Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-nmvwc Total loading time: 0 Render date: 2024-06-20T10:13:11.919Z Has data issue: false hasContentIssue false

12 - Stackelberg versus Nash in Security Games: Interchangeability, Equivalence, and Uniqueness

from PART IV - FUTURE RESEARCH

Published online by Cambridge University Press:  05 January 2012

Get access

Summary

Introduction

There has been significant recent research interest in game-theoretic approaches to security at airports, ports, transportation, shipping and other infrastructure (Basilico, Gatti, and Amigoni, 2009; Conitzer and Sandholm, 2006; Kiekintveld et al., 2009; Pita et al., 2008). Much of this work has used a Stackelberg game framework to model interactions between the security forces and attackers. That is, the defender (i.e., the security forces) acts first by committing to a patrolling or inspection strategy, and the attacker chooses where to attack after observing the defender's choice. The typical solution concept applied to these games is strong Stackelberg equilibrium (SSE), which assumes that the defender will choose an optimal mixed (randomized) strategy based on the assumption that the attacker will observe this strategy and choose an optimal response. This leader-follower paradigm appears to fit many real world security situations. Indeed, Stackelberg games are at the heart two major decision-support applications: the ARMOR program in use at the Los Angeles International Airport since 2007 to randomize allocation of checkpoints and canine patrols (Pita et al., 2008), and the IRIS program in use by the U.S. Federal Air Marshals to randomize assignments of air marshals to flights (Tsai et al., 2009).

However, there are legitimate concerns about whether the Stackelberg model is appropriate in all cases.

Type
Chapter
Information
Security and Game Theory
Algorithms, Deployed Systems, Lessons Learned
, pp. 233 - 253
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

K., Bagwell. Commitment and observability in games. Games and Economic Behavior, 8:271–280, 1995.Google Scholar
T., Basar and G. J., Olsder. Dynamic Noncooperative Game Theory. Academic Press, San Diego, CA, 2nd edition, 1995.Google Scholar
N., Basilico, N., Gatti, and F., Amigoni. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009.Google Scholar
V., Conitzer and T., Sandholm. Computing the optimal strategy to commit to. In ACM Conference on Electronic Commerce, 2006.Google Scholar
D., Fudenberg and J., Tirole. Game Theory. MIT Press, October 1991.Google Scholar
S., Huck and W., Müller. Perfect versus imperfect observability – an experimental test of Bagwell's result. Games and Economic Behavior, 31(2):174–190, 2000.Google Scholar
C., Kiekintveld, M., Jain, J., Tsai, J., Pita, M., Tambe, and F., Ordonez. Computing optimal randomized resource allocations for massive security games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009.Google Scholar
G., Leitmann. On generalized Stackelberg strategies. Optimization Theory and Applications, 26(4):637–643, 1978.Google Scholar
J., Morgan and F., Vardy. The value of commitment in contests and tournaments when observation is costly. Games and Economic Behavior, 60(2):326–338, August 2007.Google Scholar
H., Moulin and J. P., Vial. Strategically zero-sum games: The class of games whose completely mixed equilibria cannot be improved upon. International Journal of Game Theory, 7(3–4):201–221, September 1978.Google Scholar
J., Pita, M., Jain, F., Ordóñez, M., Tambe, S., Kraus, and R., Magori-Cohen. Effective solutions for real-world Stackelberg games: When agents must deal with human uncertainties. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009.Google Scholar
J., Pita, M., Jain, C., Western, C., Portway, M., Tambe, F., Ordonez, S., Kraus, and P., Parachuri. Deployed ARMOR protection: The application of a game-theoretic model for security at the Los Angeles International Airport. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (Industry Track), 2008.Google Scholar
J., Tsai, S., Rathi, C., Kiekintveld, F., Ordóñez, and M., Tambe. IRIS a tool for strategic security allocation in transportation networks. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (Industry Track), 2009.Google Scholar
E., van DammeandS., Hurkens. Games with imperfectly observable commitment. Games and Economic Behavior, 21(1–2):282–308, 1997.Google Scholar
J., von Neumann and O., Morgenstern. Theory of Games and Economic Behavior. Princeton University Press, May 2004.Google Scholar
B., von Stengel and S., Zamir. Leadership with commitment to mixed strategies. Technical Report London School of Economics-Centre for Discrete and Applicable Mathematics (LSE-CDAM)-2004-01, CDAM Research Report, 2004.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×