Skip to main content

Perimeter Defense Game

Stackelberg Game · Mixed Strategies

Randomize guard deployment across 4 perimeter sectors to prevent alien infiltration. A pure (deterministic) strategy is exploitable — the attacker simply avoids the guarded sector. Mixed strategies force the attacker to face uncertainty everywhere. This is the key insight of Stackelberg security games.

Guard Allocation

4 perimeter sectors protect the base. You have 2 guards to allocate. Each sector has different payoffs for defender and attacker depending on whether the sector is guarded when attacked. The attacker observes your strategy (coverage probabilities) but not your realization (which guards go where tonight). You must choose a mixed strategy — randomized coverage probabilities — that maximizes your guaranteed worst-case utility.

How this differs from Patrol Route Optimization

The patrol page uses the same SSE framework in a path-based context (ARMOR/IRIS). This page focuses on the pure game-theoretic structure: guard-to-sector assignment, the concept of mixed strategies, and the key insight that randomization is a feature — predictable defense is exploitable. No routes, just allocation probabilities.

Defense DomainOR ElementSymbolExample
Wall sectorTargettSector-Beta
Guard unitCoverage resourcem = 22 guards
Guard probabilityCoveragect ∈ [0,1]0.55
Catch infiltratorDefender covered payoffUdc5
Breach damageDefender uncovered payoffUdu-12
Alien caughtAttacker covered payoffUac-7
Successful infiltrationAttacker uncovered payoffUau15
Stackelberg Security Game (Tambe 2011): MAXIMIZE d // guaranteed minimum defender utility subject to: d ≤ ct·Udc(t) + (1-ct)·Udu(t) ∀ t ∈ T // worst-case constraint Σt ct ≤ m = 2 // total coverage = 2 guards 0 ≤ ct ≤ 1 ∀ t ∈ T // Attacker best response (rational adversary): // t* = argmax_t [ c_t · Ua_c(t) + (1-c_t) · Ua_u(t) ] // At Strong Stackelberg Equilibrium (SSE): // attacker is indifferent among targets they might attack // — this is the key game-theoretic property

Mixed Strategy Optimizer

★★☆ Heuristic (LP)
4 Sectors · 2 Guards
SectorUdcUduUacUau
Alpha3-8-510
Beta5-12-715
Gamma2-5-36
Delta4-10-613
References
Published Tambe, M. (2011). Security Games: Applying Game Theory to Counterterrorism. Cambridge University Press.
Published Korzhyk, D., Conitzer, V., & Parr, R. (2010). “Complexity of computing optimal Stackelberg strategies in security resource allocation games.” AAAI.
Published Kiekintveld, C., Jain, M., Tsai, J., et al. (2009). “Computing optimal randomized resource allocations for massive security games.” AAMAS.

Preparing for First Contact

We do recommend the Hungarian algorithm. It works on any planet.

👽🛸⚠️

Educational Fiction Disclaimer

This is a fictional educational scenario.

  • All data is entirely fictional
  • No military applications intended
  • The author advocates for peace