Security Games with Probabilistic Constraints on the Agent's Strategy

This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the agent’s mobility are met. For example, the agent might be required to patrol some cells more often than others. In order to determine strategies for the agent that deal with these conditions and remain unpredictable for the intruder, this problem is modeled as a two-player zero-sum game with probabilistic constraints such that the operational conditions are met with high probability. We also introduce a variant of the basic constrained security game in which the payoff matrices change over time, to allow for the payoff that may change during the planning period.

[1]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[2]  Alan R. Washburn,et al.  Allocation of clearance assets in IED warfare , 2011 .

[3]  Uriel G. Rothblum,et al.  A two-resource allocation algorithm with an application to large-scale zero-sum defensive games , 2017, Comput. Oper. Res..

[4]  A Charnes,et al.  Constrained Games and Linear Programming. , 1953, Proceedings of the National Academy of Sciences of the United States of America.

[5]  Fanyong Meng,et al.  Two Methods for Solving Constrained Bi-Matrix Games , 2014 .

[6]  Milind Tambe,et al.  Robust Protection of Fisheries with COmPASS , 2014, AAAI.

[7]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[8]  Eric R. Zieyel Operations research : applications and algorithms , 1988 .

[9]  Sheldon M. Ross,et al.  Stochastic Processes , 2018, Gauge Integral Structures for Stochastic Calculus and Quantum Electrodynamics.

[10]  John Semple,et al.  Constrained games for evaluating organizational performance , 1997 .

[11]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[12]  R. K. Wood,et al.  Bilevel Network Interdiction Models: Formulations and Solutions , 2011 .

[13]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[14]  Kevin D. Glazebrook,et al.  A Graph Patrol Problem with Random Attack Times , 2013, Oper. Res..