COOPERATIVE CONTROL STRATEGIES AND DECEPTION IN ADVERSARIAL SYSTEMS

of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy COOPERATIVE CONTROL STRATEGIES AND DECEPTION IN ADVERSARIAL SYSTEMS By Zachariah E. Fuchs August 2012 Chair: Pramod P. Khargonekar Major: Electrical and Computer Engineering The protection of vulnerable, high-value assets has been a challenge throughout history. These high-value targets may be fixed, mobile, or in the cloud. In any case, it is necessary to deploy and effectively utilize defensive assets in an attempt to neutralize an attack if it occurs, or make the prospect of further engagement so unappealing that the attackers stand down and retreat. My research focused on two aspects of applying game theoretic methods to the development of defensive strategies. The first aspect of my research utilized tools from differential game theory to develop cooperative, defensive control strategies against a superior, mobile attacker. It was shown that through cooperation, the defending agents can combine their resources and make engagement more costly to the attacker than if they acted independently. A hierarchical attack-retreat game was then developed that incorporates the concept of player intent. This game demonstrated that it is sometimes optimal for the defending player to cooperate with the attacker in order to encourage retreat. Although cooperation can encourage retreat, cooperating at the wrong time can actually assist an attacker in engagement. For this reason, a modified differential game with a value function constraint was developed to prevent the attacker from moving the state of the system to a region where engagement is optimal. The second aspect of my research focused on developing an analytic framework to quantitatively capture and describe concepts of deception. A generic two-player,

[1]  T. Getty,et al.  Cooperative nest defence in red–winged blackbirds: reciprocal altruism, kinship or by–product mutualism? , 2004, Proceedings of the Royal Society of London. Series B: Biological Sciences.

[2]  Martin Shubik,et al.  Systems Defense Games: Colonel Blotto, Command and Control , 1981 .

[3]  Carlos Eduardo Pereira,et al.  Coordinating Aerial Robots and Unattended Ground Sensors for Intelligent Surveillance Systems , 2010, Int. J. Comput. Commun. Control.

[4]  Lawrence Freedman The Problem of Strategy , 1980 .

[5]  Huihui Jiang,et al.  Modeling and control of military operations against adversarial control , 2000, Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187).

[6]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[7]  Tamer Basar,et al.  Differential Games and Applications , 1989 .

[8]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[9]  Pramod P. Khargonekar,et al.  A sequential Colonel Blotto game with a sensor network , 2012, 2012 American Control Conference (ACC).

[10]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[11]  Pramod P. Khargonekar,et al.  Games, deception, and Jones' Lemma , 2011, Proceedings of the 2011 American Control Conference.

[12]  Eliot A. Cohen,et al.  Fortitude: The D-Day Deception Campaign , 2000 .

[13]  B. Roberson,et al.  The non-constant-sum Colonel Blotto game , 2008, SSRN Electronic Journal.

[14]  I. N. Katz,et al.  Solution of a Differential Game Formulation of Military Air Operations by the Method of Characteristics , 2005 .

[15]  K. N. Laland,et al.  Social structure and co-operative interactions in a wild population of guppies (Poecilia reticulata) , 2006, Behavioral Ecology and Sociobiology.

[16]  João Pedro Hespanha,et al.  A cooperative homicidal chauffeur game , 2007, 2007 46th IEEE Conference on Decision and Control.

[17]  Pramod P. Khargonekar,et al.  Cooperative defense within a single-pursuer, two-evader pursuit evasion differential game , 2010, 49th IEEE Conference on Decision and Control (CDC).

[18]  D. W. Blackett Pure strategy solutions of blotto games , 1958 .

[19]  M. Pachter,et al.  A stochastic homicidal chauffeur pursuit-evasion differential game , 1981 .

[20]  Michael R. Baye,et al.  The all-pay auction with complete information , 1990 .

[21]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[22]  Barton Whaley,et al.  Stratagem: Deception and Surprise in War , 2007 .

[23]  Robert Powell,et al.  Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..

[24]  M. Pachter,et al.  Two-target pursuit-evasion differential games in the plane , 1981 .

[25]  Joao P. Hespanha,et al.  Deception in Non-Cooperative Games with Partial Information , 2000 .

[26]  Singular Paths in Differential Games with Simple Motion , 1994 .

[27]  Marc Quincampoix,et al.  Some algorithms for differential games with two players and one target , 1994 .

[28]  J. Lewin Differential Games: Theory And Methods For Solving Game Problems With Singular Surfaces , 2011 .

[29]  Bruce A. Conway,et al.  Optimal Fighter Pursuit-Evasion Maneuvers Found via Two-Sided Optimization , 2006 .

[30]  Gerardus Sierksma,et al.  Linear and integer programming - theory and practice , 1999, Pure and applied mathematics.

[31]  Tamer Basar,et al.  Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).

[32]  D. W. Blackett,et al.  Some blotto games , 1954 .

[33]  Bruce A. Conway,et al.  Optimal Interception of Evasive Missile Warheads: Numerical Solution of the Differential Game , 2008 .

[34]  P. Hagedorn,et al.  Point capture of two evaders in succession , 1979 .

[35]  Tamer Basar,et al.  Secure communication for mobile agents in an adversarial environment , 2011, 14th International Conference on Information Fusion.

[36]  Pramod P. Khargonekar,et al.  Encouraging attacker retreat through defender cooperation , 2011, IEEE Conference on Decision and Control and European Control Conference.

[37]  B. Roberson The Colonel Blotto game , 2006 .

[38]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[39]  L. Dugatkin,et al.  Tit-For-Tat in guppies (Poecilia reticulata): the relative nature of cooperation and defection during predator inspection , 1991, Evolutionary Ecology.

[40]  Pierre Bernhard,et al.  Geometry of Optimal Paths around Focal Singular Surfaces in Differential Games , 2005 .

[41]  Naira Hovakimyan,et al.  Singular surfaces in multi-agent connectivity maintenance games , 2011, IEEE Conference on Decision and Control and European Control Conference.

[42]  B. E. Wallacker,et al.  Sun Tzu: The Art of War , 2008 .

[43]  Mike Mesterton-Gibbons,et al.  Neighbor intervention: a game-theoretic model. , 2009, Journal of theoretical biology.

[44]  Ian L. Gale,et al.  Caps on Political Lobbying , 1998 .

[45]  A. W. Merz,et al.  To pursue or to evade - That is the question , 1985 .

[46]  S. Nowicki,et al.  The Evolution of Animal Communication: Reliability and Deception in Signaling Systems: Reliability and Deception in Signaling Systems , 2005 .

[47]  John K. Karlof,et al.  Integer programming : theory and practice , 2005 .

[48]  K. Buchanan The Evolution of Animal Communication. Reliability and Deception in Signalling Systems, William A. Searcy, Stephen Nowicki. Princeton University Press, Princeton, New Jersey (2005), Pp xiv+270. Price £26.95 paperback , 2006 .

[49]  S Bhattacharya,et al.  Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.

[50]  A I Houston,et al.  Beyond the prisoner's dilemma: Toward models to discriminate among mechanisms of cooperation in nature. , 1992, Trends in ecology & evolution.

[51]  Richard Bellman,et al.  On “Colonel Blotto” and Analogous Games , 1969 .

[52]  Rafael Murrieta-Cid,et al.  Optimal Paths for Landmark-Based Navigation by Differential-Drive Vehicles With Field-of-View Constraints , 2007, IEEE Transactions on Robotics.

[53]  Jose B. Cruz,et al.  Information, decision-making and deception in games , 2009, Decis. Support Syst..

[54]  Tamer Basar,et al.  Game-theoretic analysis of a visibility based pursuit-evasion game in the presence of obstacles , 2009, 2009 American Control Conference.

[55]  Bruce A. Conway,et al.  Numerical Solution of the Three-Dimensional Orbital Pursuit-Evasion Game , 2009 .

[56]  Antony W Merz,et al.  The Homicidal Chauffeur - A Differential Game , 1971 .

[57]  T. Başar,et al.  Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .

[58]  Eitan Israeli,et al.  Sowing Doubt Optimally in Two-Person Repeated Games , 1999 .

[59]  Lee Alan Dugatkin Cheating Monkeys and Citizen Bees: The Nature of Cooperation in Animals and Humans , 1999 .

[60]  Marta B. Manser,et al.  The function of mobbing in cooperative meerkats , 2007, Animal Behaviour.

[61]  Pierre Bernhard,et al.  Singular surfaces in differential games an introduction , 1977 .

[62]  Rufus Isaacs,et al.  Differential Games , 1965 .

[63]  Michael Bennett,et al.  Counterdeception Principles and Applications for National Security , 2007 .

[64]  Debasish Ghose,et al.  Modeling and analysis of air campaign resource allocation: a spatio-temporal decomposition approach , 2002, IEEE Trans. Syst. Man Cybern. Part A.

[65]  Tamar Frankel [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.

[66]  Giles Sun Tzu On The Art Of War , 2013 .

[67]  Tamer Basar,et al.  Spatial approaches to broadband jamming in heterogeneous mobile networks: a game-theoretic approach , 2011, Auton. Robots.