Next Article in Journal
Demand Prediction of Shared Bicycles Based on Graph Convolutional Network-Gated Recurrent Unit-Attention Mechanism
Previous Article in Journal
Limit Distributions of Products of Independent and Identically Distributed Random 2 × 2 Stochastic Matrices: A Treatment with the Reciprocal of the Golden Ratio
Previous Article in Special Issue
A Hybrid MCDM Approach Based on Fuzzy MEREC-G and Fuzzy RATMI
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Protecting Infrastructure Networks: Solving the Stackelberg Game with Interval-Valued Intuitionistic Fuzzy Number Payoffs

Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(24), 4992; https://doi.org/10.3390/math11244992
Submission received: 16 November 2023 / Revised: 11 December 2023 / Accepted: 12 December 2023 / Published: 18 December 2023
(This article belongs to the Special Issue Advances in Fuzzy Decision Theory and Applications, 2nd Edition)

Abstract

:
Critical infrastructure is essential for the stability and development of modern society, and a combination of complex network theory and game theory has become a new research direction in the field of infrastructure protection. However, existing studies do not consider the fuzziness and subjective factors of human judgment, leading to challenges when analyzing strategic interactions between decision makers. This paper employs interval-valued intuitionistic fuzzy numbers (IVIFN) to depict the uncertain payoffs in a Stackelberg game of infrastructure networks and then proposes an algorithm to solve it. First, we construct IVIFN payoffs by considering the different complex network metrics and subjective preferences of decision makers. Next, we propose a lexicographic algorithm to solve this game based on the concept of a strong Stackelberg equilibrium (SSE). Finally, we conduct experiments on target scale-free networks. Our results illustrate that in an SSE, for the defender in a weak position, it is better to defend nodes with high degrees. The experiments also indicate that taking fuzziness into account leads to higher SSE payoffs for the defender. Our work aims to solve a Stackelberg game with IVIFN payoffs and apply it to enhance the protection of infrastructure networks, thereby improving their overall security.

1. Introduction

Critical infrastructures, such as power grids, transportation systems, communication networks, and water supply networks, play vital roles in modern society. On 7 October 2023, Hamas launched an attack on Israel, utilizing drones to target and destroy communications equipment at surveillance posts along the borders of the Gaza Strip. In response, Israel launched thousands of missiles to destroy Gaza’s cables, cell towers, and infrastructure needed to keep people online. Therefore, the protection of critical infrastructure networks has become increasingly challenging and deserves further study. Probabilistic risk assessment (PRA) is a conventional and commonly used method for the analysis of infrastructure investment and protection [1,2]. However, such analysis is resource-intensive and quickly becomes complex, even for small systems. Complex network theory has emerged as a novel approach to overcome the limitations of PRA in dealing with the protection of infrastructure systems. Lee and Tien [3] investigated the impact of variations in three parameters of network vulnerability, namely component vulnerabilities, service interdependency redundancies, and system link configurations. Liu et al. [4] investigated interdependent critical infrastructure networks and designed a cascading failure model, examining cascading failure in both syncretic and single networks. Herrera et al. [5] presented a multilayer complex network framework taking into account the heterogeneity of the redundant infrastructure for realistic network modeling. Recent studies have been conducted on complex networks such as network disintegration [6,7,8] and protection [9,10,11]. These studies have provided effective ways to obtain insights into network attacks and to identify the systems and components that must be protected.
To deal with deliberate attacks, the combination of network science and game theory has garnered considerable research attention. Li et al. [12] applied a simultaneous game and defined payoffs according to the topology of the infrastructure system. They then considered two typical strategies under a cost constraint model [13]. Fu et al. [14] proposed a static network attack and defense game model to examine the impact of cascading failures. Sun et al. [15] established a network attack and defense game model based on betweenness virtual flow. Although a simultaneous game is an important game model, Stackelberg games are more commonly used to model attack and defense scenarios in security domains, as they align better with real-life situations [16]. Li et al. [17] applied a Stackelberg game model to complex networks and evaluated the effects of cost-sensitive parameters. Zeng et al. [18,19] proposed a false network construction method and applied Stackelberg and Bayesian Stackelberg game models for the defense of critical infrastructure networks. Fu et al. [20] established a Stackelberg game model based on camouflage strategies and proposed an evolutionary rule to optimize these strategies. Qi et al. [21,22] proposed a link-hiding rule and analyzed its impact in terms of optimization within the context of dynamic attack and defense games played out on complex networks. Liu et al. [23] established an attack-defensive game model based on a Stackelberg game under asymmetric information, obtaining a defensive resource allocation strategy to optimize the network robustness. Liu et al. [24] established a Stackelberg game model based on a 5G network graph and proposed compact particle swarm optimization based on the location-scale distribution to solve the Nash equilibrium.
However, the aforementioned research fails to consider the problem in a fuzzy environment. The topology of real-world infrastructure networks exhibits numerous features; even if the same nodes are removed after an attack, the effects of the attack can vary when measured using different network metrics [25,26]. Hence, the assessment of an attack’s impact (i.e., the payoffs for both the attacker and the defender) naturally contains fuzziness and uncertainty. In addition, subjective factors and human judgment are challenges in the analysis of the strategic interactions between decision makers. Fuzzy set theory, proposed by Zadeh [27] in 1965, provides a preliminary tool to handle these problems. Atanassov extended the notion of fuzzy sets to intuitionistic fuzzy sets by appending a degree of nonmembership [28,29]. Unfortunately, for  attack and defense games in infrastructure networks, it may be difficult to identify exact values for the membership and nonmembership degrees of impact after a confrontation. Thus, the payoffs of the game seem to be suitably expressed with interval-valued intuitionistic fuzzy numbers (IVIFN) [30]. The IVIFN is characterized by introducing the degrees of membership and nonmembership as whole intervals instead of crisp values. As is known, IVIFN has been extensively applied in the field of decision making [31,32,33,34,35,36,37], and the research in this field has provided several useful methodologies. Many studies have focused on solving the simultaneous game with IVIFN payoffs. Li [38] proved that matrix games with interval-valued intuitionistic fuzzy set (IVIFS) payoffs have solutions, and he developed a mathematical programming methodology by constructing a pair of auxiliary linear/nonlinear programming models to solve these games. Xia [39] proposed several mathematical programming models to find solutions of IVIFN matrix games based on Archimedean t-conorm and t-norm and transformed them into a pair of primal–dual linear programming models. Kumar et al. [40] developed a solution for a two-person zero-sum game with IVIFN payoffs by introducing a new order function to defuzzify the IVIFNs. Naqvi et al. [41] extended the work of Li [38] by proposing a solution for a matrix game with payoffs characterized by linguistic IVIFSs.
To the best of our knowledge, no existing literature has delved into the modeling of fuzzy payoffs for the game in infrastructure networks. Moreover, to the best of our knowledge, no existing research has studied a method to solve Stackelberg games in an interval-valued intuitionistic fuzzy (IVIF) environment. These limitations highlight the need for further research in the area of infrastructure protection. In this paper, we evaluate attack and defense performance using various complex network metrics and introduce a method of constructing them as IVIFNs. Furthermore, we establish a Stackelberg game with IVIFN payoffs where the defender (leader) commits to a strategy before the attacker (follower) selects its own strategy. Inspired by the work of Conitzer et al. [42], we propose a lexicographic method to solve this game. In this method, we use score and accuracy functions to consider the risk attitude of the decision maker by defining two comparison indices arranged in a hierarchical fashion [34]. We then conduct experiments under different available resources and risk attitudes of both the attacker and the defender. We analyze the results of the experiment using a scale-free network as the target. Overall, the model and solution method proposed in this paper enable the incorporation of more payoff information, accounting for factors such as fuzziness, uncertainty, and decision makers’ subjective preferences in the context of protecting infrastructure networks. This extension enhances the applicability of the game model to real-world scenarios and offers a more rational basis for strategy selection. Furthermore, this research provides insights that can inform defenders in the protection of infrastructure networks.

2. Preliminaries

In this section, we briefly review the basic concepts of IVIFSs and IVIFNs and the different ranking methods of the latter. We also review a classical Stackelberg game (one attacker and one defender) and its SSE.

2.1. Regarding the IVIF Theory

Definition 1. 
An IVIFS A ˜ in the universe of discourse Z is defined by [30] A ˜ = x , μ A ˜ L ( x ) , μ A ˜ U ( x ) , ν A ˜ L ( x ) , ν A ˜ U ( x ) x Z , where μ A ˜ L ( x ) , μ A ˜ U ( x ) D [ 0 , 1 ] and ν A ˜ L ( x ) , ν A ˜ U ( x ) D [ 0 , 1 ] , with the condition 0 μ A ˜ U ( x ) + ν A ˜ U ( x ) 1 , x Z . Here, the intervals μ A ˜ L ( x ) , μ A ˜ U ( x ) , and  ν A ˜ L ( x ) , ν A ˜ U ( x ) , respectively, represent the membership degree and nonmembership degree of the element x Z to A ˜ . For each element x, the hesitancy degree of x Z to A ˜ is defined as 1 μ A ˜ U ( x ) ν A ˜ U ( x ) , 1 μ A ˜ L ( x ) ν A ˜ L ( x ) .
In [31], Xu called the pair μ L , μ U , ν L , ν U an IVIFN, where 0 μ L μ U 1 , 0 ν L ν U 1 , and  0 μ U + ν U 1 .
Definition 2. 
Let ξ ˜ 1 = μ 1 L , μ 1 U , ν 1 L , ν 1 U and ξ ˜ 2 = μ 2 L , μ 2 U , ν 2 L , ν 2 U be any two IVIFNs; then [30],
(1) 
ξ ˜ 1 ξ ˜ 2 ξ ˜ 1 < ξ ˜ 2 iff μ 1 L < μ 2 L , μ 1 U < μ 2 U , ν 1 L > ν 2 L and ν 1 U > ν 2 U ;
(2) 
ξ ˜ 1 = ξ ˜ 2 iff μ 1 L = μ 2 L , μ 1 U = μ 2 U , ν 1 L = ν 2 L and ν 1 U = ν 2 U ;
(3) 
ξ ˜ 1 + ξ ˜ 2 = μ 1 L + μ 2 L μ 1 L μ 2 L , μ 1 U + μ 2 U μ 1 U μ 2 U , ν 1 L ν 2 L , ν 1 U ν 2 U ;
(4) 
ξ ˜ 1 ξ ˜ 2 = μ 1 L μ 2 L , μ 1 U μ 2 U , ν 1 L + ν 2 L ν 1 L ν 2 L , ν 1 U + ν 2 U ν 1 U ν 2 U ;
(5) 
r ξ ˜ 1 = 1 1 μ 1 L r , 1 1 μ 1 U r , ν 1 L r , ν 1 U r .
Definition 3. 
Xu’s method of ranking IVIFNs is shown as follows [31]. For an IVIFN ξ ˜ = μ L , μ U , ν L , ν U , the score function X S F and accuracy function X A F of the IVIFN ξ ˜ can be computed as
X S F ( ξ ˜ ) = μ L + μ U ν L ν U 2 ,
X A F ( ξ ˜ ) = μ L + μ U + ν L + ν U 2 ,
where 1 X S F ( ξ ˜ ) 1 and 0 X A F ( ξ ˜ ) 1 .
Let ξ ˜ 1 and ξ ˜ 2 be any two IVIFNs; then,
(1) 
If X S F ξ ˜ 1 < X S F ξ ˜ 2 , then ξ ˜ 1 < ξ ˜ 2 ;
(2) 
If X S F ξ ˜ 1 > X S F ξ ˜ 2 , then ξ ˜ 1 > ξ ˜ 2 ;
(3) 
If X S F ξ ˜ 1 = X S F ξ ˜ 2 , then
(i) 
If X A F ξ ˜ 1 < X A F ξ ˜ 2 , then ξ ˜ 1 < ξ ˜ 2 ;
(ii) 
If X A F ξ ˜ 1 > X A F ξ ˜ 2 , then ξ ˜ 1 > ξ ˜ 2 ;
(iii) 
If X A F ξ ˜ 1 = X A F ξ ˜ 2 , then ξ ˜ 1 = ξ ˜ 2 .
However, Xu’s method of ranking IVIFNs has the shortcoming that it cannot distinguish IVIFNs μ 1 L , μ 1 U , ν 1 L , ν 1 U and μ 2 L , μ 2 U , ν 2 L , ν 2 U if μ 1 L + μ 1 U = μ 2 L + μ 2 U and ν 1 L + ν 1 U = ν 2 L + ν 2 U .
Definition 4. 
Wang and Wan’s method of ranking IVIFNs is shown as follows [34]. For an IVIFN ξ ˜ = μ L , μ U , ν L , ν U , the score function W S F and accuracy function W A F of the IVIFN ξ ˜ can be computed as
W S F ( ξ ˜ ) = λ μ L ν U + ( 1 λ ) μ U ν L ,
W A F ( ξ ˜ ) = λ μ L + ν U + ( 1 λ ) μ U + ν L ,
where 1 W S F ( ξ ˜ ) 1 , 0 W A F ( ξ ˜ ) 1 , and  λ [ 0 , 1 ] is the risk attitude parameter of the decision maker.
Let ξ ˜ 1 and ξ ˜ 2 be any two IVIFNs; then,
(1) 
If W S F ξ ˜ 1 < W S F ξ ˜ 2 , then ξ ˜ 1 < ξ ˜ 2 ;
(2) 
If W S F ξ ˜ 1 > W S F ξ ˜ 2 , then ξ ˜ 1 > ξ ˜ 2 ;
(3) 
If W S F ξ ˜ 1 = WSF ξ ˜ 2 , then
(i) 
If W A F ξ ˜ 1 < W A F ξ ˜ 2 , then ξ ˜ 1 < ξ ˜ 2 ;
(ii) 
If W A F ξ ˜ 1 > W A F ξ ˜ 2 , then ξ ˜ 1 > ξ ˜ 2 ;
(iii) 
If W A F ξ ˜ 1 = W A F ξ ˜ 2 , then ξ ˜ 1 = ξ ˜ 2 .
In this ranking method, the decision maker is considered risk-seeking when λ [ 0 , 0.5 ) and risk-averse when λ ( 0.5 , 1 ] . If  λ = 0.5 , the decision maker is neutral to risk, and Equations (3) and (4) are reduced to Equations (1) and (2). Therefore, Wang and Wan’s ranking method is a general extension of Xu’s ranking method.

2.2. The Stackelberg Game

In a normal-form Stackelberg game, the defender is the leader and the attacker is the follower. S D and S A denote the strategy sets of the defender and the attacker. The payoff functions of the attacker and the defender can be represented as f A : S D × S A R and f D : S D × S A R , respectively. The payoffs under different strategy profiles are real numbers. In this game, the attacker obtains the defender’s mixed strategy and chooses the best response strategy. Correspondingly, the defender has the ability to anticipate the attacker’s preferred strategy before committing to a mixed strategy. The Stackelberg game model is shown in Figure 1.

2.3. The Strong Stackelberg Equilibrium

A Stackelberg equilibrium, which is the conceptual solution of Stackelberg games, captures the optimal outcome of the defender’s strategy, since the attacker will always respond optimally to the defender’s strategy [43]. When the attacker has multiple optimal responses to the mixed strategy committed by the defender, a tie occurs. The attacker’s various tie-breaking rules result in different Stackelberg equilibria. In real-world scenarios, we typically assume that the attacker will choose the strategy that benefits the defender, thereby leading to an SSE [44,45]. Hence, the optimal mixed strategy for the defender in an SSE is s D Δ S D , which maximizes max f D s D , R F s D : s D Δ S D , where Δ S D is the set of probability distributions over S D and R F s D = arg max f A s D , s A : s A S A is the reaction function for the attacker.

3. Stackelberg Game Model Based on Interval-Valued Intuitionistic Fuzzy Theory

3.1. Basic Assumptions

Consider a target network, such as a railway network, that is formalized in terms of a simple undirected graph G ( V , E ) , where V = v 1 , v 2 , , v N is the set of nodes and E V × V is the set of edges (i.e., the railway stations and the railway lines, respectively, in the railway network). Let N = | V | be the number of nodes in the network. We denote the number of nodes in the network by N = | V | . The adjacency matrix A ( G ) of the network G is defined by a i j N × N , where a i j = a j i = 1 if nodes v i and v j are adjacent and a i j = a j i = 0 otherwise. The following assumptions are made in this model:
(1)
There is only one defender, who moves first, and one attacker, who moves after knowing the defender’s strategy commitment.
(2)
Both players (i.e., the attacker and the defender) have access to complete information about the target network and possess full knowledge of each other. This means that they are fully informed about all possible strategy profiles and the corresponding payoffs for both sides.
(3)
The game consists of a single round, in which both players strive to adopt optimal strategies.

3.2. Cost Model

For node v i , let c i A and c i D be the attack cost and the defense cost, respectively. The cost c i A or c i D is determined by a specific referential property r i 0 associated with node v i , which can be expressed as
c i A = r i q A ,
c i D = r i q D ,
where q A 0 is the attack cost sensitivity parameter and q D 0 is the defense cost sensitivity parameter. In this paper, the referential property r i is set as the degree of node v i . From Equations (5) and (6), the cost associated with a node v i is determined not only by its degree in the network but also by the cost-sensitive parameters of the players. The parameters q A and q D can be determined through expert experience, as well as by considering the actual usage and resource allocation of the infrastructure network.
The available resources of both the attacker and the defender can be defined as follows:
C A = θ A i = 1 N c i A = θ A i = 1 N r i q A ,
C D = θ D i = 1 N c i D = θ D i = 1 N r i q D .
The attack and defense cost constraint parameters are denoted by θ A [ 0 , 1 ] and θ D [ 0 , 1 ] , respectively. The values of θ A and θ D represent the attacker’s and defender’s respective cost budgets for attacking or defending.

3.3. Strategies

Based on the cost model presented in Section 3.2, and taking the attacker as an example, the feasible strategies presented in prior studies are defined as follows [13,17].
Suppose that X = x 1 , x 2 , , x N S A is an attack strategy vector, where S A represents the strategy set of the attacker. We define V A V as the set of attacked nodes and let x i = 1 if node v i is attacked v i V A ; otherwise, x i = 0 . The total cost of an attack strategy X is denoted by
C X = v i V A c i A = i = 1 N x i c i A = i = 1 N x i r i q A .
The cost constraint on the attacker is
C X = i = 1 N x i r i q A C A = θ A i = 1 N r i q A .
Similarly, the cost constraint on the defender is
C Y = i = 1 N y i r i q D C D = θ D i = 1 N r i q D .
In an infrastructure network, when one node fails, its function within the network becomes invalid. We assume that node v i will only fail if it is attacked without protection (i.e., x i = 1 and y i = 0 ). Conversely, if the node is defended (i.e., x i = 1 and y i = 1 ), it will not fail.
The attack and defense strategies defined in Equations (10) and (11) have an expansive strategy space, especially in networks with a large size N. For instance, in a network with N = 100 , S A = C N N / 2 = ( 100 × 99 × × 51 ) / ( 50 × 49 × × 1 ) 2 50 when θ A = 0.5 and q A = 0 . The size of strategy profiles S A × S D is even larger.
In real-world scenarios, it can be intuitively seen that many decision makers generally choose a better strategy from several options. While there may exist alternative strategies, focusing on the analysis of typical strategies holds greater relevance for decision makers. Therefore, to facilitate the analysis, this paper will consider the following two typical attack and defense strategies [19].
(1)
High-degree strategy (HS): In this case, the attacker and the defender allocate all their resources to the nodes with the highest degree. Although the number of nodes selected is small, they have relatively high importance.
(2)
Low-degree strategy (LS): In this scenario, the attacker and defender allocate all their resources to nodes with the lowest degree. Although the selected nodes may have lower importance, their quantity is greater.
To obtain an HS (or LS), the nodes are initially sorted in either descending or ascending order based on their referential property. Subsequently, the targets of the attack (or defense) set are incrementally added in this ordered sequence, while continuously checking for any violation of the cost constraint. This process is terminated when adding one more node into the set results in a violation of the constraint.

3.4. Payoffs

To better address uncertainty in attack and defense games in infrastructure networks, it is appropriate to define the payoff for a decision maker as an IVIFN, which is more realistic when dealing with the decision maker’s fuzziness. The payoff functions of the attacker and the defender under this circumstance can be represented as f ˜ A : S D × S A I V I F N and f ˜ D : S D × S A I V I F N , respectively. Consider the target network G ( V , E ) , and let V ^ V be the set of failing nodes and E ^ E be the set of removed edges. When a node fails, it loses its ability to maintain its functionality, resulting in the removal of all edges connected to it. G ^ = ( V , E E ^ ) denotes the network topology that remains after the attack and defense game is played in a single round. From the perspective of both the attacker and the defender, the change in network topology in the target network G is considered to be the universe of discourse Z. The “satisfaction with the effect of the attack or defense” for the attacker and the defender, when the attacker chooses strategy i and the defender takes strategy j, is represented by the IVIFN on Z, denoted by μ i j A L , μ i j A U , ν i j A L , ν i j A U and μ i j D L , μ i j D U , ν i j D L , ν i j D U , respectively. Because there are only two typical strategies considered in this paper, we have i , j { 1 , 2 } , where strategy 1 represents the HS and strategy 2 represents the LS.
To comprehensively show the effect of the attack and the defense on the target network, we adopt the network efficiency ( Ψ ) and the size of the largest connected component ( Γ ) as the functions measuring the network performance. Let G ˜ = ( V , E E ˜ ) be the network in which all attacked nodes become failing nodes without any defense. The alterations in the network topology under the strategy profiles (i,j) can be quantified utilizing Equations (12)–(15). Furthermore, these equations serve as references for the IVIFN payoffs of the attacker and the defender.
Ψ i j A = Ψ ( G ) Ψ ( G ^ ) Ψ ( G ) [ 0 , 1 ] ,
Γ i j A = Γ ( G ) Γ ( G ^ ) Γ ( G ) [ 0 , 1 ] ,
Ψ i j D = Ψ ( G ) Ψ ( G ^ ) Ψ ( G ) e Ψ ( G ^ ) Ψ ( G ˜ ) Ψ ( G ) [ 0 , 1 ] ,
Γ i j D = Γ ( G ) Γ ( G ^ ) Γ ( G ) e Γ ( G ^ ) Γ ( G ˜ ) Γ ( G ) [ 0 , 1 ] .
Obviously, both Ψ i j A and Γ i j A can be used to represent the membership degree with respect to the attacker’s satisfaction, while both Ψ i j D and Γ i j D can be used to represent the nonmembership degree with respect to the defender’s dissatisfaction. The membership and nonmembership degrees may vary within certain ranges, and it is more appropriate to consider them as intervals μ i j A L , μ i j A U and ν i j D L , ν i j D U . In this paper, the membership degree of the attacker and the nonmembership degree of the defender can be obtained based on the aforementioned network metrics, as follows:
μ i j A L = 1 4 max Ψ i j A , Γ i j A + 3 4 min Ψ i j A , Γ i j A ,
μ i j A U = 3 4 max Ψ i j A , Γ i j A + 1 4 min Ψ i j A , Γ i j A ,
ν i j D L = 1 4 max Ψ i j D , Γ i j D + 3 4 min Ψ i j D , Γ i j D ,
ν i j D U = 3 4 max Ψ i j D , Γ i j D + 1 4 min Ψ i j D , Γ i j D ,
where μ i j A L , μ i j A U , ν i j D L , ν i j D U [ 0 , 1 ] and μ i j A L μ i j A U , ν i j D L ν i j D U . We divide the original intervals min Ψ i j A , Γ i j A , max Ψ i j A , Γ i j A and min Ψ i j D , Γ i j D , max Ψ i j D , Γ i j D into smaller intervals and halve the value range to enhance the accuracy.
Specifically, when more nodes are successfully attacked, the defender’s dissatisfaction and the attacker’s satisfaction increase. To incorporate the subjective preferences of both the attacker and the defender, we modify the expression to reflect the nonmembership of the attacker and the membership of the defender. This can be obtained as follows:
ν i j A L = 1 μ i j A U 1 μ i j A U 1 μ i j A L e | V ^ | | V | ε ,
ν i j A U = 1 μ i j A U e | V ^ | | V | ε ,
μ i j D L = 1 ν i j D U 1 ν i j D U 1 ν i j D L e | V ^ | | V | ε ,
μ i j D U = 1 ν i j D U e | V ^ | | V | ε ,
where ε is a parameter that represents the hesitancy degree of the attacker and the defender, with a higher value of ε indicating a greater degree of hesitancy. Let | V ^ | denote the number of failing nodes and | V | the total number of nodes. Obviously, we have ν i j A L , ν i j A U , ν i j D L , ν i j D U [ 0 , 1 ] and ν i j A L ν i j A U , ν i j D L ν i j D U . As  | V ^ | increases, the membership degree of the defender and the nonmembership degree of the attacker decrease. Because  e | V ^ | | V | 1 , it is obvious that the IVIFNs that we propose satisfy the condition μ i j A U + 1 μ i j A U e | V ^ | | V | 1 ,   1 ν i j D U 1 e | V ^ | | V | + ν i j D U 1 (i.e., μ i j A U + ν i j A U 1 , μ i j D U + ν i j D U 1 ). Therefore, we can obtain the 2 × 2 payoff matrix in Figure 2 based on Equations (16)–(23), where f ˜ A ( i , j ) = μ i j A L , μ i j A U , ν i j A L , ν i j A U and f ˜ D ( i , j ) = μ i j D L , μ i j D U , ν i j D L , ν i j D U . The row player is the attacker, and the column player is the defender.
The process of generating the IVIFN payoffs of the attacker and the defender under different strategy profiles is shown in Figure 3.

4. The Lexicographic Method to Solve a Stackelberg Game with IVIFN Payoffs

4.1. The Lexicographic Method

To solve a Stackelberg game in a crisp condition, Conitzer and Sandholm proposed a multiple linear programming (Multi-LP) algorithm to obtain an SSE solution [42]. Inspired by Multi-LP and the concept of SSE, for a Stackelberg game with the payoffs of IVIFNs, we propose a lexicographic solution method to obtain the optimal strategy profile. For every pure attacker strategy t S A , let p i t represent the probability that the defender commits to the defense strategy i S D and the vector p t = p 1 t , p 2 t , , p S D t denotes the mixed strategy for the defender. We can derive a mixed strategy for the defender such that (1) pure strategy t is the optimal response for the attacker and (2) the mixed strategy maximizes the defender’s utility under this constraint. The mixed strategy can be derived by solving the following fuzzy mathematical programming model:
max i S D p i t f ˜ D ( i , t ) s . t . i S D p i t f ˜ A ( i , j ) l e x i S D p i t f ˜ A ( i , t ) , j S A i S D p i t = 1 p i t 0 , i S D ,
where i S D p i t f ˜ A ( i , j ) = [ 1 i S D ( 1 μ i j A L ) p i t , 1 i S D ( 1 μ i j A U ) p i t ] , [ i S D ( ν i j A L ) p i t , i S D ( ν i j A U ) p i t ] , i S D p i t f ˜ A ( i , t ) =   [ 1 i S D ( 1 μ i t A L ) p i t , 1 i S D ( 1 μ i t A U ) p i t ] , [ i S D ( ν i t A L ) p i t , i S D ( ν i t A U ) p i t ] , and  i S D p i t f ˜ D ( i , t ) = [ 1 i S D ( 1 μ i t D L ) p i t , 1 i S D ( 1 μ i t D U ) p i t ] , [ i S D ( ν i t D L ) p i t , i S D ( ν i t D U ) p i t ] are IVIFNs. The lexicographic order relation is lex . From Wang’s ranking method in Definition 4, for IVIFNs i S D p i t f ˜ A ( i , j ) and i S D p i t f ˜ A ( i , t ) , we have i S D p i t f ˜ A ( i , j ) l e x i S D p i t f ˜ A ( i , t ) if and only if
(1)
W S F i S D p i t f ˜ A ( i , j ) < W S F i S D p i t f ˜ A ( i , t ) or
(2)
W S F i S D p i t f ˜ A ( i , j ) = W S F i S D p i t f ˜ A ( i , t ) and W A F i S D p i t f ˜ A ( i , j ) W A F i S D p i t f ˜ A ( i , t ) .
According to Definitions 2 and 4, Equation (24) can be converted into a lexicographic max mathematical programming model as follows:
l e x max W S F i S D p i t f ˜ D ( i , t ) , W A F i S D p i t f ˜ D ( i , t ) s . t . i S D p i t f ˜ A ( i , j ) l e x i S D p i t f ˜ A ( i , t ) , j S A i S D p i t = 1 p i t 0 , i S D ,
where l e x max indicates the operation of lexicographic maximization.
We develop a lexicographic approach to solve Equation (25) in the sense of Pareto optimality and divide this approach into two stages.
As the scoring function takes priority over the accuracy function in the objective function, the programming model in the first stage is constructed as
max W S F i S D p i t f ˜ D ( i , t ) s . t . i S D p i t f ˜ A ( i , j ) l e x i S D p i t f ˜ A ( i , t ) , j S A i S D p i t = 1 p i t 0 , i S D .
The optimal mixed strategy of the defender can be obtained from Equation (26), denoted by p t 0 = p 1 t 0 , p 2 t 0 , , p S D t 0 . We then have W S F t * = W S F i S D p i t 0 f ˜ D ( i , t ) and W A F t 0 = W A F i S D p i t 0 f ˜ D ( i , t ) .
In the second stage, the following programming model is constructed:
max W A F i S D p i t f ˜ D ( i , t ) s . t . i S D p i t f ˜ A ( i , j ) l e x i S D p i t f ˜ A ( i , t ) , j S A W S F t * W S F i S D p i t f ˜ D ( i , t ) W A F t 0 W A F i S D p i t f ˜ D ( i , t ) i S D p i t = 1 p i t 0 , i S D .
By solving Equation (27), we can obtain W S F t = W S F i S D p i t f ˜ D ( i , t ) , W A F t = W A F i S D p i t f ˜ D ( i , t ) and the optimal strategy p t = p 1 t , p 2 t , , p S D t .
For each pure strategy t of the attacker, we can compute the optimal mixed strategy p t = p 1 t , p 2 t , , p S D t and the IVIFN utility i S D p i t f ˜ D ( i , t ) for the defender. Among these attacker strategies, we choose t ^ to maximize the defender’s IVIFN utility, where i S D p i t ^ f ˜ D ( i , t ^ ) l e x i S D p i t f ˜ D ( i , t ) . The mixed strategy p t ^ = p 1 t ^ , p 2 t ^ , , p S D t ^ of the defender and strategy t ^ of the attacker constitute an optimal strategy profile.
We utilize the aforementioned lexicographic method to solve an example Stackelberg game, where the payoffs are represented by IVIFNs. Let us assume that the risk attitude parameter λ = 0.5 and the payoff matrices for the attacker and defender are provided as follows:
A ˜ e = 1 2 1 2 [ 0.2 , 0.3 ] , [ 0.2 , 0.3 ] [ 0.3 , 0.4 ] , [ 0.3 , 0.4 ] [ 0.5 , 0.6 ] , [ 0.1 , 0.2 ] [ 0.3 , 0.8 ] , [ 0.1 , 0.2 ]
D ˜ e = 1 2 1 2 [ 0.5 , 0.6 ] , [ 0.2 , 0.3 ] [ 0.5 , 0.6 ] , [ 0.3 , 0.4 ] [ 0.4 , 0.5 ] , [ 0.1 , 0.2 ] [ 0.3 , 0.4 ] , [ 0.1 , 0.2 ] .
The rows of the matrices represent the defender, while the columns represent the attacker. When the attacker chooses strategy 1 and applies Equation (26), a feasible solution p 10 = ( 0 , 1 ) can be obtained. We then have W S F 1 = 0.6 and W A F 10 = 1.2 . After applying Equation (27), we find that p 1 = ( 0 , 1 ) , W S F 1 = 0.6 , and  W A F 1 = 1.6 . When the attacker chooses strategy 2 and applies Equation (26), a feasible solution p 20 = ( 0.523 , 0.477 ) can be obtained. We then have W S F 2 = 0.463 and W A F 20 = 1.393 . After applying Equation (27), we find that p 2 = ( 0.523 , 0.477 ) , W S F 2 = 0.463 , and  W A F 2 = 1.393 .
It is evident that the optimal strategy for the defender is (0,1) and that the attacker’s best response is strategy 1.

4.2. The Lexicographic Algorithm

The specific calculation process to obtain the equilibria of the Stackelberg game with fuzzy number payoffs is shown in Algorithm 1.
Algorithm 1 The process to obtain equilibrium strategies
Input: The payoff function (or payoff matrix) of the defender, f ˜ D ;
            The payoff function (or payoff matrix) of the attacker, f ˜ A ;
            The strategy set of the defender, S D ;
            The strategy set of the attacker, S A .
Output: The equilibrium payoff of the defender, i S D p i t ^ f ˜ D ( i , t ^ ) ;
               The equilibrium payoff of the attacker, i S D p i t ^ f ˜ A ( i , t ^ ) ;
               The defender’s probability distribution when choosing the optimal mixed
               strategy, p t ^ = p 1 t ^ , p 2 t ^ , , p S D t ^ ;
               The attacker’s optimal reaction strategy, t ^ .
1:
for   t = 1   :   | S A |   do
2:
      Calculate W S F t = max W S F i S D p i t f ˜ D ( i , t ) by Equation (26);
3:
      if  W S F t exists then
4:
              p t 0 = p 1 t 0 , p 2 t 0 , , p S D t 0 ;
5:
              W S F t = W S F i S D p i t 0 f ˜ D ( i , t ) ;
6:
             Calculate W A F t = W A F i S D p i t f ˜ D ( i , t ) by Equation (27);
7:
              p t = p 1 t , p 2 t , , p S D t ;
8:
              W S F t = W S F i S D p i t f ˜ D ( i , t ) , W A F t = W A F i S D p i t f ˜ D ( i , t ) .
9:
     else if then
10:
             W S F t = , W A F t = ;
11:
    end if
12:
end for
13:
Sort W S F t , W S F t ¯ = max W S F t .
14:
Sort W A F t , W A F t ^ = max W A F t ¯ .
15:
return  i S D p i t ^ f ˜ D ( i , t ^ ) , i S D p i t ^ f ˜ A ( i , t ^ ) , p t = p 1 t , p 2 t , , p S D t , t ^ .

4.3. Advantages and Limitations of the Lexicographic Method

The lexicographic method has the following advantages.
(1)
In the lexicographic solution method, the uniqueness of the optimal fuzzy objective values can be guaranteed. It provides a clear and unambiguous ranking of solutions, which is crucial for decision-making processes.
(2)
All available information during the solving process, such as the fuzziness of the objectives and the inequality relations within the constraints, is taken into consideration.
(3)
The lexicographic method is flexible in the actual decision-making process due to the availability of various similar ranking methods for IVIFNs.
Despite its advantages, the lexicographic method has some limitations.
(1)
The proposed method in this paper heavily relies on the input data in the form of IVIFNs. Insufficient or inaccurate payoffs will directly impact the results obtained by the algorithm.
(2)
The method proposed in this paper is only applicable to a two-player Stackelberg game and cannot address scenarios with multiple leaders or multiple followers.

5. Experiments

5.1. Experimental Settings

We model a scale-free network with a power-law degree distribution, denoted by p ( k ) ( η 1 ) m η 1 k η [46], to represent infrastructure networks such as power grids, which often exhibit this type of distribution [47]. We set N = 300 , η = 3 , m = 2 and the cost-sensitive parameter q A = q D = 0.5 .
To investigate the effect of hesitancy parameter ε , we set θ A = 0.3 and θ D = 0.7 . According to Definition 1, we present the hesitancy degree for the attacker and defender under different strategy profiles as ε increases in Table 1. As shown in Table 1, the hesitancy degree under different strategy profiles also increases with the increase in ε . However, considering real-world scenarios, decision makers typically have a certain hesitancy degree, but it is not excessively high. Therefore, choosing ε = 0.1 is a more realistic option. Thus, we set ε = 0.1 in this paper.

5.2. Payoff Analysis

In Section 3.4, we utilized IVIFNs to represent the payoffs of the attacker and the defender under different strategy profiles in a Stackelberg game in infrastructure networks. This approach was adopted due to the diversity of complex network metrics and the subjective preferences of the players. We analyze the payoffs of the attacker and defender under different strategy profiles when, for example, θ A = 0.7 and θ D = 0.3 (Figure 4a,b and Figure 4c,d, respectively), where μ i j A = μ i j A L , μ i j A U , ν i j A = ν i j A L , ν i j A U , μ i j D = μ i j D L , μ i j D U , and ν i j D = ν i j D L , ν i j D U ( i , j { 1 , 2 } ) .
From Figure 4, it is evident that when θ A or θ D varies, for i { 1 , 2 } , j { 1 , 2 } , the monotonicity of μ i j A L μ i j D L is consistent with that of μ i j A U μ i j D U , while it demonstrates an inverse trend compared to the monotonicity of ν i j A L ν i j D L and ν i j A U ν i j D U . Because θ D increases and θ A = 0.7 , the defender’s membership in different strategy profiles increases while its nonmembership decreases. On the other hand, the attacker’s membership in different strategy profiles decreases while its nonmembership increases. When θ A increases and θ D = 0.3 , the defender’s membership in different strategy profiles decreases while its nonmembership increases. Conversely, the attacker’s membership in different strategy profiles increases while its nonmembership decreases. It is obvious that when the cost constraint parameter for the attacker or the defender increases, this generally results in an upward trend in the payoffs for different strategy profiles. This can be inferred from the degree of membership and nonmembership.

5.3. The SSE with Different Values of θ A and θ D

We use the score function in Definition 4 to show the SSE payoffs of the attacker and the defender (i.e., W S F i S D p i t ^ f ˜ A ( i , t ^ ) and W S F i S D p i t ^ f ˜ D ( i , t ^ ) ) in Figure 5.
In Figure 5a, we can see that the SSE payoffs for the attacker have the highest value when it has significantly more resources than the defender and lowest when the attacker has far fewer resources. Simultaneously, the SSE payoffs of the attacker decrease as θ A decreases while θ D increases. Conversely, in Figure 5b, we can see that when the defender’s resources are much lower than those of the attacker, the defender’s SSE payoffs are at their lowest. However, if the defender’s resources surpass those of the attacker, the defender’s SSE payoffs will be high. Simultaneously, overall, the SSE payoffs for the defender increase as θ A decreases while θ D increases. However, when θ D is greater than θ A , regardless of the changes in θ D or θ A , the SSE payoffs for the defender remain at their maximum value. This is because when the defender has more resources, the majority of nodes remain unattacked, resulting in higher and relatively unchanged benefits for the defender. Universally, the SSE payoffs of the attacker and the defender will rise with an increase in λ .
The SSE strategies of the attacker and the defender with different cases of risk attitude parameters are shown in Figure 6. Upon analyzing the SSE strategies of the attacker and the defender, the following two main characteristics can be observed: (1) regarding the defender, regardless of changes in λ , when θ D is small ( θ D [ 0.1 , 0.4 ] ) and θ A is large θ A [ 0.6 , 0.9 ] , the probability of adopting the HS is approximately 0.8; (2) regarding the attacker, regardless of changes in λ , when θ D is small θ D [ 0.1 , 0.4 ] and θ A is large θ A [ 0.6 , 0.9 ] , the attacker will adopt the HS, and the tendency for the attacker to choose HS increases as λ decreases. For these two characteristics, we provide the following explanation.
For the first characteristic, when in a weak position, the defender is more likely to allocate its limited resources to protecting critical nodes. This aligns with [6], which states that the failure of critical nodes leads to a significant decline in network performance.
For the second characteristic, Figure 7 shows the defender’s optimal utility expressed by the score function in Definition 4 when the best responses of the attacker are the HS and the LS ( W S F i S D p i 1 f ˜ D ( i , 1 ) and W S F i S D p i 2 f ˜ D ( i , 2 ) , respectively). According to the theory of breaking ties in SSE, the attacker will choose the best response strategy that maximizes the defender’s utility. From Figure 7, when the defender is in a weak position, we always have W S F i S D p i 1 f ˜ D ( i , 1 ) > W S F i S D p i 2 f ˜ D ( i , 2 ) , but as λ decreases, situations where W S F i S D p i 1 f ˜ D ( i , 1 ) < W S F i S D p i 2 f ˜ D ( i , 2 ) become increasingly prevalent. The reason for this is that, by becoming more risk-seeking, the attacker expresses a preference for the HS, which offers an opportunity for greater utility.

5.4. Comparative Analysis

In order to demonstrate the advantage of taking fuzziness into consideration, we conduct an analysis of the target network using crisp payoffs and the solution method described in [18]. We derive the defender’s “crisp strategy” p c = p 1 c , p 2 c , , p S D c , where the payoffs are expressed as crisp values obtained solely through the size of the largest connected component, and the solving method employed is the Multi-LP method [42]. By substituting p c into the proposed model in this paper, we can obtain the attacker’s optimal response strategy t by comparing W S F i = S D p i c f ˜ A ( i , j ) , 1     j     | S A | , which in turn allows us to determine the defender’s payoff, represented by the score function under p c . As an example, we consider the case of λ = 0.5 . We compare the SSE payoffs in Figure 6b with the defender’s payoffs under p c , as shown in Figure 8.
From Figure 8, it can be observed that taking the fuzziness into consideration can lead to higher SSE payoffs for the defender. Compared to employing the Multi-LP method under the crisp condition, the defender’s SSE payoff can be increased by up to 0.274.

6. Conclusions

Critical infrastructure plays a vital role in the stability and development of modern society, and the protection of such infrastructure has recently drawn extensive attention. In this paper, we analyzed the Stackelberg game for an infrastructure network based on IVIF theory, leading to three main contributions.
First, a Stackelberg game model of infrastructure networks with IVIFN payoffs was introduced considering various complex network metrics and the decision makers’ subjective judgment. The payoffs of the games in infrastructure networks were evaluated as IVIFNs. To show the effect of an attack on or a defense of the target network in the IVIF environment, the network efficiency and size of the largest connected component were used to represent the membership or nonmembership degree, and we modified the satisfaction of the decision makers according to the number of failed nodes. Second, to solve a Stackelberg game with IVIFN payoffs, we proposed a programming model based on the lexicographic method. In the proposed model, we converted the IVIF constraints into their equivalent sets of crisp constraints and utilized the optimization of a deterministic bi-objective function to be solved in a lexicographic manner. The score function and accuracy function with the risk attitude of the attacker and the defender were used, where the priority of the score function was higher than that of the accuracy function. Combined with the proposed model, we designed an algorithm that would utilize the concept of SSE to determine the optimal strategies for the attacker and the defender. Finally, we investigated the IVIFN payoffs and SSEs of the game in a target scale-free network with different cost constraint parameters for the attacker and the defender. We demonstrated the variation in the trends of the payoffs represented by IVIFNs and discovered that the payoffs of both the attacker and the defender were generally monotonic and had opposite trends when changed. We found that under SSE, the defender’s probability of choosing the HS was higher when in a weak position and that the attacker would choose the HS more frequently in various combinations when λ became lower. We also observed that taking the fuzziness into consideration can lead to higher SSE payoffs for the defender.
This paper studied a Stackelberg game in infrastructure networks with IVIFN payoffs, and an algorithm based on a lexicographic method was proposed to obtain the optimal strategy. In future work, we will investigate a more appropriate method to denote the IVIFN payoffs. This will allow us to better capture the uncertainty of the decision makers’ satisfaction and enhance the accuracy of our analysis. Moreover, for the method of ranking IVIFNs, we will consider using a more appropriate scoring function or accuracy function to improve the quality of the solution.

