves the vulnerability, i.e., given ( N , v , γ ) and ( N , w , γ ) CS * N , ( N , v ) and ( N , w ) being strategically equivalent, we have that V d ( N , v , γ ) = V d ( N , w , γ ) and V b ( N , v , γ ) = V b ( N , w , γ ) .
(ii) 
The betweenness vulnerability of an unconnected graph can be written in terms of the betweenness vulnerability of the graph restricted to different components, i.e., suppose ( N , v , γ ) CS * N and N / γ = { C 1 , C 2 , , C r } , then
V b ( N , v , γ ) = j = 1 r v ( C j ) v ( N ) V b ( N , v | C j , γ | C j ) .
(iii) 
The betweenness vulnerability can be written as a linear combination of betweenness vulnerabilities in communication situations corresponding to unanimity games (with a fixed graph), i.e., given ( N , v , γ ) CS * N , we have
V b ( N , v , γ ) = S N Δ v ( S ) v ( N ) V b ( N , u S , γ ) .

6. Conclusions and Final Remarks

In this paper, we have introduced a family of efficiency measures and a family of vulnerability measures for a network from a game theory perspective. We have assumed that actors can use the network for different purposes or with different social or economic interests modeled by means of a cooperative game or transferable utility. In this way, both families are parameterized by the game. With a fixed game, both the efficiency and vulnerability measures we have introduced can be considered normalized value functions, as in [21,22].
In our proposal, given the game, the efficiency of a network is the proportion of the value of the grand coalition corresponding to the within group Myerson values. And thus, it can be seen as the proportion of the productivity of the grand coalition that the network allows players to retain. But also, for social networks, it is related to the proportion of total centrality due to communication. The other ratio, corresponding to expenses or centrality through intermediation, can be seen as a measure of network vulnerability.
The proposed measures satisfy properties that can be considered appealing when measuring efficiency or vulnerability in a network. The calculation of efficiency and vulnerability for different networks and specific purposes has provided us with values and asymptotic behaviors that seem consistent with the (somewhat vague) idea of what both should measure.
Given the increasingly extensive literature on the use of game theory to measure centrality in networks, we believe that some of the ideas presented here may be useful in defining other theoretical measures of efficiency and vulnerability arising from different centralities. Examples include the Shapley value, Owen value and Banzhaf value for connectivity games ([29]), which have been widely used to analyze terrorist networks. See, for example, [9,26,27,28,30].
As the Myerson value and its decomposition are Shapley values, the results in [27,32] are useful to calculate the measures introduced here.
Open and relevant problems that can be considered are the analysis of the relation between these measures and others existing (not necessarily game-theoretic) in the literature and the asymptotic behavior of the measures in other different structures and games than those studied here.

Author Contributions

Conceptualization, C.M.M. and E.O.; methodology, C.M.M. and E.O.; software, C.M.M. and E.O.; validation, C.M.M. and E.O.; formal analysis, C.M.M. and E.O.; investigation, C.M.M. and E.O.; resources, C.M.M. and E.O.; data curation, C.M.M. and E.O.; writing—original draft preparation, C.M.M. and E.O.; writing—review and editing, C.M.M. and E.O.; visualization, C.M.M. and E.O.; supervision, C.M.M. and E.O.; project administration, C.M.M. and E.O.; funding acquisition, C.M.M. and E.O. All authors have read and agreed to the published version of the manuscript.

Funding

This research has been partially supported by the “Plan Nacional de I+D+i” of the Spanish Government under the project PID2020-116884GB-I00.

Data Availability Statement

Data sharing is not applicable to this article.

