An attrition game on a network ruled by Lanchester’s square law

We consider two-person zero-sum attrition games in which an attacker and a defender are in combat with each other on a network. The attacker marches from a starting node to a destination node, hoping that the initial members survive the march. The defender deploys his forces on arcs in order to intercept the attacker. If the attacker encounters the defender on an arc, the attacker incurs casualties according to Lanchester’s square law. We consider two models: a one-shot game in which the two players have no information about their opponents, and a two-stage game in which both players have some information about their opponents. For both games, the payoff is defined as the number of survivors for the attacker. The attacker’s strategy is to choose a path, and the defender’s is to deploy the defending forces on arcs. We propose a numerical algorithm, in which nonlinear programming is embedded, to derive the equilibrium of the game.

[1]  Joseph M. Kahn,et al.  Imaging diversity receivers for high-speed infrared wireless communication , 1998, IEEE Commun. Mag..

[2]  Ravindra K. Ahuja,et al.  Network Flows , 2011 .

[3]  Javier Salmerón,et al.  Deception tactics for network interdiction: A multiobjective approach , 2012, Networks.

[4]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[5]  Maria Paola Scaparra,et al.  Optimal Allocation of Protective Resources in Shortest-Path Networks , 2011, Transp. Sci..

[6]  D. Tcha,et al.  Design of Communication Networks with Survivability Constraints , 1999 .

[7]  Javier Salmeron,et al.  The Value of Recovery Transformers in Protecting an Electric Transmission Grid Against Attack , 2015, IEEE Transactions on Power Systems.

[8]  Ami Arbel A weighted-gradient approach to multi-objective linear programming problems using the analytic hierarchy process , 1993 .

[9]  Philip M. Morse,et al.  Methods of Operations Research , 1952 .

[10]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[11]  Zoë K Harris Efficient allocation of resources to prevent HIV infection among injection drug users: the Prevention Point Philadelphia (PPP) needle exchange program. , 2006, Health economics.

[12]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[13]  R. Kevin Wood,et al.  The multi-terminal maximum-flow network-interdiction problem , 2011, Eur. J. Oper. Res..

[14]  Leo Liberti,et al.  Introduction to Global Optimization , 2006 .

[15]  John M. Auger An infiltration game onk arcs , 1991 .

[16]  Martin Grötschel,et al.  Survivable mobile phone network architectures: models and solution methods , 1998 .

[17]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[18]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[19]  Philip S. Bud Whiteman Improving Single Strike Effectiveness for Network Interdiction , 1999 .

[20]  Richard J. Gibbens,et al.  Dynamic Routing in Fully Connected Networks , 1990 .

[21]  Jonathan Cole Smith,et al.  Survivable network design under optimal and heuristic interdiction scenarios , 2007, J. Glob. Optim..

[22]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[23]  Jitamitra Desai,et al.  A global optimization algorithm for reliable network design , 2010, Eur. J. Oper. Res..

[24]  Justo Puerto,et al.  Revisiting a game theoretic framework for the robust railway network design against intentional attacks , 2013, Eur. J. Oper. Res..

[25]  William H. Ruckle,et al.  Geometric games and their applications , 1983 .

[26]  Delbert Ray Fulkerson,et al.  Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..

[27]  Alan W. McMasters,et al.  Optimal interdiction of a supply network , 1970 .

[28]  Melvin Dresher,et al.  A Sampling Inspection Problem in Arms Control Agreements: A Game-Theoretic Analysis , 1962 .

[29]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[30]  William H. Ruckle,et al.  Ambushing Random Walks I: Finite Models , 1976, Oper. Res..

[31]  Richard L. Church,et al.  Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .

[32]  Eric V. Denardo,et al.  Flows in Networks , 2011 .

[33]  Marlin U. Thomas,et al.  An infiltration game with time dependent payoff , 1976 .

[34]  W. C. Turner,et al.  Optimal interdiction policy for a flow network , 1971 .

[35]  Takashi Chiba,et al.  An attrition game on an acyclic network , 2015, J. Oper. Res. Soc..

[36]  Jonathan P. Caulkins,et al.  Simulation of adaptive response: A model of drug interdiction , 1993 .

[37]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[38]  M. Naceur Azaiez,et al.  Game Theoretic Risk Analysis of Security Threats , 2009 .

[39]  Halil Bayrak,et al.  Shortest path network interdiction with asymmetric information , 2008, Networks.

[40]  F. W. Lanchester,et al.  Aircraft in Warfare: The Dawn of the Fourth Arm , 1995 .

[41]  B. Golden A problem in network interdiction , 1978 .

[42]  Iradj Ouveysi,et al.  On design of a survivable network architecture for dynamic routing: Optimal solution strategy and an efficient heuristic , 1999, Eur. J. Oper. Res..

[43]  N. Assimakopoulos,et al.  A network interdiction model for hospital infection control. , 1987, Computers in biology and medicine.

[44]  M G H Bell,et al.  Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[45]  Niyazi Onur Bakir A Stackelberg game model for resource allocation in cargo container security , 2011, Ann. Oper. Res..

[46]  Kensaku Kikuta,et al.  An Ambush Game with an Unknown Number of Infiltrators , 2004, Oper. Res..