A systematic review on the application of security game to strategic assets protection

Document Type : Original Article

Authors

1 Researcher at TDA/ACECR (Sharif University of Technology Branch). Tehran. Iran, Responsible

2 Associate Professor, Faculty at Industrial Engineering Department, University of Science and Culture, Tehran, Iran

3 Assistant professor, Faculty at TDA/ACECR (Sharif University of Technology Branch). Tehran. Iran

Abstract

Over the past two decades, especially after the events of September 11, 2001, the security game research area has been at the center of attention of researchers, and the scientific publications in this area have grown increasingly. The present study is done to examine the situation and science mapping of publications in security game research area, especially in the field of engineering,  and furthermore, intends to create an insight into this field for future research. The statistical population of this study is the journal papers written in English that have been published in the Scopus Scientific Database. In this study, for the first time in the field of systematic reviewing the security game literature, a bibliometric analysis approach has been used, adopting Bibexcel and Gephi software. Analytical results of the subject of co-citation network of highly cited references show that the problem of optimization of defensive resource allocation to the infrastructures and information and communication security are the main subject areas, which have been addressed in the examined papers. This suggests that, given the wide range of different types of strategic assets exposed to different types of threats, there is now much potential to address the security game in the field of engineering. Finally, after reviewing the content of the first cluster’s papers, which deals with the allocation optimization of defensive resources based on game theory approach, some suggestions for future research on the problem in the field of engineering are presented.

Keywords


  • الف. منابع فارسی

    • بیگدلی، حمید و طیبی، جواد (1396)، ارائه یک الگو و روش حل بازی های امنیتی فازی و کاربرد آن در آینده پژوهی تهدیدات امنیتی، آینده پژوهی دفاعی، 2(6)، ص 7–29.
    • خاتمی، سیدمهدی و انوشه، ابراهیم (1398)، تحلیل منازعه ایران و رژیم صهیونیستی در زمینه برنامه هسته ای ایران با استفاده از نظریه بازی ها، آینده پژوهی دفاعی، 4(13)، ص 7–39
    • رحالگو، ناصر؛ کامکار، مهدی و یزدانیان، حمید (1399)، ویژگی های دفاع دانش بنیان از منظر مقام معظم رهبری، فصلنامه علمی مطالعات مدیریت راهبردی دفاع ملی، 4(13)، ص 297–
    • شورای عالی علوم تحقیقات و فناوری (1396)، سیاست ها و اولویت های پژوهش و فناوری کشور در بازه زمانی 96 تا 1400. ایران.
    • کلانتری، فتح الله، (1398)، مدیریت جنگ احتمالی آینده با توجه به روندها و پیشران های موجود، فصلنامه علمی مدیریت راهبردی دفاع ملی، 3(12)، ص 245–
    • عبادی زاده، حجت الله، (1398)، شبیه سازی ریاضی تعاملات و راهبرد‏های جمهوری اسلامی ایران و عربستان سعودی به کمک نظریه بازی‏ها، فصلنامه علمی مطالعات بین رشته ای دانش راهبردی، 9(35)، ص 35–
    • متقی، افشین، کاویانی، مراد و نجفی، سجاد، (1394)، رابطه امنیت زیست محیطی با امنیت ملی، فصلنامه مجلس و راهبرد، 22(83)، ص 75-100.
    • محمدپور، مطهره و دشتی، سولماز (1397)، شبیه سازی و پهنه بندی گسترش آتش سوزی در اکوسیستم جنگل به کمک الگو FARSITE (مطالعه موردی: جنگل های استان ایلام)، جغرافیا و مخاطرات محیطی، 32، ص 87–

     

