Decision Support
Optimizing dynamic investment decisions for railway systems protection

https://doi.org/10.1016/j.ejor.2015.07.025Get rights and content

Highlights

  • A bilevel model for optimizing security investments in railway systems is proposed.

  • Two different decomposition approaches are used to solve the model.

  • The dynamic security investment model is tested on the Kent, UK, railway network.

  • Significant system flow loss reductions can be achieved with modest investments.

  • The robustness of the approach to different disruption scenarios is analyzed.

Abstract

Past and recent events have shown that railway infrastructure systems are particularly vulnerable to natural catastrophes, unintentional accidents and terrorist attacks. Protection investments are instrumental in reducing economic losses and preserving public safety. A systematic approach to plan security investments is paramount to guarantee that limited protection resources are utilized in the most efficient manner. In this paper, we present an optimization model to identify the railway assets which should be protected to minimize the impact of worst case disruptions on passenger flows. We consider a dynamic investment problem where protection resources become available over a planning horizon. The problem is formulated as a bilevel mixed-integer model and solved using two different decomposition approaches. Random instances of different sizes are generated to compare the solution algorithms. The model is then tested on the Kent railway network to demonstrate how the results can be used to support efficient protection decisions.

Introduction

Nowadays the social well-being of people highly relies on the well functioning of critical interconnected infrastructures such as transportation, information, telecommunication, and electric power systems. Planning and protecting infrastructure systems is a complex task, especially because of their dimension and interdependence. Even small random disruptions can severely affect the normal functioning of one or more infrastructure. Intelligent attacks or large natural catastrophes can have even more dramatic consequences in terms of both economic and life losses. Examples of such events include the 1995 Paris metro bombing, the 2004 Madrid train bombing, the 2005 London underground suicide attacks, and the 2010 Moscow bombing. Most recently, severe floods hit some western regions of the UK and forced the Network Rail to pay £12.5m for the suppressed services and further £15m to repair the infrastructure (Wintour & Topham, 2014). It is therefore paramount to protect infrastructure systems so that continuity in service provision and safety for the users can be guaranteed, even when disruptions occur.

A critical aspect in planning infrastructure protection is the scarce availability of protection resources. Protecting all the components of an infrastructure system to targeted safety levels may infact be cost prohibitive. For example, the Kent (UK) railway system serves 179 stations and has 1094 miles of tracks. Protecting every station and all the tracks is economically impossible. Another complicating factor in protecting railways is that they are open and easily accessible systems. This renders them highly vulnerable to all kinds of disruption and requires careful identification of suitable protection measures. These may include the structural reinforcement of vulnerable parts (tunnels and bridges), video surveillance of critical areas (crosses, stations) and the use of a wide range of sensors to detect intrusions and obstacles on tracks. Since resources are limited, it is important to identify and protect the most critical assets of the infrastructure.

In recent years, several mathematical models have been developed to identify systems’ vulnerabilities and plan protection strategies for critical infrastructures. Predominantly, interdiction and protection of infrastructure systems have been modeled using multi-level optimization. Multi-level optimization models represent an effective tool to “model a complete infrastructure system and its value to society, including how losses of the system’s assets reduce that value, or how improvements in the system mitigate lost value” (Brown, Carlyle, Salmeron, & Wood, 2006). These models are also referred to as defender–attacker models since they emulate the game between two actors with opposite aims. The defender’s aim is to distribute limited defence resources so as to minimize the effects of a worst case disruption. On the other hand, the attacker’s aim is to choose the attack plan which minimizes the system’s value (or maximize the system’s cost). The attacker is an intelligent actor who has perfect knowledge of the system and is always able to inflict the maximum damage. In other words, he is a proxy to model worse-case disruptions. Clearly this kind of models are very useful to simulate terrorist attacks and intentional disruptions. Nonetheless, given the criticality of infrastructure systems, protection efforts are often guided by risk-averse decision making criteria, thus making these models extremely valuable also for problems involving natural catastrophes.

