Intelligent Patrolling Sarit Kraus Department of Computer Science Bar-Ilan University Collaborators: Noa Agmon, Gal Kaminka, Efrat Sless 1.

Slides:



Advertisements
Similar presentations
N. Basilico, N. Gatti, F. Amigoni DEI, Politecnico di Milano Leader-Follower Strategies for Robotic Patrolling in Environments with Arbitrary Topology.
Advertisements

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Finding the Optimal Strategies in Robotic Patrolling with Adversaries in Topologically-Represented.
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
NUS CS5247 Motion Planning for Car- like Robots using a Probabilistic Learning Approach --P. Svestka, M.H. Overmars. Int. J. Robotics Research, 16: ,
1 University of Southern California Keep the Adversary Guessing: Agent Security by Policy Randomization Praveen Paruchuri University of Southern California.
Randomized Sensing in Adversarial Environments Andreas Krause Joint work with Daniel Golovin and Alex Roper International Joint Conference on Artificial.
MULTI-ROBOT SYSTEMS Maria Gini (work with Elizabeth Jensen, Julio Godoy, Ernesto Nunes, abd James Parker,) Department of Computer Science and Engineering.
Multi Robot Systems Course Bar Ilan University Mor Vered.
Artificial Intelligence in Real Time Strategy Games Dan Li.
Meta-Level Control in Multi-Agent Systems Anita Raja and Victor Lesser Department of Computer Science University of Massachusetts Amherst, MA
NUS CS5247 Motion Planning for Camera Movements in Virtual Environments By Dennis Nieuwenhuisen and Mark H. Overmars In Proc. IEEE Int. Conf. on Robotics.
Bart Jansen, University of Utrecht.  Problem background  Geometrical problem statement  Research  Experimental evaluation of heuristics ◦ Heuristics.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security via Strategic Randomization Milind Tambe Fernando Ordonez Praveen Paruchuri Sarit Kraus (Bar Ilan, Israel) Jonathan Pearce, Jansuz Marecki James.
SB Research Presentation – 12/2/05 Finding Rectilinear Least Cost Paths in the Presence of Convex Polygonal Congested Regions # Avijit Sarkar School of.
Applications: Special Case of Security Games. Given a team of robots, how should they plan their patrol paths along time to optimize some objective function?
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
1 PHA*:Performing A* in Unknown Physical Environments Ariel Felner Bar-Ilan University. Joint work with Roni Stern and Sarit Kraus.
B.Tech. Project Presentation Intercepting a Moving Target in Road Networks by Prateek Khatri Under the guidance of Prof. N. L. Sarda.
1 University of Southern California Security in Multiagent Systems by Policy Randomization Praveen Paruchuri, Milind Tambe, Fernando Ordonez University.
1 University of Southern California Increasing Security through Communication and Policy Randomization in Multiagent Systems Praveen Paruchuri, Milind.
Sarit Kraus Bar-Ilan University
Commitment without Regrets: Online Learning in Stackelberg Security Games Nika Haghtalab Carnegie Mellon University Joint work with Maria-Florina Balcan,
A Study of Computational and Human Strategies in Revelation Games 1 Noam Peled, 2 Kobi Gal, 1 Sarit Kraus 1 Bar-Ilan university, Israel. 2 Ben-Gurion university,
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
1 DARPA TMR Program Collaborative Mobile Robots for High-Risk Urban Missions Second Quarterly IPR Meeting January 13, 1999 P. I.s: Leonidas J. Guibas and.
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
Distributed Systems 15. Multiagent systems and swarms Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2014/2015.
When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Mobile Robotics Laboratory Institute of Systems and Robotics ISR – Coimbra 3D Hand Trajectory Segmentation by Curvatures and Hand Orientation for Classification.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
DARPA TMR Program Collaborative Mobile Robots for High-Risk Urban Missions Third Quarterly IPR Meeting May 11, 1999 P. I.s: Leonidas J. Guibas and Jean-Claude.
CS 4630: Intelligent Robotics and Perception Case Study: Motor Schema-based Design Chapter 5 Tucker Balch.
Automated Agents that Interact Proficiently with People Sarit Kraus Bar-Ilan University
Game-Theoretic Analysis of Mobile Network Coverage David K.Y. Yau.
Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011.
On Delaying Collision Checking in PRM Planning – Application to Multi-Robot Coordination By: Gildardo Sanchez and Jean-Claude Latombe Presented by: Michael.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets Lynne E. Parker Autonomous Robots, 2002 Yousuf Ahmad Distributed Information.
Robotics Club: 5:30 this evening
Sensors and Control Applications 7 Rivers Robotics Coalition December, 2015 D. Foye.
Audit Games Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha 1 Carnegie Mellon University.
Identifying and Analyzing Patterns of Evasion HM Investigator: Shashi Shekhar (U Minnesota) Collaborators: Renee Laubscher, James Kang Kickoff.
Visual Tracking by Cluster Analysis Arthur Pece Department of Computer Science University of Copenhagen
Path Planning Based on Ant Colony Algorithm and Distributed Local Navigation for Multi-Robot Systems International Conference on Mechatronics and Automation.
Learning for Physically Diverse Robot Teams Robot Teams - Chapter 7 CS8803 Autonomous Multi-Robot Systems 10/3/02.
CS382 Introduction to Artificial Intelligence Lecture 1: The Foundations of AI and Intelligent Agents 24 January 2012 Instructor: Kostas Bekris Computer.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
Keep the Adversary Guessing: Agent Security by Policy Randomization
SENSOR FUSION LAB RESEARCH ACTIVITIES PART II: SIGNAL/IMAGE PROCESSING AND NETWORKING Sensor Fusion Lab, Department of Electrical Engineering and.
CS b659: Intelligent Robotics
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security Fang et al.
When Security Games Go Green
Dude, where’s that IP? Circumventing measurement-based geolocation
Athith Amarnath, graduate Student Database and Security Research Group
Presenter: Solomon Ayalew
Navigation In Dynamic Environment
Research Challenges of Autonomic Computing
CSE 4705 Artificial Intelligence
Coverage and Connectivity in Sensor Networks
Day 29 Bug Algorithms 12/7/2018.
Day 29 Bug Algorithms 12/8/2018.
Aiman H. El-Maleh Sadiq M. Sait Syed Z. Shazli
Ship Patrol: Multiagent Patrol under Complex Environmental Conditions
We guarantee robust, maximal, uniform frequency in multi-robot patrol
Presentation transcript:

Intelligent Patrolling Sarit Kraus Department of Computer Science Bar-Ilan University Collaborators: Noa Agmon, Gal Kaminka, Efrat Sless 1

2 Physical Security with Bounded Resources Limited security resources prevent full security coverage at all times; allows adversaries to observe and exploit patterns in selective patrolling or monitoring. Randomized patrolling or monitoring is necessary.

3 Randomized Checkpoints

Multi-Robot Adversarial Patrol Motivation: High security facilities Large military bases Neighborhood watch 4

Protecting a Parade: route is announced 5

Protecting a Moving Target: randomizing the route 6

Why Do We Need Automated Methods for Randomization? People are not good at randomization The randomized strategy should depend on: o the adversary and the defenders’ utilities o the environment parameters o the defender’s resources. 7

8 Multi-Robot Adversarial Patrol: The Environment Perimeter o Divided into segments o Uniform time-distance o Robot travels through one segment per time unit Adversary o Tries to penetrate through the perimeter o Takes t>0 time units to penetrate

9 Robotic Model k homogenous robots Robotic movement model: o Robots’ movement is directed o Turning around “costs” τ time units

10 Algorithm Framework Patrol algorithm: o Continue straight with probability p o Turn around with probability 1-p PPD: Probability of Penetration Detection p depends on the distance between robots and on the penetration time.

11 Robot Movement Optimal: Robots are uniformly placed around the perimeter Coordinated o If decide to turn around they do it simultaneously o Preserve uniform distance

12 Optimal: Robots are uniformly placed around the perimeter Coordinated – If decide to turn around they do it simultaneously – Preserve uniform distance Robot Movement

13 Optimal: Robots are uniformly placed around the perimeter Coordinated – If decide to turn around they do it simultaneously – Preserve uniform distance Robot Movement

14 Optimal: Robots are uniformly placed around the perimeter Coordinated – If decide to turn around they do it simultaneously – Preserve uniform distance Robot Movement

Handling Events What if a robot needs to inspect the penetration? Once a penetration is detected, one robot is extracted from the team to inspect it Coordinated attacks are beneficial to the adversary 15

What Happens If Penetration Detected? 16

What Happens If Penetration Detected? Robot that detected the penetration will inspect it Other k-1 robots will spread uniformly o To achieve optimal behavior for k-1 robots Phase 1: k robots (before event), steady state Phase 2: Reorganization Phase 3: k-1 robots (after event), steady state Optimal patrol known 17

Naïve Approach Deterministic: Each robot goes straight to its final position 18

Randomized Reorganization Challenges: o each robot needs to move differently o How much time to spend on the reorganization? We randomized over possible paths Finding the strategy is complex, in theory, but we used heuristics to find it in reasonable time 19

20 Physical Security with Bounded Resources: Summary Randomized patrolling or monitoring is necessary. Automated randomization is important Interesting problems?