Author Contributions

Conceptualization, Y.D., J.L. and W.L.; methodology, Y.D. and W.L.; software, Y.D.; validation, Y.D.; formal analysis, Y.D. and J.L.; investigation, J.L. and J.R.; writing—original draft preparation, Y.D. and J.R.; writing—review and editing, J.L., W.L. and Z.L.; visualization, Y.D. and J.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Johnson, C.A.; Flage, R.; Guikema, S.D. Feasibility study of PRA for critical infrastructure risk analysis. Reliab. Eng. Syst. Saf. 2021, 212, 107643. [Google Scholar] [CrossRef]
  2. Suo, W.; Wang, L.; Li, J. Probabilistic risk assessment for interdependent critical infrastructures: A scenario-driven dynamic stochastic model. Reliab. Eng. Syst. Saf. 2021, 214, 107730. [Google Scholar] [CrossRef]
  3. Lee, C.; Tien, I. Impacts of varying network parameters on the vulnerability and resilience of interdependent critical infrastructure systems. Sustain. Resilient Infrastruct. 2022, 7, 984–1007. [Google Scholar] [CrossRef]
  4. Liu, S.; Yin, C.; Chen, D.; Lv, H.; Zhang, Q. Cascading failure in multiple critical infrastructure interdependent networks of syncretic railway system. IEEE Trans. Intell. Transp. Syst. 2022, 23, 5740–5753. [Google Scholar] [CrossRef]
  5. Herrera, M.; Sasidharan, M.; Cassidy, S.; Parlikad, A.K. Performance assessment of a communication infrastructure with redundant topology: A complex network approach. Comput. Netw. 2023, 228, 109747. [Google Scholar] [CrossRef]
  6. Albert, R.; Jeong, H.; Barabási, A.L. Error and attack tolerance of complex networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef]
  7. Morone, F.; Makse, H.A. Influence maximization in complex networks through optimal percolation. Nature 2015, 524, 65–68. [Google Scholar] [CrossRef]
  8. Wang, Z.G.; Deng, Y.; Wang, Z.; Wu, J. Disintegrating spatial networks based on region centrality. Chaos 2021, 31, 061101. [Google Scholar] [CrossRef]
  9. Fan, N.; Pardalos, P.M. Robust optimization of graph partitioning and critical node detection in analyzing networks. In Proceedings of the 4th International Conference on Combinatorial Optimization and Applications, Kailua-Kona, HI, USA, 18–20 December 2020; Wu, W., Daescu, O., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2010; pp. 170–183. [Google Scholar] [CrossRef]
  10. Addis, B.; Aringhieri, R.; Grosso, A.; Hosteins, P. Hybrid constructive heuristics for the critical node problem. Ann. Oper. Res. 2016, 238, 637–649. [Google Scholar] [CrossRef]
  11. Bernaschi, M.; Celestini, A.; Cianfriglia, M.; Guarino, S.; Italiano, G.F.; Mastrostefano, E.; Zastrow, L.R. Seeking critical nodes in digraphs. J. Comput. Sci. 2023, 69, 102012. [Google Scholar] [CrossRef]
  12. Li, Y.P.; Xiao, Y.; Li, Y.; Wu, J. Which targets to protect in critical infrastructures-a game-theoretic solution from a network science perspective. IEEE Access 2018, 6, 56214–56221. [Google Scholar] [CrossRef]
  13. Li, Y.P.; Tan, S.Y.; Deng, Y.; Wu, J. Attacker-defender game from a network science perspective. Chaos 2018, 28, 051102. [Google Scholar] [CrossRef] [PubMed]
  14. Fu, C.; Gao, Y.; Zhong, J.; Sun, Y.; Zhang, P.; Wu, T. Attack-defense game for critical infrastructure considering the cascade effect. Reliab. Eng. Syst. Saf. 2021, 216, 107958. [Google Scholar] [CrossRef]
  15. Sun, J.; Wang, S.; Zhang, J.; Dong, Q. Attack–defense game in interdependent networks: A functional perspective. J. Infrastruct. Syst. 2023, 29, 04023020. [Google Scholar] [CrossRef]
  16. Brown, G.; Carlyle, M.; Salmerón, J.; Wood, K. Defending critical infrastructure. Interfaces 2006, 36, 530–544. [Google Scholar] [CrossRef]
  17. Li, Y.; Qiao, S.; Deng, Y.; Wu, J. Stackelberg game in critical infrastructures from a network science perspective. Phys. A 2019, 521, 705–714. [Google Scholar] [CrossRef]
  18. Zeng, C.; Ren, B.; Li, M.; Liu, H.; Chen, J. Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective. Chaos 2019, 29, 083129. [Google Scholar] [CrossRef]
  19. Zeng, C.Y.; Ren, B.; Liu, H.; Chen, J. Applying the Bayesian Stackelberg active deception game for securing infrastructure networks. Entropy 2019, 21, 909. [Google Scholar] [CrossRef]
  20. Fu, C.; Zhang, P.; Zhou, L.; Gao, Y.; Du, N. Camouflage strategy of a stackelberg game based on evolution rules. Chaos Solitons Fractals 2021, 153, 111603. [Google Scholar] [CrossRef]
  21. Qi, G.; Li, J.; Xu, X.; Chen, G.; Yang, K. An attack-defense game model in infrastructure networks under link hiding. Chaos 2022, 32, 113109. [Google Scholar] [CrossRef]
  22. Qi, G.; Li, J.; Xu, C.; Chen, G.; Yang, K. Attack-defense game model with multi-type attackers considering information dilemma. Entropy 2022, 25, 57. [Google Scholar] [CrossRef] [PubMed]
  23. Liu, D.; Zhang, Z. Research on robustness of critical information infrastructure based on attack-defensive game model. J. Phys. Conf. Ser. 2021, 1738, 012112. [Google Scholar] [CrossRef]
  24. Liu, N.; Liu, S.; Chai, Q.; Zheng, W. A method for analyzing Stackelberg attack-defense game model in 5G by tCPSO. Expert Syst. Appl. 2023, 228, 120386. [Google Scholar] [CrossRef]
  25. Azevedo, H.; Moreira-Filho, C.A. Topological robustness analysis of protein interaction networks reveals key targets for overcoming chemotherapy resistance in glioma. Sci. Rep. 2015, 5, 16830. [Google Scholar] [CrossRef] [PubMed]
  26. Tomassini, M. Designing robust scale-free networks under targeted link attack using local information. Physica A 2023, 615, 128563. [Google Scholar] [CrossRef]
  27. Zadeh, L. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  28. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  29. Atanassov, K.T. More on intuitionistic fuzzy sets. Fuzzy Sets Syst. 1989, 33, 37–45. [Google Scholar] [CrossRef]
  30. Atanassov, K.; Gargov, G. Interval valued intuitionistic fuzzy sets. Fuzzy Sets Syst. 1989, 31, 343–349. [Google Scholar] [CrossRef]
  31. Xu, Z. Methods for aggregating interval-valued intuitionistic fuzzy information and their application to decision making. J. Control Decis. 2007, 22, 215–219. [Google Scholar]
  32. Wang, F.; Wan, S. Possibility degree and divergence degree based method for interval-valued intuitionistic fuzzy multi-attribute group decision making. Expert Syst. Appl. 2020, 141, 112929. [Google Scholar] [CrossRef]
  33. Wan, S.; Xu, G.; Dong, J. An Atanassov intuitionistic fuzzy programming method for group decision making with interval-valued Atanassov intuitionistic fuzzy preference relations. Appl. Soft Comput. 2020, 95, 106556. [Google Scholar] [CrossRef]
  34. Wang, F.; Wan, S. A comprehensive group decision-making method with interval-valued intuitionistic fuzzy preference relations. Soft Comput. 2021, 25, 343–362. [Google Scholar] [CrossRef]
  35. Wei, A.; Li, D.; Lin, P. An information-based score function of interval-valued intuitionistic fuzzy sets and its application in multiattribute decision making. Soft Comput. 2021, 25, 1913–1923. [Google Scholar] [CrossRef]
  36. Chen, Z.; Wan, S.; Dong, J. An integrated interval-valued intuitionistic fuzzy technique for resumption risk assessment amid COVID-19 prevention. Inf. Sci. 2023, 619, 695–721. [Google Scholar] [CrossRef] [PubMed]
  37. Dong, J.; Wan, S. Interval-valued intuitionistic fuzzy best-worst method with additive consistency. Expert Syst. Appl. 2024, 236, 121213. [Google Scholar] [CrossRef]
  38. Li, D.F. Mathematical-programming approach to matrix games with payoffs represented by Atanassov’s interval-valued intuitionistic fuzzy sets. IEEE Trans. Fuzzy Syst. 2010, 18, 1112–1128. [Google Scholar] [CrossRef]
  39. Xia, M. Interval-valued intuitionistic fuzzy matrix games based on Archimedean t-conorm and t-norm. Int. J. Gen. Syst. 2018, 47, 278–293. [Google Scholar] [CrossRef]
  40. Kumar, S.; Kumar, M. A game theoretic approach to solve multiple group decision making problems with interval-valued intuitionistic fuzzy decision matrices. Int. J. Manag. Sci. Eng. Manag. 2021, 16, 34–42. [Google Scholar] [CrossRef]
  41. Naqvi, D.R.; Verma, R.; Aggarwal, A.; Sachdev, G. Solutions of matrix games involving linguistic interval-valued intuitionistic fuzzy sets. Soft Comput. 2023, 27, 783–808. [Google Scholar] [CrossRef]
  42. Sandholm, V.C. Computing the Optimal Strategy to Commit to. In Proceedings of the EC ’06: 7th ACM Conference on Electronic Commerce, Ann Arbor, MI, USA, 11–15 June 2006. [Google Scholar]
  43. Leitmann, G. On generalized Stackelberg strategies. J. Optim. Theory Appl. 1978, 26, 637–643. [Google Scholar] [CrossRef]
  44. Breton, M.; Alj, A.; Haurie, A. Sequential Stackelberg equilibria in two-person games. J. Optim. Theory Appl. 1988, 59, 71–97. [Google Scholar] [CrossRef]
  45. Kiekintveld, C.; Jain, M.; Tsai, J.; Pita, J.; Ordóñez, F.; Tambe, M. Computing Optimal Randomized Resource Allocations for Massive Security Games. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, AAMAS ’09, Budapest, Hungary, 10–15 May 2009; International Foundation for Autonomous Agents and Multiagent Systems: Richland, SC, USA, 2009; Volume 1, pp. 689–696. [Google Scholar]
  46. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [PubMed]
  47. Nesti, T.; Sloothaak, F.; Zwart, B. Emergence of scale-free blackout sizes in power grids. Phys. Rev. Lett. 2020, 125, 058301. [Google Scholar] [CrossRef]
Figure 1. The framework of the Stackelberg game.
Figure 1. The framework of the Stackelberg game.
Mathematics 11 04992 g001
Figure 2. Payoff matrix of the IVIFS game for the attacker.
Figure 2. Payoff matrix of the IVIFS game for the attacker.
Mathematics 11 04992 g002
Figure 3. The process used to generate the IVIFN payoffs of the attacker and the defender in the proposed game model. A network with 10 nodes is shown as an example, and we focus on one game result where the attacker and defender choose strategies involving red and blue nodes, respectively.
Figure 3. The process used to generate the IVIFN payoffs of the attacker and the defender in the proposed game model. A network with 10 nodes is shown as an example, and we focus on one game result where the attacker and defender choose strategies involving red and blue nodes, respectively.
Mathematics 11 04992 g003
Figure 4. The defender’s payoffs versus θ D (a) or θ A (c) and the attacker’s payoffs versus θ D (b) or θ A (d) in each strategy profile, where θ A = 0.7 in (a,b), θ D = 0.3 in (c,d). The payoffs of different strategy profiles are represented as IVIFNs, where the intervals of membership degrees are visually depicted using a darker color and are shown by two solid lines representing the upper and lower bounds. On the other hand, the intervals of nonmembership degrees are depicted with a lighter color and are represented by two dashed lines indicating the upper and lower bounds.
Figure 4. The defender’s payoffs versus θ D (a) or θ A (c) and the attacker’s payoffs versus θ D (b) or θ A (d) in each strategy profile, where θ A = 0.7 in (a,b), θ D = 0.3 in (c,d). The payoffs of different strategy profiles are represented as IVIFNs, where the intervals of membership degrees are visually depicted using a darker color and are shown by two solid lines representing the upper and lower bounds. On the other hand, the intervals of nonmembership degrees are depicted with a lighter color and are represented by two dashed lines indicating the upper and lower bounds.
Mathematics 11 04992 g004
Figure 5. SSE payoffs of the attacker (a) and the defender (b) under different λ when θ A , θ D [ 0.1 , 0.9 ] .
Figure 5. SSE payoffs of the attacker (a) and the defender (b) under different λ when θ A , θ D [ 0.1 , 0.9 ] .
Mathematics 11 04992 g005
Figure 6. SSEs of the attacker and the defender when θ A , θ D [ 0.1 , 0.9 ] . The various cases of λ are considered. In (a), the probabilities of the HS in the defender’s mixed SSEs are represented by the colors in the blocks. In (b), the HS and the LS are represented by the yellow and blue blocks, respectively.
Figure 6. SSEs of the attacker and the defender when θ A , θ D [ 0.1 , 0.9 ] . The various cases of λ are considered. In (a), the probabilities of the HS in the defender’s mixed SSEs are represented by the colors in the blocks. In (b), the HS and the LS are represented by the yellow and blue blocks, respectively.
Mathematics 11 04992 g006
Figure 7. The defender’s optimal utility expressed by W S F when the best response of the attacker is HS and LS.
Figure 7. The defender’s optimal utility expressed by W S F when the best response of the attacker is HS and LS.
Mathematics 11 04992 g007
Figure 8. Comparison of the SSE payoffs obtained from different models and methods.
Figure 8. Comparison of the SSE payoffs obtained from different models and methods.
Mathematics 11 04992 g008
Table 1. The hesitancy degree for the attacker and defender under different strategy profiles versus ε .
Table 1. The hesitancy degree for the attacker and defender under different strategy profiles versus ε .
ε 0.10.30.50.70.9
Attacker’s
hesitancy
(HS, HS) [ 0.10 , 0.10 ] [ 0.26 , 0.26 ] [ 0.39 , 0.39 ] [ 0.50 , 0.50 ] [ 0.59 , 0.59 ]
(HS, LS) [ 0.17 , 0.34 ] [ 0.23 , 0.38 ] [ 0.27 , 0.42 ] [ 0.30 , 0.44 ] [ 0.33 , 0.47 ]
(LS, HS) [ 0.11 , 0.45 ] [ 0.18 , 0.50 ] [ 0.23 , 0.53 ] [ 0.28 , 0.56 ] [ 0.31 , 0.59 ]
(LS, LS) [ 0.10 , 0.10 ] [ 0.26 , 0.26 ] [ 0.39 , 0.39 ] [ 0.50 , 0.50 ] [ 0.59 , 0.59 ]
Defender’s
hesitancy
(HS, HS) [ 0.10 , 0.10 ] [ 0.26 , 0.26 ] [ 0.39 , 0.39 ] [ 0.50 , 0.50 ] [ 0.59 , 0.59 ]
(HS, LS) [ 0.18 , 0.34 ] [ 0.23 , 0.38 ] [ 0.27 , 0.42 ] [ 0.31 , 0.45 ] [ 0.34 , 0.47 ]
(LS, HS) [ 0.12 , 0.45 ] [ 0.18 , 0.50 ] [ 0.24 , 0.53 ] [ 0.28 , 0.56 ] [ 0.32 , 0.59 ]
(LS, LS) [ 0.10 , 0.10 ] [ 0.26 , 0.26 ] [ 0.39 , 0.39 ] [ 0.50 , 0.50 ] [ 0.59 , 0.59 ]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dong, Y.; Liu, J.; Ren, J.; Li, Z.; Li, W. Protecting Infrastructure Networks: Solving the Stackelberg Game with Interval-Valued Intuitionistic Fuzzy Number Payoffs. Mathematics 2023, 11, 4992. https://doi.org/10.3390/math11244992

AMA Style

Dong Y, Liu J, Ren J, Li Z, Li W. Protecting Infrastructure Networks: Solving the Stackelberg Game with Interval-Valued Intuitionistic Fuzzy Number Payoffs. Mathematics. 2023; 11(24):4992. https://doi.org/10.3390/math11244992

Chicago/Turabian Style

Dong, Yibo, Jin Liu, Jiaqi Ren, Zhe Li, and Weili Li. 2023. "Protecting Infrastructure Networks: Solving the Stackelberg Game with Interval-Valued Intuitionistic Fuzzy Number Payoffs" Mathematics 11, no. 24: 4992. https://doi.org/10.3390/math11244992

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop