Quantifying the Security of Physical Facilities: A Game Theoretic Framework

被引:0
|
作者
Singh, Rajdeep [1 ]
Ariyur, Kartik B. [2 ]
机构
[1] Lockheed Martin Adv Technol, San Diego, CA 92121 USA
[2] Purdue Univ, Sch Mech Engn, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We develop a framework for quantifying the security of physical facilities-airports, government or industrial-and for evaluating their performance. We abstract the contest between the attackers and the defense as a game with two sides: N-levels of security on one side and M coordinated attackers on the other. The different security systems in place, such as walk-in metal detectors or X-ray machines, or even human personnel are described by their detection rates and false alarm rates for objects inspected by them. We assume that the M attackers share all of their knowledge through perfect communication. Under these conditions we derive the optimal strategies for both the security system and the criminals for static detection thresholds of the security devices; under conditions of randomization of the detection thresholds; and for certain kinds of feedback when an attacker is caught. Our results show that current security levels can be maintained at significantly lower personnel costs (up to 50%) or equivalently, the potential for attaining much higher throughput (up to 200%) without any changes to hardware, and with little change to personnel training.
引用
收藏
页码:1368 / 1373
页数:6
相关论文
共 50 条
  • [21] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [22] A Survey of Game Theoretic Methods for Cyber Security
    Wang, Yuan
    Wang, Yongjun
    Liu, Jing
    Huang, Zhijian
    Xie, Peidai
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 631 - 636
  • [23] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64
  • [24] Game theoretic security of quantum bit commitment
    Zhou, Lu
    Sun, Xin
    Su, Chunhua
    Liu, Zhe
    Choo, Kim-Kwang Raymond
    INFORMATION SCIENCES, 2019, 479 : 503 - 514
  • [25] A graph-theoretic network security game
    Department of Computer Science, University of Cyprus, Nicosia CY-1678, Cyprus
    不详
    不详
    Int. J. Auton. Adapt. Commun. Syst., 2008, 4 (390-410):
  • [26] Diversity and System Security: A Game Theoretic Perspective
    Brahma, Swastik
    Kwiat, Kevin
    Varshney, Pramod K.
    Kamhoua, Charles
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 146 - 151
  • [27] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [28] Game-theoretic and Learning-aided Physical Layer Security for Multiple Intelligent Eavesdroppers
    Wu, Yingzhen
    Huo, Yan
    Gao, Qinghe
    Wu, Yue
    Li, Xuehan
    2022 IEEE GLOBECOM Workshops, GC Wkshps 2022 - Proceedings, 2022, : 233 - 238
  • [29] An extension of duality to a game-theoretic framework
    Pavel, Lacra
    AUTOMATICA, 2007, 43 (02) : 226 - 237
  • [30] A Game-Theoretic Framework for Interference Avoidance
    Menon, R.
    MacKenzie, A. B.
    Hicks, J.
    Buehrer, R. M.
    Reed, J. H.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2009, 57 (04) : 1087 - 1098