IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v222y2012i3p571-582.html
   My bibliography  Save this article

Patrolling a perimeter

Author

Listed:
  • Zoroa, N.
  • Fernández-Sáez, M.J.
  • Zoroa, P.

Abstract

In this paper we study the problem of patrolling a perimeter. The general situation considered here can correspond to different tactical problems and it is studied from the point of view of game theory. To put the ideas in a context we describe it as follows. An intruder seeks to carry out a sabotage on the perimeter of a protected zone. He has to perform the action along n consecutive days and has to position himself each day at one of m strategic points placed on this border. The first day he can take his place at any of the m points, but on successive days he can move only to adjacent points. Furthermore, the perimeter is protected by a patroller, who will select each day one of the m points to inspect. The strategic situation is modeled as a two-person zero-sum game, which is developed on a cyclic set of m points over n time units. We prove some interesting properties of the strategies, solve the game in closed form under certain constraints and obtain bounds for the value of the game in several non-solved cases.

Suggested Citation

  • Zoroa, N. & Fernández-Sáez, M.J. & Zoroa, P., 2012. "Patrolling a perimeter," European Journal of Operational Research, Elsevier, vol. 222(3), pages 571-582.
  • Handle: RePEc:eee:ejores:v:222:y:2012:i:3:p:571-582
    DOI: 10.1016/j.ejor.2012.05.030
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221712003888
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2012.05.030?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. R.J. Aumann & S. Hart (ed.), 2002. "Handbook of Game Theory with Economic Applications," Handbook of Game Theory with Economic Applications, Elsevier, edition 1, volume 3, number 3.
    2. A.Y. Garnaev, 1997. "On a ruckle problem in discrete games of ambush," Naval Research Logistics (NRL), John Wiley & Sons, vol. 44(4), pages 353-364, June.
    3. Hohzaki, Ryusuke, 2007. "An inspection game with multiple inspectees," European Journal of Operational Research, Elsevier, vol. 178(3), pages 894-906, May.
    4. P. Goutal & A. Garnaev & G. Garnaeva, 1997. "On the Infiltration Game," International Journal of Game Theory, Springer;Game Theory Society, vol. 26(2), pages 215-221.
    5. Zoroa, Noemi & Zoroa, Procopio & Jose Fernandez-Saez, M., 1999. "A generalization of Ruckle's results for an ambush game," European Journal of Operational Research, Elsevier, vol. 119(2), pages 353-364, December.
    6. Zoroa, N. & Zoroa, P. & Fernández-Sáez, M.J., 2009. "Weighted search games," European Journal of Operational Research, Elsevier, vol. 195(2), pages 394-411, June.
    7. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    8. Vic Baston & Kensaku Kikuta, 2004. "An Ambush Game with an Unknown Number of Infiltrators," Operations Research, INFORMS, vol. 52(4), pages 597-605, August.
    9. John M. Auger, 1991. "An infiltration game on k arcs," Naval Research Logistics (NRL), John Wiley & Sons, vol. 38(4), pages 511-529, August.
    10. Avenhaus, Rudolf & Von Stengel, Bernhard & Zamir, Shmuel, 2002. "Inspection games," Handbook of Game Theory with Economic Applications, in: R.J. Aumann & S. Hart (ed.), Handbook of Game Theory with Economic Applications, edition 1, volume 3, chapter 51, pages 1947-1987, Elsevier.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Bui, Thuy & Lidbetter, Thomas, 2023. "Optimal patrolling strategies for trees and complete networks," European Journal of Operational Research, Elsevier, vol. 311(2), pages 769-776.
    2. Garrec, Tristan, 2019. "Continuous patrolling and hiding games," European Journal of Operational Research, Elsevier, vol. 277(1), pages 42-51.
    3. Karwowski, Jan & Mańdziuk, Jacek, 2019. "A Monte Carlo Tree Search approach to finding efficient patrolling schemes on graphs," European Journal of Operational Research, Elsevier, vol. 277(1), pages 255-268.
    4. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    5. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    6. Lidbetter, Thomas, 2017. "On the approximation ratio of the Random Chinese Postman Tour for network search," European Journal of Operational Research, Elsevier, vol. 263(3), pages 782-788.
    7. Camacho-Collados, M. & Liberatore, F. & Angulo, J.M., 2015. "A multi-criteria Police Districting Problem for the efficient and effective design of patrol sector," European Journal of Operational Research, Elsevier, vol. 246(2), pages 674-684.
    8. Alpern, Steve & Lidbetter, Thomas & Papadaki, Katerina, 2019. "Optimizing periodic patrols against short attacks on the line and other networks," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1065-1073.
    9. Alpern, Steve & Fokkink, Robbert & Simanjuntak, Martin, 2016. "Optimal search and ambush for a hider who can escape the search region," European Journal of Operational Research, Elsevier, vol. 251(3), pages 707-714.
    10. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    11. Collado, Ricardo & Meisel, Stephan & Priekule, Laura, 2017. "Risk-averse stochastic path detection," European Journal of Operational Research, Elsevier, vol. 260(1), pages 195-211.
    12. Oléron Evans, Thomas P. & Bishop, Steven R., 2013. "Static search games played over graphs and general metric spaces," European Journal of Operational Research, Elsevier, vol. 231(3), pages 667-689.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Steve Alpern & Alec Morton & Katerina Papadaki, 2011. "Patrolling Games," Operations Research, INFORMS, vol. 59(5), pages 1246-1257, October.
    2. Alpern, Steve & Fokkink, Robbert & Simanjuntak, Martin, 2016. "Optimal search and ambush for a hider who can escape the search region," European Journal of Operational Research, Elsevier, vol. 251(3), pages 707-714.
    3. Kyle Y. Lin & Michael P. Atkinson & Timothy H. Chung & Kevin D. Glazebrook, 2013. "A Graph Patrol Problem with Random Attack Times," Operations Research, INFORMS, vol. 61(3), pages 694-710, June.
    4. Andrew Yim, 2009. "Efficient Committed Budget for Implementing Target Audit Probability for Many Inspectees," Management Science, INFORMS, vol. 55(12), pages 2000-2018, December.
    5. Páez-Pérez, David & Sánchez-Silva, Mauricio, 2016. "A dynamic principal-agent framework for modeling the performance of infrastructure," European Journal of Operational Research, Elsevier, vol. 254(2), pages 576-594.
    6. Bård Harstad & Torben K. Mideksa, 2017. "Conservation Contracts and Political Regimes," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 84(4), pages 1708-1734.
    7. Manish Jain & Jason Tsai & James Pita & Christopher Kiekintveld & Shyamsunder Rathi & Milind Tambe & Fernando Ordóñez, 2010. "Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service," Interfaces, INFORMS, vol. 40(4), pages 267-290, August.
    8. Alpern, Steven & Morton, Alec & Papadaki, Katerina, 2011. "Patrolling games," LSE Research Online Documents on Economics 32210, London School of Economics and Political Science, LSE Library.
    9. Stefan Rass, 2017. "On Game-Theoretic Risk Management (Part Three) - Modeling and Applications," Papers 1711.00708, arXiv.org.
    10. Zoroa, N. & Zoroa, P. & Fernández-Sáez, M.J., 2009. "Weighted search games," European Journal of Operational Research, Elsevier, vol. 195(2), pages 394-411, June.
    11. Alpern, Steve & Lidbetter, Thomas & Papadaki, Katerina, 2019. "Optimizing periodic patrols against short attacks on the line and other networks," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1065-1073.
    12. Garrec, Tristan, 2019. "Continuous patrolling and hiding games," European Journal of Operational Research, Elsevier, vol. 277(1), pages 42-51.
    13. Stamatios Katsikas & Vassili Kolokoltsov & Wei Yang, 2016. "Evolutionary Inspection and Corruption Games," Games, MDPI, vol. 7(4), pages 1-25, October.
    14. Jelnov, Artyom & Tauman, Yair & Zeckhauser, Richard, 2017. "Attacking the unknown weapons of a potential bomb builder: The impact of intelligence on the strategic interaction," Games and Economic Behavior, Elsevier, vol. 104(C), pages 177-189.
    15. V. N. Kolokoltsov & O. A. Malafeyev, 2017. "Mean-Field-Game Model of Corruption," Dynamic Games and Applications, Springer, vol. 7(1), pages 34-47, March.
    16. Baykal-Gürsoy, Melike & Duan, Zhe & Poor, H. Vincent & Garnaev, Andrey, 2014. "Infrastructure security games," European Journal of Operational Research, Elsevier, vol. 239(2), pages 469-478.
    17. Günter Fandel & Jan Trockel, 2013. "Applying a one-shot and infinite repeated inspection game to materials management," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(2), pages 495-506, March.
    18. Marco Faravelli & Randall Walsh, 2011. "Smooth Politicians And Paternalistic Voters: A Theory Of Large Elections," Levine's Working Paper Archive 786969000000000250, David K. Levine.
    19. Jhinyoung Shin & Rajdeep Singh, 2010. "Corporate Disclosures: Strategic Donation of Information," International Review of Finance, International Review of Finance Ltd., vol. 10(3), pages 313-337, September.
    20. Mario Guajardo & Kurt Jörnsten & Mikael Rönnqvist, 2016. "Constructive and blocking power in collaborative transportation," OR Spectrum: Quantitative Approaches in Management, Springer;Gesellschaft für Operations Research e.V., vol. 38(1), pages 25-50, January.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:222:y:2012:i:3:p:571-582. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.