A continuous-time Markov Stackelberg security game approach for reasoning about real patrol strategies

Research output: Contribution to journalArticlepeer-review

15 Scopus citations

Abstract

This paper improves the classical attacker-defender Stackelberg security games providing a novel approach for handling real-world patrolling domains with spatiotemporal constraints. The solution is restricted to a class of finite, controllable, and ergodic continuous-time Markov games. First, we suggest a multi-leader-follower Stackelberg game: the game model involves leaders and followers in a non-cooperative game respectively, related to a Stackelberg game. We study the problem of computing the Stackelberg-Nash equilibrium for this game in terms of the intermediate step solver. We employ the penalty method for representing the original game formulation in terms of nonlinear programming problems. The mathematical optimisation method proposed for solving the continuous-time Markov game takes into account the average cost functions of the players and extends the c-variable method for continuous-time. In addition, we present a new continuous-time random walk model, which defines the time of the jumping events for representing continuous-time patrol strategies. Our contribution overcomes the limitations presented in previous proposals related to Stackelberg security games. We experimentally show the efficiency of our approach measuring the benefits of the continuous-time Stackelberg game for security resource allocation. These results establish a strong step toward employing game theory to solve real-world security allocation problems.

Original languageEnglish
Pages (from-to)2494-2510
Number of pages17
JournalInternational Journal of Control
Volume91
Issue number11
DOIs
StatePublished - 2 Nov 2018

Keywords

  • Stackelberg security games
  • continuous-time Markov games
  • continuous-time random walk
  • patrolling

Fingerprint

Dive into the research topics of 'A continuous-time Markov Stackelberg security game approach for reasoning about real patrol strategies'. Together they form a unique fingerprint.

Cite this