Advertisement

Balancing Unpredictability and Coverage in Adversarial Patrolling Settings

  • Nicola Basilico
  • Stefano CarpinEmail author
Conference paper
  • 28 Downloads
Part of the Springer Proceedings in Advanced Robotics book series (SPAR, volume 14)

Abstract

We present a novel strategy for a patroller defending a set of heterogeneous assets from the attacks carried by an attacker that through repeated observations attempts to learn the strategy followed by the patroller. Implemented through a Markov chain whose stationary distribution is a function of the values of the assets being defended and the topology of the environment, the strategy is biased towards providing more protection to valuable assets, yet is provably hard to learn for an opponent. After having studied its properties, we show that our proposed method outperforms strategies commonly used for this type of problems.

Keywords

Security games Learning Patrolling 

References

  1. 1.
    Agharkar, P., Patel, R., Bullo, F.: Robotic surveillance and Markov chains with minimal first passage time. In: Proceedings of the IEEE conference on Decision and Control, pp. 6603–6608 (2014)Google Scholar
  2. 2.
    Alamdari, S., Fata, E., Smith, S.L.: Persistent monitoring in discrete environments: minimizing the maximum weighted latency between observations. Int. J. Robot. Res. 33(1), 138–154 (2014)CrossRefGoogle Scholar
  3. 3.
    Alpern, S., Morton, A., Papadaki, K.: Patrolling games. Oper. Res. 59(5), 1246–1257 (2011)MathSciNetCrossRefGoogle Scholar
  4. 4.
    An, B., Brown, M., Vorobeychik, Y., Tambe, M.: Security games with surveillance cost and optimal timing of attack execution. In: International Conference on Autonomous Agents and Multi-agent Systems, pp. 223–230 (2013)Google Scholar
  5. 5.
    Basilico, N., Gatti, N., Amigoni, F.: Patrolling security games: definition and algorithms for solving large instances with single patroller and single intruder. Artif. Intell. 184, 78–123 (2012)CrossRefGoogle Scholar
  6. 6.
    Blum, A., Haghtalab, N., Procaccia, A.D.: Lazy defenders are almost optimal against diligent attackers. In: AAAI, pp. 573–579 (2014)Google Scholar
  7. 7.
    Bontempi, G., Ben Taieb, S., Le Borgne, Y.: Machine learning strategies for time series forecasting. In: Business Intelligence, pp. 62–77. Springer (2013)Google Scholar
  8. 8.
    Chevaleyre, Y.: Theoretical analysis of the multi-agent patrolling problem. In: Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, pp. 302–308 (2004)Google Scholar
  9. 9.
    Grace, J., Baillieul, J.: Stochastic strategies for autonomous robotic surveillance. In: Proceedings of the IEEE Conference on Decision and Control, pp. 2200–2205 (2005)Google Scholar
  10. 10.
    Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)CrossRefGoogle Scholar
  11. 11.
    Papoulis, A., Pillai, S.U.: Probability, Random Variables, and Stochastic Processes, 4th edn. McGraw-Hill, New York (2002)Google Scholar
  12. 12.
    Privault, N.: Understanding Markov Chains. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  13. 13.
    Robin, C., Lacroix, S.: Multi-robot target detection and tracking: taxonomy and survey. Auton. Robot. 40(4), 729–760 (2016)CrossRefGoogle Scholar
  14. 14.
    Ross, S.M.: Introduction to Probability Models. Elsevier, Amsterdam (2014)zbMATHGoogle Scholar
  15. 15.
    Sutton, R.S., Barto, A.G.: Reinforcement Learning. MIT Press, Cambridge (1998)zbMATHGoogle Scholar
  16. 16.
    Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)CrossRefGoogle Scholar
  17. 17.
    Wei, W.W.S.: Time series analysis. In: The Oxford Handbook of Quantitative Methods in Psychology, vol. 2 (2006)Google Scholar
  18. 18.
    Zhang, C., Bucarey, V., Mukhopadhyay, A., Sinha, A., Qian, Y., Vorobeychik, Y., Tambe, M.: Using abstractions to solve opportunistic crime security games at scale. In: International Conference on Autonomous Agents and Multiagent Systems, pp. 196–204 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of MilanMilanItaly
  2. 2.Department of Computer Science and EngineeringUniversity of CaliforniaMercedUSA

Personalised recommendations