Strategic Coordination of Human Patrollers and Mobile Sensors With Signaling for Security Games

Traditional security games concern the optimal randomized allocation of human patrollers, who can directly catch attackers or interdict attacks. Motivated by the emerging application of utilizing mobile sensors (e.g., UAVs) for patrolling, in this paper we propose the novel Sensor-Empowered security Game (SEG) model which captures the joint allocation of human patrollers and mobile sensors. Sensors differ from patrollers in that they cannot directly interdict attacks, but they can notify nearby patrollers (if any). Moreover, SEGs incorporate mobile sensors’ natural functionality of strategic signaling. On the technical side, we first prove that solving SEGs is NP-hard even in zero-sum cases. We then develop a scalable algorithm SEGer based on the branch-and-price framework with two key novelties: (1) a novel MILP formulation for the slave; (2) an efficient relaxation of the problem for pruning. To further accelerate SEGer, we design a faster combinatorial algorithm for the slave problem, which is provably a constant-approximation to the slave problem in zerosum cases and serves as a useful heuristic for general-sum SEGs. Our experiments demonstrate the significant benefit of utilizing mobile sensors.

[1]  Haifeng Xu,et al.  Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.

[2]  Sarit Kraus,et al.  When Security Games Hit Traffic: Optimal Traffic Enforcement Under One Sided Uncertainty , 2017, IJCAI.

[3]  Yoav Shoham,et al.  Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[4]  Haifeng Xu,et al.  Information Disclosure as a Means to Security , 2015, AAMAS.

[5]  Bo An,et al.  Deploying PAWS to Combat Poaching: Game-Theoretic Patrolling in Areas with Complex Terrain (Demonstration) , 2016, AAAI.

[6]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[7]  Nicholas R. Jennings,et al.  Near-optimal continuous patrolling with teams of mobile information gathering agents , 2013, Artif. Intell..

[8]  Noa Agmon,et al.  On the Power and Limitations of Deception in Multi-Robot Adversarial Patrolling , 2017, IJCAI.

[9]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[10]  Milind Tambe,et al.  VIOLA: Video Labeling Application for Security Domains , 2017, GameSec.

[11]  Milind Tambe,et al.  Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security , 2016, AAAI.

[12]  Martin W. P. Savelsbergh,et al.  Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..

[13]  Branislav Bosanský,et al.  Comparing Strategic Secrecy and Stackelberg Commitment in Security Games , 2017, IJCAI.

[14]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[15]  Emir Kamenica,et al.  Bayesian Persuasion , 2009 .

[16]  Bo An,et al.  Optimally Protecting Elections , 2016, IJCAI.

[17]  Fernando Ordóñez,et al.  Building Real Stackelberg Security Games for Border Patrols , 2017, GameSec.

[18]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[19]  Jan Vondrák,et al.  Maximizing a Monotone Submodular Function Subject to a Matroid Constraint , 2011, SIAM J. Comput..

[20]  Nicola Basilico,et al.  Adversarial patrolling with spatially uncertain alarm signals , 2015, Artif. Intell..

[21]  Klaudia Frankfurter Computers And Intractability A Guide To The Theory Of Np Completeness , 2016 .

[22]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[23]  Nicola Basilico,et al.  Coordinating Multiple Defensive Resources in Patrolling Games with Alarm Systems , 2017, AAMAS.

[24]  Gerhard Friedrich,et al.  Multi-UAV Monitoring with Priorities and Limited Energy Resources , 2015, ICAPS.