Multi-resource defensive strategies for patrolling games with alarm systems

Security Games employ game theoretical tools to derive resource allocation strategies in security domains. Recent works considered the presence of alarm systems, even suffering various forms of uncertainty, and showed that disregarding alarm signals may lead to arbitrarily bad strategies. The central problem with an alarm system, unexplored in other Security Games, is finding the best strategy to respond to alarm signals for each mobile defensive resource. The literature provides results for the basic single-resource case, showing that even in that case the problem is computationally hard. In this paper, we focus on the challenging problem of designing algorithms scaling with multiple resources. First, we focus on finding the minimum number of resources assuring non-null protection to every target. Then, we deal with the computation of multi-resource strategies with different degrees of coordination among resources. For each considered problem, we provide a computational analysis and propose algorithmic methods.

[1]  J. van Leeuwen,et al.  Theoretical Computer Science , 2003, Lecture Notes in Computer Science.

[2]  Bo An,et al.  An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..

[3]  Ariel D. Procaccia,et al.  Lazy Defenders Are Almost Optimal against Diligent Attackers , 2014, AAAI.

[4]  Nicola Basilico,et al.  Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.

[5]  Sarit Kraus,et al.  Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.

[6]  Robert M Thrall,et al.  Mathematics of Operations Research. , 1978 .

[7]  Nicola Basilico,et al.  Adversarial patrolling with spatially uncertain alarm signals , 2015, Artif. Intell..

[8]  Kristoffer Arnsfelt Hansen,et al.  Approximability and Parameterized Complexity of Minmax Values , 2008, WINE.

[9]  Vasek Chvátal,et al.  A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..

[10]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[11]  Nysret Musliu,et al.  Local Search Algorithm for Unicost Set Covering Problem , 2006, IEA/AIE.

[12]  Oriol Carbonell-Nicolau Games and Economic Behavior , 2011 .

[13]  Adam Tauman Kalai,et al.  The myth of the folk theorem , 2008, Games Econ. Behav..

[14]  B. Stengel,et al.  Team-Maxmin Equilibria☆ , 1997 .

[15]  Nicola Basilico,et al.  A Security Game Model for Environment Protection in the Presence of an Alarm System , 2015, GameSec.

[16]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[17]  Bo An,et al.  Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.

[18]  Nicola Basilico,et al.  Capturing augmented sensing capabilities and intrusion delay in patrolling-intrusion games , 2009, 2009 IEEE Symposium on Computational Intelligence and Games.