A Stackelberg security game with random strategies based on the extraproximal theoretic approach

Kristal K. Trejo, Julio B. Clempner, Alexander S. Poznyak

Research output: Contribution to journalArticlepeer-review

39 Scopus citations

Abstract

In this paper we present a novel approach for representing a real-world attacker-defender Stackelberg security game-theoretic model based on the extraproximal method. We focus on a class of ergodic controlled finite Markov chain games. The extraproximal problem formulation is considered as a nonlinear programming problem with respect to stationary distributions. The Lagrange principle and Tikhonov's regularization method are employed to ensure the convergence of the cost functions. We transform the problem into a system of equations in a proximal format, and a two-step (prediction and basic) iterated procedure is applied to solve the formulated problem. In particular, the extraproximal method is employed for computing mixed strategies, providing a strong optimization formulation to compute the Stackelberg/Nash equilibrium. Mixed strategies are especially found when the resources available for both the defender and the attacker are limited. In this sense, each equation in this system is an optimization problem for which the minimum is found using a quadratic programming approach. The model supports a defender and N attackers. In order to address the dynamic execution uncertainty in security patrolling, we provide a game-theoretic based method for scheduling randomized patrols. Simulation results provide a validations of our approach.

Original languageEnglish
Pages (from-to)145-153
Number of pages9
JournalEngineering Applications of Artificial Intelligence
Volume37
DOIs
StatePublished - 1 Jan 2015

Keywords

  • Extraproximal method
  • Finite Markov chains
  • Security games
  • Strong Stackelberg equilibrium

Fingerprint

Dive into the research topics of 'A Stackelberg security game with random strategies based on the extraproximal theoretic approach'. Together they form a unique fingerprint.

Cite this