Next Article in Journal
State Estimation Using Dependent Evidence Fusion: Application to Acoustic Resonance-Based Liquid Level Measurement
Next Article in Special Issue
A Weighted Belief Entropy-Based Uncertainty Measure for Multi-Sensor Data Fusion
Previous Article in Journal
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks
Previous Article in Special Issue
Sensing Attribute Weights: A Novel Basic Belief Assignment Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Zero-Sum Matrix Game with Payoffs of Dempster-Shafer Belief Structures and Its Applications on Sensors

School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
*
Authors to whom correspondence should be addressed.
Sensors 2017, 17(4), 922; https://doi.org/10.3390/s17040922
Submission received: 16 January 2017 / Revised: 13 April 2017 / Accepted: 19 April 2017 / Published: 21 April 2017
(This article belongs to the Special Issue Soft Sensors and Intelligent Algorithms for Data Fusion)

Abstract

:
The zero-sum matrix game is one of the most classic game models, and it is widely used in many scientific and engineering fields. In the real world, due to the complexity of the decision-making environment, sometimes the payoffs received by players may be inexact or uncertain, which requires that the model of matrix games has the ability to represent and deal with imprecise payoffs. To meet such a requirement, this paper develops a zero-sum matrix game model with Dempster–Shafer belief structure payoffs, which effectively represents the ambiguity involved in payoffs of a game. Then, a decomposition method is proposed to calculate the value of such a game, which is also expressed with belief structures. Moreover, for the possible computation-intensive issue in the proposed decomposition method, as an alternative solution, a Monte Carlo simulation approach is presented, as well. Finally, the proposed zero-sum matrix games with payoffs of Dempster–Shafer belief structures is illustratively applied to the sensor selection and intrusion detection of sensor networks, which shows its effectiveness and application process.

1. Introduction

Uncertainty extensively exists in numerous scientific and engineering fields. Among a variety of fundamental problems related to uncertainty, how to express the uncertain information is one of the first issues. Usually, uncertainty contains randomness, fuzziness, ambiguity, and so on. From the perspective of semantics or linguistics, Klir and Yuan [1] have identified three basic types: fuzziness, discord and non-specificity, where fuzziness stands for the unclearness or indistinctness about objects’ characters, discord in the conflict or randomness to an object and non-specificity in the diversity of possible results. The discord and non-specificity are unified as ambiguity [2]. Probability theory, fuzzy set [3], rough set [4], Dempster–Shafer evidence theory [5,6] and the maximum-entropy approach [7,8], to name but a few [9], are some of representative theories or approaches to deal with uncertain information. Especially, due to providing feasible ways to represent and synthesize uncertain information, Dempster–Shafer evidence theory has attracted increasing interest in many fields, such as surveillance [10], intrusion detection [11], etc. As attempts to improve conventional Dempster–Shafer evidence theory, generalized evidence theory [12] and D numbers [13,14,15,16,17,18] have also received researchers’ attention recently. Among them, the model of D numbers, which generalizes belief structures, is a relatively novel means to represent uncertain information by overcoming the exclusiveness hypothesis and completeness constraint in Dempster-Shafer theory.
Apart from uncertainty, which depicts the essential characteristic of information, things are universally interrelated and interact with each other. The interactive relationship among things or objects, either competitive or cooperative, arises in countless types of fields. Game theory gives a mathematical framework to study the interactions among related individuals in interactive decision situations where the aims, goals and preferences of the participating agents are potentially in conflict [19,20,21] and has achieved great success in multiple of disciplines and fields [22,23,24,25,26]. As a game model representing the most conflicting and competitive relationship, the two-person zero-sum game models the case where players’ interests are completely opposed [27]. As a special case of that game, the two-person zero-sum matrix game, short for the matrix game representing a pervasive interactive relationship, has been addressed since von Neumann and Morgenstern [28] published their seminal book Theory of Games and Economic Behavior.
Usually, in a matrix game, payoffs are in the form of crisp values representing utilities received by players. However, as mentioned above, uncertainty widely exists, which may result in the difficulty to obtain deterministic payoffs. Instead, uncertain or imprecise payoffs in matrix games are more universal and practical in reality, since it is unavoidable in most cases to involve subjective or objective uncertainty caused by many reasons in constructing the payoff matrix of a matrix game. Therefore, investigation of matrix games with imprecise or uncertain payoffs is very important and of great significance [29]. In previous studies, zero-sum matrix games with payoffs of interval-valued [30,31,32,33,34], or fuzzy data [35,36,37,38], or rough sets [39], or intuitionistic fuzzy sets [40,41,42], or interval-valued intuitionistic fuzzy sets [43] have been given much attention. In addition, other forms of payoff matrices, such as ones with fuzzy random variables [44] or lattice values [45], have also received some attention.
Compared with the rich studies on interval- or fuzzy-based matrix games, imprecise matrix games with payoffs involving the uncertainty of ambiguity (i.e., discord and non-specificity) have been given less attention. Existing representative studies are included in [46,47,48], where Dempster–Shafer evidence theory is employed to express ambiguity. In most cases, payoffs are on the basis of linguistic variables or assessments. For example, in [46,47], the initial payoffs are all in the form of categorical variable-based belief structures, where the involved categorical variables represent the ordered levels of reflecting the consequences of players’ actions. When dealing with the game consisting such payoffs, the payoffs are transformed into expected utility intervals based on each categorical variable’s utility function; in the process, the original ambiguity has been changed to the interval uncertainty. What is more, in [48], the payoffs have been directly transformed to crisp numbers that do not contain uncertainty. In contrast, this paper immediately studies the games with ambiguity based on conventional numerical payoffs, but does not need to utilize additionally utility functions transforming categorical assessment levels to real numbers. In order to implement the goal, the Dempster–Shafer belief structure defined on the real line is used to represent this kind of uncertain payoff. As a result, a zero-sum matrix game with payoffs of Dempster–Shafer belief structures is constructed. Within the paper, a decomposition method is proposed to solve the game. The obtained value of this game is still in the form of belief structures, which maintains the consistency between the payoff matrix and the value of the game. Besides, an alternative solution to solve the game is presented in the paper to overcome the possible issue of high computational complexity caused by the decomposition method. Finally, this novel game model is illustratively applied to the sensor selection and intrusion detection of sensor networks to show its potential applications and effectiveness.
The rest of the paper is organized as follows. Section 2 gives a brief introduction about Dempster–Shafer evidence theory and belief structures defined on the real line. Section 3 gives the formal representation of a two-person zero-sum matrix game and its extension of Dempster–Shafer belief structures. Then, the method to solve the game is proposed in Section 4, and a Monte Carlo-based alternative solution is presented in Section 5. Section 6 gives the applications of the proposed model and method in the sensor selection and intrusion detection of sensor networks. At last, Section 7 concludes this paper.

2. Preliminaries

2.1. Basics of Dempster-Shafer Evidence Theory

Dempster–Shafer evidence theory [5,6], also called Dempster–Shafer (D-S) theory or evidence theory, is a popular theory to deal with uncertain information [49,50,51,52,53,54,55,56]. Having a similar effect of aggregating operators [57,58,59,60] and as the counterpart of the probability-based approaches [61,62,63], such as composite hypothesis testing, Bayesian approaches and the maximum entropy approach, D-S theory is another widely-used framework for multi-sensor information fusion [64,65,66,67,68,69,70]. Compared with traditional probability theory, this theory has the advantage of directly expressing the “uncertainty” by assigning the probability to the set composed of multiple objects; it therefore has attracted increasing interest in uncertainty reasoning and modeling.
In D-S theory, the uncertainty is modeled by belief structures. A belief structure is formally expressed by a mapping m : 2 Ω [ 0 , 1 ] , such that:
m ( ) = 0 a n d A 2 Ω m ( A ) = 1 ,
where Ω is called the frame of discernment, which is a finite nonempty set, 2 Ω denotes the power set of Ω and set A with m ( A ) > 0 is called a focal element. A belief structure is also called a mass function or a basic probability assignment (BPA). The belief measure and plausibility measure, denoted as B e l and P l , respectively, are two important measures associated with the belief structure; they are defined by:
B e l ( A ) = B A m ( B ) ,
and:
P l ( A ) = 1 B e l ( A ¯ ) = B A m ( B ) ,
where A ¯ = Ω A . For every A Ω , B e l ( A ) P r o b ( A ) P l ( A ) is satisfied. The measures B e l and P l quantify the lower limit and upper limit of the support to focal element A, respectively.

2.2. D-S Belief Structures Defined on the Real Line

In most cases, a D-S belief structure is defined over a discrete nonempty set. Some pioneering researchers have investigated the case where the focal elements of belief structures are closed intervals, which leads to an extension of D-S theory to the real line [ , + ] . Please refer to [71,72,73] for more details. A D-S belief structure defined on the real line has the form:
i m ( F i ) = 1 , F i = [ a i , b i ] [ , + ]
where F i is the focal element of belief structure m.
Given a D-S belief structure defined on the real line, Yager [71] has presented an approach to construct its cumulative distribution function (CDF). The CDF has graphically shown the lower and upper distributions of the associated belief structure. Let L x be a subset of R whose elements are less than or equal to x, namely L x = { z | z x } , the CDF of a belief structure m, denoted as C D F m ( x ) , is C D F m ( x ) = [ B e l m ( L x ) , P l m ( L x ) ] , satisfying:
B e l m ( L x ) = i , F i L x m ( F i ) = i , b i x m ( F i ) ,
P l m ( L x ) = i , F i L x m ( F i ) = i , a i x m ( F i ) .
For simplicity, the low distribution calculated by B e l m ( L x ) is called B-CDF; the upper distribution calculated by P l m ( L x ) is called P-CDF. An example of a belief structure’s CDF is given in Figure 1, in which the associated belief structure is m ( [ 0 , 3 ] ) = 0.2 , m ( [ 3 , 6 ] ) = 0.3 , m ( [ 5 , 8 ] ) = 0.2 , m ( [ 7 , 9 ] ) = 0.2 , m ( [ 8 , 10 ] ) = 0.1 .

3. Two-Person Zero-Sum Matrix Game and Its Extension of D-S Belief Structures

In a two-person zero-sum matrix game, there are two players; each has a finite number of strategies to select in each play of the game. Assume that S 1 = { δ 1 , δ 2 , , δ p } and S 2 = { σ 1 , σ 2 , , σ q } are the sets of pure strategies for Players 1 and 2. The vectors x = ( x 1 , x 2 , , x p ) and y = ( y 1 , y 2 , , y q ) are known as the mixed strategies of Players 1 and 2, respectively, where i = 1 p x i = 1 , x i 0 , and j = 1 q y j = 1 , y j 0 .
The classical zero-sum matrix game is based on a deterministic payoff matrix. Let the payoff matrix of Player 1 be denoted as A = a i j p × q , which is a real matrix, then a two-person zero-sum matrix game is expressed by ( { x } , { y } , A ) or A simply. In matrix game A, if Player 1 selects strategy x and Player 2 chooses strategy y , the expected gain (also called utility) of Player 1 can be computed as:
u 1 ( x , y ) = x A y T = i = 1 p j = 1 q x i a i j y j .
Correspondingly, in this condition, the expected loss of Player 2 is u 2 ( x , y ) = x A y T . The game reaches a Nash equilibrium if the strategy combination ( x * , y * ) selected by players satisfies:
u 1 ( x * , y * ) u 1 ( x , y * ) , x u 2 ( x * , y * ) u 2 ( x * , y ) , y
In order to find the optimal strategies x * and y * , von Neumann presented the minimax theorem to solve the game. According to that theorem, a player should find the mixed strategy that maximizes the minimum expected gain, or equivalently, a player should select the mixed strategy that minimizes the maximum expected loss. In the mathematical formulation, the criterion is expressed by a pair of primal-dual linear programming problems as below:
max v s . t . i = 1 p a i j x i * v , j = 1 , , q i = 1 p x i * = 1 x i * 0 , i = 1 , p
and:
min w s . t . j = 1 q a i j y j * w , i = 1 , , p j = 1 q y j * = 1 y j * 0 , j = 1 , q
In that case, x * and y * are the optimal strategies, and V ( = v = w ) is called the value of the matrix game A.
As shown above, the traditional zero-sum matrix game is on the basis of deterministic payoffs. However, in the real world, the game may be composed by uncertain payoffs because of the varieties of uncertain factors. In previous studies, matrix games with payoffs of interval numbers, fuzzy numbers, intuitionistic fuzzy sets, and so on, have received much concern. The matrix game with belief structure payoffs, which represent the ambiguity involved in players’ utilities, has been paid less attention. In the paper, the deterministic zero-sum matrix game is extended to the uncertain environment expressed by D-S belief structures over the real line.
Modeled after the zero-sum matrix game within the environment of deterministic payoffs, a zero-sum matrix game with D-S belief structure payoffs is represented as a triplet ( { x } , { y } , M ) or M simply, where x and y are the strategies of two players, and M is the payoff matrix consisting of belief structures defined over the real line. Formally, M is expressed as:
M = m 11 m 12 m 1 q m 21 m 22 m 2 q m p 1 m p 2 m p q .

4. Proposed Method to Solve Zero-Sum Matrix Games with D-S Belief Structure Payoffs

Once the model of the zero-sum matrix game with D-S belief structure payoffs has been proposed, how to solve the game becomes the following problem. Herein, a basic fact or hypothesis must be clarified. In the research of uncertain matrix games, the term “solve the game” does not mean obtain a unique combination of optimal strategies, i.e., a Nash equilibrium. In fact, in the uncertain environment, the deterministic Nash equilibrium basically cannot be derived due to the impact of uncertain payoffs. This will yield different Nash equilibria associated with different cases of payoffs, and any single equilibrium is trivial. Instead, solving the game is mainly to calculate the value of the game, which is uncertain in an uncertain matrix game.
As for the zero-sum matrix game with D-S belief structure payoffs, a decomposition method is proposed to calculate the value of the game via decomposing it into multiple zero-sum matrix games with interval data. The details of the method are shown as follows. It mainly contains the steps “decompose”-“calculate”-“compose”.
  • “Decompose”: A zero-sum matrix game with D-S belief structure payoffs ( { x } , { y } , M ) , where M = m i j p × q with i { 1 , , p } and j { 1 , , q } , is decomposed into i , j NumFocals ( m i j ) zero-sum matrix games with interval data ( { x } , { y } , I = I k l p × q ) , k { 1 , , p } and l { 1 , , q } , where NumFocals ( m i j ) is the number of focal elements in belief structure m i j , and I k l is a focal element extracting from m i j . Each I = I k l p × q has a belief degree indicated by B e l D ( I ) to express its probability of occurrence, which is determined by all I k l in I. For example, Table 1 shows a zero-sum matrix game with D-S belief structure payoffs, which can be decomposed into the following four zero-sum matrix games with interval data:
    I 1 = [ 1 , 2 ] [ 1 , 3 ] [ 1 , 0 ] [ 1 , 1 ] with belief degree B e l D ( I 1 ) = 0.6 × 1 × 1 × 0.2 = 0.12 .
    I 2 = [ 1 , 2 ] [ 1 , 3 ] [ 1 , 0 ] [ 0 , 2 ] with belief degree B e l D ( I 2 ) = 0.6 × 1 × 1 × 0.8 = 0.48 .
    I 3 = [ 3 , 5 ] [ 1 , 3 ] [ 1 , 0 ] [ 1 , 1 ] with belief degree B e l D ( I 3 ) = 0.4 × 1 × 1 × 0.2 = 0.08 .
    I 4 = [ 3 , 5 ] [ 1 , 3 ] [ 1 , 0 ] [ 0 , 2 ] with belief degree B e l D ( I 4 ) = 0.4 × 1 × 1 × 0.8 = 0.32 .
  • “Calculate”: In this step, the values of obtained interval-valued matrix games are calculated. At present, there are many existing approaches to solve a zero-sum matrix game with interval data. A well-developed approach proposed by Liu and Kao [34] is employed to solve these interval-valued matrix games in the paper. Given a zero-sum matrix game with interval data ( { x } , { y } , I = I k l p × q ) , where I k l = [ I k l L , I k l R ] , k { 1 , , p } and l { 1 , , q } , according to Liu and Kao’s approach, the lower bound of the value of the game, denoted as V ̲ , is calculated by:
    max v ̲ s . t . k = 1 p I k l L x k v ̲ , l = 1 , , q k = 1 p x k = 1 x k 0 , k = 1 , p
    and:
    min w ̲ s . t . l = 1 q I k l L y l w ̲ , k = 1 , , p l = 1 q y l = 1 y l 0 , l = 1 , q
    V ̲ = v ̲ = w ̲ . The upper bound of the value of the game, denoted as V ¯ , is calculated by:
    max v ¯ s . t . k = 1 p I k l R x k v ¯ , l = 1 , , q k = 1 p x k = 1 x k 0 , k = 1 , p
    and:
    min w ¯ s . t . l = 1 q I k l R y l w ¯ , k = 1 , , p l = 1 q y l = 1 y l 0 , l = 1 , q
    V ¯ = v ¯ = w ¯ . For example, the values of the four interval-valued matrix games associated with Table 1 are calculated. For I 1 , the value is [ 1 , 2 ] with belief degree 0.12 . The value of I 2 is [ 1 / 3 , 2 ] with belief degree 0.48 . The value of I 3 is [ 1 , 3 ] with belief degree 0.08 . The value of I 4 is [ 0.2 , 3 ] with belief degree 0.32 .
  • “Compose”: In this step, the values calculated by the above step are composed to form an overall value for the zero-sum matrix game with belief structure payoffs. Let us still use the game shown in Table 1 as the example. According to the step “calculate”, the values of interval-valued matrix games associated with the game shown in Table 1 are [ 1 , 2 ] with belief degree 0.12 , [ 1 / 3 , 2 ] with belief degree 0.48 , [ 1 , 3 ] with belief degree 0.08 and [ 0.2 , 3 ] with belief degree 0.32 , respectively. Therefore, the value of the matrix game shown in Table 1 is m ( [ 1 , 2 ] ) = 0.12 , m ( [ 1 / 3 , 2 ] ) = 0.48 , m ( [ 1 , 3 ] ) = 0.08 , m ( [ 0.2 , 3 ] ) = 0.32 . This value is also in the form of D-S belief structures; its CDF is shown in Figure 2.
Via the steps shown above, the value of a zero-sum matrix game with belief structure payoffs is calculated. This value indicates the distribution of equilibrium payoffs of the game.

5. Alternative Solution: A Monte Carlo Simulation Approach Based on the Latin Hypercube Sampling

Essentially, the proposed decomposition method presented in Section 4 enumerates all possible interval-valued matrix games of the associated zero-sum matrix game with belief structure payoffs. It will generate i , j NumFocals ( m i j ) zero-sum interval-valued matrix games. This would not be an issue in many cases. However, if the size of a game’s payoff matrix and the number of focal elements in belief structures are simultaneously large, the amount of generated interval-valued matrix games will be very large. For example, Table 2 shows a 5 × 3 zero-sum matrix game with D-S belief structure payoffs. In the game, each payoff is a belief structure having four focal elements. If using the decomposition method presented in Section 4, it has to generate and deal with 4 15 = 1,073,741,824 zero-sum interval-valued matrix games. If we run the corresponding MATLAB code on the MATLAB R2016a software, which has been installed on a personal computer with Intel Pentium CPU G3250 (3.20 GHz, two cores) and 8 GB RAM, the time for solving a zero-sum interval-valued matrix game is 0.0141 s, which is the average of running 10,000 times. As a result, solving 4 15 zero-sum interval-valued matrix games will take 0.0141 × 4 15 15,140,000 s, which is more than 175 days. Therefore, it is quite computation-intensive.
Facing this situation, as an alternative solution, a Monte Carlo simulation based on the Latin hypercube sampling (LHS) can be used, whose process is shown in Algorithm 1. LHS [74] is a popular sampling method to generate a near-random sample of parameter values from a multidimensional distribution [75,76]. By using the LHS, an interval-valued matrix game is generated according to the original matrix game with belief structure payoffs in every sampling, then the value of the interval-valued matrix game, which is an interval, can be calculated. Given a predetermined sampling size T, the obtained T intervals can be used to construct the distribution of the value of the game. This distribution can also be seen as a belief structure, which could be graphically shown in a CDF figure in terms of Equations (5) and (6). For example, Figure 3 shows the CDF of the value of the game given in Table 1 obtained by using the LHS-based Monte Carlo simulation approach. It is basically the same as Figure 2. The comparison verifies the result obtained by using the proposed decomposition method in Section 4 and simultaneously shows the effectiveness of these two methods. Besides, now the game shown in Table 2 can be handled by using the LHS-based Monte Carlo simulation approach; the results are shown in Figure 4. By using the alternative solution, for the game shown in Table 2, we do not need to solve 1,073,741,824 zero-sum interval-valued matrix games, but just deal with T interval-valued matrix games, which could greatly reduce the amount of computation. As shown in Figure 4, the obtained B-CDF and P-CDF become more and more precise with the rise of sampling size T. In the concrete applications, the value of T can be determined according to the requirement of precision and computing capability. Note that since the Monte Carlo simulation is an approximate approach that cannot achieve 100% precision, it is suggested to be used when the amount of computation is very large and the computing capability is limited.
By comparing the proposed decomposition method presented in Section 4 and the LHS-based Monte Carlo simulation approach presented in this section, we can find that: (i) in the facet of the optimality or precision property, the decomposition method is an accurate method that would obtain the exact value of the game with belief structure payoffs, in contrast to the Monte Carlo simulation approach being a sampling-based approach, which only derives the approximate result; (ii) in the aspect of complexity, the decomposition method has a bearable computational complexity if the game and its payoffs are relatively simple; when the game becomes complicated, the amount of computation of using the decomposition method will rapidly increase, at that time the Monte Carlo simulation approach is suggested to reduce the computation; (iii) in the aspect of parallelization, both proposed methods can be performed in parallel, which provides a potential way to accelerate the computing process when the amount of computation is extremely large.
Algorithm 1: The Latin hypercube sampling (LHS)-based Monte Carlo simulation approach to solve a zero-sum matrix game with D-S belief structure payoffs.
INPUT: Zero-sum matrix game with D-S belief structure payoffs ( { x } , { y } , M ) ,
   where M = m i j p × q with i { 1 , , p } and j { 1 , , q } ; Sampling size T
OUTPUT: B-CDF, P-CDF
 Generate a T-by- ( p × q ) matrix L containing a LHS of T values on each of ( p × q ) variables;
FOR k = 1 : stepsize 1 : T
   FOREACH m i j in M
     Get a focal element F ( i j ) FocalElements ( m i j ) in terms of L ( k , i , j ) ;
   END
   Generate an interval-valued matrix game I k = F ( i j ) p × q according to all F ( i j ) ;
   Solve I k = F ( i j ) p × q based on Equations (12)–(15), the obtained value is denoted as
[ V ̲ k , V ¯ k ] ;
END
 Once having all [ V ̲ k , V ¯ k ] , k = 1 , , T , then
  (i) calculate the B-CDF according to Equation (5);
  (ii) calculate the P-CDF according to Equation (6);
 where m ( [ V ̲ k , V ¯ k ] ) = 1 / T .

6. Applications

6.1. An Illustrative Application in Sensor Selection

In this subsection, an application of sensor selection adapted from [27] is used to show the process of applying the proposed zero-sum matrix game with belief structure payoffs and its solution method.
In [27], the author presented an example of applying zero-sum matrix games with crisp payoffs to sensor selection. Suppose there are two types of sensors A and B, and one of the two sensors is acquired for use in detecting submarines. Note that sensors with different buoyancy submerge to different depths; hence, each type of sensors works at a certain depth, and a sensor network consisting of sensors belonging to the same type is approximatively deployed on a two-dimensional plane. Both of the sensors have “shallow” (S) and “deep” (D) settings or modes, but Sensor B’s long-range detection capability is weakened in order to enhance its robustness; the capacity that the detection range is not zero even if the submarine’s depth (which is also either S or D) is guessed incorrectly. The detection ranges of the two sensors are shown in Figure 5. The question is which kind of sensor is more effective.
In order to answer the question, in [27], the author has analyzed two cases, as shown in Figure 6. One is that the sensors are used to construct a linear barrier. In that case, each matrix in Figure 5 is regarded as the payoff matrix in a game, and the value of the game is an equivalent detection range. Let V A and V B be the values of Sensor A and Sensor B games. According to the minimax criterion shown in Equations (9) and (10), it is calculated that V A = 1.333 and V B = 1.5 . Therefore, Sensor B is better in this case. The other case is to perform the task that detects hidden submarines within a large area of size C. In the case, if n sensors are used, the fraction of submarines detected can be calculated by i = 1 n π R i 2 i = 1 n π R i 2 C C where R i is the detection range of the i-th sensor. On average, the ratio is positively related to E ( R 2 ) , which is the value of the game with squared detection ranges. For Sensors A and B, the games become new forms as shown in Figure 7, which are the same as those in Figure 5, but each entry has been squared since now the task is to detect submarines within an area. In the case, the values of new sensor games becomes V A = 3.2 and V B = 2.5 . Therefore, Sensor A is better for the task of submarine detection within a large area.
The analysis given above is on the basis of deterministic payoff matrices of sensor games. However, in reality, due to the complexity of the marine environment, the sensor’s reliability and the opponent’s interference, the detection ranges of sensors are not precise, but have a degree of uncertainty. In the paper, the uncertainty is modeled by D-S belief structures. Suppose the detection ranges of the two sensors are in the form of D-S belief structures, as shown in Figure 8. For example, in Figure 8, the item m ( [ 3.7 , 3.9 ] ) = 0.2 , m ( [ 3.8 , 4.1 ] ) = 0.8 indicates that the detection range is that of ambiguity composed of discord and non-specificity, where the distribution of beliefs 0.2 and 0.8 expresses the discord, and both the intervals [3.7, 3.9] and [3.8, 4.1] express the non-specificity. By facing the situation, the method of matrix games with payoffs of D-S belief structures will be used to compare the performance of the sensors in different task cases. Similarly, if the sensors are used to construct a linear barrier, each matrix in Figure 8 is treated as the payoff matrix in a game, and the value of the game becomes an equivalent detection range. By using the proposed solution method in Section 4, the value of the sensor games with D-S belief structure payoffs can be calculated, they are still D-S belief structures indicated by m V A and m V B :
m V A ( [ 1.1648 , 1.2776 ] ) = 0.02 , m V A ( [ 1.2109 , 1.3650 ] ) = 0.18 , m V A ( [ 1.1745 , 1.2983 ] ) = 0.08 , m V A ( [ 1.2214 , 1.3887 ] ) = 0.72 ;
and
m V B ( [ 1.2500 , 1.5000 ] ) = 0.01 , m V B ( [ 1.2737 , 1.5444 ] ) = 0.18 , m V B ( [ 1.3000 , 1.6000 ] ) = 0.81 .
The associated CDFs of m V A and m V B are illustrated in Figure 9.
In order to compare the performance of Sensors A and B, m V A and m V B herein are regarded as distributions of interval numbers, then the expected detection ranges of Sensors A and B are E ( m V A ) = [ 1.2146 , 1.3750 ] and E ( m V B ) = [ 1.2948 , 1.5890 ] . To compare E ( m V A ) and E ( m V B ) , a simple heuristic method proposed by Wang et al. [77] is utilized in this paper, which provides the degree of possibility that an interval is greater/lesser than another one. In [77], for intervals A = [ a L , a U ] and B = [ b L , b U ] , the possibilities of A B and B A are defined as below:
P ( A B ) = max 0 , a U b L max 0 , a L b U a U a L + b U b L ,
P ( B A ) = max 0 , b U a L max 0 , b L a U a U a L + b U b L .
According to Equations (16) and (17), we have P E ( m V A ) E ( m V B ) = 0.1765 and P E ( m V B ) E ( m V A ) = 0.8235 . Therefore, Sensor B is more likely to perform better in the task of constructing linear barriers.
In the other case, the sensors are used to detect hidden submarines within a large area. For Sensors A and B, since the task is changed to detecting submarines within an area to construct a linear barrier (in other words, from the barrier coverage to the area coverage), the games now are on the basis of squared detection ranges, as shown in Figure 10. Similarly, by using the proposed method in this paper, we have the values of the games in Figure 10, denoted as m V A and m V B :
m V A ( [ 2.3863 , 2.9175 ] ) = 0.02 , m V A ( [ 2.6199 , 3.4188 ] ) = 0.18 , m V A ( [ 2.4081 , 2.9718 ] ) = 0.08 , m V A ( [ 2.6462 , 3.4935 ] ) = 0.72 ;
and
m V B ( [ 1.7650 , 2.4100 ] ) = 0.01 , m V B ( [ 1.8462 , 2.5814 ] ) = 0.18 , m V B ( [ 1.9400 , 2.8100 ] ) = 0.81 .
Likewise, the associated CDFs of m V A and m V B are shown in Figure 11. Then, we calculate the expected values of the games, which are E ( m V A ) = [ 2.6172 , 3.4268 ] and E ( m V B ) = [ 1.9214 , 2.7648 ] . At last, according to Equations (16) and (17), it is derived that P E ( m V A ) E ( m V B ) = 0.9107 and P E ( m V B ) E ( m V A ) = 0.0893 . Hence, it is well-founded to conclude that Sensor A is better than Sensor B for the task of detecting submarines within a large area.
Through the application, we can find that in the real world, sometimes, it indeed requires that the game model has the ability to handle uncertain payoffs. On the basis of D-S theory’s capability to represent the ambiguity involved in game payoffs, the proposed zero-sum matrix game with belief structure payoffs provides an effective way to meet this requirement.

6.2. Another Application on the Intrusion Detection in Sensor Networks

In this subsection, another example about the intrusion detection in sensor networks is given to illustrate the application and effectiveness of the proposed model.
The intrusion detection (ID) is of great concern in various kinds of sensor networks [78]. Currently, the ID techniques are mainly classified into misuse detection and anomaly detection. Generally, the misuse detection is usually used to detect known types of attacks whose attack characteristics (known as “signatures”) are known and could achieve high detection accuracy and a low false alarm rate for such attacks, but is unable to detect novel attacks. In contrast, the anomaly detection has good performance in detecting novel attacks, but it is inclined to a high false alarm rate. The signature-based intrusion detection system (IDS) and anomaly-based IDS are two typical IDSs for misuse detection and anomaly detection, respectively. Therefore, integrating multiple detection techniques is a promising way to improve overall detection performance. In [79], the authors have presented a game-theoretic framework to study the interactions between attackers and defenders in the ID by integrating various ID techniques. They assumed that a defender can use multiple IDSs and an attacker can stage multiple types of attacks. In the paper, the two-person zero-sum game presented in [79] is utilized to show the practicable application of the proposed zero-sum matrix game with belief structure payoffs.
In [79], it is assumed that a sensor network could deploy multiple weak IDSs in which “weak” means that each IDS has different limitations in its coverage of attack types and has different performances in detecting different types of attacks. Particularly, suppose an attacker is able to stage two attacks on a sensor network, Attack 1 and Attack 2, so it has three strategies: Attack 1, Attack 2 and not attack. In response, a defender can use two IDSs, for example signature-based IDS and anomaly-based IDS, against the attacker: IDS1, which performs better for Attack 1, and IDS2, having better performance for Attack 2. Hence the defender also has three strategies: IDS1, IDS2 and not monitor. As a result, the defender and attacker constitute a 3 × 3 two-person zero-sum game; the payoff matrix of the defender is shown in Table 3. The payoffs are explained as follows. Let α i j and 1 α i j be the detection rate and false negative rate of the i-th IDS with respect to the j-th attack type and β i the false positive rate of the i-th IDS, where α i j , β i [ 0 , 1 ] , and h represents the merit of the overall network. The payoff function of the defender, denoted as U i j , is defined by:
U i j = ( 2 α i j 1 ) h , i , j = 1 , 2 h , i = 3 , j = 1 , 2 β i h , i = 1 , 2 , j = 3 0 , i = 3 , j = 3
where ( 2 α i j 1 ) h is the expected gain of detecting the j-th attack type by the i-th IDS, which is calculated by the detection gain of the defender α i j h plus the loss of a failed detection ( 1 α i j ) h . Additionally, β i h represents the loss (cost) of false alarm attacks when only normal data are presented. Since the game is zero-sum, the payoff of the attacker is U i j . In the constructed attacker/defender game, the equilibrium strategy shows the contribution of each IDS to the overall sensor network security, which can be used as a reference to further improve the IDS configuration. Additionally, the value of the game, denoted as V, represents a minimum security level (MSL) the defender can achieve; it is a key indicator of the sensor network security.
A numerical example is given in [79] by setting specific values for the parameters mentioned above. Let α 11 = 85 % , α 12 = 45 % , β 1 = 0.1 % , α 21 = 20 % , α 22 = 70 % , β 2 = 2 % and h = 100 , then a numerical payoff matrix of the attacker/defender game is generated:
U d e f e n d e r = 70 10 0.1 60 40 2 100 100 0 .
For the above U d e f e n d e r , the value of the game is V = 0.4624 , which means that the MSL of the corresponding sensor network is 0.4624 .
Clearly, in the above numerical example, it is assumed that IDS1 has a bad performance with respect to Attack 2 (namely α 12 = 45 % ) and IDS2 performs very poorly to Attack 1 (namely α 21 = 20 % ). In order to elevate the overall security level of the sensor network, a straightforward way is to improve the performances of IDS1 to Attack 2 and IDS2 to Attack 1, respectively. Now, we analyze the effect of such improvement. In order to decrease the number of parameters, we assume α 12 = γ 1 α 11 and α 21 = γ 2 α 22 , where γ 1 , γ 2 [ 0 , 1 ] . Therefore, the payoff matrix of the defender now becomes:
U d e f e n d e r = ( 2 α 11 1 ) h ( 2 γ 1 α 11 1 ) h β 1 h ( 2 γ 2 α 22 1 ) h ( 2 α 22 1 ) h β 2 h h h 0
where α 11 = 85 % , α 22 = 70 % , β 1 = 0.1 % , β 2 = 2 % and h = 100 . According to U d e f e n d e r , the MSL of the sensor network can be obtained with respect to different γ 1 and γ 2 , as shown in Figure 12. From Figure 12, it is found that: (i) if both the values of γ 1 and γ 2 are small, increasing them can obviously elevate the MSL of the sensor network; (ii) however, if γ 1 or γ 2 has already obtained a big value, increasing the value of the other parameter cannot observably improve the security of the sensor network. The results are very useful in the process of improving IDS1 and IDS2 to avoid unnecessary work and save cost. What is more, from Figure 12, it seems that the MSL almost reaches the highest level only if γ 1 0.6 , regardless of the value of γ 2 . This is obtained from the analysis of the attacker/defender game with deterministic payoffs.
However, in the above analysis, the uncertainty is not taken into consideration in the process of improving IDS1 and IDS2. For example, if γ 1 = 0.55 resulting in α 12 = 46.75 % , it actually assumes that the improved IDS1 has an exact 46.75% detection rate with respect to Attack 2. In reality, a security architect may hardly ensure that an improved IDS has an exact detection rate. Instead, the performance index of the improved IDS is usually of uncertainty, for instance lying in an interval α 12 [ 45 % , 47 % ] . Dose such uncertainty have a severe impact on the security of the sensor network? This problem can be addressed by using the proposed model in the paper. A numerical example is given first as follows.
If γ 1 = 0.55 and γ 2 = 0.7 , it is easily obtained that the MSL of the sensor network is V = 0.3512 in terms of Equation (18). Now, suppose that γ 1 and γ 2 are uncertain, which are represented by belief structures:
m γ 1 ( [ 0.53 , 0.56 ] ) = 0.5 , m γ 1 ( [ 0.54 , 0.57 ] ) = 0.5 ; m γ 2 ( [ 0.68 , 0.71 ] ) = 0.5 , m γ 2 ( [ 0.69 , 0.72 ] ) = 0.5 .
Herein, the mean values of γ 1 and γ 2 , expressed by m γ 1 and m γ 2 , are approximately equal to 0.55 and 0.7, respectively. According to Equation (18), a new zero-sum matrix games with belief structure payoffs can be generated, in which the payoff matrix of the defender is shown in Table 4. Then, in terms of the proposed solution method, the value of the game in Table 4 can be obtained:
m V ( [ 0.4595 , 0.2912 ] ) = 0.25 , m V ( [ 0.4072 , 0.2267 ] ) = 0.25 , m V ( [ 0.4595 , 0.2912 ] ) = 0.25 , m V ( [ 0.4072 , 0.2267 ] ) = 0.25 .
Additionally, the expected value of m V is E ( m V ) = [ 0.4333 , 0.2589 ] . Therefore, the MSL of the sensor network becomes an interval [ 0.4333 , 0.2589 ] from a crisp number −0.3512, because of the consideration of uncertainty. Here, we define a fluctuation coefficient Q to express the impact of considering such uncertainty:
Q = r a n g e ( E ( m V ) ) V × 100 % .
In the numerical example, the value of Q is calculated as 49.65 % , which indicates that the MSL has relatively large fluctuations in the case of considering the uncertainty involved in γ 1 and γ 2 , compared with its deterministic case. Therefore, according to the result obtained by using our proposed model, in this numerical example, the uncertainty has to be cautiously considered in the process of improving IDS1 and IDS2. The security architect is suggested to try the best to make γ 1 and γ 2 more precise in order to achieve the expected MSL shown in Figure 12.
By this means, all Q values associated with different mean values of γ 1 and γ 2 can be derived, as shown in Figure 13. In the process, for each deterministic value of γ 1 or γ 2 , denoted as γ , it is transformed to a Dempster–Shafer belief structure via the following means:
m ( [ γ l , γ + l / 2 ] ) = 0.5 , m ( [ γ l / 2 , γ + l ] ) = 0.5
where l represents the radius of the uncertainty of γ . From Figure 13, the distribution map of the value of Q can be classified into four areas, A, B, C and D. In Areas B and D, each value of Q is very small, which means that the uncertainty in γ 1 and γ 2 basically has no influence on the MSL of the sensor network compared with the case that γ 1 and γ 2 get deterministic values. In contrast, in Areas A and C the uncertainty expressed by m γ 1 and m γ 2 distinctly causes the MSL to fluctuate to different extents. In Area A, the uncertainty both in γ 1 and γ 2 can impact the final MSL, and with the increase of γ 1 or γ 2 , the fluctuation becomes more and more severe. Therefore, the security architect should prevent IDS1 and IDS2 from falling into this area as much as possible. In Area C, it is found that only γ 1 ’s uncertainty influences the final MSL; therefore, the security architect should give the most attention to the process of improving IDS1 to reduce the uncertainty of α 12 . By synthetically considering Figure 12 and Figure 13, if letting γ 1 0.65 and γ 2 0.45 (i.e., improving IDS1 and IDS2 to implement α 12 55.25 % and α 21 31.5 % ), on the one hand, the sensor network can achieve the highest security level that IDS1 and IDS2 can provide; on the other hand, the security level can basically remain unchanged with the possible uncertainty of IDS1’s detection rate for Attack 2 and IDS2’s detection rate for Attack 1. The result gives the security architect a more practical and effective suggestion of how to optimize the IDS configuration of the sensor network. Through the example of the intrusion detection of sensor networks, it shows another potential application of the proposed model, which is helpful for improving the security of sensor networks.

7. Conclusions

In this paper, zero-sum matrix games with uncertain payoffs have been addressed. In order to express the ambiguity involved in the payoffs of a game, D-S theory has been used to represent the uncertain payoffs. As a result, a zero-sum matrix game with payoffs of D-S belief structures has been presented. In order to obtain the value of such a game, in the paper, a decomposition method is proposed by transforming the game into multiple zero-sum matrix games with interval data. Moreover, for the possible computationally-intensive issue in the process of applying the decomposition method, as an alternative solution, a Monte Carlo simulation approach based on LHS is provided, as well. Finally, applications of the proposed game model and its solution method in sensor selection and intrusion detection of sensor networks are given, which show the usefulness and effectiveness of the novel game model. In future research, the authors will invest more effort into seeking other potential applications so as to further improve the proposed game model.

Acknowledgments

The authors are grateful to the anonymous reviewers for their useful comments and suggestions on improving this paper. The work is partially supported by National Natural Science Foundation of China (Grant No. 61671384), Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016JM6018), Fundamental Research Funds for the Central Universities (Grant No. 3102017OQD020), Aviation Science Foundation (Program No. 20165553036), the Fund of SAST (Program No. SAST2016083) and the Seed Foundation of Innovation and Creation for Graduate Students in Northwestern Polytechnical University (Program No. Z2016122).

Author Contributions

X.D. and W.J. conceived of, designed and performed the experiments. X.D., W.J. and J.Z. analyzed the data. X.D. wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Klir, G.; Yuan, B. Fuzzy Sets and Fuzzy Logic: Theory and Applications; Prentice Hall: Upper Saddle River, NJ, USA, 1995. [Google Scholar]
  2. Jousselme, A.L.; Liu, C.; Grenier, D.; Bossé, É. Measuring ambiguity in the evidence theory. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2006, 36, 890–903. [Google Scholar] [CrossRef]
  3. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  4. Pawlak, Z. Rough sets. Int. J. Comput. Inf. Sci. 1982, 11, 341–356. [Google Scholar] [CrossRef]
  5. Dempster, A.P. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 1967, 38, 325–339. [Google Scholar] [CrossRef]
  6. Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976. [Google Scholar]
  7. Palmieri, F.A.; Ciuonzo, D. Objective priors from maximum entropy in data classification. Inf. Fusion 2013, 14, 186–198. [Google Scholar] [CrossRef]
  8. An, L.; Li, M.; Zhang, P.; Wu, Y.; Jia, L.; Song, W. Discriminative random fields based on maximum entropy principle for semisupervised SAR image change detection. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2016, 9, 3395–3404. [Google Scholar] [CrossRef]
  9. Jiang, W.; Xie, C.; Luo, Y.; Tang, Y. Ranking Z-numbers with an improved ranking method for generalized fuzzy numbers. J. Intell. Fuzzy Syst. 2017, 32, 1931–1943. [Google Scholar] [CrossRef]
  10. Palmieri, F.; Ciuonzo, D. Data fusion with entropic priors. Procedings of the 20th Italian Workshop on Neural Networks, WIRN, Frontiers in Artificial Intelligence and Applications, Salerno, Italy, 27–29 May 2010; Volume 226, pp. 107–114. [Google Scholar]
  11. Chen, T.M.; Venkataramanan, V. Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput. 2005, 9, 35–41. [Google Scholar] [CrossRef]
  12. Jiang, W.; Zhan, J. A modified combination rule in generalized evidence theory. Appl. Intell. 2017, 46, 630–640. [Google Scholar] [CrossRef]
  13. Deng, X.; Hu, Y.; Deng, Y.; Mahadevan, S. Supplier selection using AHP methodology extended by D numbers. Expert Syst. Appl. 2014, 41, 156–167. [Google Scholar] [CrossRef]
  14. Deng, X.; Hu, Y.; Deng, Y.; Mahadevan, S. Environmental impact assessment based on D numbers. Expert Syst. Appl. 2014, 41, 635–643. [Google Scholar] [CrossRef]
  15. Sun, L.; Liu, Y.; Zhang, B.; Shang, Y.; Yuan, H.; Ma, Z. An integrated decision-making model for transformer condition assessment using game theory and modified evidence combination extended by D numbers. Energies 2016, 9, 697. [Google Scholar] [CrossRef]
  16. Zhou, X.; Deng, X.; Deng, Y.; Mahadevan, S. Dependence assessment in human reliability analysis based on D numbers and AHP. Nucl. Eng. Des. 2017, 313, 243–252. [Google Scholar] [CrossRef]
  17. Liu, H.C.; You, J.X.; Fan, X.J.; Lin, Q.L. Failure mode and effects analysis using D numbers and grey relational projection method. Expert Syst. Appl. 2014, 41, 4670–4679. [Google Scholar] [CrossRef]
  18. Zhou, X.; Shi, Y.; Deng, X.; Deng, Y. D-DEMATEL: A new method to identify critical success factors in emergency management. Saf. Sci. 2017, 91, 93–104. [Google Scholar] [CrossRef]
  19. Wang, Z.; Bauch, C.T.; Bhattacharyya, S.; d’Onofrio, A.; Manfredi, P.; Perc, M.; Perra, N.; Salathé, M.; Zhao, D. Statistical physics of vaccination. Phys. Rep. 2016, 664, 1–113. [Google Scholar] [CrossRef]
  20. Wang, Z.; Kokubo, S.; Jusup, M.; Tanimoto, J. Universal scaling for the dilemma strength in evolutionary games. Phys. Life Rev. 2015, 14, 1–30. [Google Scholar] [CrossRef] [PubMed]
  21. Deng, X.; Han, D.; Dezert, J.; Deng, Y.; Shyr, Y. Evidence combination from an evolutionary game theory perspective. IEEE Trans. Cybern. 2016, 46, 2070–2082. [Google Scholar] [CrossRef] [PubMed]
  22. Caponetto, R.; Fortuna, L.; Fazzino, S.; Xibilia, M.G. Chaotic sequences to improve the performance of evolutionary algorithms. IEEE Trans. Evol. Comput. 2003, 7, 289–304. [Google Scholar] [CrossRef]
  23. Lee, J.; Pak, D. A Game Theoretic Optimization Method for Energy Efficient Global Connectivity in Hybrid Wireless Sensor Networks. Sensors 2016, 16, 1380. [Google Scholar] [CrossRef] [PubMed]
  24. Abdalzaher, M.S.; Seddik, K.; Elsabrouty, M.; Muta, O.; Furukawa, H.; Abdel-Rahman, A. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey. Sensors 2016, 16, 1003. [Google Scholar] [CrossRef] [PubMed]
  25. Wang, Z.; Jusup, M.; Wang, R.W.; Shi, L.; Iwasa, Y.; Moreno, Y.; Kurths, J. Onymity promotes cooperation in social dilemma experiments. Sci. Adv. 2017, 3, e1601444. [Google Scholar] [CrossRef]
  26. Chen, Y.; Weng, S.; Guo, W.; Xiong, N. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network. Sensors 2016, 16, 245. [Google Scholar] [CrossRef] [PubMed]
  27. Washburn, A. Two-Person Zero-Sum Games; Springer Science & Business Media: New York, NY, USA, 2013; Volume 201. [Google Scholar]
  28. von Neumann, J.; Morgenstern, O. Theory of Games and Economic Behavior; Princeton University Press: Princeton, NJ, USA, 1944. [Google Scholar]
  29. Li, D.F. Linear Programming Models and Methods of Matrix Games With Payoffs of Triangular Fuzzy Numbers; Springer: New York, NY, USA, 2016. [Google Scholar]
  30. Li, D.F.; Nan, J.X.; Zhang, M.J. Interval programming models for matrix games with interval payoffs. Optim. Methods Softw. 2012, 27, 1–16. [Google Scholar] [CrossRef]
  31. Li, D.F. Linear programming approach to solve interval-valued matrix games. Omega 2011, 39, 655–666. [Google Scholar] [CrossRef]
  32. Collins, W.D.; Hu, C. Studying interval valued matrix games with fuzzy logic. Soft Comput. 2008, 12, 147–155. [Google Scholar] [CrossRef]
  33. Mitchell, C.; Hu, C.; Chen, B.; Nooner, M.; Young, P. A computational study of interval-valued matrix games. In Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 10–13 March 2014; Volume 1, pp. 347–352. [Google Scholar]
  34. Liu, S.T.; Kao, C. Matrix games with interval data. Comput. Ind. Eng. 2009, 56, 1697–1700. [Google Scholar] [CrossRef]
  35. Li, D.F. An effective methodology for solving matrix games with fuzzy payoffs. IEEE Trans. Cybern. 2013, 43, 610–621. [Google Scholar] [PubMed]
  36. Dutta, B.; Gupta, S. On Nash equilibrium strategy of two-person zero-sum games with trapezoidal fuzzy payoffs. Fuzzy Inf. Eng. 2014, 6, 299–314. [Google Scholar] [CrossRef]
  37. Kumar, S.; Chopra, R.; Saxena, R.R. A Fast Approach to Solve Matrix Games with Payoffs of Trapezoidal Fuzzy Numbers. Asia Pac. J. Oper. Res. 2016, 33, 1650047. [Google Scholar] [CrossRef]
  38. Chandra, S.; Aggarwal, A. On solving matrix games with pay-offs of triangular fuzzy numbers: Certain observations and generalizations. Eur. J. Oper. Res. 2015, 246, 575–581. [Google Scholar] [CrossRef]
  39. Roy, S.K.; Mula, P. Solving matrix game with rough payoffs using genetic algorithm. Oper. Res. 2016, 16, 117–130. [Google Scholar] [CrossRef]
  40. Nan, J.X.; Li, D.F.; Zhang, M.J. A lexicographic method for matrix games with payoffs of triangular intuitionistic fuzzy numbers. Int. J. Comput. Intell. Syst. 2010, 3, 280–289. [Google Scholar] [CrossRef]
  41. Li, D.F.; Nan, J.X. A nonlinear programming approach to matrix games with payoffs of Atanassov’s intuitionistic fuzzy sets. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 2009, 17, 585–607. [Google Scholar] [CrossRef]
  42. Seikh, M.R.; Nayak, P.K.; Pal, M. Matrix games with intuitionistic fuzzy pay-offs. J. Inf. Optim. Sci. 2015, 36, 159–181. [Google Scholar] [CrossRef]
  43. Li, D.F. Mathematical-programming approach to matrix games with payoffs represented by Atanassov’s interval-valued intuitionistic fuzzy sets. IEEE Trans. Fuzzy Syst. 2010, 18, 1112–1128. [Google Scholar] [CrossRef]
  44. Xu, L.; Zhao, R.; Ning, Y. Two-person zero-sum matrix game with fuzzy random payoffs. In Proceedings of the International Conference on Intelligent Computing, Kunming, China, 16–19 August 2006; pp. 809–818. [Google Scholar]
  45. Xu, Y.; Liu, J.; Zhong, X.; Chen, S. Lattice-valued matrix game with mixed strategies for intelligent decision support. Knowl. Based Syst. 2012, 32, 56–64. [Google Scholar] [CrossRef]
  46. Xiong, W.; Luo, X.; Ma, W.; Zhang, M. Ambiguous games played by players with ambiguity aversion and minimax regret. Knowl. Based Syst. 2014, 70, 167–176. [Google Scholar] [CrossRef]
  47. Xiong, W. Games under ambiguous payoffs and optimistic attitudes. J. Appl. Math. 2014, 2014, 531987. [Google Scholar] [CrossRef]
  48. Deng, X.; Zheng, X.; Su, X.; Chan, F.T.; Hu, Y.; Sadiq, R.; Deng, Y. An evidential game theory framework in multi-criteria decision making process. Appl. Math. Comput. 2014, 244, 783–793. [Google Scholar] [CrossRef]
  49. Yager, R.R.; Alajlan, N. Evaluating Belief Structure Satisfaction to Uncertain Target Values. IEEE Trans. Cybern. 2016, 46, 869–877. [Google Scholar] [CrossRef] [PubMed]
  50. Xu, X.B.; Zheng, J.; Yang, J.B.; Xu, D.L.; Chen, Y.W. Data classification using evidence reasoning rule. Knowl. Based Syst. 2017, 116, 144–151. [Google Scholar] [CrossRef]
  51. Deng, Y. Deng entropy. Chaos Solitons Fractals 2016, 91, 549–553. [Google Scholar] [CrossRef]
  52. Jiang, W.; Xie, C.; Zhuang, M.; Tang, Y. Failure mode and effects analysis based on a novel fuzzy evidential method. Appl. Soft Comput. 2017. [Google Scholar] [CrossRef]
  53. Yang, M.; Lin, Y.; Han, X. Probabilistic Wind Generation Forecast Based on Sparse Bayesian Classification and Dempster-Shafer Theory. IEEE Trans. Ind. Appl. 2016, 52, 1998–2005. [Google Scholar] [CrossRef]
  54. Deng, X.; Xiao, F.; Deng, Y. An improved distance-based total uncertainty measure in belief function theory. Appl. Intell. 2017. [Google Scholar] [CrossRef]
  55. Han, D.; Dezert, J.; Duan, Z. Evaluation of probability transformations of belief functions for decision making. IEEE Trans. Syst. Man Cybern. Syst. 2016, 46, 93–108. [Google Scholar] [CrossRef]
  56. Yang, Y.; Han, D.Q.; Dezert, J. An angle-based neighborhood graph classifier with evidential reasoning. Pattern Recogn. Lett. 2016, 71, 78–85. [Google Scholar] [CrossRef]
  57. Jiang, W.; Wei, B.; Zhan, J.; Xie, C.; Zhou, D. A visibility graph power averaging aggregation operator: A methodology based on network analysis. Comput. Ind. Eng. 2016, 101, 260–268. [Google Scholar] [CrossRef]
  58. Jiang, W.; Wei, B.; Tang, Y.; Zhou, D. Ordered visibility graph average aggregation operator: An application in produced water management. Chaos 2017, 27, 023117. [Google Scholar] [CrossRef] [PubMed]
  59. Mo, H.; Deng, Y. A new aggregating operator in linguistic decision making based on D numbers. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 2016, 24, 831–846. [Google Scholar] [CrossRef]
  60. Song, M.; Jiang, W.; Xie, C.; Zhou, D. A new interval numbers power average operator in multiple attribute decision making. Int. J. Intell. Syst. 2017, 32, 631–644. [Google Scholar] [CrossRef]
  61. Ciuonzo, D.; Romano, G.; Rossi, P.S. Channel-aware decision fusion in distributed MIMO wireless sensor networks: Decode-and-fuse vs. decode-then-fuse. IEEE Trans. Wirel. Commun. 2012, 11, 2976–2985. [Google Scholar] [CrossRef]
  62. Wang, H.; Yao, K.; Pottie, G.; Estrin, D. Entropy-based sensor selection heuristic for target localization. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, 26–27 April 2004; pp. 36–45. [Google Scholar]
  63. Ciuonzo, D.; Romano, G.; Rossi, P.S. Optimality of received energy in decision fusion over Rayleigh fading diversity MAC with non-identical sensors. IEEE Trans. Signal Process. 2013, 61, 22–27. [Google Scholar] [CrossRef]
  64. Dong, J.; Zhuang, D.; Huang, Y.; Fu, J. Advances in multi-sensor data fusion: Algorithms and applications. Sensors 2009, 9, 7771–7784. [Google Scholar] [CrossRef] [PubMed]
  65. Si, L.; Wang, Z.; Liu, X.; Tan, C.; Xu, J.; Zheng, K. Multi-sensor data fusion identification for shearer cutting conditions based on parallel quasi-newton neural networks and the Dempster-Shafer theory. Sensors 2015, 15, 28772–28795. [Google Scholar] [CrossRef] [PubMed]
  66. André, C.; Le Hégarat-Mascle, S.; Reynaud, R. Evidential framework for data fusion in a multi-sensor surveillance system. Eng. Appl. Artif. Intell. 2015, 43, 166–180. [Google Scholar] [CrossRef]
  67. Jiang, W.; Zhuang, M.; Xie, C.; Wu, J. Sensing attribute weights: A novel basic belief assignment method. Sensors 2017, 17, 721. [Google Scholar] [CrossRef] [PubMed]
  68. Khaleghi, B.; Khamis, A.; Karray, F.O.; Razavi, S.N. Multisensor data fusion: A review of the state-of-the-art. Inf. Fusion 2013, 14, 28–44. [Google Scholar] [CrossRef]
  69. Zois, E.N.; Anastassopoulos, V. Fusion of correlated decisions for writer verification. Pattern Recogn. 2001, 34, 47–61. [Google Scholar] [CrossRef]
  70. Tselios, K.; Zois, E.N.; Nassiopoulos, A.; Economou, G. Fusion of directional transitional features for off-line signature verification. In Proceedings of the International Joint Conference on Biometrics (IJCB), Washington, DC, USA, 11–13 October 2011; pp. 1–6. [Google Scholar]
  71. Yager, R.R. Cumulative distribution functions from Dempster-Shafer belief structures. IEEE Trans. Syst. Man Cybern. Part B Cybern. 2004, 34, 2080–2087. [Google Scholar] [CrossRef]
  72. Yager, R.R. Joint cumulative distribution functions for Dempster-Shafer belief structures using copulas. Fuzzy Optim. Decis. Mak. 2013, 12, 393–414. [Google Scholar] [CrossRef]
  73. Smets, P. Belief functions on real numbers. Int. J. Approx. Reason. 2005, 40, 181–223. [Google Scholar] [CrossRef]
  74. McKay, M.D.; Beckman, R.J.; Conover, W.J. Comparison of three methods for selecting values of input variables in the analysis of output from a computer code. Technometrics 1979, 21, 239–245. [Google Scholar] [CrossRef]
  75. Helton, J.C.; Davis, F.J. Latin hypercube sampling and the propagation of uncertainty in analyses of complex systems. Reliab. Eng. Syst. Saf. 2003, 81, 23–69. [Google Scholar] [CrossRef]
  76. Shields, M.D.; Zhang, J. The generalization of Latin hypercube sampling. Reliab. Eng. Syst. Saf. 2016, 148, 96–108. [Google Scholar] [CrossRef]
  77. Wang, Y.M.; Yang, J.B.; Xu, D.L. A preference aggregation method through the estimation of utility intervals. Comput. Oper. Res. 2005, 32, 2027–2049. [Google Scholar] [CrossRef]
  78. Ammari, H.M. The Art of Wireless Sensor Networks; Springer: New York, NY, USA, 2014. [Google Scholar]
  79. Liu, Y.; Man, H.; Comaniciu, C. A game theoretic approach to efficient mixed strategies for intrusion detection. In Proceedings of the IEEE International Conference on Communications, Istanbul, Turkey, 11–15 June 2006; Volume 5, pp. 2201–2206. [Google Scholar]
Figure 1. Example of a D-S belief structure’s CDF with respect to its associated variable x.
Figure 1. Example of a D-S belief structure’s CDF with respect to its associated variable x.
Sensors 17 00922 g001
Figure 2. The CDF of the value of the game given in Table 1 with respect to the associated variable x.
Figure 2. The CDF of the value of the game given in Table 1 with respect to the associated variable x.
Sensors 17 00922 g002
Figure 3. Obtained CDF of the value of the game shown in Table 1 with respect to the associated variable x by using the LHS-based Monte Carlo simulation while sampling size T = 10,000.
Figure 3. Obtained CDF of the value of the game shown in Table 1 with respect to the associated variable x by using the LHS-based Monte Carlo simulation while sampling size T = 10,000.
Sensors 17 00922 g003
Figure 4. CDF of the value of the game shown in Table 2 with respect to the associated variable x by using the LHS-based Monte Carlo simulation with different sampling sizes T.
Figure 4. CDF of the value of the game shown in Table 2 with respect to the associated variable x by using the LHS-based Monte Carlo simulation with different sampling sizes T.
Sensors 17 00922 g004
Figure 5. The detection ranges of Sensors A and B in the form of crisp numbers.
Figure 5. The detection ranges of Sensors A and B in the form of crisp numbers.
Sensors 17 00922 g005
Figure 6. Two cases in sensor selection for submarine detection.
Figure 6. Two cases in sensor selection for submarine detection.
Sensors 17 00922 g006
Figure 7. Squared detection ranges for Sensors A and B in the form of crisp numbers.
Figure 7. Squared detection ranges for Sensors A and B in the form of crisp numbers.
Sensors 17 00922 g007
Figure 8. The detection ranges of Sensors A and B in the form of D-S belief structures.
Figure 8. The detection ranges of Sensors A and B in the form of D-S belief structures.
Sensors 17 00922 g008
Figure 9. CDFs of the values of sensor games given in Figure 8 with respect to the associated variable x.
Figure 9. CDFs of the values of sensor games given in Figure 8 with respect to the associated variable x.
Sensors 17 00922 g009
Figure 10. Squared detection ranges for Sensors A and B in the form of D-S belief structures.
Figure 10. Squared detection ranges for Sensors A and B in the form of D-S belief structures.
Sensors 17 00922 g010
Figure 11. CDFs of the values of sensor games given in Figure 10 with respect to the associated variable x.
Figure 11. CDFs of the values of sensor games given in Figure 10 with respect to the associated variable x.
Sensors 17 00922 g011
Figure 12. The minimum security level (MSL) of the sensor network with respect to parameters γ 1 and γ 2 in terms of U d e f e n d e r .
Figure 12. The minimum security level (MSL) of the sensor network with respect to parameters γ 1 and γ 2 in terms of U d e f e n d e r .
Sensors 17 00922 g012
Figure 13. The value of fluctuation coefficient Q with respect to different mean values of γ 1 and γ 2 .
Figure 13. The value of fluctuation coefficient Q with respect to different mean values of γ 1 and γ 2 .
Sensors 17 00922 g013
Table 1. A 2 × 2 zero-sum matrix game with D-S belief structure payoffs.
Table 1. A 2 × 2 zero-sum matrix game with D-S belief structure payoffs.
Strategy σ 1 σ 2
δ 1 m ( [ 1 , 2 ] ) = 0.6 m ( [ 3 , 5 ] ) = 0.4 m ( [ 1 , 3 ] ) = 1
δ 2 m ( [ 1 , 0 ] ) = 1 m ( [ 1 , 1 ] ) = 0.2 m ( [ 0 , 2 ] ) = 0.8
Table 2. A 5 × 3 zero-sum matrix game with D-S belief structure payoffs.
Table 2. A 5 × 3 zero-sum matrix game with D-S belief structure payoffs.
σ 1 σ 2 σ 3
δ 1 m ( [ 1 , 2 ] ) = 0.5 , m ( [ 0 , 2 ] ) = 0.1 , m ( [ 3 , 5 ] ) = 0.3 , m ( [ 4 , 5 ] ) = 0.1 m ( [ 1 , 1 ] ) = 0.5 , m ( [ 1 , 2 ] ) = 0.3 , m ( [ 1 , 3 ] ) = 0.1 , m ( [ 2 , 3 ] ) = 0.1 m ( [ 3 , 2 ] ) = 0.4 , m ( [ 1 , 1 ] ) = 0.3 , m ( [ 2 , 2 ] ) = 0.1 , m ( [ 1 , 2 ] ) = 0.2
δ 2 m ( [ 1 , 0 ] ) = 0.2 , m ( [ 1 , 1 ] ) = 0.3 , m ( [ 0 , 3 ] ) = 0.3 , m ( [ 1 , 2 ] ) = 0.2 m ( [ 1 , 1 ] ) = 0.2 , m ( [ 0 , 1 ] ) = 0.2 , m ( [ 0 , 1.5 ] ) = 0.3 , m ( [ 1 , 2 ] ) = 0.3 m ( [ 2 , 1.5 ] ) = 0.1 , m ( [ 1 , 1 ] ) = 0.3 , m ( [ 0 , 2 ] ) = 0.3 , m ( [ 1 , 3 ] ) = 0.3
δ 3 m ( [ 1 , 0 ] ) = 0.2 , m ( [ 1 , 1 ] ) = 0.3 , m ( [ 1 , 2 ] ) = 0.1 , m ( [ 0 , 2 ] ) = 0.4 m ( [ 2 , 0 ] ) = 0.2 , m ( [ 1 , 0 ] ) = 0.2 , m ( [ 0.5 , 1 ] ) = 0.3 , m ( [ 0 , 1 ] ) = 0.3 m ( [ 1 , 0 ] ) = 0.3 , m ( [ 0.5 , 0 ] ) = 0.2 , m ( [ 1 , 2 ] ) = 0.3 , m ( [ 0 , 2 ] ) = 0.2
δ 4 m ( [ 1 , 2 ] ) = 0.1 , m ( [ 0 , 2 ] ) = 0.7 , m ( [ 0 , 1 ] ) = 0.1 , m ( [ 1 , 2 ] ) = 0.1 m ( [ 2 , 0 ] ) = 0.4 , m ( [ 1 , 1 ] ) = 0.1 , m ( [ 0.5 , 1 ] ) = 0.2 , m ( [ 0 , 1 ] ) = 0.3 m ( [ 1.5 , 1 ] ) = 0.3 , m ( [ 0.5 , 0 ] ) = 0.1 , m ( [ 1 , 2 ] ) = 0.1 , m ( [ 1 , 3 ] ) = 0.5
δ 5 m ( [ 2 , 1 ] ) = 0.4 , m ( [ 1 , 1 ] ) = 0.2 , m ( [ 0 , 1 ] ) = 0.3 , m ( [ 1 , 2 ] ) = 0.1 m ( [ 3 , 1 ] ) = 0.6 , m ( [ 1 , 2 ] ) = 0.1 , m ( [ 1 , 2 ] ) = 0.2 , m ( [ 0 , 2 ] ) = 0.1 m ( [ 2 , 1 ] ) = 0.4 , m ( [ 1 , 1 ] ) = 0.2 , m ( [ 1 , 2 ] ) = 0.2 , m ( [ 1 , 3 ] ) = 0.2
Table 3. The payoff matrix of the defender in a zero-sum attacker/defender game.
Table 3. The payoff matrix of the defender in a zero-sum attacker/defender game.
Attack 1Attack 2Not Attack
IDS1 ( 2 α 11 1 ) h ( 2 α 12 1 ) h β 1 h
IDS2 ( 2 α 21 1 ) h ( 2 α 22 1 ) h β 2 h
Not monitor h h 0
Table 4. The payoff matrix of the defender in a zero-sum attacker/defender game with belief structure payoffs. IDS, intrusion detection system.
Table 4. The payoff matrix of the defender in a zero-sum attacker/defender game with belief structure payoffs. IDS, intrusion detection system.
Attack 1Attack 2Not Attack
IDS1 m ( [ 70 , 70 ] ) = 1 m ( [ 9.9 , 4.8 ] ) = 0.5 m ( [ 8.2 , 3.1 ] ) = 0.5 m ( [ 0.1 , 0.1 ] ) = 1
IDS2 m ( [ 4.8 , 0.6 ] ) = 0.5 m ( [ 3.4 , 0.8 ] ) = 0.5 m ( [ 40 , 40 ] ) = 1 m ( [ 2 , 2 ] ) = 1
Not monitor m ( [ 100 , 100 ] ) = 1 m ( [ 100 , 100 ] ) = 1 m ( [ 0 , 0 ] ) = 1

Share and Cite

MDPI and ACS Style

Deng, X.; Jiang, W.; Zhang, J. Zero-Sum Matrix Game with Payoffs of Dempster-Shafer Belief Structures and Its Applications on Sensors. Sensors 2017, 17, 922. https://doi.org/10.3390/s17040922

AMA Style

Deng X, Jiang W, Zhang J. Zero-Sum Matrix Game with Payoffs of Dempster-Shafer Belief Structures and Its Applications on Sensors. Sensors. 2017; 17(4):922. https://doi.org/10.3390/s17040922

Chicago/Turabian Style

Deng, Xinyang, Wen Jiang, and Jiandong Zhang. 2017. "Zero-Sum Matrix Game with Payoffs of Dempster-Shafer Belief Structures and Its Applications on Sensors" Sensors 17, no. 4: 922. https://doi.org/10.3390/s17040922

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop