Please use this identifier to cite or link to this item: https://doi.org/10.1109/TIFS.2009.2026459
Title: Adversary aware surveillance systems
Authors: Singh, V.K.
Kankanhalli, M.S. 
Keywords: Adversary modeling
Game theory
Scenario engineering
Surveillance
Issue Date: 2009
Citation: Singh, V.K., Kankanhalli, M.S. (2009). Adversary aware surveillance systems. IEEE Transactions on Information Forensics and Security 4 (3) : 552-563. ScholarBank@NUS Repository. https://doi.org/10.1109/TIFS.2009.2026459
Abstract: We consider surveillance problems to be a set of system-adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his utility. We feel that appropriate adversary modeling can provide deep insights into the system performance and also clues for optimizing the system's performance against the adversary. Further, we propose that system designers should exploit the fact that they can impose certain restrictions on the intruders and the way they interact with the system. The system designers can analyze the scenario to determine conditions under which system outperforms the adversaries, and then suitably reengineer the environment under a scenario engineering approach to help the system outperform the adversary. We study the proposed enhancements using a game theoretic framework and present results of their adaptation to two significantly different surveillance scenarios. While the precise enforcements for the studied zero-sum ATM lobby monitoring scenario and the nonzero-sum traffic monitoring scenario were different, they lead to some useful generic guidelines for surveillance system designers. © 2006 IEEE.
Source Title: IEEE Transactions on Information Forensics and Security
URI: http://scholarbank.nus.edu.sg/handle/10635/39515
ISSN: 15566013
DOI: 10.1109/TIFS.2009.2026459
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.