Skip to main content

Game-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance Information

  • Conference paper
  • First Online:
Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9161))

  • 782 Accesses

Abstract

Game-theoretic security resource allocation problems have generated significant interest in the area of designing and developing security systems. These approaches traditionally utilize the Stackelberg game model for security resource scheduling in order to improve the protection of critical assets. The basic assumption in Stackelberg games is that a defender will act first, then an attacker will choose their best response after observing the defender’s strategy commitment (e.g., protecting a specific asset). Thus, it requires an attacker’s full or partial observation of a defender’s strategy. This assumption is unrealistic in real-time threat recognition and prevention. In this paper, we propose a new solution concept (i.e., a method to predict how a game will be played) for deriving the defender’s optimal strategy based on the principle of acceptable costs of minimax regret. Moreover, we demonstrate the advantages of this solution concept by analyzing its properties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A defender’s knowledge of both players’ payoff matrices and an attacker’s knowledge of their own payoff matrix.

  2. 2.

    While surveillance information can be represented by some imprecise probability theories [7], due to space restrictions, in this paper we focus on probability theory.

  3. 3.

    Regret is an emotion associated with decisions which yield undesirable outcomes.

  4. 4.

    Formally, in a two-player game, a probability distribution p for the pure strategies of a given player i (\(A_i=\{a_1,\dots ,a_n\}\)) is an equalizer if and only if there exists \(c\in \mathfrak {R}\) (\(\mathfrak {R}\) is the set of real numbers) and any pure strategy \(b_j\) for their opponent, s.t. the following equation holds \(\Sigma _{t=1}^{n} p(a_{t}) u_{i}(a_{t},b_{j})=c\).

  5. 5.

    \(k=l\) means that both players select the same target (i.e., the attacker loses), while \(i\ne j\) and \(s\ne r\) mean that players select different targets (i.e., the attacker wins).

  6. 6.

    Since a defender may have multiple available security resources, our Linear Programs will also consider this situation based on Definition 3.

References

  1. Chua, H.F., Gonzalez, R., Taylor, S.F., Welsh, R.C., Liberzon, I.: Decision-related loss: regret and disappointment. NeuroImage 47(4), 2031–2040 (2009)

    Article  Google Scholar 

  2. Gong, S., Loy, C., Xiang, T.: Security and surveillance. In: Moeslund, T.B., Hilton, A., Krüger, V., Sigal, L. (eds.) Visual Analysis of Humans, pp. 455–472. Springer, London (2011)

    Chapter  Google Scholar 

  3. Harsanyi, J.C.: Rational Behaviour and Bargaining Equilibrium in Games and Social Situations. Cambridge University Press, Cambridge (1986)

    MATH  Google Scholar 

  4. Kiekintveld, C., Kreinovich, V.: Efficient approximation for security games with interval uncertainty. In: Proceedings of the AAAI Spring Symposium on Game Theory for Security, Sustainability, and Health GTSSH (2012)

    Google Scholar 

  5. Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. Nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness. J. Artif. Intell. Res. 41(2), 297–327 (2011)

    MathSciNet  MATH  Google Scholar 

  6. Kuhnen, C.M., Knutson, B.: The neural basis of financial risk taking. Neuron 47(5), 763–770 (2005)

    Article  Google Scholar 

  7. Ma, J., Liu, W., Miller, P.: Event modelling and reasoning with uncertain information for distributed sensor networks. In: Deshpande, A., Hunter, A. (eds.) SUM 2010. LNCS, vol. 6379, pp. 236–249. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Ma, W., Luo, X., Liu, W.: An ambiguity aversion framework of security games under ambiguities. IJCAI 2013, 271–278 (2013)

    Google Scholar 

  9. Osborne, M.J.: An Introduction to Game Theory. Oxford University Press, New York (2004)

    Google Scholar 

  10. Pita, J., Jain, M., Ordonez, F., Portway, C., Tambe, M., Western, C., Paruchuri, P., Kraus, S.: Using game theory for Los Angeles airport security. AI Mag. 30(1), 43–57 (2009)

    Google Scholar 

  11. Pita, J., Jain, M., Tambe, M., Ordóñez, F., Kraus, S.: Robust solutions to stackelberg games: addressing bounded rationality and limited observations in human cognition. Artif. Intell. 174(15), 1142–1171 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  12. Pruzhansky, V.: Some interesting properties of maximin strategies. Int. J. Game Theory 40(2), 351–365 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  13. Savage, L.J.: The theory of statistical decision. J. Am. Stat. Assoc. 46(253), 54–67 (1951)

    Article  MATH  Google Scholar 

  14. Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems Lessons Learned. Cambridge University Press, Cambridge (2011)

    Book  MATH  Google Scholar 

  15. Wasserkrug, S., Gal, A., Etzion, O.: Inference of security hazards from event composition based on incomplete or uncertain information. IEEE Trans. Knowl. Data Eng. 20(8), 1111–1114 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kevin McAreavey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ma, W., Liu, W., McAreavey, K. (2015). Game-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance Information. In: Destercke, S., Denoeux, T. (eds) Symbolic and Quantitative Approaches to Reasoning with Uncertainty. ECSQARU 2015. Lecture Notes in Computer Science(), vol 9161. Springer, Cham. https://doi.org/10.1007/978-3-319-20807-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20807-7_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20806-0

  • Online ISBN: 978-3-319-20807-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics