Decision SupportOptimizing dynamic investment decisions for railway systems protection
Introduction
Nowadays the social well-being of people highly relies on the well functioning of critical interconnected infrastructures such as transportation, information, telecommunication, and electric power systems. Planning and protecting infrastructure systems is a complex task, especially because of their dimension and interdependence. Even small random disruptions can severely affect the normal functioning of one or more infrastructure. Intelligent attacks or large natural catastrophes can have even more dramatic consequences in terms of both economic and life losses. Examples of such events include the 1995 Paris metro bombing, the 2004 Madrid train bombing, the 2005 London underground suicide attacks, and the 2010 Moscow bombing. Most recently, severe floods hit some western regions of the UK and forced the Network Rail to pay £12.5m for the suppressed services and further £15m to repair the infrastructure (Wintour & Topham, 2014). It is therefore paramount to protect infrastructure systems so that continuity in service provision and safety for the users can be guaranteed, even when disruptions occur.
A critical aspect in planning infrastructure protection is the scarce availability of protection resources. Protecting all the components of an infrastructure system to targeted safety levels may infact be cost prohibitive. For example, the Kent (UK) railway system serves 179 stations and has 1094 miles of tracks. Protecting every station and all the tracks is economically impossible. Another complicating factor in protecting railways is that they are open and easily accessible systems. This renders them highly vulnerable to all kinds of disruption and requires careful identification of suitable protection measures. These may include the structural reinforcement of vulnerable parts (tunnels and bridges), video surveillance of critical areas (crosses, stations) and the use of a wide range of sensors to detect intrusions and obstacles on tracks. Since resources are limited, it is important to identify and protect the most critical assets of the infrastructure.
In recent years, several mathematical models have been developed to identify systems’ vulnerabilities and plan protection strategies for critical infrastructures. Predominantly, interdiction and protection of infrastructure systems have been modeled using multi-level optimization. Multi-level optimization models represent an effective tool to “model a complete infrastructure system and its value to society, including how losses of the system’s assets reduce that value, or how improvements in the system mitigate lost value” (Brown, Carlyle, Salmeron, & Wood, 2006). These models are also referred to as defender–attacker models since they emulate the game between two actors with opposite aims. The defender’s aim is to distribute limited defence resources so as to minimize the effects of a worst case disruption. On the other hand, the attacker’s aim is to choose the attack plan which minimizes the system’s value (or maximize the system’s cost). The attacker is an intelligent actor who has perfect knowledge of the system and is always able to inflict the maximum damage. In other words, he is a proxy to model worse-case disruptions. Clearly this kind of models are very useful to simulate terrorist attacks and intentional disruptions. Nonetheless, given the criticality of infrastructure systems, protection efforts are often guided by risk-averse decision making criteria, thus making these models extremely valuable also for problems involving natural catastrophes.
A third actor, referred to as the system user, is often used in multi-level models to evaluate the system’s value after protection and interdiction. Bilevel attacker-user models are typically used to identify the vulnerabilities of a system, by highlighting the outcomes of a worst-case interdiction. Trilevel defender–attacker-user models are typically used to identify the system’s components that should be hardened or protected. Sometimes the models mirroring the actions of the attacker and the system user can be collapsed into a single model (Church, Scaparra, Middleton, 2004, Losada, Scaparra, Church, Daskin, 2012a), so that a single level model can represent an interdiction problem whereas a bilevel model can represent a protection problem.
The main contribution of this paper is to study a dynamic network protection problem. The model we present is quite general and, albeit designed for railway infrastructures, can be applied in other contexts as well. The model aims at distributing protection resources among the assets of a railway system so as to maximize its survivability after a worst case disruption. Generally, survivability can be described as “the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents” (Ellison, Fisher, Linger, Lipson, & Longstaff, 1997). According to the specific context, network survivability can be measured using different metrics. For instance, for shortest-path based problems, the length of a path is the key measure to assess whether a network is vulnerable and reliable. To evaluate survivability, we use the same metric introduced by Myung and Kim (2004), Murray, Matisziw, and Grubesic (2007), Matisziw and Murray (2009) and Scaparra, Starita, Sterle, Setola, Sforza, Vittorini, and Pragliola (2015). In these works, network survivability is measured in terms of lost or unserved system flow. In our model, the flow between an origin and a destination node is considered lost if after a disruption affecting some network components, the two nodes are no longer connected or they are connected but the post-disruption service is significantly deteriorated (i.e., alternative routes are too long from a user’s perspective). In this case, in fact, rail network users may abandon the trip or resort to another mode of transport.
An important issue that should be taken into account when modelling protection efforts is that protection resources usually become available at different times. Our model addresses this issue by including a temporal component whereby the available budget for protection is spread over a planning horizon. This choice renders the model more applicable to real situations. In fact, public expenditures to protect and modernize critical infrastructures are usually set in spending reviews that cover a number of years. For instance, the last UK spending review (HM Treasury, 2013) allocated £100bn for the modernization of the energy and transportation sectors. This budget is spread over a five-year period (2015–2020). Similarly, after the 2013–2014 floods in the UK, £130m were allocated by the government to repair flood defences. Of the whole budget, £30m were made available in 2014, the rest in 2015 (Carrington & Weaver, 2014). In addition, the UK Department for Environment, Food and Rural Affairs (DEFRA) set out a six-year programme of capital investment to improve flood defences up to 2021, of £2.3bn. Fixed capital settlements were allocated for each year, although flexibility to move funds between years was allowed for effective delivery (DEFRA, 2015). These examples demonstrate that funds availability is often time-related. Consequently, prioritizing expenditures over time is key to the development of long-term, effective strategies for improving infrastructure’s security and resiliency. To respond to the practical planning needs of railway stakeholders and operators, we therefore propose a protection model that optimizes the allocation of scarce protection resources over time.
Our model builds upon and extends the static protection model proposed by Scaparra et al. (2015) by considering dynamic investments. The model has a bilevel structure where the aim of the upper level is to find the best allocation of protection resources over a planning horizon so as to minimize the amount of disrupted flow. The lower level is used to evaluate worse case losses in each time period in response to a given protection plan. The resulting multi-period bilevel model is significantly more difficult to solve than its static counterpart. To find optimal solutions to problem instances of realistic size, we propose two decomposition approaches tailored to the dynamic structure of the model and test them on a set of new, randomly generated instances. Given that the multi-period structure of the model can lead to solve the same lower level program multiple times in our iterative approaches, we streamline the algorithms by using efficient data structures, thus avoiding recomputing solutions already found. The use of this expedient proved to be extremely efficient and on some preliminary tests reduced the overall computing time of the decomposition methods by as much as 80 percent. Finally, some practical insights, including an analysis of dynamic investments, are discussed for a real network representing the railway infrastructure of Kent (UK).
The remainder of this paper is organized as follows. Section 2 provides a review of the literature related to this work. In Section 3, the bilevel formulation of DNP is introduced. Section 4 provides a description of the decomposition algorithms. In Section 5, we report computational results on two sets of random problems, while the results on the Kent case study are analyzed in Section 6. Some conclusive remarks are discussed in Section 7.
Section snippets
Background
Since the seminal paper of Wollmer (1964), several papers have appeared in the literature which deal with network interdiction problems. The underlying idea of these models is to find the critical arcs and/or nodes of a network. An element is critical if, after interdiction, the performance of the network drops significantly. Therefore a key issue in these models is to identify a suitable metric to evaluate network performance.
One stream of the literature has analyzed the problem of finding the
The dynamic network protection problem (DNP)
We consider an undirected graph representing the transportation network. In a railway network, the nodes represent the stations and the arcs are the tracks connecting the nodes. Assumptions, parameters and decision variables are introduced below:
- (a)
The problem is studied over a planning horizon represented by the set .
- (b)
Interdiction is complete (i.e., an interdicted component is completely unusable in the time period when interdiction takes place).
- (c)
A protected element becomes
Solution methodology
Multi-level models are generally very difficult to solve. Hansen, Jaumard, and Savard (1992) proved that even the simplest bilevel models, the ones with continuous variables on every level, are strongly NP-hard. Several solution approaches have been studied in the literature, including both heuristic techniques and exact methods. Examples of heuristic approaches can be found in Aksen, Şengul Akca, and Aras (2014); Aksen and Aras (2013); Aksen, Aras, and Piyade (2013); Parvaresh,
Results and analysis
In this section, we investigate the computational efficiency of solving the dynamic network protection problem using BND-D and SVI-D. Both algorithms were implemented in C and run on a 64-bit machine with a quad-core 3.4 gigahertz processor and 4Gigabyte of RAM. The Restricted Master Problems and the SubProblems were solved using the IBM ILOG CPLEX version 12.5 callable library. In our computational analysis, we set a time limit of 10, 000 seconds. In the algorithms’ implementation, we used
Case study analysis
In this section, we test the efficiency of the decomposition approaches and analyze the results using a case study which represent the railway network of Kent (UK). The strategic position of this county makes the case study particularly interesting. Kent has a nominal border with France and, therefore, intercepts all the passenger flow from and to France. Although most of the traffic flow is represented by London commuters, Kent’s railway has also a considerable traffic of tourists, attracted
Conclusions and discussion
To protect critical infrastructure systems, it is necessary to distribute limited protection resources in the most effective way. This paper introduced a bilevel fortification model to identify the best allocation of protection resources against worst case scenario disruptions in transportation networks. This model includes the important issue of considering dynamic investments. Two decomposition methods to find optimal solutions to the model were proposed and compared. The method based on
Acknowledgements
The authors gratefully acknowledge three anonymous referees for their insightful and constructive comments.
References (58)
- et al.
Maximum dynamic network flow interdiction problem: new formulation and solution procedures
Computers & Industrial Engineering
(2013) - et al.
