Skip to main content

A Review of Multi Agent Perimeter Defense Games

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2020)

Abstract

This paper reviews a series of works done on the multi-agent perimeter defense scenario, in which a team of intruders try to score by reaching the target region while a team of defenders try to minimize the score by intercepting those intruders. We describe how the small-scale differential games are solved and are leveraged to design team strategies in the large-scale swarm versus swarm scenarios. Three different approaches to analyze the large-scale games (MM, MIS, and LGR) are introduced with comments on their relative strengths and weaknesses. As a unique contribution of this paper, we discuss how the existing results can be extended into more general problem formulations. Furthermore, we point out the limitations of the current work and suggest potential directions for future research.

Supported by ARL grant ARL DCIST CRA W911NF-17-2-0181.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Basar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, 2nd edn. Society for Industrial and Applied Mathematics, Philadelphia (2011)

    MATH  Google Scholar 

  2. Chen, M., Zhou, Z., Tomlin, C.J.: A path defense approach to the multiplayer reach-avoid game. In: IEEE Conference on Decision and Control (CDC), pp. 2420–2426 (2014)

    Google Scholar 

  3. Chen, M., Zhou, Z., Tomlin, C.J.: Multiplayer reach-avoid games via low dimensional solutions and maximum matching. In: Proceedings of the American Control Conference (ACC), pp. 1444–1449 (2014)

    Google Scholar 

  4. Chen, M., Zhou, Z., Tomlin, C.J.: Multiplayer reach-avoid games via pairwise outcomes. IEEE Trans. Autom. Control 62(3), 1451–1457 (2017)

    Article  MathSciNet  Google Scholar 

  5. Fisac, J.F., Chen, M., Tomlin, C.J., Sastry, S.S.: Reach-avoid problems with time-varying dynamics, targets and constraints. In: Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control (ACM), pp. 11–20 (2015)

    Google Scholar 

  6. Fuchs, Z.E., Khargonekar, P.P., Evers, J.: Cooperative defense within a single-pursuer, two-evader pursuit evasion differential game. In: IEEE Conference on Decision and Control (CDC), pp. 3091–3097 (2010)

    Google Scholar 

  7. Garcia, E., Casbeer, D.W., Pachter, M.: The barrier surface in the cooperative football differential game. arXiv preprint arXiv:2006.03682 (2020)

  8. Garcia, E., Casbeer, D.W., Pachter, M.: Optimal strategies for a class of multi-player reach-avoid differential games in 3d space. IEEE Rob. Autom. Lett. 5(3), 4257–4264 (2020)

    Article  Google Scholar 

  9. Garcia, E., Casbeer, D.W., Pham, K., Pachter, M.: Cooperative aircraft defense from an attacking missile. J. Guid. Control Dyn. 38(8), 1510–1520 (2015)

    Article  Google Scholar 

  10. Garcia, E., Casbeer, D.W., Von Moll, A., Pachter, M.: Cooperative two-pursuer one-evader blocking differential game. In: Proceedings American Control Conference (ACC), pp. 2702–2709. IEEE (2019)

    Google Scholar 

  11. Garcia, E., Casbeer, D.W., Von Moll, A., Pachter, M.: Multiple pursuer multiple evader differential games. IEEE Transactions on Automatic Control (2020)

    Google Scholar 

  12. Garcia, E., Von Moll, A., Casbeer, D.W., Pachter, M.: Strategies for defending a coastline against multiple attackers. In: IEEE Conference on Decision and Control (CDC), pp. 7319–7324. IEEE (2019)

    Google Scholar 

  13. Garcia, E., Von Moll, A., Casbeer, D.W., Pachter, M.: Strategies for defending a coastline against multiple attackers. In: IEEE Conference on Decision and Control (CDC), pp. 7319–7324 (2019)

    Google Scholar 

  14. Huang, H., Ding, J., Zhang, W., Tomlin, C.J.: A differential game approach to planning in adversarial scenarios: a case study on capture-the-flag. In: IEEE International Conference on Robotics and Automation (ICRA), pp. 1451–1456 (2011)

    Google Scholar 

  15. Huang, H., Zhang, W., Ding, J., Stipanović, D.M., Tomlin, C.J.: Guaranteed decentralized pursuit-evasion in the plane with multiple pursuers. In: IEEE Conference on Decision and Control (CDC), pp. 4835–4840 (2011)

    Google Scholar 

  16. Isaacs, R.: Differential games: a mathematical theory with applications to warfare and pursuit, control and optimization. Courier Corporation (1999)

    Google Scholar 

  17. Liang, L., Deng, F., Peng, Z., Li, X., Zha, W.: A differential game for cooperative target defense. Automatica 102, 58–71 (2019)

    Article  MathSciNet  Google Scholar 

  18. Makkapati, V.R., Tsiotras, P.: Optimal evading strategies and task allocation in multi-player pursuit–evasion problems. Dyn. Games Appl. 9(4), 1168–1187 (2019). https://doi.org/10.1007/s13235-019-00319-x

    Article  MathSciNet  MATH  Google Scholar 

  19. Paulos, J., Chen, S.W., Shishika, D., Kumar, V.: Decentralization of multiagent policies by learning what to communicate. In: IEEE International Conference on Robotics and Automation (ICRA), pp. 7990–7996. IEEE (2019)

    Google Scholar 

  20. Pierson, A., Wang, Z., Schwager, M.: Intercepting rogue robots: an algorithm for capturing multiple evaders with multiple pursuers. IEEE Rob. Autom. Lett. 2(2), 530–537 (2017)

    Article  Google Scholar 

  21. Prokopov, O., Shima, T.: Linear quadratic optimal cooperative strategies for active aircraft protection. J. Guid. Control Dyn. 36(3), 753–764 (2013)

    Article  Google Scholar 

  22. Rubinsky, S., Gutman, S.: Three-player pursuit and evasion conflict. J. Guid. Control Dyn. 37(1), 98–110 (2014)

    Article  Google Scholar 

  23. Lee, S.E., Shishika, D., Kumar, V.: Perimeter-defense game between aerial defender and ground intruder. In: To Appear in IEEE Conference on Decision and Control (CDC). IEEE (2020)

    Google Scholar 

  24. Scott, W.L., Leonard, N.E.: Optimal evasive strategies for multiple interacting agents with motion constraints. Automatica 94, 26–34 (2018)

    Article  MathSciNet  Google Scholar 

  25. Shishika, D., Kumar, V.: Local-game decomposition for multiplayer perimeter-defense problem. In: IEEE Conference on Decision and Control (CDC), pp. 2093–2100 (2018)

    Google Scholar 

  26. Shishika, D., Kumar, V.: Perimeter-defense game on arbitrary convex shapes. arXiv arXiv:190903989 (2019)

  27. Shishika, D., Paulos, J., Dorothy, M.R., Hsieh, M.A., Kumar, V.: Team composition for perimeter defense with patrollers and defenders. In: IEEE Conference on Decision and Control (CDC), pp. 7325–7332 (2019)

    Google Scholar 

  28. Shishika, D., Paulos, J., Kumar, V.: Cooperative team strategies for multi-player perimeter-defense games. IEEE Rob. Autom. Lett. 5(2), 2738–2745 (2020)

    Article  Google Scholar 

  29. Von Moll, A., Casbeer, D., Garcia, E., Milutinović, D., Pachter, M.: The multi-pursuer single-evader game. J. Intel. Rob. Syst. 96(2), 193–207 (2019)

    Article  Google Scholar 

  30. Von Moll, A., Casbeer, D.W., Garcia, E., Milutinović, D.: Pursuit-evasion of an evader by multiple pursuers. In: International Conference on Unmanned Aircraft Systems (ICUAS), pp. 133–142. IEEE (2018)

    Google Scholar 

  31. Von Moll, A., Garcia, E., Casbeer, D., Suresh, M., Swar, S.C.: Multiple-pursuer, single-evader border defense differential game. J. Aero. Info. Syst. 17(8), 1–10 (2019)

    Google Scholar 

  32. Von Moll1, A., Pachter, M., Shishika, D., Fuchs, Z.: Guarding a circular target by patrolling its perimeter. In: To Appear in IEEE Conference on Decision and Control (CDC). IEEE (2020)

    Google Scholar 

  33. Yan, R., Duan, X., Shi, Z., Zhong, Y., Bullo, F.: Maximum-matching capture strategies for 3d heterogeneous multiplayer reach-avoid games. arXiv preprint arXiv:1909.11881 (2019)

  34. Yan, R., Shi, Z., Zhong, Y.: Escape-avoid games with multiple defenders along a fixed circular orbit. In: 13th IEEE International Conference on Control & Automation (ICCA), pp. 958–963. IEEE (2017)

    Google Scholar 

  35. Yan, R., Shi, Z., Zhong, Y.: Reach-avoid games with two defenders and one attacker: an analytical approach. IEEE Trans. Cybern. 49(3), 1035–1046 (2018)

    Article  Google Scholar 

  36. Yan, R., Shi, Z., Zhong, Y.: Task assignment for multiplayer reach-avoid games in convex domains via analytical barriers. IEEE Trans. Rob. 36(1), 107–124 (2019)

    Article  Google Scholar 

  37. Zhou, Z., Ding, J., Huang, H., Takei, R., Tomlin, C.: Efficient path planning algorithms in reach-avoid problems. Automatica 89, 28–36 (2018)

    Article  MathSciNet  Google Scholar 

  38. Zhou, Z., Takei, R., Huang, H., Tomlin, C.J.: A general, open-loop formulation for reach-avoid games. In: IEEE Conference on Decision and Control (CDC), pp. 6501–6506 (2012)

    Google Scholar 

  39. Zhou, Z., Zhang, W., Ding, J., Huang, H., Stipanović, D.M., Tomlin, C.J.: Cooperative pursuit with Voronoi partitions. Automatica 72, 64–72 (2016)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daigo Shishika .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shishika, D., Kumar, V. (2020). A Review of Multi Agent Perimeter Defense Games. In: Zhu, Q., Baras, J.S., Poovendran, R., Chen, J. (eds) Decision and Game Theory for Security. GameSec 2020. Lecture Notes in Computer Science(), vol 12513. Springer, Cham. https://doi.org/10.1007/978-3-030-64793-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-64793-3_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-64792-6

  • Online ISBN: 978-3-030-64793-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics