Skip to main content

PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response

  • Chapter
  • First Online:
Handbook of Computational Approaches to Counterterrorism

Abstract

The global need for security of key infrastructure with limited resources has led to significant interest in research conducted in multiagent systems towards game-theory for real-world security. As reported previously at AAMAS, three applications based on Stackelberg games have been transitioned to real-world deployment. This includes ARMOR, used by the Los Angeles International Airport to randomize checkpoints of roadways and canine patrols [16]; IRIS, which helps the US Federal Air Marshal Service [22] in scheduling air marshals on international flights; and GUARDS [17], which is under evaluation by the US Transportation Security Administration to allocate resources for airport protection. We as a community remain in the early stages of these deployments, and must continue to develop our understanding of core principles of innovative applications of game theory for security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Or the attacker may be sufficiently deterred and dissuaded from attacking the protected target.

  2. 2.

    Creating optimal Stackelberg defender strategies that increase the attacker’s difficulty of surveillance is an open research issue in the literature; here we choose to maximize unpredictability as the first step.

  3. 3.

    In general these types of security games are non-zero-sum [21], though for Boston as a first step it was decided to cast the game as zero-sum.

References

  1. Agmon N, Kraus S, Kaminka GA, Sadov V (2009) Adversarial uncertainty in multi-robot patrol. In IJCAI

    Google Scholar 

  2. Basilico N, Gatti N, Amigoni F (2009) Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In AAMAS

    Google Scholar 

  3. Blair D (2010) Annual threat assessment of the US intelligence community for the senate select committee on intelligence. http://www.dni.gov/testimonies/20100202_testimony.pdf

  4. Camerer CF (2003) Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press, USA

    Google Scholar 

  5. Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In ACM EC

    Google Scholar 

  6. Dozier K (2011) Bin laden trove of documents sharpen US aim. http://www.msnbc.msn.com/id/43331634/ns/us_news-security/t/bin-laden-trove-%documents-sharpen-us-aim/

    Google Scholar 

  7. Fudenberg D, Tirole J (1991) Game Theory. MIT, USA

    Google Scholar 

  8. Jain M, Kardes E, Kiekintveld C, Ordonez F, Tambe M (2010) Security games with arbitrary schedules: A branch and price approach. In AAAI

    Google Scholar 

  9. Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Tambe M, Ordonez F (2010) Software assistants for randomized patrol planning for the LAX airport police and the federal air marshal service. Interfaces 40:267–290

    Google Scholar 

  10. Kiekintveld C, Jain M, Tsai J, Pita J, Tambe M, Ordóñez F (2009) Computing optimal randomized resource allocations for massive security games. In AAMAS

    Google Scholar 

  11. Kiekintveld C, Marecki J, Tambe M (2011) Approximation methods for infinite bayesian Stackelberg games: modeling distributional uncertainty. In AAMAS

    Google Scholar 

  12. Korzhyk D, Conitzer V, Parr R (2010) Complexity of computing optimal Stackelberg strategies in security resource allocation games. In Proceedings of The 24th AAAI conference on artificial intelligence. Atlanta, GA, USA, pp 805–810

    Google Scholar 

  13. Korzhyk D, Conitzer V, Parr R (2011) Solving Stackelberg games with uncertain observability. In AAMAS

    Google Scholar 

  14. McKelvey DR, Palfrey TR (1995) Quantal response equilibria for normal form games. Games Econ Behav 10(1):6–38

    Google Scholar 

  15. Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008) Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In AAMAS

    Google Scholar 

  16. Pita J, Jain M, Western C, Portway C, Tambe M, Ordonez F, Kraus S, Parachuri P (2008) Deployed ARMOR protection: the application of a game-theoretic model for security at the Los Angeles International Airport. In AAMAS

    Google Scholar 

  17. Pita J, Tambe M, Kiekintveld C, Cullen S, Steigerwald E (2011) GUARDS – game theoretic security allocation on a national scale. In AAMAS

    Google Scholar 

  18. Rogers BW, Palfrey TR, Camerer CF (2009) Heterogeneous quantal response equilibrium and cognitive hierarchies. J Econ Theory, 144(4)

    Google Scholar 

  19. Shakarian P, Dickerson JP, Subrahmanian VS (2012) Adversarial geospatial abduction problems. ACM Trans Intell Syst Technol 34:1 to 34:35

    Google Scholar 

  20. Shieh E, An B, Yang R, Tambe M, Baldwin C, DiRenzo J, Maule B, Meyer G (2012) Protect: A deployed game theoretic system to protect the ports of the united states. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Taipei, Taiwan

    Google Scholar 

  21. Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, NY

    Google Scholar 

  22. Tsai J, Rathi S, Kiekintveld C, Ordonez F, Tambe M (2009) IRIS: a tool for strategic security allocation in transportation networks. In AAMAS. Budapest, Hungary pp 37–44

    Google Scholar 

  23. Vanek O, Jakob M, Hrstka O, Pechoucek M (2011) Using multi-agent simulation to improve the security of maritime transit. In MABS

    Google Scholar 

  24. Wright J, Leyton-Brown K (2010) Beyond equilibrium: Predicting human behavior in normal form games. In AAAI

    Google Scholar 

  25. Yang R, Kiekintveld C, Ordonez F, Tambe M, John R (2011) Improving resource allocation strategy against human adversaries in security games. In IJCAI

    Google Scholar 

  26. Yang R, Tambe M, Ordonez F (2012) Computing optimal strategy against quantal response in security games. In AAMAS

    Google Scholar 

  27. Yin Z, Jain M, Tambe M, Ordóñez F (2011) Risk-averse strategies for security games with execution and observational uncertainty. In AAAI

    Google Scholar 

Download references

Acknowledgements

We thank the USCG offices, and particularly Sector Boston, for their exceptional collaboration. Thanks to Matt Johnson for technical assistance in the preparation of this chapter. The views expressed herein are those of the author(s) and are not to be construed as official or reflecting the views of the Commandant or of the U.S. Coast Guard. This research was supported by the United States Department of Homeland Security through the Center for Risk and Economic Analysis of Terrorism Events (CREATE) under award number 2010-ST-061-RE0001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Shieh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Shieh, E. et al. (2013). PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5311-6_20

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5310-9

  • Online ISBN: 978-1-4614-5311-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics