F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Finding the Optimal Strategies in Robotic Patrolling with Adversaries in Topologically-Represented.

Slides:



Advertisements
Similar presentations
N. Basilico, N. Gatti, F. Amigoni DEI, Politecnico di Milano Leader-Follower Strategies for Robotic Patrolling in Environments with Arbitrary Topology.
Advertisements

S. Ceppi, N. Gatti, and N. Basilico DEI, Politecnico di Milano Computing Bayes-Nash Equilibria through Support Enumeration Methods in Bayesian Two-Player.
Multiagent Technology Solutions for Planning in Ambient Intelligence Nicola Gatti, Francesco Amigoni, Marco Rolando {ngatti,
An Introduction to Game Theory Part V: Extensive Games with Perfect Information Bernhard Nebel.
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
1 Analysis of Random Mobility Models with PDE's Michele Garetto Emilio Leonardi Politecnico di Torino Italy MobiHoc Firenze.
CPS Extensive-form games Vincent Conitzer
Evolving Cooperation in the N-player Prisoner's Dilemma: A Social Network Model Dept Computer Science and Software Engineering Golriz Rezaei Michael Kirley.
1 ECE 776 Project Information-theoretic Approaches for Sensor Selection and Placement in Sensor Networks for Target Localization and Tracking Renita Machado.
1 University of Southern California Keep the Adversary Guessing: Agent Security by Policy Randomization Praveen Paruchuri University of Southern California.
Randomized Sensing in Adversarial Environments Andreas Krause Joint work with Daniel Golovin and Alex Roper International Joint Conference on Artificial.
Game Theoretical Insights in Strategic Patrolling: Model and Analysis Nicola Gatti – DEI, Politecnico di Milano, Piazza Leonardo.
Bargaining in Markets with One-Sided Competition: Model and Analysis Nicola Gatti DEI, Politecnico di Milano, Piazza Leonardo da.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games Praveen Paruchuri, Jonathan P. Pearce, Sarit Kraus Catherine.
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
A Game Theoretic Model of Strategic Conflict in Cyberspace Operations Research Department Naval Postgraduate School, Monterey, CA 80 th MORS 12 June, 2012.
Applications: Special Case of Security Games. Given a team of robots, how should they plan their patrol paths along time to optimize some objective function?
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
Intelligent Patrolling Sarit Kraus Department of Computer Science Bar-Ilan University Collaborators: Noa Agmon, Gal Kaminka, Efrat Sless 1.
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
Temporal Action-Graph Games: A New Representation for Dynamic Games Albert Xin Jiang University of British Columbia Kevin Leyton-Brown University of British.
Zach Ramaekers Computer Science University of Nebraska at Omaha Advisor: Dr. Raj Dasgupta 1.
Algorithmic Game Theory Nicola Gatti and Marcello Restelli {ngatti, DEI, Politecnico di Milano, Piazza Leonardo da Vinci 32, Milano,
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Approximate Solutions for Partially Observable Stochastic Games with Common Payoffs Rosemary Emery-Montemerlo joint work with Geoff Gordon, Jeff Schneider.
On Spectrum Selection Games in Cognitive Radio Networks
Developing a Deterministic Patrolling Strategy for Security Agents Nicola Basilico, Nicola Gatti, Francesco Amigoni.
May 11, 2005 Tracking on a Graph Songhwai Oh Shankar Sastry Target trajectoriesEstimated tracks Tracking in Sensor Networks Target tracking is a representative.
Towards Automated Bargaining in Electronic Markets: a Partially Two-Sided Competition Model N. Gatti, A. Lazaric, M. Restelli {ngatti, lazaric,
A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots Francesco Amigoni, Nicola Gatti, Antonio Ippedico.
Alternating-Offers Bargaining under One-Sided Uncertainty on Deadlines Francesco Di Giunta and Nicola Gatti Dipartimento di Elettronica e Informazione.
1 A Cooperative Game Framework for QoS Guided Job Allocation Schemes in Grids Riky Subrata, Member, IEEE, Albert Y. Zomaya, Fellow, IEEE, and Bjorn Landfeldt,
Games of Incomplete Information. These games drop the assumption that players know each other’s preferences. Complete info: players know each other’s preferences.
A Study of Computational and Human Strategies in Revelation Games 1 Noam Peled, 2 Kobi Gal, 1 Sarit Kraus 1 Bar-Ilan university, Israel. 2 Ben-Gurion university,
Game theoretic models for detecting network intrusions OPLab 1.
Strategic Modeling of Information Sharing among Data Privacy Attackers Quang Duong, Kristen LeFevre, and Michael Wellman University of Michigan Presented.
Advanced Energy Management in Cloud Computing multi data center environments Giuliana Carello, DEI, Politecnico di Milano Danilo.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
General Polynomial Time Algorithm for Near-Optimal Reinforcement Learning Duke University Machine Learning Group Discussion Leader: Kai Ni June 17, 2005.
1 S ystems Analysis Laboratory Helsinki University of Technology Kai Virtanen, Janne Karelahti, Tuomas Raivio, and Raimo P. Hämäläinen Systems Analysis.
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
Dynamic Games & The Extensive Form
Patrolling Games Katerina Papadaki London School of Economics with Alec Morton and Steven Alpern.
Network Intrusions via Sampling : A Game Theoretic Approach Presented by Zhiqi Zhang Written by: Murali Kodialam (Bell Labs)‏ T.V. Lakshman.
1 S ystems Analysis Laboratory Helsinki University of Technology Kai Virtanen, Tuomas Raivio and Raimo P. Hämäläinen Systems Analysis Laboratory Helsinki.
A Study of Central Auction Based Wholesale Electricity Markets S. Ceppi and N. Gatti.
1 S ystems Analysis Laboratory Helsinki University of Technology Kai Virtanen, Janne Karelahti, Tuomas Raivio, and Raimo P. Hämäläinen Systems Analysis.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Path Planning Based on Ant Colony Algorithm and Distributed Local Navigation for Multi-Robot Systems International Conference on Mechatronics and Automation.
By: Donté Howell Game Theory in Sports. What is Game Theory? It is a tool used to analyze strategic behavior and trying to maximize his/her payoff of.
Dynamics of Competition Between Incumbent and Emerging Network Technologies Youngmi Jin (Penn) Soumya Sen (Penn) Prof. Roch Guerin (Penn) Prof. Kartik.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Keep the Adversary Guessing: Agent Security by Policy Randomization
Impact of Interference on Multi-hop Wireless Network Performance
C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta
Non-additive Security Games
Application of network flow: Protecting coral reef ecosystems
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security Fang et al.
When Security Games Go Green
Econ 805 Advanced Micro Theory 1
Presenter: Solomon Ayalew
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
2016 International Conference on Grey Systems and Uncertainty Analysis
CPS Extensive-form games
Kai Virtanen, Janne Karelahti, Tuomas Raivio, and Raimo P. Hämäläinen
Vincent Conitzer Extensive-form games Vincent Conitzer
CPS 173 Extensive-form games
Presentation transcript:

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Finding the Optimal Strategies in Robotic Patrolling with Adversaries in Topologically-Represented Environments Francesco Amigoni, Nicola Basilico, Nicola Gatti

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Robotic Patrolling A patrolling strategy determines the path followed by the robot, usually the next cell to move to

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Randomized Patrolling Strategies The patroller should adopt an unpredictable patrolling strategy, randomizing over cells and trying to reduce the intrusion risk (Pita et al., AAMAS08) Randomized strategy: the robot determines the next cell according to a probability distribution

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Example: Randomized Strategy

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Patrolling Strategies with Adversaries Considering a model of the adversary (Agmon et al., AAMAS08, Paruchuri et al., AAMAS08) can provide the patrolling robot a larger expected utility than not considering it, i.e., it can lead to better strategies (Amigoni et al., IAT2008) Model of the adversary can include: its preferences over the possible targets, its knowledge about the patrollers strategy, …

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano The Problem The problem we addressed in this work: finding the optimal randomized patrolling strategy in a arbitrary environment while considering a model of the adversary Our approach applies to environments with arbitrary topology generalizing (Agmon et al., ICRA08) Agmon et al., ICRA08

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano The Basic Patrolling Model Time is discrete Environment: represented by a directed graph, e.g., a grid of cells or a topological map (Carpin et al., IROS08) Single patrolling robot It can move between adjacent nodes It can detect a possible intruder in its current node Single intruder It knows the strategy of the patrolling robot, for example because it can observe the patroller movements before attempting to intrude It can directly enter any node Penetration time d i is required to successfully complete an intrusion in a node i When attempting to penetrate in a node i at time t, the intruder can be detected during {t,t+1,…,t+ d i }

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano The Basic Patrolling Model In this scenario there are two actors that compete one with each other Natural approach: to study their behaviors in a game-theoretical framework The patrolling problem is modeled as a two-player game and optimal behaviors can be derived by finding equilibria of such game The type of game that best describes this scenario is the leader- follower game Two players The leader commits to a strategy The follower observes such commitment and acts as a best responder

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano The Basic Patrolling Model Final States The indruder enters node i at time t: If the patroller does not visit cell i in the interval {t,t+1,…,t+ d i } the intruder wins Otherwise the intruder is captured and the patroller wins The intruder never enters Utilities X i,Y i (i {1, 2, …, 13}) : patrollers and intruders utilities when the intruder successfully attacks node i X 0,Y 0 : patrollers and intruders utilities when the intruder is captured P P I I I I I I move(10) move(12) move(7) … P P P P P P wait enter(13) enter(1) … … … …… 1 time unit

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Objective The proposed method finds the probability distribution over the patroller movements, i.e., given the current node, finding the probability of moving in each adjacent node

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Solving the Game Two competing actors: we study their behaviors in a game-theoretical framework The patrolling problem can be modeled as a leader-follower game Two players The leader commits to a strategy The follower observes such commitment and acts as a best responder Patrolling strategy: A = {α i,j }, where α i,j is the probability of doing move(j) when i is the current node The optimal A can be derived by computing the equilibrium of the leader-follower game resorting to a bilevel optimization problem (Conitzer and Sandholm, 2006)

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Solving Algorithm We safely assume that the game will end, i.e., the intruder will enter We compute A such that the patrollers expected payoff is maximum This amounts to solve a bilinear optimization problem for every possible action of the intruder Game Model Optimal patrolling strategy that maximizes patrollers expected utility Solving algorithm If the above problem does not admit a solution, Step 2: Step 1: is there any strategy A such that the game will never end? Single bilinear feasibility problem If a solution is found, it is the best patrolling strategy and the intruder will never attempt to enter

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano An Example X 1 = 0.8 Y 1 = 0.2 d 1 = 7 X 5 = 0.5 Y 5 = 0.5 d 5 = 7 X 0 = 1 Y 0 = -1 X 1 = 0.8 Y 1 = 0.2 d 1 = 7 X 5 = 0.5 Y 5 = 0.3 d 5 = With this strategy the game never ends, i.e., the intruder will never enter

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Another Example X 1 = 0.8 Y 1 = 0.2 d 1 = 5 X 5 = 0.5 Y 5 = 0.3 d 5 = 4 X 1 = 0.8 Y 1 = 0.2 d 1 = 5 X 5 = 0.5 Y 5 = 0.3 d 5 = X 0 = 1 Y 0 = -1 With this strategy the intruder will try to enter in cell 1 when the patroller is in cell 5, the expected utility of the patroller is 0.819

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Model Extensions Augmented sensing capabilities: we introduce the range parameter Synchronized multirobot setting: a single patroller able to sense an arbitrary subset of cells X 4 = 0.8 Y 4 = 0.4 X 6 = 0.7 Y 6 = 0.5 X 12 = 0.8 Y 12 = 0.4 expected utility penetration time X 0 = 1 Y 0 = -1

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Conclusions and Future Works We presented an approach to find optimal randomized patrolling strategies in arbitrary environments with adversaries Future Works Accounting for intruders movements and limited observation capabilities Extending our framework with multiple non-synchronized patrollers