Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder

Security games are gaining significant interest in artificial intelligence. They are characterized by two players (a defender and an attacker) and by a set of targets the defender tries to protect from the [email protected]?s intrusions by committing to a strategy. To reach their goals, players use resources such as patrollers and intruders. Security games are Stackelberg games where the appropriate solution concept is the leader-follower equilibrium. Current algorithms for solving these games are applicable when the underlying game is in normal form (i.e., each player has a single decision node). In this paper, we define and study security games with an extensive-form infinite-horizon underlying game, where decision nodes are potentially infinite. We introduce a novel scenario where the attacker can undertake actions during the execution of the [email protected]?s strategy. We call this new game class patrolling security games (PSGs), since its most prominent application is patrolling environments against intruders. We show that PSGs cannot be reduced to security games studied so far and we highlight their generality in tackling adversarial patrolling on arbitrary graphs. We then design algorithms to solve large instances with single patroller and single intruder.

[1]  B. Stengel,et al.  Efficient Computation of Behavior Strategies , 1996 .

[2]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[3]  Micah Adler,et al.  Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.

[4]  Michal Tzur,et al.  The Period Vehicle Routing Problem with Service Choice , 2006, Transp. Sci..

[5]  Sarit Kraus,et al.  Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.

[6]  Troels Bjerre Lund,et al.  A heads-up no-limit Texas Hold'em poker player: discretized betting models and automatically generated equilibrium-finding programs , 2008, AAMAS.

[7]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[8]  Christos H. Papadimitriou,et al.  Computational complexity , 1993 .

[9]  Noa Agmon,et al.  Multi-robot area patrol under frequency constraints , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.

[10]  Ari K. Jónsson,et al.  Cyclic Scheduling , 1999, IJCAI.

[11]  El Houssaine Aghezzaf,et al.  Production , Manufacturing and Logistics A practical solution approach for the cyclic inventory routing problem , 2008 .

[12]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[13]  Nicola Basilico,et al.  Automated Abstractions for Patrolling Security Games , 2011, AAAI.

[14]  Nicola Basilico,et al.  A Game-Theoretical Model Applied to an Active Patrolling Camera , 2010, 2010 International Conference on Emerging Security Technologies.

[15]  Sarit Kraus,et al.  An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.

[16]  Sui Ruan,et al.  Patrolling in a Stochastic Environment , 2005 .

[17]  Sarit Kraus,et al.  Uncertainties in adversarial patrol , 2009, AAMAS.

[18]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.

[19]  Elbert E. N. Macau,et al.  Patrol Mobile Robots and Chaotic Trajectories , 2007 .

[20]  Vincent Conitzer,et al.  Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.

[21]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[22]  J.K. Hedrick,et al.  Border patrol and surveillance missions using multiple unmanned air vehicles , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[23]  Nicola Basilico,et al.  Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.

[24]  Sarit Kraus,et al.  Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.

[25]  Yehuda Elmaliach,et al.  A realistic model of frequency-based multi-robot polyline patrolling , 2008, AAMAS.

[26]  Nicola Basilico,et al.  TALOS: a tool for designing security applications with mobile patrolling robots , 2011, AAMAS.

[27]  Sarit Kraus,et al.  Adversarial Uncertainty in Multi-Robot Patrol , 2009, IJCAI.

[28]  Nils J. Nilsson,et al.  Artificial Intelligence , 1974, IFIP Congress.

[29]  Yi Guo,et al.  Collaborative Robots for Infrastructure Security Applications , 2007, Mobile Robots.

[30]  Bruce L. Golden,et al.  The period vehicle routing problem: New heuristics and real-world variants , 2011 .

[31]  S. Alpern Infiltration games on arbitrary graphs , 1992 .

[32]  Nicos Christofides,et al.  The period routing problem , 1984, Networks.

[33]  Noa Agmon On events in multi-robot patrol in adversarial environments , 2010, AAMAS.

[34]  Mokhtar S. Bazaraa,et al.  Nonlinear Programming: Theory and Algorithms , 1993 .

[35]  Nicola Basilico,et al.  Developing a Deterministic Patrolling Strategy for Security Agents , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[36]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[37]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[38]  P. Hudson Search Games , 1982 .

[39]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[40]  Olivier Buffet,et al.  Theoretical Study of Ant-based Algorithms for Multi-Agent Patrolling , 2008, ECAI.

[41]  Alexis Drogoul,et al.  Multi-agent Patrolling: An Empirical Analysis of Alternative Architectures , 2002, MABS.

[42]  M. M. Flood THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .

[43]  A. Rubinstein Perfect Equilibrium in a Bargaining Model , 1982 .

[44]  Stefano Carpin,et al.  Extracting surveillance graphs from robot maps , 2008, 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[45]  D. Koller,et al.  Efficient Computation of Equilibria for Extensive Two-Person Games , 1996 .

[46]  Alexander H. G. Rinnooy Kan,et al.  Vehicle Routing with Time Windows , 1987, Oper. Res..

[47]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[48]  David M. Kreps,et al.  Sequential Equilibria Author ( s ) : , 1982 .

[49]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[50]  Yann Chevaleyre,et al.  Recent Advances on Multi-agent Patrolling , 2004, SBIA.

[51]  Jacques Wainer,et al.  Probabilistic Multiagent Patrolling , 2008, SBIA.

[52]  Francesco Amigoni,et al.  A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[53]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[54]  John N. Tsitsiklis,et al.  Special cases of traveling salesman and repairman problems with time windows , 1992, Networks.

[55]  Brian W. Kernighan,et al.  AMPL: A Modeling Language for Mathematical Programming , 1993 .

[56]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[57]  Sampath Kannan,et al.  Randomized pursuit-evasion in a polygonal environment , 2005, IEEE Transactions on Robotics.

[58]  Tuomas Sandholm,et al.  Lossless abstraction of imperfect information games , 2007, JACM.

[59]  Yann Chevaleyre,et al.  Theoretical analysis of the multi-agent patrolling problem , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..

[60]  Bohdana Ratitch,et al.  Multi-agent patrolling with reinforcement learning , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[61]  Milind Tambe,et al.  How to protect a city: strategic security placement in graph-based domains , 2010, AAMAS.

[62]  William H. Ruckle,et al.  Ambushing Random Walks I: Finite Models , 1976, Oper. Res..

[63]  Brahim Chaib-draa,et al.  Solving the continuous time multiagent patrol problem , 2010, 2010 IEEE International Conference on Robotics and Automation.

[64]  Israel A. Wagner,et al.  A Distributed Ant Algorithm for\protect Efficiently Patrolling a Network , 2003, Algorithmica.

[65]  Nicola Basilico,et al.  Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.