Computer Science ›› 2017, Vol. 44 ›› Issue (5): 153-159.doi: 10.11896/j.issn.1002-137X.2017.05.027

Previous Articles     Next Articles

Maritime Security Research Based on Stackelberg Game

GONG Xu-fu, WEI Cheng-jian, QIAN Zhen, CHE Bao-zhen and SHEN Hang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: In recent years,the security problem is becoming more and more popular all over the world.How to use the limited security resources to maximize the deployment of defensive strategies to protect critical facilities and goals is a critical challenge that a lot of security department have to face.For maritime safety patrol,security model based on Stackelberg game was proposed to carry out the security resource scheduling.In the case of limited security resources,the constraints of time and space appear in real world and factors that human behavior are not completely rational were comprehensive considered,and the security game’s assumption that attack is rational perfectly was relaxed.Based on the theory of quantal response equilibrium,the attacker’s behavior preference was considered,then the optimal strategy under the condition of imperfect rationality and the optimal strategy under the condition of complete rationality were compared and analyzed.Experimental results show that the new model under the condition of imperfect rationality can get higher returns in real-world problems,and can be more effectively used in maritime security patrol.

Key words: Security resource allocation,Human behavior model,Maritime security patrols,Stackelberg game

[1] BASILICO N,GATTI N,AMIGONI F.Leader-follower strategies for robotic patrolling in environments with arbitrary topologies[C]∥Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1.International Foundation for Autonomous Agents and Multiagent Systems,2009:57-64.
[2] HAILE P A,HORTASU A,KOSENOK G.On the empirical content of quantal response equilibrium[J].The American Economic Review,2008,98(1):180-200.
[3] MCKELVEY R D,PALFREY T R.Quantal response equilibria for normal form games[J].Games and economic behavior,1995,10(1):6-38.
[4] BOXALL P,PURCELL J.Strategy and human resource ma-nagement[M].Palgrave Macmillan,2011.
[5] WRIGHT J R,LEYTON-BROWN K.Beyond Equilibrium:Predicting Human Behavior in Normal-Form Games[C]∥AAAI.2010.
[6] PITA J,JAIN M,TAMBE M,et al.Robust solutions to Stacke-lberg games:Addressing bounded rationality and limited observations in human cognition[J].Artificial Intelligence,2010,174(15):1142-1171.
[7] NIKNAM T.A new fuzzy adaptive hybrid particle swarm optimization algorithm for non-linear,non-smooth and non-convex economic dispatch problem[J].Applied Energy,2010,87(1):327-339.
[8] SINGH S,GUPTA P,BHATIA D.Multiparametric sensitivityanalysis in programming problem with linear-plus-linear fractional objective function[J].European Journal of Operational Research,2005,160(1):232-241.
[9] CONITZER V,SANDHOLM T.Computing the optimal strategy to commit to[C]∥Proceedings of the 7th ACM conference on Electronic commerce.ACM,2006:82-90.
[10] PARUCHURI P,PEARCE J P,MARECKI J,et al.Playing ga-mes for security:An efficient exact algorithm for solving Baye-sian Stackelberg games[C]∥Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems-Volume 2.International Foundation for Autonomous Agents and Multiagent Systems,2008:895-902.
[11] XIA Z,ZHANG S.A kind of network security behavior model based on game theory[C]∥International Conference on Parallel and Distributed Computing,Applications and Technologies.IEEE Xplore,2003:950-954.
[12] PITA J,JAIN M,ORDNEZ F,et al.ARMOR Security for Los Angeles International Airport[C]∥AAAI.2008:1884-1885.
[13] JAIN M,TSAI J,PITA J,et al.Software assistants for rando-mized patrol planning for the lax airport police and the federal air marshal service[J].Interfaces,2010,40(4):267-290.
[14] YIN Z,JIANG A X,TAMBE M,et al.TRUSTS:Scheduling ran-domized patrols for fare inspection in transit systems using game theory[J].AI Magazine,2012,33(4):59.
[15] FANG F,STONE P,TAMBE M.When security games gogreen:Designing defender strategies to prevent poaching and illegal fishing[C]∥International Joint Conference on Artificial Intelligence (IJCAI).2015.
[16] LETCHFORD J,KORZHYK D,CONITZER V.On the value of commitment[J].Autonomous Agents and Multi-Agent Systems,2014,28(6):986-1016.
[17] JAIN M.Thwarting Adversaries with Unpredictability:Mas-sive-scale Game-Theoretic Algorithms for Real-world Security Deployments[D].Los Angeless:University of Southern California,2013.
[18] SHIEH E.Not a Lone Ranger:Unleashing Defender Teamwork in Security Games[D].Los Angeless:University of Southern California,2015.
[19] PITA J,JAIN M,ORDNEZ F,et al.ARMOR Security for Los Angeles International Airport[C]∥AAAI.2008:1884-1885.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!