Defense coordination in security games: Equilibrium analysis and mechanism design

Jiarui Gan, Edith Elkind, Sarit Kraus, Michael Wooldridge

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Real-world security scenarios sometimes involve multiple defenders: security agencies of two or more countries might patrol the same border areas, and domestic security agencies might also operate in the same locations when their areas of jurisdiction overlap. Motivated by these scenarios and the observation that uncoordinated movements of the defenders may lead to an inefficient defense, we introduce a model of multi-defender security games and explore the possibility of improving efficiency by coordinating the defenders — specifically, by pooling the defenders' resources and allocating them jointly. The model generalizes the standard model of Stackelberg security games, where a defender (now a group of defenders) allocates security resources to protect a set of targets, and an attacker picks the best target to attack. In particular, we are interested in the situation with heterogeneous defenders, who may value the same target differently. Our task is twofold. First, we need to develop a good understanding of the uncoordinated situation, as the baseline to be improved. To this end we formulate a new equilibrium concept, and prove that an equilibrium under this concept always exists and can be computed efficiently. Second, to coordinate the heterogeneous defenders we take a mechanism design perspective and aim to find a mechanism to generate joint resource allocation strategies. We seek a mechanism that improves the defenders' utilities upon the uncoordinated baseline, achieves Pareto efficiency, and incentivizes the defenders to report their true incentives and execute the recommended strategies. Our analysis establishes several impossibility results, which indicate the intrinsic difficulties of defense coordination. Specifically, we show that even the basic properties listed above are in conflict with each other: no mechanism can simultaneously satisfy them all, or even some proper subsets of them. In terms of positive results, we present mechanisms that satisfy all combinations of the properties that are not ruled out by our impossibility results, thereby providing a comprehensive profile of the mechanism design problem with respect to the properties considered.

Original languageEnglish
Article number103791
JournalArtificial Intelligence
Volume313
DOIs
StatePublished - Dec 2022

Bibliographical note

Publisher Copyright:
© 2022 The Author(s)

Funding

Preliminary versions of this paper appeared in Proceedings of the 17th and the 19th International Conferences on Autonomous Agents and Multiagent Systems (AAMAS 2018 and 2020) [17,18] . This paper features additional mechanisms and impossibility results which complete our answers to the mechanism design problem (see our summary in Section 1.1 ). This work was supported by the European Research Council (ERC) under grant number 639945 (ACCORD). Jiarui Gan was supported by the EPSRC International Doctoral Scholars Grant EP/N509711/1 and the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No. 945719 ); part of this work was done when he was a postdoctoral researcher at Max Planck Institute for Software Systems. Sarit Kraus was partially supported by the Israel Science Foundation under grant 1958/20 . Michael Wooldridge was supported by the UKRI under a Turing AI World Leading Researcher Fellowship ( EP/W002949/1 ).

FundersFunder number
Horizon 2020 Framework Programme639945
UK Research and InnovationEP/W002949/1
Engineering and Physical Sciences Research CouncilEP/N509711/1
European Commission
Israel Science Foundation1958/20
Horizon 2020945719

    Keywords

    • Defense coordination
    • Mechanism Design
    • Multiple leaders
    • Nash-Stackelberg equilibrium
    • Security games
    • Stackelberg games

    Fingerprint

    Dive into the research topics of 'Defense coordination in security games: Equilibrium analysis and mechanism design'. Together they form a unique fingerprint.

    Cite this