Skip to main content
Security and Game Theory Algorithms Deployed Systems Lessons Learned

Stackelberg versus nash in security games: Interchangeability, equivalence, and uniqueness

Publication ,  Chapter
Yin, Z; Korzhyk, D; Kiekintveld, C; Conitzer, V; Tambe, M
January 1, 2011

Introduction There has been significant recent research interest in game-theoretic approaches to security at airports, ports, transportation, shipping and other infrastructure (Basilico, Gatti, and Amigoni, 2009; Conitzer and Sandholm, 2006; Kiekintveld et al., 2009; Pita et al., 2008). Much of this work has used a Stackelberg game framework to model interactions between the security forces and attackers. That is, the defender (i. e., the security forces) acts first by committing to a patrolling or inspection strategy, and the attacker chooses where to attack after observing the defender’s choice. The typical solution concept applied to these games is strong Stackelberg equilibrium (SSE), which assumes that the defender will choose an optimal mixed (randomized) strategy based on the assumption that the attacker will observe this strategy and choose an optimal response. This leader-follower paradigm appears to fit many real world security situations. Indeed, Stackelberg games are at the heart two major decision-support applications: the ARMOR program in use at the Los Angeles International Airport since 2007 to randomize allocation of checkpoints and canine patrols (Pita et al., 2008), and the IRIS program in use by the U. S. Federal Air Marshals to randomize assignments of air marshals to flights (Tsai et al., 2009). However, there are legitimate concerns about whether the Stackelberg model is appropriate in all cases.

Duke Scholars

DOI

Publication Date

January 1, 2011

Volume

9781107096424

Start / End Page

233 / 253
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Yin, Z., Korzhyk, D., Kiekintveld, C., Conitzer, V., & Tambe, M. (2011). Stackelberg versus nash in security games: Interchangeability, equivalence, and uniqueness. In Security and Game Theory Algorithms Deployed Systems Lessons Learned (Vol. 9781107096424, pp. 233–253). https://doi.org/10.1017/CBO9780511973031.012
Yin, Z., D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. “Stackelberg versus nash in security games: Interchangeability, equivalence, and uniqueness.” In Security and Game Theory Algorithms Deployed Systems Lessons Learned, 9781107096424:233–53, 2011. https://doi.org/10.1017/CBO9780511973031.012.
Yin Z, Korzhyk D, Kiekintveld C, Conitzer V, Tambe M. Stackelberg versus nash in security games: Interchangeability, equivalence, and uniqueness. In: Security and Game Theory Algorithms Deployed Systems Lessons Learned. 2011. p. 233–53.
Yin, Z., et al. “Stackelberg versus nash in security games: Interchangeability, equivalence, and uniqueness.” Security and Game Theory Algorithms Deployed Systems Lessons Learned, vol. 9781107096424, 2011, pp. 233–53. Scopus, doi:10.1017/CBO9780511973031.012.
Yin Z, Korzhyk D, Kiekintveld C, Conitzer V, Tambe M. Stackelberg versus nash in security games: Interchangeability, equivalence, and uniqueness. Security and Game Theory Algorithms Deployed Systems Lessons Learned. 2011. p. 233–253.

DOI

Publication Date

January 1, 2011

Volume

9781107096424

Start / End Page

233 / 253