On the Power and Limitations of Deception in Multi-Robot Adversarial Patrolling

Multi-robot adversarial patrolling is a well studied problem, investigating how defenders can optimally use all given resources for maximizing the probability of detecting penetrations, that are controlled by an adversary. It is commonly assumed that the adversary in this problem is rational, thus uses the knowledge it has on the patrolling robots (namely, the number of robots, their location, characteristics and strategy) to optimize its own chances to penetrate successfully. In this paper we present a novel defending approach which manipulates the adversarial (possibly partial) knowledge on the patrolling robots, so that it will believe the robots have more power than they actually have. We describe two different ways of deceiving the adversary: Window Deception, in which it is assumed that the adversary has partial observability of the perimeter, and Scarecrow Deception, in which some of the patrolling robots only appear as real robots, though they have no ability to actually detect the adversary. We analyze the limitations of both models, and suggest a random-based approach for optimally deceiving the adversary that considers both the resources of the defenders, and the adversarial knowledge.

[1]  Christine Julien,et al.  On coordination in practical multi-robot patrol , 2012, 2012 IEEE International Conference on Robotics and Automation.

[2]  Bo An,et al.  Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.

[3]  G. Kaminka,et al.  Frequency-Based Multi-Robot Fence Patrolling , 2008 .

[4]  Xudong Luo,et al.  Security games with partial surveillance , 2014, AAMAS.

[5]  Noa Agmon,et al.  Multi-robot area patrol under frequency constraints , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.

[6]  Alexis Drogoul,et al.  Multi-agent Patrolling: An Empirical Analysis of Alternative Architectures , 2002, MABS.

[7]  Sarit Kraus,et al.  Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..

[8]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.

[9]  Ian F. Akyildiz,et al.  BorderSense: Border patrol through advanced wireless sensor networks , 2011, Ad Hoc Networks.

[10]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[11]  Sarit Kraus,et al.  Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.

[12]  Manish Jain,et al.  Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system , 2014, Autonomous Agents and Multi-Agent Systems.

[13]  Emad Felemban,et al.  Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology , 2013 .

[14]  Sarit Kraus,et al.  Security in multiagent systems by policy randomization , 2006, AAMAS '06.

[15]  Bo An,et al.  Security Games with Limited Surveillance , 2012, AAAI.