A third actor, referred to as the system user, is often used in multi-level models to evaluate the system’s value after protection and interdiction. Bilevel attacker-user models are typically used to identify the vulnerabilities of a system, by highlighting the outcomes of a worst-case interdiction. Trilevel defender–attacker-user models are typically used to identify the system’s components that should be hardened or protected. Sometimes the models mirroring the actions of the attacker and the system user can be collapsed into a single model (Church, Scaparra, Middleton, 2004, Losada, Scaparra, Church, Daskin, 2012a), so that a single level model can represent an interdiction problem whereas a bilevel model can represent a protection problem.

The main contribution of this paper is to study a dynamic network protection problem. The model we present is quite general and, albeit designed for railway infrastructures, can be applied in other contexts as well. The model aims at distributing protection resources among the assets of a railway system so as to maximize its survivability after a worst case disruption. Generally, survivability can be described as “the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents” (Ellison, Fisher, Linger, Lipson, & Longstaff, 1997). According to the specific context, network survivability can be measured using different metrics. For instance, for shortest-path based problems, the length of a path is the key measure to assess whether a network is vulnerable and reliable. To evaluate survivability, we use the same metric introduced by Myung and Kim (2004), Murray, Matisziw, and Grubesic (2007), Matisziw and Murray (2009) and Scaparra, Starita, Sterle, Setola, Sforza, Vittorini, and Pragliola (2015). In these works, network survivability is measured in terms of lost or unserved system flow. In our model, the flow between an origin and a destination node is considered lost if after a disruption affecting some network components, the two nodes are no longer connected or they are connected but the post-disruption service is significantly deteriorated (i.e., alternative routes are too long from a user’s perspective). In this case, in fact, rail network users may abandon the trip or resort to another mode of transport.

An important issue that should be taken into account when modelling protection efforts is that protection resources usually become available at different times. Our model addresses this issue by including a temporal component whereby the available budget for protection is spread over a planning horizon. This choice renders the model more applicable to real situations. In fact, public expenditures to protect and modernize critical infrastructures are usually set in spending reviews that cover a number of years. For instance, the last UK spending review (HM Treasury, 2013) allocated £100bn for the modernization of the energy and transportation sectors. This budget is spread over a five-year period (2015–2020). Similarly, after the 2013–2014 floods in the UK, £130m were allocated by the government to repair flood defences. Of the whole budget, £30m were made available in 2014, the rest in 2015 (Carrington & Weaver, 2014). In addition, the UK Department for Environment, Food and Rural Affairs (DEFRA) set out a six-year programme of capital investment to improve flood defences up to 2021, of £2.3bn. Fixed capital settlements were allocated for each year, although flexibility to move funds between years was allowed for effective delivery (DEFRA, 2015). These examples demonstrate that funds availability is often time-related. Consequently, prioritizing expenditures over time is key to the development of long-term, effective strategies for improving infrastructure’s security and resiliency. To respond to the practical planning needs of railway stakeholders and operators, we therefore propose a protection model that optimizes the allocation of scarce protection resources over time.

Our model builds upon and extends the static protection model proposed by Scaparra et al. (2015) by considering dynamic investments. The model has a bilevel structure where the aim of the upper level is to find the best allocation of protection resources over a planning horizon so as to minimize the amount of disrupted flow. The lower level is used to evaluate worse case losses in each time period in response to a given protection plan. The resulting multi-period bilevel model is significantly more difficult to solve than its static counterpart. To find optimal solutions to problem instances of realistic size, we propose two decomposition approaches tailored to the dynamic structure of the model and test them on a set of new, randomly generated instances. Given that the multi-period structure of the model can lead to solve the same lower level program multiple times in our iterative approaches, we streamline the algorithms by using efficient data structures, thus avoiding recomputing solutions already found. The use of this expedient proved to be extremely efficient and on some preliminary tests reduced the overall computing time of the decomposition methods by as much as 80 percent. Finally, some practical insights, including an analysis of dynamic investments, are discussed for a real network representing the railway infrastructure of Kent (UK).

The remainder of this paper is organized as follows. Section 2 provides a review of the literature related to this work. In Section 3, the bilevel formulation of DNP is introduced. Section 4 provides a description of the decomposition algorithms. In Section 5, we report computational results on two sets of random problems, while the results on the Kent case study are analyzed in Section 6. Some conclusive remarks are discussed in Section 7.

Section snippets

Background

Since the seminal paper of Wollmer (1964), several papers have appeared in the literature which deal with network interdiction problems. The underlying idea of these models is to find the critical arcs and/or nodes of a network. An element is critical if, after interdiction, the performance of the network drops significantly. Therefore a key issue in these models is to identify a suitable metric to evaluate network performance.

One stream of the literature has analyzed the problem of finding the

The dynamic network protection problem (DNP)

We consider an undirected graph G=(N,A) representing the transportation network. In a railway network, the nodes represent the stations and the arcs are the tracks connecting the nodes. Assumptions, parameters and decision variables are introduced below:

  • (a)

    The problem is studied over a planning horizon represented by the set T={0,1,,T^}.

  • (b)

    Interdiction is complete (i.e., an interdicted component is completely unusable in the time period when interdiction takes place).

  • (c)

    A protected element becomes

Solution methodology

Multi-level models are generally very difficult to solve. Hansen, Jaumard, and Savard (1992) proved that even the simplest bilevel models, the ones with continuous variables on every level, are strongly NP-hard. Several solution approaches have been studied in the literature, including both heuristic techniques and exact methods. Examples of heuristic approaches can be found in Aksen, Şengul Akca, and Aras (2014); Aksen and Aras (2013); Aksen, Aras, and Piyade (2013); Parvaresh,

Results and analysis

In this section, we investigate the computational efficiency of solving the dynamic network protection problem using BND-D and SVI-D. Both algorithms were implemented in C and run on a 64-bit machine with a quad-core 3.4 gigahertz processor and 4Gigabyte of RAM. The Restricted Master Problems and the SubProblems were solved using the IBM ILOG CPLEX version 12.5 callable library. In our computational analysis, we set a time limit of 10, 000 seconds. In the algorithms’ implementation, we used

Case study analysis

In this section, we test the efficiency of the decomposition approaches and analyze the results using a case study which represent the railway network of Kent (UK). The strategic position of this county makes the case study particularly interesting. Kent has a nominal border with France and, therefore, intercepts all the passenger flow from and to France. Although most of the traffic flow is represented by London commuters, Kent’s railway has also a considerable traffic of tourists, attracted

Conclusions and discussion

To protect critical infrastructure systems, it is necessary to distribute limited protection resources in the most effective way. This paper introduced a bilevel fortification model to identify the best allocation of protection resources against worst case scenario disruptions in transportation networks. This model includes the important issue of considering dynamic investments. Two decomposition methods to find optimal solutions to the model were proposed and compared. The method based on

Acknowledgements

The authors gratefully acknowledge three anonymous referees for their insightful and constructive comments.

References (58)

  • MyungY.S. et al.

    A cutting plane algorithm for computing k-edge survivability of a network

    European Journal of Operational Research

    (2004)
  • O’HanleyJ.R. et al.

    Designing robust coverage networks to hedge against worst-case facility losses

    European Journal of Operational Research

    (2011)
  • PereaF. et al.

    Revisiting a game theoretic framework for the robust railway network design against intentional attacks

    European Journal of Operational Research

    (2013)
  • ScaparraM.P. et al.

    A bilevel mixed-integer program for critical infrastructure protection planning

    Computers & Operations Research

    (2008)
  • ScaparraM.P. et al.

    An exact solution approach for the interdiction median problem with fortification

    European Journal of Operational Research

    (2008)
  • Wintour, P. Topham, G. (2014). UK rail service disruptions continue after high winds. Available at...
  • YatesJ. et al.

    A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector

    International Journal of Critical Infrastructure Protection

    (2013)
  • AksenD. et al.

    A matheuristic for leader-follower games involving facility location-protection-interdiction decisions

    Studies in Computational Intelligence

    (2013)
  • AksenD. et al.

    A bilevel p-median model for the planning and protection of critical facilities

    Journal of Heuristics

    (2013)
  • AlbertR. et al.

    Error and attack tolerance of complex networks

    Nature

    (2000)
  • BayrakH. et al.

    Shortest path network interdiction with asymmetric information

    Networks

    (2008)
  • BendersJ.F.

    Partitioning procedures for solving mixed-variables programming problems

    Numerische mathematik

    (1962)
  • BrownG. et al.

    Defending critical infrastructure

    Interfaces

    (2006)
  • CappaneraP. et al.

    Optimal allocation of protective resources in shortest-path networks

    Transportation Science

    (2011)
  • Carrington, D. Weaver, M. (2014). Emergency funding to repair damaged UK flood defences raised to 130m. Available at...
  • ChurchR.L. et al.

    Identifying critical infrastructure: the median and covering facility interdiction problems

    Annals of the Association of American Geographers

    (2004)
  • ChurchR.L. et al.

    Protecting Critical Assets: The r-Interdiction Median Problem with Fortification

    Geographical Analysis

    (2007)
  • CormicanK.J. et al.

    Stochastic network interdiction

    Operations Research

    (1998)
  • DEFRA (2015). Central Government Funding for Flood and Coastal Erosion Risk Management in England. Available at:...
  • Cited by (43)

    • An exact method for binary fortification games

      2023, European Journal of Operational Research
      Citation Excerpt :

      Recently, a trilevel critical node problem used for limiting the spread of a viral attack in a given network has been considered in Baggio, Carvalho, Lodi, & Tramontani (2021). We point out that our list of applications of FGs is far from being comprehensive, and we refer an interested reader to further references provided in Lozano & Smith (2017); Sarhadi et al. (2017); Starita & Scaparra (2016), and Lai et al. (2019). In this sense, our approach is a generalization of the Benders-like decomposition used in Brown et al. (2006) and Smith et al. (2007) for convex recourse problems.

    • Computing fortification games in a tri-level Stackelberg Markov chains approach

      2023, Engineering Applications of Artificial Intelligence
    • Equilibrium strategies for multiple interdictors on a common network

      2021, European Journal of Operational Research
      Citation Excerpt :

      Such problems are usually modeled in the framework of leader-follower games and can be formulated as bilevel optimization problems. Interdiction models have been used in various military and homeland security applications, such as dismantling drug traffic networks (e.g. Washburn & Wood, 1995; Wood, 1993), preventing nuclear smuggling (e.g. Brown, Carlyle, Harney, Skroch, & Wood, 2009; Morton, Pan, & Saeger, 2007), planning tactical air strikes (e.g. Ghare, Montgomery, & Turner, 1971), and identifying critical infrastructure (e.g. Church, Scaparra, & Middleton, 2004; O’Hanley & Church, 2011; Perea & Puerto, 2013; Scaparra & Church, 2008; Starita & Scaparra, 2016). Interdiction models have also found applications in other areas such as controlling the spread of pandemics (e.g. Assimakopoulos, 1987) and defending attacks on computer communication networks (e.g. Mofya & Smith, 2006).

    • Dynamic interdiction networks with applications in illicit supply chains

      2020, Omega (United Kingdom)
      Citation Excerpt :

      Many studies applied the Benders Decomposition technique to improve the computational efficiency of exact methods. Some successful applications of the Benders decomposition technique in solving network interdiction problems can be found in studies by Israeli and Wood [36], Losada et al. [39], Tang et al. [65], Borndörfer et al. [13], Starita and Scaparra [64], Enayaty-Ahangar et al. [24] and Wei et al. [66]. Assessing the solution methods in the literature, and considering the characteristics of our problem (e.g., the type of decision variables for both interdictor and operator), convinced us that the Benders decomposition technique is an appropriate choice for our study.

    View all citing articles on Scopus
    View full text