Journal of Risk Analysis and Crisis Response

Volume 9, Issue 3, October 2019, Pages 134 - 144

A Game Theory Approach for Multi-agent System Resources Allocation against Outside Threats

Authors
Cheng-Kuang Wu1, *, Xingwei Hu2
1School of Computer Science and Software Engineering, Zhaoqing University, Zhaoqing Road, Zhaoqing City, Guangdong Province 526021, China
2Information Technology Department, International Monetary Fund, 700 19th St NW, Washington, DC 20431, USA
*Corresponding author. Email: shapleyvalue@hotmail.com
Corresponding Author
Cheng-Kuang Wu
Received 28 July 2019, Accepted 25 August 2019, Available Online 31 October 2019.
DOI
10.2991/jracr.k.191024.003How to use a DOI?
Keywords
Multi-agent system; external threat value; resources allocation; Nash equilibrium; Shapley value
Abstract

This study proposes an integrated model for the deployment of multiagent resources for resisting outside threats. The proposed two-stage model applies the divide-and-conquer strategy to solve the resources allocation problem. First, the interactive actions between an external attack and a response agent are modeled as a non-cooperative game, after which the external threat value is derived from the Nash equilibrium. Second, the threat values of all response agents are utilized to compute each agent’s Shapley value. Then an acceptable resource allocation of agents based on their expected marginal contribution creates a minimum set of resource deployment costs. The experimental results show that our approach is feasible as a means to mobilize search and rescue resources from a non-affected district and to improve relief efforts against earthquake damage. The Shapley value allocation approach proposed in this study; the percentage of resources allocation of districts is closer to death rate of each district than the proportional division of resources.

Copyright
© 2019 The Authors. Published by Atlantis Press SARL.
Open Access
This is an open access article distributed under the CC BY-NC 4.0 license (http://creativecommons.org/licenses/by-nc/4.0/).

1. INTRODUCTION

Emergency Response Systems (ERS) and Homeland Security Advisory Systems (HSAS) are both centralized Multiagent Systems (MASs) which delegate multiple interacting agents to resist outside attacks. However, the effectiveness of these MASs as a means to defend entire large-scale geographic regions is constrained by the available resources. The system administrator faces a density of agent deployment dilemmas, where the disposition of more agents easily leads to higher costs. These systems also lack specific measures for rational decision-making, and do not apply mathematical models to capture the interactions between attacker and defender. The administrator of a MAS should have a tool to measure the strength of the attacks and the resistance capability of the response agents. By considering the utilities of moves available to the attacker and the defender, we can find a way to build a rating system for decision making [1].

Game theory tools provide analytical techniques that are already applied in many other research areas, where multiple agents compete and interact with each other within a specific system. In most multiple agent interactions, the overall outcome depends on the choices made by all self-interested agents. The goal is to make choices that optimize the outcome [2]. Game theory also provides general mathematical techniques for analyzing goal-conflict and cooperation between two or more individuals [3].

This study surveyed several game theoretic approaches to be applied when external attacks threaten the MAS. These MASs include ERS, HSAS, and security force reallocation systems. However, there are common problems related to extension and scalability that are often encountered [4]. When these game theory models are played by more than four players (i.e., agents), it is not easy to compute the Nash Equilibrium (N.E.) of the payoff matrix in a multi-dimensional game. Because MASs consist of multiple agents, these computations are complex and therefore pose a challenge for classical game theory. The model uses two steps for solving the growing amount of MAS agent work. A framework is formed for deploying multiple agents using game theory, which analyzes the detected threats (or attacks) and allocates the resources of the MAS as much as efficiently as possible.

The game theory model is appropriate for analyzing the interactions of MAS agents and to deal with the Resource Allocation Problem (RAP) [5,6]. However, when many agents face external attacks, the whole MAS may suffer from limited resources to resist these attacks. The two-stage model applies the divide-and-conquer idea to divide the scalability problem into two parts. First, a non-cooperative game is applied to model the conflict of goals between an attacker and a response agent, after which the external threat value (i.e., the strength of the attacker) is derived from the Nash equilibrium. Second, a cooperative game is used to solve the RAP among MAS agents, in particular, by increasing the number of agents. The threat values of all response agents are utilized to compute each agent’s Shapley value. Then an acceptable resource allocation of agents based on the expected marginal contribution creates a minimum set of resource deployment costs.

The proposed model is applied to reallocate Search-and-Rescue (SAR) resources after a strong earthquake event, to maximize the capacity of the security response teams and minimize the number of emergency responders needed. The experimental results show that the model is feasible as a means of mobilizing SARs from a non-affected district and to improve relief efforts against earthquake damage.

2. MAS RESPONSE REGION

In general, the MAS agent is regarded as a software agent although they could be robots, humans or human teams, or even a combination of human-agent teams. MASs can represent self-organized and complex behaviors even when the individual skills of all their agents are simple [7]. In this study, various MASs including Intrusion Detection System (IDS), HSAS, and ERS are surveyed. The agents possess skills and offer emergency services to protect the MAS from external threats. A response agent can be a node in the IDSs software, a response crisis unit comprised of human teams in HSAS, or agencies which assist in dealing with any emergency, such as a detector, SAR-group, security force agency, etc. Figure 1 shows the interactions of an agent in the MAS under external threats (or attacks). As the external attacker chooses its moves to attack the MAS, the response agent uses their moves to resist the external attack.

Figure 1

Behaviors and interactions between response agents and external attacks.

This study assumes that the MAS architectures (e.g., ERS or HSAS) will face external threats, rather than internal attacks. Each agent has a possibility of an attack that is an external threat to the MAS. An attack is an event which happens in the MAS. In contrast, a threat is not an actual event. Therefore, we define an external threat as “a possibility of outside attack” created by an attacker who will attack the MAS, or by an unexpected disaster, such as a strong earthquake. In this situation, each agent possesses detection techniques, raises alerts, and improves emergency responses against the external attacks (e.g., large earthquake attacks) (see Figure 1).

Figure 2 shows the five interaction steps among SAR agents faced with external attacks.

  1. (i)

    Each agent faces a sudden attack in the external threat environment.

  2. (ii)

    The agent’s goal is to resist the external attack. He/she utilizes specific resources, such as fire fighters, rescue-groups, ambulances, equipment and statistical analysis to report and relieve damage. These specific techniques refer to the SAR agent’s capability which controls and handles its resources.

  3. (iii)

    Each agent reports to the coordinator (e.g., Emergency Operation Center: EOC) about its own capability and resources as it resists the attack.

  4. (iv)

    The only goal in this environment is the optimization of MAS resource allocation. After the coordinator measures the value of a threat to all agents and analyzes its decisions, he/she determines and commands all SAR agents to mobilize and redistribute resources.

  5. (v)

    According to the commands of the EOC, each agent begins to employ his/her own resources or make them available for someone else. In other words, some agents’ resources are redistributed to the critical agents so as achieve the goal of resisting serious attacks and discarding non-affected agents.

Figure 2

An illustration representing the interactions of an SAR agent with its external attacker and EOC.

3. RELATED WORKS

Several game theory approaches have been applied in which external attacks threaten a MAS which could include ERS, HSAS, and security force reallocation systems. Various approaches have been applied to model the interactions between attackers and defenders for computer network intrusion detection. Burke [8] proposed a two-player game framework to model the information warfare between two players, an attacker and a system administrator. In his model, the mixed strategy equilibrium was used to construct a player’s optimal solution. The strategies and scenarios of the model are simple extensions of a few simulations to analyze how it would behave in real situations.

Other approaches also have been applied to model the interactions between terrorists and defenders for counter-terrorism purposes. Paruchuri et al. [9] deployed a software assistant agent that aided police or other security agencies in randomizing their security schedules. They improved the security capability of anti-terrorism forces when dealing with multiple agents posing an intentional threat. The model maps the problem of check-point scheduling as a Bayesian Stackelberg game. The proposed model is faster than the multiple-LP method because it simply solves the mixed-strategy N.E. However, Bayesian concepts do not fully apply in real situations, and the model did not consider incomplete information regarding the type of adversary. The solution of the Bayesian N.E. is an NP computation. Their model also encountered the many-players problem, which involves the extension and scalability of the proposed model.

Alpcan and Basar [10] proposed the utilization of cooperative and non-cooperative game theory concepts to address some of the basic network security tradeoffs. They constructed a sensor warning system and a security game for making various decisions, analysis and, IDS control schemes. The sensor warning system generates a security risk value for the IDS agent (i.e., sensor). This value could have various levels and the calculation is based on simple detection output. However, the strategy between the IDS and the attacker was incomplete, because it did not consider the propagation attacks in a game, therefore their model could not satisfy the decision-making requirements for IDS control. Their proposed model consists of two independent schemes. Our study combines their proposed non-cooperative game with a cooperative game to solve the RAP in a MAS.

3.1. Why Game Theory?

Gupta and Ranganathan [11] surveyed several optimization approaches such as Genetic Algorithms (GA), the Bayesian Search (BS) method, as well as Random Search (RS) and Greedy Allocation (GS) methodologies. These algorithms cannot be applied to the multi-crisis management problem because they do not provide individual rationality and some of the members of the population become dominant as the algorithm progresses. However, using game theory, scenarios that optimize multiple competing objectives can be modeled. Game theory presents interactions between self-interested agents and analysis as to which strategies can be designed that will maximize the benefits of an agent in a MAS. Many of the applications of game theory have been to analyze the negotiation and coordination of multiple agents. Game theory can be a useful tool for building future generations of mixed game theory and decision theory agents [3].

In a non-cooperative game, each player tries to utilize resources at minimum cost and the coordination is not enforced externally but is self-enforcing. All players optimize their decisions which maximize their payoffs in a non-cooperative game. N.E. is a solution concept for a non-cooperative game which identifies a prediction of the game outcome such that every player in the game is satisfied with respect to every other player [12]. N.E. provides a theoretical prediction of attack in a conflict situation, where individual MAS agents suffer from external attacks. The interactions between an external attacker and a response agent can be modeled as a non-cooperative game.

The Shapley value is a solution concept for cooperative games which computes the power index of an individual for cost allocation [13]. The cooperative game provides a suitable model for the design and analysis of response agent deployment, and it has been shown that the famous Shapley value rule satisfies many nice fairness properties [14]. The Shapely value also identifies a socially fair, good quality allocation for all agents. Here, the individual fairness for each player is optimal and the average fairness of the MAS is high. The social optimality property ensures that each player in the game receives the best utility for herself/himself and the complete MAS. A power index in the form of the Shapley value is applied to calculate the marginal contribution among agents and achieve a mutually agreeable division of cost for MAS deployment [2].

4. THE PROPOSED MODEL

There are two schemes applied in the proposed model. A simplified workflow chart describing the principles for optimal agent deployment is given in Figure 3. In the first scheme, the interaction processes between the attacker (or attacks) and the defensive agent are modeled as a two-person non-cooperative game (zero- or general-sum game), taking into account the interactions of security measures among agents and attackers. The proposed payoff functions utilize the external threat measures (such as defensive or offensive capability) for two players. The N.E. derived from these functions is calculated to assign a unique external threat value for the agent. Then, the second scheme constructs a resource allocation game. The power index of the Shapley value is applied to calculate the marginal contribution among MAS agents, to find a mutually agreeable division of cost for deployment. This study revises Owen’s method [15] to propose a Shapley value formula. MAS agents are grouped into coalition groups based on the threat levels to provide an acceptable MAS deployment. The Shapley value can be used to assure the derivation of a unique solution for each agent in the MAS resource sharing interactions. Let Zh={ω1h,ω2h,ω3h,...,ωih} be the minimum set of response agents, ∀IN, and N is the number of agents, which is subject to the threat level h. Finally, we obtain the appropriate Shapley value vector and compute the number of reallocation resources of each agent. These optimal reallocation resources of the agents in the emergency response enable us to mitigate the damage from external attacks.

Figure 3

Flowchart of the proposed model.

4.1. The External Threat Game

The first game models the interactions of an attacker (or attack) and a response agent. When an agent confronts an external attacker, both face a competitive situation. The relationships between external attacker and response agents include pure and impure conflicts, and their behaviors are non-cooperative. Thus, in the first stage, a non-cooperative game is applied to model decisions and to analyze the best responses. The two-player non-cooperative game is defined as follows:

  1. (i)

    The set of players A: The first model only has two players. The attacker is player 1 and the response agent is player 2. A = {Attacker, Response agent}.

  2. (ii)

    Strategy space Si: A set of all possible strategies available to two players in a game.

  3. (iii)

    Payoff πi: The expected utility to a player as a function of the strategies chosen by an attacker or response agent.

Let G = <A, (Si), (πi)> be such a normal form game. Sometimes this game cannot determine a pure N.E. strategy, because there is probably no N.E. However, every finite normal form game has a mixed-strategy N.E [16]. Thus, this study can also derive another strategic game from G, called the “mixed extension” of G, in which the set of actions Ai of each player i is the set of mixed strategies in G. More generally, suppose that player i has K pure strategies: Si = {si1, …, s1K}. Then, a mixed strategy for player i has a probability distribution (pi1, pi2, …, piK), where piK is the probability that player i will play siK, for k = 1, …, K. Since pik is a probability, this study requires 0 ≤ piK ≤ 1 for k = 1, …, K and pi1 + ⋯ + piK = 1, where pi is used to denote an arbitrarily mixed strategy from the set of probability distributions over Si, just as si is used to denote an arbitrary pure strategy from Si.

Let J denote the number of pure strategies in S1 and K indicate the number in S2. Now, S1 = {u1, u2, …, uJ} and S2 = {d1, d2, …, dK} are rewritten using uj and dk to denote pure arbitrary strategies from S1 and S2, respectively. A J × K payoff matrix is created for the external threat game based on the two players’ strategies and interactions (see Table 1).

Response agent

d1 d2 ... dK r-mix
Attacker u1 π1(u1, d1), π2(u1, d1) π1(u1, d2), π2(u1, d2) ... π1(u1, dK), π2(u1, dK) r(u1)
u2 π1(u2, d1), π2(u2, d1) π1(u2, d2), π2(u2, d2) ... π1(u2, dK), π2(u2, dK) r(u2)
... ... ... ... ... ...
uJ π1(uJ, d1), π2(uJ, d1) π1(uJ, d2), π2(uJ, d2) ... π1(uJ, dK), π2(uJ, dK) r(uJ)
q-mix q(d1) q(d2) ... q(dK)
Table 1

A payoff matrix for the external threat game

If player 1 believes that player 2 will play the strategies {d1, d2, …, dK} with the probability q = (q(d1), q(d2), …, q(dK)) then player 1’s expected payoff from playing the pure strategy uj is [Equation (1)]

k=1Kq(dk)π1(uj,dk)
and player 1’s expected payoff from playing the mixed strategy r = (r(u1), r(u2), …, r(uJ)) is [Equation (2)]
M1(r,q)=j=1Jr(uj)[k=1Kq(dk)π1(uj,dk)]=j=1Jk=1Kr(uj)q(dk)π1(uj,dk)
where r(uj), q(dk) is the probability that player 1 plays uj and player 2 plays dk. Thus, 0 ≤ r(uj), q(dk) ≤ 1 for k = 1, …, K and j = 1, …, J; r(u1) + r(u2) + ⋯ + r(uJ) = 1 and q(d1) + q(d2) + ⋯ + q(dK) = 1.

Player 1’s expected payoff from the mixed strategy r, given in Equation (2), is the weighted sum of the expected payoff for each of the pure strategies {u1, u2, …, uJ}, given in Equation (1), where the weights are the probabilities r(u1), r(u2), …, r(uJ). Thus, for the mixed strategy r(u1), r(u2), …, r(uJ) is the best response for player 1 and 2’s mixed strategy q(dk), and it must be that r(uj) > 0 only if [Equation (3)]

k=1Kq(dk)π1(uj,dk)k=1Kq(dk)π1(uj,dk)
for every uj′ in S1. That is, for a mixed strategy to be the best response to q it must put a positive probability on a given pure strategy only if the pure strategy is itself the best response to q. Conversely, if player 1 has several pure strategies that are best responses to q, then any mixed strategy that puts all its probability on some or all of these pure-strategy best responses (and zero probability on all other pure strategies) is also the best response for player 2 to q [17].

This study computes player 2’s expected payoff when players 1 and 2 play the mixed strategies r and q, respectively. If player 2 believes that player 1 will play the strategies (u1, u2, …, uJ) with the probabilities (r(u1), r(u2), …, r(uJ)), then player 2’s expected payoff from playing the strategies (d1, d2, …, dK) with the probabilities (q(d1), q(d2), …, q(dK)) is [Equation (4)]

M2(r,q)=j=1Jr(u,j)[k=1Kq(d,k)π2(uj,dk)]=j=1Jk=1Kr(u,j)q(d,k)π2(uj,dk)

Given M1(r, q) and M2(r, q) this study restates the N.E. requirement that each player’s mixed strategy is the best response to the other player’s mixed strategy: for the pair of mixed strategies (r*, q*) to be a N.E., r* must satisfy [Equation (5)]

M1(r*,q*)M2(r*,q)
for every probability distribution r over S1, and q* must satisfy [Equation (6)]
M2(r*,q*)M2(r*,q)
for every probability distribution q over S2, where r* and q* represent the optimal mixed strategy for the attacker and response agent respectively. A mixed strategy N.E. is similar to a stochastic state that predicts the outcome of a game and it can capture stochastic regularity. The attacker and agent have information about their payoffs from actions which were taken in the past; each player applies these payoffs to form his belief about the future behaviour of the other players, and thereby formulate his optimal mixed strategy.

In Table 1, player 2’s expected payoff is computed when players 1 and 2 play mixed strategies r and q respectively. If the game G has no pure strategy N.E., a mixed N.E. pair (r*, q*) exists in this game, which is an optimal strategy [18]. The mixed N.E. for the probability vector is r* = {r*(u1), r*(u2), ..., r*(uJ)} with actions {u1, u2, ..., uJ} for the external attacker and the vector q* = {q*(d1), q*(d2), ..., q*(dK)} with actions {d1, d2, ..., dK} for the response agent. The external attacker’s expected payoff for a N.E. (pure or mixed strategy) is defined as its external threat value. Player 1 (i.e., the external attacker) obtains the positive payoff (+), because player 1 gains a profit from player 2’s resource responses. Player 2 (i.e., the response agent) obtains a negative payoff (−), which means that player 2 pays for player 1’s attack. When the response agent (i.e., player 2) gets a low expected payoff, the external attacker (i.e., player 1) gets a high expected payoff and the threat of external attack is high. Because player 1’s expected payoff always represents a gain (+), this study defines the vi as the ith response agent’s threat value, given by [Equation (7)]

vi=π1(p*,q*)=j=1Jk=1Kp*(uj)q*(dk)π1(uj*,dk*),uj*,dk*N.E.

Therefore, vi is derived from the attacker optimal strategies’ expected payoff which represents the threat value in the first game model. The next proposed model uses the threat value vi to compute the Shapley value of each agent within the cooperative game.

4.2. Resource Reallocation Game

In this study, it is assumed that a central planner of the Security of Center (SOC) or Emergency Operation Center (EOC) can command and control MAS resource allocation [19]. Each agent reports its degree of threat (or threat value) to the central planner. The central planner computes the Shapley value based on the threat values of all agents in order to command agents to dispatch resources. In this second game, the interactions of all response agents in the MAS response region are likened to the playing of a cooperative game. An efficient method is needed to decide the number and priority of the deployment of resources to various response events when multiple attacks occur simultaneously. The Shapley value is applied to create an optimal allocation of resources for the SOC commander during multiple attacks. We utilize the concept of the majority coalition in a party voting game to deal with MAS resource reallocation. A majority of voters can pass any bill in the majority game. The power of a voter will depend on how crucial that voter is to the formation of a winning coalition [15]. The Shapley value can provide a measure of the power of each voter, which is represented by the power index. When the sum of external threat values of some attacks passes the threshold of the majority level, the formation of a winning coalition is enabled, and the power index of each attack can be computed.

We define y: VR+ as a one-to-one function by assigning a positive real number to each element of v (i.e., external threat value) and y(0) = 0, V = {v1, v2, …, vi}, in. The majority of the attack level hH is derived from a majority of all external threat values which represents the corresponding threshold value mH. The allocation of the response agent resources is based on the concept of the majority of external threat values. Given the output vector of all external threat values of attacked events, the majority level is hH, if the sum of the external threat values of attacks is greater than or equal to mH [Equation (8)]

hHifk=1nvkmH,mH=vMin+(vMax-vMin2)

The external threat values of attacks can be grouped into the majority level hH. This is divided by 2 from the maximum value vMax to minimum value vMin. All response agents can be modelled as an N-person game with X = {1, 2, …, N}, which includes a set of players (i.e., response agents) and each subset VX, and where vj ≠ 0, ∀j ∈ V is called a coalition [2]. The coalition of X response agent groups in the mth threshold of the threat level, and each subset of X (coalition), represents the observed threat pattern for different threat levels H. The aggregate value of the coalition is defined as the sum of the threat values of the response agent, y(C) = ∑ic vi and is called a coalition function. Each response agent coincides with one or another given m thresholds of the threat level. Therefore, the different priorities for the response agent deployment are derived from the thresholds. Based on the external threat for each MAS response agent with respect to others, and the effect of the threshold values on various threat levels, the Shapley value represents the relative importance of each response agent. Now let y(C) = ∑ic vi viV, CX be the value of coalition C with a cardinality of c. The Shapley value of the ith element of the response agent vector is defined by [Equations (9) and (10)]

ω(i)=CXicn(c-1)!(n-c)!n![y(C)-y(C-{i})]
ω(i)=CXicn(c-1)!(n-c)!n!

Equation (9) can be simplified to Equation (10), because the term y(C) − y(C − {i}) will always have a value of 0 or 1, taking the value 1 whenever c′ is a winning coalition. If it is not a winning coalition, the terms C − {i} and y(C) are 0 [15]. Hence, the Shapley value is ω(i), where C′ denotes the winning coalitions with ∑ic vimi. The Shapley value of the ith response agent output indicates the relative threat value for the thresholds mH (i.e., threat levels). Therefore, a Shapley value vector shows the strength of all external attacks. We can use all Shapley values to compute the reallocation amount of emergency response resources of the agent. The numbers of resources of type k reallocated to the ith agent are defined by [Equation (11)]

ek(i)=ω(i)×oall,ki,kN
where oall, k is the total number of resource available of type k in a MAS (such as ambulances when an earthquake occurs). The reallocated numbers of the ith agent’s resources ek(i) are derived from the Shapley value of the ith response agent ω(i) multiplied by the total number of resource available of type k oall, k. Finally, the commander can reallocate any kind of agents’ resources so as to fairly deploy resources to resist attacks in multiple attack regions.

5. SAR RESPONSE CASE

The September 21, 2009 earthquake claimed 2297 fatalities, according to the National Fire Agency and Ministry of the Interior of Taiwan. Almost 90% of these victims died within 1 day of the event and 56% died within 6 hours (nearly 1284 victims) [20]. As we know, the key point to minimizing the total number of fatalities after an earthquake is the deployment of SAR efforts in the first few hours. In an emergency response region, there are usually a number of alarm districts-each equipped with resources that must be able to be deployed quickly and effectively after any kind of emergency. However, the SARs (e.g., fire fighters, rescue-groups, ambulances, and equipment) available to some affected districts may be limited.

A devastating earthquake brings with its multiple disasters such as fire, building collapse and a combination of fire and collapse. In cases of multiple emergencies, each affected district might possess different response capabilities. Some form of the central emergency management system must be present in order to allocate response resources. This study focuses on the problem faced by the emergency manager: which affected districts are the major ones and which ones are minor? Which affected districts require first aid and to need more SAR resources? This is a deployment efficiency problem. An emergency manager must find an optimal resource allocation for assigning response resources in space and time to the affected districts and improve the relief efforts against earthquake attacks.

We apply the proposed model to solve the SAR resources allocation problem. Two games are constructed, representing the two stages needed for the economical deployment of available resources. One is the earthquake damage game which calculates the value of the earthquake threat in each district. Another is the SAR resource reallocation game which efficiently mobilizes the available resources of the response agent to increase the survival rate of earthquake victims.

5.1. The Model Assumptions

Certain assumptions must be made when treating a multi-emergency and response management scenario as a game theory framework. The assumptions are listed below.

  1. (i)

    After the deadliest quakes, emergencies will occur in different districts in a time-overlapped manner, and resource requests will be simultaneously received by the central response agent managers (see Table 2). We assume the multi-emergency event is player 1 and the district response agent is player 2. Hence, two players can use a static single step. Each player plays a non-cooperative and a zero-sum game. A response agent manages one district. Three types of earthquake emergencies (i.e., fire, house collapse, and fire and house collapse) could occur simultaneously when evaluating the value of the earthquake threat in a specific time period.

  2. (ii)

    The EOC has developed a training program to improve the emergency response agents’ capabilities. As seen in Table 3, the annual emergency training gives us the time needed to perform search and rescue activities from each of the resource sites. These data are generated by the training program through annual earthquake drills or exercises.

  3. (iii)

    The first model is a normal form game for capturing the interactions between two players. This model assumes complete information; that is, every player knows the available strategies of every other player. Each district has a different number of resources available. In multiple emergencies, there is also complete information regarding the resource requirements, emergency priorities and the population density of the affected district (see Tables 2 and 4).

Rescue groups Ambulances Fire engines Machine and equipments Priority (1–3)
Fire 0 1 2 0 1
Collapse 3 2 0 0.3 2
Fire and collapse 3 3 2 0.5 3
Table 2

Emergency priorities, types, and the ratio of four resource requests

Rescue groups Ambulances Fire engines Machine and equipments
Fire 5 5 5 5
Collapse 5 5 5 5
Fire and collapse 10 10 10 10
Total 20 20 20 20

These average times (or min) are measured by the annual earthquake exercise.

Table 3

Average times needed to perform search and rescue activities from the resource sites in ith district

Districts The number of available resources

Population density Rescue workers Ambulances Fire engines Machine and equipments
A1 TAIPEI 94 350 250 600 100
A2 TAOYUAN 100 100 100 200 60
A3 HSINCHU 37 50 60 100 50
A4 MIAOLI 19 25 40 50 45
A5 TAICHUNG 73 125 100 250 65
A6 CHANGHUA 74 75 50 150 65
A7 NANTOU* 8 25 50 50 45
A8 YUNLIN 34 25 50 50 45
A9 CHIAYI 25 30 60 70 47
A10 TAINAN 52 80 80 180 60
A11 KAOHSIUNG 57 125 200 250 65
A12 PINGTUNG 19 50 40 100 50
A13 TAITUNG 4 20 20 30 44
A14 HUALIEN 4 20 20 30 44
A15 YILAN 13 25 20 40 45
Total 613 1125 1140 2150 830
*

A strong earthquake occurred.

Table 4

Population density and resource available in 15 disaster districts

5.2. Earthquake Damage Game

This game applied the first scheme of the proposed model, which is designed to obtain the threat value of the earthquake in each district. We assume that the multi-emergency event is player 1 and the district response agent is player 2. The interactions between multi-emergency event and response agent are modeled by a two-person game. It is assumed that both players are forming a set of non-cooperative players I = {I1, I2}, where I1 generates multiple emergency events; and I2 is the district response agent responding to allocate finite SAR resources, obtained by prioritizing the different districts. The parameters for determining the threat measures are defined in the following paragraphs.

5.2.1. Multi-emergency events

In the earthquake damage game, we assume the multi-emergency event to be player 1; three emergencies could happen simultaneously as a result of the player’s actions. S1 denotes the set of strategies available to player 1: S1 = {u1, u2, u3} = {fire, house collapse, and fire and house collapse}. The greater the seriousness of the emergency events, the more resources are needed. W denotes the set of resource requirements for multiple emergencies in one urban region. W = {w1, w2, ..., wn}. The variable wj,k denotes the number of resources required by uj emergency event from resource dk. Moreover, the priority for each emergency is related to the resource requirement. Typically, in a priority-based system, a high priority emergency needs more resources, and a lower priority emergency needs fewer resources. Each event is assigned a priority P on a scale of 1–3 indicating the severity of the emergency, which is used as a weight in the payoff function to facilitate the calculation of losses. pj denotes the priority of the jth emergency: pj = 1, 2, 3, where 1 is the lowest level and 3 is the highest. An emergency event on a densely populated target would increase the number of fatalities and thus would gain greater benefit for player 1, while the response agent must pay a higher rescue cost. βi denotes the population density of the ith district in the whole region.

5.2.2. Response agent

Each alarm district has different response agents, which in turn have varied resources to prepare for multiple emergencies. In the earthquake damage game, the response agent is player 2, who holds four resources (i.e., four strategies). S2 denotes the sets of strategies player 2 has access to: S2 = {d1, d2, d3, d4} = {rescue worker, ambulance, fire engine, and machine and equipment}. O denotes the set of resources available to response agents in one district: O = {o1, o2, o3, o4}. ok denotes the number of resources available at resource dk, and tj,k denotes the time for resource dk to reach the uj emergency; k ∈ 1, 2, 3, 4. We assume these times are measured based on the annual emergency drill or exercise.

Two players will simultaneously make their strategic decisions. A 3 × 4 payoff matrix for the earthquake damage game is created based on two players’ strategies and interactions as seen in Table 5. The payoff to player 1 for choosing a particular strategy when player 2 makes his selection can be represented as a gain by player 1(+) or a loss for player 2(−). In this model, a summation of the losses of player 2 is depicted, and player 1 tries to maximize this loss. Player 2 tries to minimize the losses. Player 1 gains a profit from player 2’s effort of resource responses. Player 2 pays as a result of player 1’s multi-emergency events. We assume that each player’s aim in the game is to achieve as high a payoff for player as possible.

Response agent

d1 (Rescue groups) d2 (Ambulances) d3 (Fire engines) d4 (Machine and equipments)
Multi-emergency events u1(Fire) (wi,1oall,1-w1,1)t1,1βip1 (wi,2oall,2-w1,2)t1,2βip1 (wi,3oall,3-w1,3)t1,3βip1 (wi,4oall,4-w1,4)t1,4βip1
u2(Collapse) (wi,1oall,1-w2,1)t2,1βip2 (wi,2oall,2-w2,2)t2,2βip2 (wi,3oall,3-w2,3)t2,3βip2 (wi,4oall,4-w2,4)t2,4βip2
u3(Fire and collapse) (wi,1oall,1-w3,1)t3,1βip3 (wi,2oall,2-w3,2)t3,2βip2 (wi,3oall,3-w3,3)t3,3βip3 (wi,4oall,4-w3,4)t3,4βip3
Table 5

A payoff matrix for the external threat game

The payoff for the jth strategy for player 1 when player 2 chooses the kth strategy to the response can be formulated as [Equation (12)]

π1=j=13k=14(wi,k oall,k-wj,k ) tj,k×βi×pj
where oall, k is the total number of SAR resources of type k; wi,k indicates the total number SAR resources needed of type k by the ith district. The proposed model assumes that the non-cooperative game is a zero-sum game; therefore, the payoff function of player 2 is given by [Equation (13)]
π2=-j=13k=14(wi,koall,k-wj,k)tj,k×βi×pj

A mixed Nash equilibrium pair (r*, q*) exists in the normal form game if this game has no pure strategy Nash equilibrium, which is an optimal strategy. The mixed N.E. for the probability vector is r* = {r*(u1), r*(u2), r*(u3)} with actions {u1, u2, u3} for the Multi-emergency event and the vector q* = {q*(d1), q*(d2), q*(d3), q*(d4)} with actions {d1, d2, d3, d4} for the response agent. Now, the proposed model lets vi be the ith threat value of a strong earthquake in a district which is the expected payoff of player 1. vi is computed by Equation (7).

vi=π1(p*,q*)=j=13k=13p*(uj)q*(dk)π1(uj*,dk*),uj*,dk*N.E.

5.3. Reallocation of SAR Resources Game

This game applies the second scheme of the proposed models as explained in Section 4.2. We assume that the 15 SAR districts of Taiwan are modeled as a 15-person cooperative game (see Figure 4). The threshold value mH is generated by Equation (8). Given the mH threshold of the majority value, we can compute the majority of coalitions which are pivotal to each district. The different priorities for response resource deployment are derived from the majority of coalitions. Based on the earthquake threat value for each district with respect to the others, and the impact of the threshold values on the majority of emergency level represents the relative importance of each district. Equations (9) and (10) are used to compute the Shapley value for each agent and the amount of reallocation of each agent’s resources in Section 4.2. According to SAR resource reallocation, the EOC mobilizes resources from all districts to assure that even rescue of victims in multiple emergency events across the whole region is possible.

Figure 4

15 Search and rescue (SAR) districts of Taiwan.

5.4. Simulation Experiments

The simulation takes advantage of the 921-earthquake data to verify the proposed model. We hypothesize that a strong earthquake occurs as it did in Jiji, Nantou County, Taiwan. The EOC deploys 15 response agents from the district (or county) in the whole region (from A1 to A15) and provides central management and monitoring for homeland security of Taiwan (see Figure 4). In the first stage, the information in Tables 24 is used, regarding the resource types and the availability, population density, emergency requests, emergency priorities, and time taken to reach the crisis area from each of the resource centers. Each district’s emergency resource request is derived from the number of emergency calls (i.e., 119) multiplied by the ratio of the resource requests (see Tables 2 and 6). We model the non-cooperative game and generated simulation sets of threat measures for the strong earthquake and the response agent in each district. The payoff matrix of the zero-sum earthquake damage game for each district is modeled according to Equations (12) and (13) and Table 5. Then, 15 earthquake threat values are calculated using Equations (1214). Table 6 shows 15 earthquake threat values of the response agent derived from Nash equilibrium points by enumerating the strategies in the normal form game.

Districts Number of emergency calls Requirements Earthquake threat values Shapley values


Fire Collapse Fire and collapse Rescue groups Ambulances Fire engines Machine and equipments
A1 TAIPEI 5 50 40 275 225 180 46 160 0.086353
A2 TAOYUAN 5 10 10 65 55 50 11 80 0.036489
A3 HSINCHU 8 16 20 116 100 92 19.6 53 0.022389
A4 MIAOLI 8 20 30 158 138 126 26.6 37 0.015335
A5 TAICHUNG 30 200 200 1230 1030 860 206 618 0.334121
A6 CHANGHUA 5 150 150 605 505 410 101 89 0.040354
A7 NANTOU* 20 300 350 1990 1690 1430 333 610 0.334121
A8 YUNLIN 4 100 100 604 504 408 50.4 129 0.062895
A9 CHIAYI 10 10 20 200 170 160 17 31 0.013536
A10 TAINAN 8 8 16 212 196 188 19.6 75 0.034316
A11 KAOHSIUNG 4 4 8 40 36 36 3.6 15 0.005728
A12 PINGTUNG 2 2 20 68 66 66 6.6 23 0.011142
A13 TAITUNG 2 2 10 38 36 36 3.6 3 0.001931
A14 HUALIEN 2 2 10 38 36 36 3.6 3 0.001931
A15 YILAN 5 5 5 35 30 30 3 4 0.00129
Total 118 879 989 2229 1
*

Epicenter.

Table 6

Fifteen examples for computing earthquake threat values and Shapley values

In the second stage, all earthquake threat values are utilized to compute the Shapley value for each district. Given the vector output for all the values, we use Equation (8) to compute the majority of the threat values; the threshold value (i.e., mH) is 310. According to this threshold value 15 Shapley values of the district are calculated using Equation (10). The results obtained are shown in Table 6. Assume that all SAR resources available are unable to satisfy the requirements for all the earthquake-related emergencies occurring in Taiwan. Table 4 provides the experimental number of total available SAR resources. According to these experimental data, the number of reallocated SARs for each district can be computed using Equation (11). The results obtained are presented in Table 7.

Districts Resource allocation after earthquake Resource allocation rate after earthquake (%) Average distribution rate (%) Number of deaths Death rate (%)


Rescue workers Ambulances Fire engines Machine and equipments Rescue Workers Ambulances Fire engines Machine and equipments
A1 TAIPEI 97 98 186 72 8.62 8.60 8.65 8.67 8.64 134 5.40
A2 TAOYUAN 41 42 78 30 3.64 3.68 3.63 3.61 3.64 1 0.04
A3 HSINCHU 25 26 48 19 2.22 2.28 2.23 2.29 2.26 0 0.00
A4 MIAOLI 17 17 33 13 1.51 1.49 1.53 1.57 1.53 6 0.24
A5 TAICHUNG 376 381 718 277 33.42 33.42 33.40 33.37 33.40 1305 52.58
A6 CHANGHUA 45 46 87 33 4.00 4.04 4.05 3.98 4.01 30 1.21
A7 NANTOU* 376 381 718 277 33.42 33.42 33.40 33.37 33.40 916 36.91
A8 YUNLIN 71 72 135 52 6.31 6.32 6.28 6.27 6.29 82 3.30
A9 CHIAYI 15 15 29 11 1.33 1.32 1.35 1.33 1.33 7 0.28
A10 TAINAN 39 39 74 28 3.47 3.42 3.44 3.37 3.43 1 0.04
A11 KAOHSIUNG 6 7 12 5 0.53 0.61 0.56 0.60 0.58 0 0
A12 PINGTUNG 13 13 24 9 1.16 1.14 1.12 1.08 1.12 0 0
A13 TAITUNG 2 2 4 2 0.18 0.18 0.19 0.24 0.20 0 0
A14 HUALIEN 2 2 4 2 0.18 0.18 0.19 0.24 0.20 0 0
A15 YILAN 1 1 3 1 0.09 0.09 0.14 0.12 0.11 0 0
Total 1125 1140 2150 830 100 100 100 100 100 2482 100
*

Epicenter.

Table 7

Our proposed division of resources for 15 affected districts

5.5. Discussion

We analyze the application of the proposed model to determine whether the relief effort of SAR resources is improved after the 921-earthquake or not. Assume specific SAR resources for the entire Taiwan region. When the 921-earthquake occurred, the results calculated by our model guided the EOC to mobilize resources from all districts to assure even rescue of victims in multiple emergency events across the whole region (see Table 7). The number of people killed in all districts during the 921-Earthquake is revealed by the Ministry of the Interior of Taiwan statistics (see Table 7). Central Taiwan suffered major damage, particularly Nantou County and Taichung County. The majority of the casualties were concentrated in these two districts. Table 7 is interesting; because the proposed model dispatches most SAR resources to the two most severely affected districts. In addition, it shows the Average Distribution Rate (ADR) for Nantou County (i.e., 33.4%) which almost matches the death rate (i.e., 36.91%). Therefore, the proposed model is able to improve relief effort to counteract damage from external attacks.

We also evaluated the proposed division of resources by comparing the results obtained with those from the proportional division. The epicenter of the 921-earthquake was in Nantou County (i.e., agent A7) where the seismic intensity measured 7 on the Richter scale. Different magnitudes were measured at other counties in Taiwan when the 921-earthquake occurred. We assume that the higher the magnitude in a district, the more SARs resources needed. Therefore, we can use the proportional division to compute the amount of reallocation of each agent’s resources. The numbers of resources of type k reallocated to the ith agent are defined by [Equation (15)]

pk(i)=(M1Mall)×Oall,k,iN
where oall, k is the total number of SAR resources of type k; Mi indicates the seismic intensity of the ith agent in the district when a serious quake occurred. The reallocation of the ith agent’s resources in district pk(i) is derived from the proportion of Mi/Mall multiplied by the total number of resources available of type k oall, k. Table 8 shows the experimental results for 15 districts (or agents) using the proportional division of resources.

Districts Magnitude Resource allocation after earthquake Resource allocation rate after earthquake (%) Average distribution rate (%) Number of deaths Death rate (%)


Rescue workers Ambulances Fire engines Machine and equipments Rescue workers Ambulances Fire engines Machine and equipments
A1 TAIPEI 4 63 64 121 47 5.63 5.63 5.63 5.63 5.63 134 5.40
A2 TAOYUAN 4 63 64 121 47 5.63 5.63 5.63 5.63 5.63 1 0.04
A3 HSINCHU 4 63 64 121 47 5.63 5.63 5.63 5.63 5.63 0 0.00
A4 MIAOLI 5 79 80 151 58 7.04 7.04 7.04 7.04 7.04 6 0.24
A5 TAICHUNG 6 95 96 182 70 8.45 8.45 8.45 8.45 8.45 1305 52.58
A6 CHANGHUA 6 95 96 182 70 8.45 8.45 8.45 8.45 8.45 30 1.21
A7 NANTOU* 7 111 112 212 82 9.86 9.86 9.86 9.86 9.86 916 36.91
A8 YUNLIN 6 95 96 182 70 8.45 8.45 8.45 8.45 8.45 82 3.30
A9 CHIAYI 5 79 80 151 58 7.04 7.04 7.04 7.04 7.04 7 0.28
A10 TAINAN 5 79 80 151 58 7.04 7.04 7.04 7.04 7.04 1 0.04
A11 KAOHSIUNG 4 63 64 121 47 5.63 5.63 5.63 5.63 5.63 0 0
A12 PINGTUNG 3 48 48 91 35 4.23 4.23 4.23 4.23 4.23 0 0
A13 TAITUNG 3 48 48 91 35 4.23 4.23 4.23 4.23 4.23 0 0
A14 HUALIEN 5 79 80 151 58 7.04 7.04 7.04 7.04 7.04 0 0
A15 YILAN 4 63 64 121 47 5.63 5.63 5.63 5.63 5.63 0 0
Total 1125 1140 2150 830 100 100 100 100 100 2482 100
*

Epicenter.

Table 8

Proportional division of resources for 15 affected districts

In Figure 5, it can be seen that with the Shapley value allocation approach proposed in this study, the average distribution of resource rate is closer to the death rate of each district than the proportional division of resources. The results of this comparison support the idea of the proposed model, which creates a minimum set of resource allocation costs when the MAS confronts external attacks. The EOC rapidly commands all agents and efficiently mobilizes and redistributes SAR resources for seriously affected districts.

Figure 5

Comparison of our division and proportional division.

6. CONCLUSION

IDS, HSAS, and the emergency response system deploy multiple interacting agents to resist outside attackers. The resources of MAS are constrained for defending entire large-scale geographic regions. The emergency manager faces problems in agent resource deployment. The divide-and-conquer idea is utilized to improve the scalability of resource allocation. A two-stage model is proposed in this study to combine a non-cooperative game with a cooperative game to provide acceptable reallocation of resources for the MAS. The proposed model is applied to one strong earthquake attack case and is able to allocate resources efficiently in the overall system. Future work will design a computer-based decision-support system based on the proposed model. Real data will be applied and the feasibility of resource allocation from an organization’s emergency operational center point of view verified.

CONFLICTS OF INTEREST

The authors declare they have no conflicts of interest.

ACKNOWLEDGMENTS

The authors appreciate the time and effort of the editors and reviewers in providing constructive comments.

REFERENCES

[1]HW Lewis, Why flip a coin? The art and science of good decisions, John Wiley and Sons, New York, NY, 1997.
[2]A Dixit and S Skeath, Games of Strategy, W. W. Norton & Company, New York, NY, 2007.
[3]S Parsons and M Wooldridge, Game theory and decision theory in multi-agent systems, Autonom Agents Multiagent Syst, Vol. 5, 2002, pp. 243-54.
[7]G Weiss, Multiagent systems – a modern approach to distributed artificial intelligence, MIT Press, Cambridge, 1999.
[8]DA Burke, Towards a game theory model of information warfare, Air Force Institute of Technology, Air University, 1999. Master’s Thesis.
[9]P Paruchuri, JP Pearce, M Tambe, F Ordóñez, and S Kraus, An efficient heuristic approach for security against multiple adversaries, in International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (2007), pp. 311-318.
[12]MJ Osborne and A Rubinstein, A course in game theory, MIT Press, Cambridge, 1994.
[15]G Owen, Game theory, 3rd ed., Academic Press, New York, NY, 2003.
[17]R Gibbons, A primer in game theory, Pearson Higher Education, 1992.
[19]RW Perry, Emergency operations centers in an era of terrorism: policy and management functions, J Contingencies Crisis Manage, Vol. 11, 2003, pp. 151-9.
[20]YW Hsu, A study on response of fire department in earthquake - focusing on the 921 ‘Chi-Chi’ earthquake, Department of Fire Science, Central Police University, Taiwan, 2000. Master Thesis,
Journal
Journal of Risk Analysis and Crisis Response
Volume-Issue
9 - 3
Pages
134 - 144
Publication Date
2019/10/31
ISSN (Online)
2210-8505
ISSN (Print)
2210-8491
DOI
10.2991/jracr.k.191024.003How to use a DOI?
Copyright
© 2019 The Authors. Published by Atlantis Press SARL.
Open Access
This is an open access article distributed under the CC BY-NC 4.0 license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - JOUR
AU  - Cheng-Kuang Wu
AU  - Xingwei Hu
PY  - 2019
DA  - 2019/10/31
TI  - A Game Theory Approach for Multi-agent System Resources Allocation against Outside Threats
JO  - Journal of Risk Analysis and Crisis Response
SP  - 134
EP  - 144
VL  - 9
IS  - 3
SN  - 2210-8505
UR  - https://doi.org/10.2991/jracr.k.191024.003
DO  - 10.2991/jracr.k.191024.003
ID  - Wu2019
ER  -