Acknowledgments

We would like to thank two anonymous referees and the editor for all their suggestions and comments that has helped us to deeply improve this paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 1.
(i)
Given that ( N , v ) is a non-null, superadditive and zero-normalized game, we have the following:
(a)
v ( N ) > 0 .
(b)
i N μ i W ( N , v , γ )
= i N S N { i } ( n s 1 ) ! s ! n ! [ v ( C i S { i } , γ ) v ( C i S { i } , γ { i } ) ] 0 .
(c)
i N μ i B ( N , v , γ )
= i N S N { i } ( n s 1 ) ! s ! n ! [ v ( C i S { i } , γ { i } ) C ( C i S { i } , γ { i } ) | γ v ( C ) ] 0 ,
and thus, using a ) and b ) , we obtain E ( N , v , γ ) 0 . On the other hand, as
i N μ i W ( N , v , γ ) + i N μ i B ( N , v , γ ) = i N μ i ( N , v , γ ) = v γ ( N ) ,
we have E ( N , v , γ ) v γ ( N ) v ( N ) .
The second part is straightforward because, if a graph is connected, then v γ ( N ) = v ( N ) .
(ii) 
To prove that E ( N , v , γ N ) = 1 , we have
i N μ i W ( N , v , γ )
= i N S N { i } ( n s 1 ) ! s ! n ! [ v ( C i S { i } , γ N ) v ( C i S { i } , γ N { i } ) ]
= i N S N { i } ( n s 1 ) ! s ! n ! [ v ( S { i } ) v ( S ) ]
= i N S h i ( N , v ) = v ( N ) ,
the first equality holding by the definition of the within groups Myerson value; the second one, because of the connected component of S { i } in ( N , γ N ) , for all S N { i } , i N , is S { i } ; the third one because of the definition of the Shapley value; and the last one using the efficiency of the Shapley value.
To prove that E ( N , v , γ ) = 0 , we have
i N μ i W ( N , v , γ )
= i N S N { i } ( n s 1 ) ! s ! n ! [ v ( C i S { i } , γ ) v ( C i S { i } , γ { i } ) ]
= i N S N { i } ( n s 1 ) ! s ! n ! [ v ( { i } ) v ( ) ] = i N v ( { i } ) = 0 ,
as, in this case, the connected component of S { i } in ( N , γ ) for all S N { i } , i N , is { i } , the sum of the weights of the marginal contributions in the Shapley formula is equal to one, and the game is zero-normalized.
 □
Proof of Proposition 2.
(i)
If i is a null player in ( N , v ) , then
μ i W ( N , v , γ ) = μ i W ( N , v , γ γ i ) = 0 .
On the other hand, for all j N , j i ,
μ j W ( N , v , γ ) = S N { j } ( n s 1 ) ! s ! n ! [ v ( C j S { j } , γ ) v ( C j S { j } , γ { j } ) ] .
If i S , then C j S { j } , γ = C j S { j } , γ { l } , and if i S , then either C j S { j } , γ = C j S { j } , γ { l } or C j S { j } , γ = C j S { j } , γ { l } { i } . As i is a null player in ( N , v ) , in any case,
v ( C j S { j } , γ ) = v ( C j S { j } , γ { l } )
and
v ( C j S { j } , γ { j } ) = v ( C j S { j } , γ { l } { j } ) .
Then, for all k N , μ k W ( N , v , γ ) = μ k W ( N , v , γ { l } ) and the result is proved.
(ii)
For all j N , j i ,
μ j W ( N , v , γ ) = S N { j } ( n s 1 ) ! s ! n ! [ v ( C j S { j } , γ ) v ( C j S { j } , γ { j } ) ] = 0 ,
as i does not belong to the connected component of j (and thus i C j S { j } , γ { j } ) because it is isolated.
On the other hand,
μ i W ( N , v , γ ) = S N { i } ( n s 1 ) ! s ! n ! [ v ( C i S { i } , γ ) v ( C i S { i } , γ { i } ) ]
= S N { i } ( n s 1 ) ! s ! n ! [ v ( { i } ) v ( ) ] = v ( { i } ) = 0 ,
as, for all S N { i } , C i S { i } , γ = { i } and ( N , v ) is zero-normalized.
(iii)
Under the hypothesis
μ i B ( N , v , γ i S ) = S N { i } ( n s 1 ) ! s ! n ! [ v ( C i S { i } , γ i S { i } ) C C i S { i } , γ i S { i } / γ i S v ( C ) ] ,
which is equal to zero because i is an essential player and therefore the value of any coalition to which he does not belong is null.
On the other hand, for j i ,
μ j B ( N , v , γ ) = S N { j } ( n s 1 ) ! s ! n ! [ v ( C j S { j } , γ i S { j } ) C C j S { j } , γ i S { j } / γ i S v ( C ) ] .
If i S N { j } , then C j S { j } , γ i S = { j } , and thus C j S { j } , γ i S { j } = . Then, in such a case,
v ( C j S { j } , γ i S { j } ) C C j S { j } , γ i S { j } / γ i S v ( C ) ] = v ( ) v ( ) = 0 .
If, on the other hand, i S N { j } , then C j S { j } , γ i S is a connected set, and thus
v ( C j S { j } , γ i S { j } ) C C j S { j } , γ i S { j } / γ i S v ( C ) ]
= v ( C j S { j } , γ i S { j } ) v ( C j S { j } , γ i S { j } ) = 0 .
Finally, for all j N ,
μ j ( N , v , γ i S ) = μ j W ( N , v , γ i S ) + μ j B ( N , v , γ i S ) = μ j W ( N , v , γ i S ) + 0 , and then
E ( N , v , γ i S ) = j N μ j W ( N , v , γ i S ) v ( N ) = j N μ j ( N , v , γ i S ) v ( N ) = v ( N ) v ( N ) = 1 ,
given that, as it is known, the Myerson value satisfies component efficiency and the star is a connected graph.
(iv)
As proven in Proposition 3.3. (pag. 590) of [20], for communication situations in which the game is convex, we have that
μ i W ( N , v , γ ) μ i W ( N , v , γ { l } ) ,   for   all   i N ,
and thus the result.
 □
Proof of Proposition 3.
(i)
If ( N , v ) and ( N , w ) are strategically equivalent and zero-normalized, then for all S N , w ( S ) = α v ( S ) , α R + . As μ W is clearly linear in the game, we have
E ( N , w , γ ) = i N μ i W ( N , w , γ ) w ( N ) = i N μ i W ( N , α v , γ ) α v ( N )
= α i N μ i W ( N , v , γ ) α v ( N ) = E ( N , v , γ ) .
(ii)
We have
E ( N , v , γ ) = 1 v ( N ) i N μ i W ( N , v , γ ) = 1 v ( N ) k = 1 r i C k μ i W ( N , v , γ )
μ i W ( N , v | C k , γ | C k ) = 1 v ( N ) k = 1 r v ( C k ) i C k μ i W ( C k , v | C k , γ | C k ) v ( C k )
= k = 1 r v ( C i ) v ( N ) E ( C k , v | C k , γ | C k ) ,
where the third equality holds as the within groups Myerson value of a player only depends on the component to which it belongs. The other equalities are straightforward.
(iii)
E ( N , k = 1 r v k , γ ) = 1 ( k = 1 r v k ) ( N ) i N μ i W ( N , k = 1 r v k , γ )
= 1 ( k = 1 r v k ) ( N ) i N k = 1 r μ i W ( N , v k , γ ) = 1 ( k = 1 r v k ) ( N ) k = 1 r i N μ i W ( N , v k , γ )
= k = 1 r v k ( N ) ( k = 1 r v k ) ( N ) E ( N , v k , γ ) .
The first and third equalities are by the definition of the measure and the second one is by the additivity of μ W .
(iv)
The result is straightforwardly obtained particularizing (iii) of this proposition to communication situations { ( N , Δ v ( S ) u S , γ ) } S N and ( N , v , γ ) and using the linearity of the Myerson value.
(v)
We have that
E ( N , u S , γ ) = 0   if MCS ( S , N , γ ) =
and
E ( N , u S , γ ) = i N μ i W ( N , u S , γ )
= s [ i = 1 r 1 | S i | i < j 1 | S i S j | + ( 1 ) r + 1 1 | i = 1 r S i | ] = s α γ ( S ) ,
i f M C S ( S , N , γ ) = { S 1 , , S r } , where the second equality is obtained in [20].
 □

Appendix B

Proof of Equation (1).
Consider the communication situation ( N , v , γ C ) in which ( N , v ) is a superadditive, symmetric and zero-normalized game and ( N , γ C ) is a chain of n nodes, which we assume to be numbered consecutively starting with 1 at one end.
In this case, we have that
i = 1 n μ i W ( N , v , γ C ) =
s = 1 n 2 r = 1 n s 1 l = 0 r 1 k = 0 n r s 1 s r 1 l n r s 1 k ( n s l k ) ! ( s + l + k 1 ) ! n !
× [ v ( s ) v ( s 1 ) ]
+ 2 s = 1 n 2 k = 0 n s 1 s n s 1 k ( n s k ) ! ( s + k 1 ) ! n ! [ v ( s ) v ( s 1 ) ]
+ 2 ( n 1 ) 1 ! ( n 2 ) ! n ! [ v ( n 1 ) v ( n 2 ) ] + 2 n 0 ! ( n 1 ) ! n ! [ v ( n ) v ( n 1 ) ] .
The first term corresponds to the efficiency generated by the n players from coalitions that have a component of size s, s = 1 , , n 2 , having these coalitions of other components than variable size. Moreover, the component of size s possibly has other components “before” and “after” in the chain, labeled from 1 to n. The second term corresponds to coalitions in which the component of size s is on the left or on the right of the chain. In the last two terms, it is assumed, respectively, that the component has size n 1 or n.
We have
l = 0 r 1 k = 0 n r s 1 s r 1 l n r s 1 k ( n s l k ) ! ( s + l + k 1 ) ! n !
× [ v ( s ) v ( s 1 ) ]
= s l = 0 r 1 ( r + l 1 ) ! ( s + l 1 ) ! ( r + s + 1 ) ! ( r 1 ) ! l ! ( r l 1 ) !
× k = 0 n r s 1 n s l k n r s k 1 s + l + k 1 k n n r s 1 [ v ( s ) v ( s 1 ) ]
= s [ v ( s ) v ( s 1 ) ] l = 0 r 1 ( r + l 1 ) ! ( s + l 1 ) ! ( r + s + 1 ) ! ( r 1 ) ! l ! ( r l 1 ) !
= 2 s ! ( s + 2 ) ! [ v ( s ) v ( s 1 ) ] l = 0 r 1 s + l 1 l r l + 1 r l 1 r + s + 1 r 1
= 2 s ! ( s + 2 ) ! [ v ( s ) v ( s 1 ) ] .
And thus,
s = 1 n 2 r = 1 n s 1 l = 0 r 1 k = 0 n r s 1 s r 1 l n r s 1 k ( n s l k ) ! ( s + l + k 1 ) ! n !
× [ v ( s ) v ( s 1 ) ]
= s = 1 n 2 r = 1 n s 1 2 s ! ( s + 2 ) ! [ v ( s ) v ( s 1 ) ] = s = 1 n 2 2 ( n s 1 ) ( s + 2 ) ( s + 1 ) [ v ( s ) v ( s 1 ) ] .
On the other hand, for the second term,
2 s = 1 n 2 k = 0 n s 1 s n s 1 k ( n s k ) ! ( s + k 1 ) ! n ! [ v ( s ) v ( s 1 ) ]
= 2 s = 1 n 2 s ! ( s + 1 ) ! k = 0 n s 1 n s k n s k 1 s + k 1 k n n s 1 [ v ( s ) v ( s 1 ) ]
= 2 s = 1 n 2 1 s + 1 [ v ( s ) v ( s 1 ) ] .
Finally,
i = 1 n μ i W ( N , v , γ C )
= s = 1 n 2 2 ( n s 1 ) ( s + 2 ) ( s + 1 ) [ v ( s ) v ( s 1 ) ] + s = 1 n 2 2 ( s + 1 ) [ v ( s ) v ( s 1 ) ]
+ 2 n [ v ( n 1 ) v ( n 2 ) ] + [ v ( n ) v ( n 1 ) ]
= s = 1 n 1 2 ( n + 1 ) ( s + 2 ) ( s + 1 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 1 ) ]
= s = 2 n 1 2 ( n + 1 ) ( s + 2 ) ( s + 1 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 1 ) ] ,
the last equality holding as for s = 1 , and ( N , v ) a zero-normalized game, we have that v ( s ) v ( s 1 ) = v ( 1 ) v ( 0 ) = 0 .
And thus,
E ( N , v , γ C ) = 1 v ( n ) s = 2 n 1 2 ( n + 1 ) ( s + 2 ) ( s + 1 ) [ v ( s ) v ( s 1 ) ] + [ v ( n ) v ( n 1 ) ] .
 □

Appendix C

Proof of Proposition 6.
(i)
As v γ ( N ) = i N μ i W ( N , v , γ ) + i N μ i B ( N , v , γ ) , substituting in the definition of V ( N , v , γ ) ,
V ( N , v , γ ) = v ( N ) v γ ( N ) v ( N ) + i N μ i B ( N , v , γ ) v ( N )
= v ( N ) i N μ i W ( N , v , γ ) v ( N ) = 1 E ( N , v , γ ) ,
and, given that 0 E ( N , v , γ ) 1 , the result is proven.
(ii)
If ( N , v , γ ) CS * N and ( N , γ ) is a connected graph, we have that v γ ( N ) = v ( N ) and thus V d ( N , v , γ ) = 0 .
(iii)
For ( N , v , γ N ) CS * N we have that v γ N ( N ) = v ( N ) , and thus V d ( N , v , γ N ) = 0 . Then,
V ( N , v , γ N ) = V d ( N , v , γ N ) + V b ( N , v , γ N ) = V b ( N , v , γ N ) .
On the other hand, using i) and that the efficiency in communication situations with the complete graph is 1,
V ( N , v , γ N ) = V b ( N , v , γ N ) = 1 E ( N , v , γ N ) = 1 1 = 0 .
(iv)
For all ( N , v , γ ) CS * N , we have that v γ ( N ) = i N v ( { i } = 0 (since the game is zero-normalized) and μ B ( N , v , γ ) is the null vector. Therefore, V ( N , v , γ ) = V d ( N , v , γ ) = 1 .
Proof of Proposition 7.
(i)
If i 0 N is such that | γ i 0 | = 1 and it is also a null player, we will prove that μ B ( N , v , γ ) = μ B ( N , v , γ γ i 0 ) , which implies that V b ( N , v , γ ) = V b ( N , v , γ γ i 0 ) .
For i 0 ,
μ i 0 B ( N , v , γ ) = S N { i 0 } ( n s 1 ) ! s ! n ! [ v ( C i 0 S { i 0 } , γ { i 0 } ) C ( C i 0 S { i 0 } , γ { i 0 } ) | γ v ( C ) ]
= S N { i 0 } ( n s 1 ) ! s ! n ! [ v ( C i 0 S { i 0 } , γ { i 0 } ) v ( C i 0 S { i 0 } , γ { i 0 } ) ] = 0 .
On the other hand,
μ i 0 B ( N , v , γ γ i 0 ) = S N { i 0 } ( n s 1 ) ! s ! n ! [ v ( C i 0 S { i 0 } , γ γ i 0 { i 0 } )
C ( C i 0 S { i 0 } , γ γ i 0 { i 0 } ) | γ γ i 0 v ( C ) ]
= S N { i 0 } ( n s 1 ) ! s ! n ! [ v ( ) v ( ) ] = 0 .
For i i 0 ,
μ i B ( N , v , γ ) = S N { i } ( n s 1 ) ! s ! n ! [ v ( C i S { i } , γ { i } ) C ( C i S { i } , γ { i } ) | γ v ( C ) ]
= S N { i } ( n s 1 ) ! s ! n ! [ v ( C i S { i } , γ γ i 0 { i } ) C ( C i S { i } , γ γ i 0 { i } ) | γ γ i 0 v ( C ) ] ,
the equality holding as for all S N { i } , we have that
C i S { i } , γ = C i S { i } , γ γ i 0
or
C i S { i } , γ = C i S { i } , γ γ i 0 { i 0 } ,
and thus,
v ( C i S { i } , γ ) = v ( C i S { i } , γ γ i 0 ) ,
because i 0 is a null player. Similarly for each C ( C i S { i } , γ { i } ) | γ .
Then,
i N μ i B ( N , v , γ ) = i N μ i B ( N , v , γ γ i 0 ) ,
and thus,
V b ( N , v , γ ) = V b ( N , v , γ γ i 0 ) .
On the other hand,
v γ ( N ) v γ γ i 0 ( N ) = v ( C i 0 N , γ ) v ( C i 0 N , γ { i 0 } ) v ( { i 0 } ) = 0 ,
the first equality holding as the unique connected component that changes is the one to which i 0 belongs, and the second equality holding because i 0 is a null player in the zero-normalized game ( N , v ) . Therefore, V d ( N , v , γ ) = V d ( N , v , γ γ i 0 ) .
(ii)
If i 0 N is an essential player in ( N , v ) and isolated in ( N , γ γ i 0 ) , we have that
v γ γ i 0 ( N ) = C N / ( γ γ i 0 ) v ( C ) = 0 ,
the second equality holding as all the components to which i 0 does not belong have null value and the game is zero-normalized.
(iii)
Suppose ( N , v , γ ) and ( N , v , γ ) CS * N with γ γ , then
v γ ( N ) = C N / γ v ( C ) C N / γ v ( C ) = v γ ( N ) ,
the inequality holding as possibly several (disjoint) connected components in ( N , γ ) become a unique connected component in ( N , γ ) , and the game is superadditive. As a consequence,
V d ( N , v , γ ) = 1 v γ ( N ) v ( N ) 1 v γ ( N ) v ( N ) = V d ( N , v , γ ) ,
and the result is proven.
Proof of Proposition 8.
(i)
If ( N , v ) and ( N , w ) are strategically equivalent, there exists α R + , such that w = α v and thus w ( N ) = α v ( N ) , w γ ( N ) = α v γ ( N ) , and μ B ( N , w , γ ) = α μ B ( ( N , v , γ ) because the between groups Myerson value is linear in the game (ceteris paribus). Then, we have the result.
(ii)
Under the given hypothesis,
V b ( N , v , γ ) = i = 1 n μ i B ( N , v , γ ) v ( N ) = j = 1 r i C j μ i B ( N , v , γ | C j ) v ( N )
= j = 1 r i C j μ i B ( N , v | C j , γ | C j ) v ( N ) = j = 1 r v ( C j ) v ( N ) i C j μ i B ( N , v | C j , γ | C j ) v ( C j )
= j = 1 r v ( C j ) v ( N ) i C j μ i B ( N , v | C j , γ | C j ) v | C j ( C j ) = j = 1 r v ( C j ) v ( N ) V b ( N , v | C j , γ | C j ) ,
where the third equality holds as the between groups Myerson value of a player only depends on the component to which it belongs. The other equalities are straightforward.
(iii)
Using the linearity of the between groups Myerson value, we have
V b ( N , v , γ ) = i = 1 n μ i B ( N , v , γ ) v ( N ) = i N S N Δ v ( S ) μ i B ( N , u S , γ ) v ( N )
= S N Δ v ( S ) v ( N ) i N μ i B ( N , u S , γ ) = S N Δ v ( S ) v ( N ) V b ( N , u S , γ ) .

References

  1. Latora, V.; Marchiori, M. Efficient Behavior of Small-World Networks. Phys. Rev. Lett. 2001, 87, 19870. [Google Scholar] [CrossRef]
  2. Ballester, C.; Calvó-Armengol, A.; Zenou, Y. Who’s Who in Networks Wanted: The Key Player. Econometrica 2006, 74, 1403–1417. [Google Scholar] [CrossRef]
  3. Bavelas, A. A mathematical model for group structure. In Social Networks: Critical Concepts in Sociology; Routledge: New York, NY, USA, 1948; Volume 1, pp. 161–188. [Google Scholar] [CrossRef]
  4. Bavelas, A. Communication patterns in task-oriented groups. J. Acoust. Soc. Am. 1950, 22, 725–730. [Google Scholar] [CrossRef]
  5. Sabidussi, G. The centrality index of a graph. Psychometrika 1966, 31, 581–603. [Google Scholar] [CrossRef] [PubMed]
  6. Nieminen, J. On the centrality in a graph. Scand. J. Psychol. 1974, 15, 332–336. [Google Scholar] [CrossRef] [PubMed]
  7. Freeman, L.C. Centrality in Social Networks Conceptual Clarification. Soc. Netw. 1979, 1, 215–239. [Google Scholar] [CrossRef]
  8. Freeman, L.C. A Set of Measures of Centrality Based on Betweenness. Sociometry 1977, 40, 35–41. [Google Scholar] [CrossRef]
  9. Freeman, L.; Borgatti, S.; White, D. Centrality in Valued Graphs: A Measure of Betweenness Based on Network Flow. Soc. Netw. 1991, 13, 141–154. [Google Scholar] [CrossRef]
  10. Newman, M.E.J. The Structure and Function of Complex Networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef]
  11. Cook, K.S.; Emerson, R.M.; Gillmore, M.R.; Yamagishi, T. The Distribution of Power in Exchange Networks. In Schlüsselwerke der Netzwerkforschung; Netzwerkforschung; Holzer, B., Stegbauer, C., Eds.; Springer VS: Wiesbaden, Germany, 1983. [Google Scholar] [CrossRef]
  12. Bonacich, P. Power and centrality: A family of measures. Am. J. Sociol. 1987, 92, 1170–1182. [Google Scholar] [CrossRef]
  13. Ozdaglar, A.; Menache, I. Network Games; Springer Nature: Berlin, Germany, 2022; Available online: https://dl.acm.org/doi/abs/10.5555/3019320 (accessed on 10 October 2023).
  14. Nagurney, A.; Qiang, Q. A Network Efficiency Measure for Congested Networks. EPL (Europhys. Lett.) 2007, 79, 38005. [Google Scholar] [CrossRef]
  15. Nagurney, A.; Qiang, Q. A network efficiency measure with application to critical infrastructure networks. J. Glob. Optim. 2008, 40, 261–275. [Google Scholar] [CrossRef]
  16. Jadamba, B.; Pappalardo, M.; Raciti, F. Efficiency and Vulnerability. Anal. Congest. Netw. Random Data. J. Optim. Theory Appl. 2018, 177, 563–583. [Google Scholar] [CrossRef]
  17. Myerson, R.B. Graphs and cooperation in games. Math. Oper. Res. 1977, 2, 225–229. [Google Scholar] [CrossRef]
  18. Shapley, L.S. A value for n-person games. In Annals of Mathematics Studies, 28; Kuhn, H.W., Tucker, A.W., Eds.; Princeton University Press: Princeton, NJ, USA, 1953; pp. 307–317. [Google Scholar] [CrossRef]
  19. Gomez, D.; González-Arangüena, E.; Manuel, C.; Owen, G.; del Pozo, M.; Tejada, J. Centrality and power in social networks: A game theoretic approach. Math. Soc. Sci. 2003, 46, 27–54. [Google Scholar] [CrossRef]
  20. Gonzalez-Arangüena, E.; Manuel, C.; Owen, G.; del Pozo, M. The within groups and the between groups Myerson values. Eur. J. Oper. Res. 2017, 257, 586–600. [Google Scholar] [CrossRef]
  21. Jackson, M.O.; Wolinsky, A. A Strategic Model of Social and Eco-nomic Networks. J. Econ. Theory 1996, 71, 44–74. [Google Scholar] [CrossRef]
  22. Jackson, M.O. Social and Economic Networks; Princeton University Press: Princeton, NJ, USA, 2008; Volume 3, Available online: https://dl.acm.org/doi/10.5555/1571644 (accessed on 3 December 2023).
  23. Harsanyi, J.C. A bargaining model for cooperative n-person games. In Contributions to the Theory of Games IV; Tucker, A.W., Luce, R.D., Eds.; Princeton University Press: Princeton, NJ, USA, 1959; pp. 325–355. [Google Scholar] [CrossRef]
  24. van den Brink, R.; Gilles, R.P. Axiomatizations of the conjunctive permission value for games with permission structures. Games Econ. Behav. 1996, 12, 113–126. [Google Scholar] [CrossRef]
  25. Myerson, R.B. Conference structures and fair allocation rules. Int. J. Game Theory 1980, 9, 169–182. [Google Scholar] [CrossRef]
  26. Lindelauf, R.H.; Hamers, H.J.; Husslage, B.G.M. Cooperative game theoretic centrality analysis of terrorist networks: The cases of jemaah islamiyah and al qaeda. Eur. J. Oper. Res. 2013, 229, 230–238. [Google Scholar] [CrossRef]
  27. van Campen, T.; Hamers, H.; Husslage, B.; Lindelauf, R. A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack. Soc. Netw. Anal. Min. 2018, 8, 3. [Google Scholar] [CrossRef]
  28. van der Zanden, T.C.; Bodlaender, H.L.; Hamers, H.J.M. Efficiently computing the Shapley value of connectivity games in low-treewidth graphs. Oper. Res. Int. J. 2023, 23, 6. [Google Scholar] [CrossRef]
  29. Amer, R.; Giménez, J. A connectivity game for graphs. Math. Meth Oper. Res. 2004, 60, 453–470. [Google Scholar] [CrossRef]
  30. Algaba, E.; Prieto, A.; Saavedra-Nieves, A.; Hamers, H. Analyzing the Zerkani Network with the Owen Value. In Advances in Collective Decision Making: Interdisciplinary Perspectives for the 21st Century; Springer International Publishing: Cham, Switzerland, 2023; pp. 225–242. [Google Scholar] [CrossRef]
  31. Algaba, E.; Prieto, A.; Saavedra-Nieves, A. Risk analysis sampling methods in terrorist networks based on the Banzhaf value. Risk Anal. 2023; early view. [Google Scholar] [CrossRef]
  32. Castro, J.; Gómez, D.; Tejada, J. Polynomial calculation of the Shapley value based on sampling. Comput. Oper. Res. 2009, 36, 1726–1730. [Google Scholar] [CrossRef]
Table 1. E ( N , v i , γ ) for N = { 1 , 2 , 3 , 4 } , i = { 1 , 2 , 3 } and ( N , γ ) a four-node graph.
Table 1. E ( N , v i , γ ) for N = { 1 , 2 , 3 , 4 } , i = { 1 , 2 , 3 } and ( N , γ ) a four-node graph.
( N , γ ) E ( N , v 1 , γ ) E ( N , v 2 , γ ) E ( N , v 3 , γ )
Axioms 12 01119 i001111
Axioms 12 01119 i002 35 36 17 18 65 66
Axioms 12 01119 i003 34 36 8 9 32 33
Axioms 12 01119 i004 32 36 31 36 11 12
Axioms 12 01119 i005 29 36 7 9 28 33
Axioms 12 01119 i006 5 6 3 4 39 44
Table 2. Asymptotic behavior of the efficiency of chains, stars and wheels.
Table 2. Asymptotic behavior of the efficiency of chains, stars and wheels.
n E ( N , v 1 , γ ) E ( N , v 2 , γ ) E ( N , v 3 , γ )
γ = γ C 0 2 3 1 2
γ = γ 1 S 2 3 1 2 1
γ = γ W 0 2 3 3 4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Manuel, C.M.; Ortega, E. Efficiency and Vulnerability in Networks: A Game Theoretical Approach. Axioms 2023, 12, 1119. https://doi.org/10.3390/axioms12121119

AMA Style

Manuel CM, Ortega E. Efficiency and Vulnerability in Networks: A Game Theoretical Approach. Axioms. 2023; 12(12):1119. https://doi.org/10.3390/axioms12121119

Chicago/Turabian Style

Manuel, Conrado M., and Eduardo Ortega. 2023. "Efficiency and Vulnerability in Networks: A Game Theoretical Approach" Axioms 12, no. 12: 1119. https://doi.org/10.3390/axioms12121119

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop