Allocation of forces on Iran's land borders in case of neighbor attack using fuzzy security games

Document Type : Original Article

Authors

1 Researcher of Imam Ali Afsari University.Tehran.Iran

2 Assistant Professor at Imam Ali Officers University, Tehran, Iran.

Abstract

Establishing security in the different borders of the country is one of the most important priorities of the military forces, especially the ground forces. In this article, the security games between a defender and several attackers are investigated and the players' preferences and how to calculate them are described. To solve the problem of the uncertainty of the defender to face the unknown type of attacker, the Bayesian game approach is used. and in order to solve the problem of uncertainty caused by the ambiguity in the understanding of experts and their imprecise judgment, the phase theory has been used as a practical example of this type of games in creating security at land borders, and the model of this problem is expressed as a game. multi-objective security has been investigated, for this purpose we have investigated the movements and actions of the Republic of Azerbaijan in the region and to prevent this country from attacking the common land borders of Iran and Azerbaijan, the appropriate allocation and coverage of four bordering provinces (Gilan, Ardabil) , West Azerbaijan and East Azerbaijan) by the ground units in the operational area. Finally, it can be concluded that many complex military issues can be investigated using security games and the model of its optimal solution can be designed.

Keywords

Main Subjects


[1]  Sakawa, M. (1993). ‎ ‎ Fuzzy sets and interactive multiobjective optimization, Plenum press, New York and london.
[2] Tambe, M. (2012). ‎ ‎ Security and game theory, algorithms, deployed systems, lessons learned, Cambridge university press‎ .
[3] Bigdeli, H. & Hassanpour, H. (2018). Modeling and solving multiobjective security game problem using multiobjective bilevel problem and its application in metro security system.
[4] Bazaraa, M.S. & ‎ Jarvis J.J. (1997). ‎ ‎ ‎ Linear Programming and Network Flows, John Wiley & Sons‎ , ‎ Inc: ‎ NewYork ‎ .
[5] An, B. Tambe, M. Ordonez, F. & Shieh, E. (2011). Refinement of Strong Stackelberg Equilibria in Security Games, Association for the Advancement of Artificial Intelligence.
[6] Neumann, J ‎. ‎ V‎ . &‎ ‎ Morgenstern, ‎ O‎ . (1944). Theory of Games and Economic Behavior, Wiley‎ , ‎ New York.
[7] Sakawa, M. & Nishizaki, I. (2009). ‎ ‎ Cooperative and Noncooperative Multi-Level Programming, Springer, New York and london.
[8] Sandler, T. & D. G. A. M. (2003). ‎ ‎ Terrorism and Game Theory, Simulation and Gaming, 34 (3): 319–337.