Protection-interdiction-restoration for resilient multi-commodity networks

被引:6
|
作者
Kuttler, Emma [1 ]
Ghorbani-Renani, Nafiseh [2 ]
Barker, Kash [1 ]
Gonzalez, Andres D. [1 ]
Johansson, Jonas [3 ]
机构
[1] Univ Oklahoma, Sch Ind & Syst Engn, Norman, OK 73019 USA
[2] Stevens Inst Technol, Sch Syst & Enterprises, Hoboken, NJ USA
[3] Lund Univ, Div Risk Management & Societal Safety, Lund, Sweden
基金
美国国家科学基金会;
关键词
Network protection and interdiction; Resilience; Tri-level optimization; Critical infrastructure systems; Multi-commodity; Decomposition; COMPONENT IMPORTANCE; SYSTEM; INFRASTRUCTURE; OPTIMIZATION; MODELS; FORMULATION; RESOURCES; FRAMEWORK; RISK;
D O I
10.1016/j.ress.2023.109745
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Interdependent critical infrastructure systems represent substantial financial investments and are vital to maintain a fundamental level of social and economic well-being, making them attractive targets for malevolent actors. Many of these infrastructure systems carry multiple products, each with unique needs and importance to different stakeholders. This work extends a tri-level protection-interdiction-restoration model from a single commodity to multiple commodities, solving the model with an integration of Benders' decomposition and set covering decomposition. We propose a method to limit unmet weighted demand across commodities, considering unique interdependencies between network components and commodity-specific capacity requirements. An optimal solution is found iteratively by alternately fixing protection and interdiction variables. This work is illustrated with a case study of interdependent Swedish power and multi-commodity railway systems. Results demonstrate the convergent behavior of the master and subproblems, the value of network hardening, and the non-uniform network recovery trajectory. For the case study, the railway system was more vulnerable to disruption than the power system, making it a more attractive target for both protection and interdiction. The components that were commonly selected as part of a protection or interdiction plan were generally the ones with the greatest demand for iron ore, a highly critical commodity.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Extensions: Multi-commodity networks
    不详
    THEORY OF SUPPLY CHAINS, 2003, 526 : 99 - 102
  • [2] Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience
    Ghorbani-Renani, Nafiseh
    Gonzalez, Andres D.
    Barker, Kash
    Morshedlou, Nazanin
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2020, 199
  • [3] OPTIMAL DEFENSE OF MULTI-COMMODITY NETWORKS
    BELLMORE, M
    RATLIFF, HD
    MANAGEMENT SCIENCE SERIES B-APPLICATION, 1971, 18 (04): : B174 - B185
  • [4] Resilient virtual communication networks using multi-commodity flow based local optimal mapping
    Yang, Qiang
    Li, Wei
    de Souza, Jose Neuman
    Zomaya, Albert Y.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 110 : 43 - 51
  • [5] Fair Resource Allocation in Multi-commodity Networks
    Sliwinski, Tomasz
    NEW TRENDS IN DATABASES AND INFORMATION SYSTEMS, 2013, 185 : 261 - 269
  • [6] MINIMAL DISCONNECTING SETS IN DIRECTED MULTI-COMMODITY NETWORKS
    JARVIS, JJ
    TINDALL, JB
    NAVAL RESEARCH LOGISTICS, 1972, 19 (04) : 681 - 690
  • [7] Scale Multi-commodity Flow Handling on Dynamic Networks
    Quilliot, Alain
    Liberalino, Heito
    Bernay, Benoit
    LARGE-SCALE SCIENTIFIC COMPUTING, LSSC 2013, 2014, 8353 : 297 - 304
  • [8] Component importance for multi-commodity networks: Application in the Swedish railway
    Whitman, Mackenzie G.
    Barker, Kash
    Johansson, Jonas
    Darayi, Mohamad
    COMPUTERS & INDUSTRIAL ENGINEERING, 2017, 112 : 274 - 288
  • [9] Uncertainty in Multi-Commodity Routing Networks: When does it help?
    Sekar, Shreyas
    Zheng, Liyuan
    Ratliff, Lillian J.
    Zhang, Baosen
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 6553 - 6558
  • [10] Simultaneously Generating Multiple Keys and Multi-Commodity Flow in Networks
    Lai, Lifeng
    Ho, Siu-Wai
    2012 IEEE INFORMATION THEORY WORKSHOP (ITW), 2012, : 627 - 631