A bilevel partial interdiction problem with capacitated facilities and demand outsourcing
Computers and Operations Research
(2014) - et al.
The maximum flow network interdiction problem: valid inequalities, integrality gaps, and approximability
Operations Research Letters
(2010) - et al.
Protection of warehouses and plants under capacity constraint
Reliability Engineering & System Safety
(2015) - et al.
A geographic perspective on commercial internet survivability
Telematics and Informatics
(2003) - et al.
A game theoretic framework for the robust railway transit network design problem
Transportation Research Part B: Methodologicals
(2010) - et al.
Parallel systems under two sequential attacks
Reliability Engineering & System Safety
(2009) - et al.
Hedging against disruptions with ripple effects in location analysis
Omega
(2012) - et al.
Optimizing system resilience: a facility protection model with recovery time
European Journal of Operational Research
(2012) - et al.
Modeling st path availability to support disaster vulnerability assessment of network infrastructure
Computers & Operations Research
(2009)
A cutting plane algorithm for computing k-edge survivability of a network
European Journal of Operational Research
Designing robust coverage networks to hedge against worst-case facility losses
European Journal of Operational Research
Revisiting a game theoretic framework for the robust railway network design against intentional attacks
European Journal of Operational Research
A bilevel mixed-integer program for critical infrastructure protection planning
Computers & Operations Research
An exact solution approach for the interdiction median problem with fortification
European Journal of Operational Research
A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector
International Journal of Critical Infrastructure Protection
A matheuristic for leader-follower games involving facility location-protection-interdiction decisions
Studies in Computational Intelligence
A bilevel p-median model for the planning and protection of critical facilities
Journal of Heuristics
Error and attack tolerance of complex networks
Nature
Shortest path network interdiction with asymmetric information
Networks
Partitioning procedures for solving mixed-variables programming problems
Numerische mathematik
Defending critical infrastructure
Interfaces
Optimal allocation of protective resources in shortest-path networks
Transportation Science
Identifying critical infrastructure: the median and covering facility interdiction problems
Annals of the Association of American Geographers
Protecting Critical Assets: The r-Interdiction Median Problem with Fortification
Geographical Analysis
Stochastic network interdiction
Operations Research
Cited by (43)
An exact method for binary fortification games
2023, European Journal of Operational ResearchCitation Excerpt :Recently, a trilevel critical node problem used for limiting the spread of a viral attack in a given network has been considered in Baggio, Carvalho, Lodi, & Tramontani (2021). We point out that our list of applications of FGs is far from being comprehensive, and we refer an interested reader to further references provided in Lozano & Smith (2017); Sarhadi et al. (2017); Starita & Scaparra (2016), and Lai et al. (2019). In this sense, our approach is a generalization of the Benders-like decomposition used in Brown et al. (2006) and Smith et al. (2007) for convex recourse problems.
Computing fortification games in a tri-level Stackelberg Markov chains approach
2023, Engineering Applications of Artificial IntelligenceStackelberg production-protection games: Defending crop production against intentional attacks
2022, European Journal of Operational ResearchEquilibrium strategies for multiple interdictors on a common network
2021, European Journal of Operational ResearchCitation Excerpt :Such problems are usually modeled in the framework of leader-follower games and can be formulated as bilevel optimization problems. Interdiction models have been used in various military and homeland security applications, such as dismantling drug traffic networks (e.g. Washburn & Wood, 1995; Wood, 1993), preventing nuclear smuggling (e.g. Brown, Carlyle, Harney, Skroch, & Wood, 2009; Morton, Pan, & Saeger, 2007), planning tactical air strikes (e.g. Ghare, Montgomery, & Turner, 1971), and identifying critical infrastructure (e.g. Church, Scaparra, & Middleton, 2004; O’Hanley & Church, 2011; Perea & Puerto, 2013; Scaparra & Church, 2008; Starita & Scaparra, 2016). Interdiction models have also found applications in other areas such as controlling the spread of pandemics (e.g. Assimakopoulos, 1987) and defending attacks on computer communication networks (e.g. Mofya & Smith, 2006).
Dynamic interdiction networks with applications in illicit supply chains
2020, Omega (United Kingdom)Citation Excerpt :Many studies applied the Benders Decomposition technique to improve the computational efficiency of exact methods. Some successful applications of the Benders decomposition technique in solving network interdiction problems can be found in studies by Israeli and Wood [36], Losada et al. [39], Tang et al. [65], Borndörfer et al. [13], Starita and Scaparra [64], Enayaty-Ahangar et al. [24] and Wei et al. [66]. Assessing the solution methods in the literature, and considering the characteristics of our problem (e.g., the type of decision variables for both interdictor and operator), convinced us that the Benders decomposition technique is an appropriate choice for our study.
Worst-case vulnerability assessment and mitigation model of urban utility tunnels
2020, Reliability Engineering and System Safety