    ب. منابع انگلیسی

    • Abbasi, Y. (2016). Modeling Human Bounded Rationality in Opportunistic Security Games (Doctoral dissertation). University of Southern California.
    • All Nobel Prizes. (n.d.). https://www.nobelprize.org/prizes/lists/all-nobel-prizes/
    • Alpas, H., Berkowicz, S. M., & Ermakova, I. (Eds.). (2011). Environmental Security and Ecoterorrism. Springer.
    • Axelsson, J. (2019). Game theory applications in systems-of-systems engineering: A literature review and synthesis. Procedia Computer Science, 153, 154–165. https://doi.org/10.1016/j.procs.2019.05.066
    • Basak, A., Fang, F., Nguyen, T. H., & Kiekintveld, C. (2016). Abstraction methods for solving graph-based security games. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10003 LNAI, 13–33. https://doi.org/10.1007/978-3-319-46840-2_2
    • Basar, T. (2010). Lecture Notes on Game Theory. Game Theory Module of the Graduate Program in Network Mathematics, 3–6.
    • Ben Yaghlane, A., & Azaiez, M. N. (2017). Systems under attack-survivability rather than reliability: Concept, results, and applications. European Journal of Operational Research, 258(3), 1156–1164. https://doi.org/10.1016/j.ejor.2016.09.041
    • Bier, V. M., Cox, L. A., & Azaiez, M. N. (2009). Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks. In Game theoretic risk analysis of security threats (pp. 1-11 TS-CrossRef). https://doi.org/10.1007/978-0-387-87767-9_1
    • Bricha, N., & Nourelfath, M. (2013). Critical supply network protection against intentional attacks: A game-theoretical model. Reliability Engineering and System Safety, 119, 1–10. https://doi.org/10.1016/j.ress.2013.05.001
    • Casorrán-Amilburu, C. (2017). Formulations and Algorithms for General and Security Stackelberg Games (Doctoral dessertation). Université libre de Bruxelles.
    • Catharina, R., Gortnitzki, C., Larsson, A., & Wadskog, D. (2014). Bibliometric Handbook for Karolinska Institutet. Research Evaluation, 41. https://doi.org/10.1093/reseval/rvt018
    • Chengcheng, H., & Xiagwei, Q. (2020). A review of games and resource allocation algorithms oriented public security. In 2020 International Conference on Computer Engineering and Application (ICCEA), IEEE, 373–378.
    • Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011). Science mapping software tools: Review, analysis, and cooperative study among tools. Journal of the American Society for Information Science and Technology, 62(7), 1382–1402. https://doi.org/10.1002/asi.21525
    • (2020). Scopus Content Coverage Guide. https://www.elsevier.com/__data/assets/pdf_file/0017/114533/Scopus_GlobalResearch_Factsheet2019_FINAL_WEB.pdf
    • Fahimnia, B., Tang, C. S., Davarzani, H., & Sarkis, J. (2015). Quantitative models for managing supply chain risks: A review. European Journal of Operational Research, 247(1), 1–15. https://doi.org/10.1016/j.ejor.2015.04.034
    • Fakoorian, S. A. A., & Swindlehurst, A. L. (2013). Competing for secrecy in the MISO interference channel. IEEE Transactions on Signal Processing, 61(1), 170–181. https://doi.org/10.1109/TSP.2012.2223689
    • Fang, F., & Nguyen, T. (2016). Green security games: apply game theory to addressing green security challenges. ACM SIGecom Exchanges, 15(1), 78–83. https://doi.org/10.1145/2994501.2994507
    • Farooqui, A. D., & Niazi, M. A. (2016). Game theory models for communication between agents: a review. In Complex Adaptive Systems Modeling (Vol. 4, Issue 1). Springer Berlin Heidelberg. https://doi.org/10.1186/s40294-016-0026-7
    • Fujiwara-Greve, T. (2015). Non-Cooperative Game Theory. Springer.
    • Gatmiry, Z. S., Hafezalkotob, A., Khakzar bafruei, M., & Soltani, R. (2021). Food web conservation vs. strategic threats: A security game approach. Ecological Modelling, 442(May 2020), 109426. https://doi.org/10.1016/j.ecolmodel.2021.109426
    • Grigoryan, G., & Collins, A. J. (2021). Game theory for systems engineering: A survey. International Journal of System of Systems Engineering, 11(2), 121–158. https://doi.org/10.1504/IJSSE.2021.116044
    • Hao, M., Jin, S., & Zhuang, J. (2009). Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker. IIE Annual Conference, 886–891.
    • Hausken, K. (2013). Combined series and parallel systems subject to individual versus overarching defense and attack. Asia-Pacific Journal of Operational Research, 30(2). https://doi.org/10.1142/S021759591250056X
    • Hausken, K. (2014). Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain. Operations Research and Decisions, 24(3), 23–44. https://doi.org/10.5277/ord140302
    • Hausken, K. (2017a). Defense and attack for interdependent systems. European Journal of Operational Research, 256(2), 582–591. https://doi.org/10.1016/j.ejor.2016.06.033
    • Hausken, K. (2017b). Special versus general protection and attack of parallel and series components. Reliability Engineering and System Safety, 165(August 2016), 239–256. https://doi.org/10.1016/j.ress.2017.03.027
    • Hausken, K. (2019). Defence and attack of complex interdependent systems. Journal of the Operational Research Society, 70(3), 364–376. https://doi.org/10.1080/01605682.2018.1438763
    • Hausken, K., & Levitin, G. (2012). Review of systems defense and attack models. International Journal of Performability Engineering, 8(4), 355–366.
    • Jacomy, M., Venturini, T., Heymann, S., & Bastian, M. (2014). ForceAtlas2, a continuous graph layout algorithm for handy network visualization designed for the Gephi software. PLoS ONE, 9(6), 1–12. https://doi.org/10.1371/journal.pone.0098679
    • Jain, M., An, B., & Tambe, M. (2013). Security Games Applied to Real-World: Research Contributions and Challenges. In X. S. Wang (Ed.), Moving Target Defense II:Application of Game Theory and Adversarial Modeling (Vol. 100, pp. 15–39). Springer New York.
    • Jiang, G., Shen, S., Hu, K., Huang, L., Li, H., & Han, R. (2015). Evolutionary game-based secrecy rate adaptation in wireless sensor networks. International Journal of Distributed Sensor Networks, 2015. https://doi.org/10.1155/2015/975454
    • Kar, D., Nguyen, T. H., Fang, F., Brown, M., Sinha, A., Tambe, M., & Jiang, A. X. (2018). Trends and applications in stackelberg security games. Handbook of Dynamic Game Theory, 1223–1269. https://doi.org/10.1007/978-3-319-44374-4_27
    • Kovenock, D., & Roberson, B. (2012). Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment. Defence and Peace Economics, 23(5), 517–519. https://doi.org/10.1080/10242694.2012.660606
    • Li, Y., Shi, L., Cheng, P., Chen, J., & Quevedo, D. E. (2015). Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach. IEEE Transactions on Automatic Control, 60(10), 2831–2836. https://doi.org/10.1109/TAC.2015.2461851
    • Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys and Tutorials, 15(1), 472–486. https://doi.org/10.1109/SURV.2012.062612.00056
    • Lins, I. D., Rêgo, L. C., Moura, M. D. C., & Droguett, E. L. (2013). Selection of security system design via games of imperfect information and multi-objective genetic algorithm. Reliability Engineering and System Safety, 112, 59–66. https://doi.org/10.1016/j.ress.2012.11.021
    • Manshaei, M. H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J. P. (2013). Game theory meets network security and privacy. In ACM Computing Surveys (Vol. 45, Issue 3). https://doi.org/10.1145/2480741.2480742
    • McCarthy, S., Tambe, M., Kiekintveld, C., Gore, M. L., & Killion, A. (2016). Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security. Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 3880–3886. http://dl.acm.org/citation.cfm?id=3016450
    • Mo, H., Xie, M., & Levitin, G. (2015). Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks. European Journal of Operational Research, 243(1), 200–210. https://doi.org/10.1016/j.ejor.2014.12.006
    • Mukherjee, A., Fakoorian, S. A. A., Huang, J., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(3), 1550–1573. https://doi.org/10.1109/SURV.2014.012314.00178
    • Neumann, V., & Morgenstern, O. (1944). Theory of Games and Economic Behavior.
    • Nikoofal, M. E., & Zhuang, J. (2012). Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information. Risk Analysis, 32(5), 930–943. https://doi.org/10.1111/j.1539-6924.2011.01702.x
    • Rahman, M. A., Manshaei, M. H., Al-Shaer, E., & Shehab, M. (2017). Secure and private data aggregation for energy consumption scheduling in smart grids. IEEE Transactions on Dependable and Secure Computing, 14(2), 221–234. https://doi.org/10.1109/TDSC.2015.2446492
    • Rao, N. S. V., Ma, C. Y. T., Hausken, K., He, F., & Zhuang, J. (2016). Defense strategies for infrastructures with multiple systems of components. FUSION 2016 - 19th International Conference on Information Fusion, Proceedings, October, 270–277.
    • Reniers, G. L. L. (2012). Security of multimodal hazmat transports: Empirical findings and future directions. International Journal of Safety and Security Engineering, 2(1), 69–79. https://doi.org/10.2495/SAFE-V2-N1-69-79
    • Sanchez-Soriano, J. (2013). An overview on game theory applications to engineering. International Game Theory Review, 15(3), 1–18. https://doi.org/10.1142/S0219198913400197
    • Sandler, T., & Arce, D. G. M. (2003). Terrorism & game theory. Simulation and Gaming, 34(3), 319–337. https://doi.org/10.1177/1046878103255492
    • Seaberg, D., Devine, L., & Zhuang, J. (2017). A review of game theory applications in natural disaster management research. Natural Hazards, 89(3), 1461–1483. https://doi.org/10.1007/s11069-017-3033-x
    • Shan, X., & Zhuang, J. (2013). Cost of equity in homeland security resource allocation in the face of a strategic attacker. Risk Analysis, 33(6), 1083–1099. https://doi.org/10.1111/j.1539-6924.2012.01919.x
    • Stanojev, I., & Yener, A. (2013). Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Transactions on Wireless Communications, 12(1), 134–145. https://doi.org/10.1109/TWC.2012.120412.112001
    • Talarico, L., Reniers, G., Sörensen, K., & Springael, J. (2015). MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries. Reliability Engineering and System Safety, 138, 105–114. https://doi.org/10.1016/j.ress.2015.01.022
    • Tambe, M. (2012). Security and Game Theory. In cambridge university press.
    • Tang, L., Gong, X., Wu, J., & Zhang, J. (2013). Target detection in bistatic radar networks: Node placement and repeated security game. IEEE Transactions on Wireless Communications, 12(3), 1279–1289. https://doi.org/10.1109/TWC.2013.011713.120892
    • Thomé, A. M. T., Scavarda, L. F., & Scavarda, A. J. (2016). Conducting systematic literature review in operations management. Production Planning and Control, 27(5), 408–420. https://doi.org/10.1080/09537287.2015.1129464
    • Trejo, K. K., Clempner, J. B., & Poznyak, A. S. (2015). A Stackelberg security game with random strategies based on the extraproximal theoretic approach. Engineering Applications of Artificial Intelligence, 37, 145–153. https://doi.org/10.1016/j.engappai.2014.09.002
    • Wang, L., Ren, S., Korel, B., Kwiat, K. A., & Salerno, E. (2014). Improving system reliability against rational attacks under given resources. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 44(4), 446–456. https://doi.org/10.1109/TSMC.2013.2263126
    • Wang, Y., Wang, Y., Liu, J., Huang, Z., & Xie, P. (2017). A survey of game theoretic methods for cyber security. Proceedings - 2016 IEEE 1st International Conference on Data Science in Cyberspace, DSC 2016, 631–636. https://doi.org/10.1109/DSC.2016.90
    • Wilczyński, A., Jakóbik, A., & Kołodziej, J. (2016). Stackelberg security games: Models, applications and computational aspects. Journal of Telecommunications and Information Technology, 2016(3), 70–79.
    • Wu, Y., Wang, B., Liu, K. J. R., & Clancy, T. C. (2012). Anti-jamming games in multi-channel cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(1), 4–15.
    • Zagare, F. C. (2019). Game Theory and Security Studies. In Game Theory, Diplomatic History and Security Studies (Issue January, pp. 7–24). Oxford University Press. https://doi.org/10.1093/oso/9780198831587.003.0002

    Zhang, H., Wang, T., Song, L., & Han, Z. (2016). Interference Improves PHY Security for Cognitive Radio Networks. IEEE Transactions on Information Forensics and Security, 11(3), 609–620. https://doi.org/10.1109/TIFS.2015.2500184.