Defending and attacking a network of two arcs subject to traffic congestion

被引:22
作者
Bier, Vicki M. [1 ]
Hausken, Kjell [2 ]
机构
[1] Univ Wisconsin, Dept Ind & Syst Engn, Madison, WI 53706 USA
[2] Univ Stavanger, Fac Social Sci, N-4036 Stavanger, Norway
关键词
Defense; Attack; Game; Government; Terrorist; Interdiction; Network; Traffic congestion; INTERDICTION MEDIAN PROBLEM; DEFENSE STRATEGY; METHODOLOGY; PROTECTION; SYSTEMS; INFRASTRUCTURES; IDENTIFICATION; DECEPTION; SECURITY; RANKING;
D O I
10.1016/j.ress.2012.11.016
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
To study the effects of intentional attacks on transportation systems, we consider drivers who choose the more time-efficient of two arcs (possibly of different lengths). Both arcs are subjected to traffic congestion, and also to interdiction or blockage (e.g., by a terrorist attack). The model has three types of strategic actors: the government; the terrorist; and potential drivers. The government protects travel, while the terrorist interdicts travel, along the two arcs. Drivers choose the arc that gives the shortest travel time, and cannot choose an interdicted arc. The drivers have reservation travel times, such that if the actual travel time will exceed an individual driver's reservation travel time, that driver would prefer not to travel; the reservation travel times are allowed to vary among drivers. The objective function of the master problem, which the government minimizes and the terrorist maximizes, is the sum of the total travel time plus the reservation travel times of the non-travelers. Each potential driver decides endogenously whether to travel, according to whether the actual travel time is greater or lesser than that driver's reservation travel time. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:214 / 224
页数:11
相关论文
共 48 条
[1]  
[Anonymous], 2007, EC URBAN TRANSPORTAT, DOI [10.4324/9780203642306, DOI 10.4324/9780203642306]
[2]   A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism [J].
Apostolakis, GE ;
Lemon, DM .
RISK ANALYSIS, 2005, 25 (02) :361-376
[3]   Optimal resource allocation for security in reliability systems [J].
Azaiez, M. N. ;
Bier, Vicki M. .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 181 (02) :773-786
[4]   Attacker-defender models and road network vulnerability [J].
Bell, M. G. H. ;
Kanturska, U. ;
Schmocker, J.-D. ;
Fonzone, A. .
PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1872) :1893-1906
[5]  
BIER V, 2002, P ENG FDN C RISK BAS, V10
[6]   Meeting the challenges of terrorism risk analysis [J].
Bier, Vicki M. ;
von Winterfeldt, Detlof .
RISK ANALYSIS, 2007, 27 (03) :503-504
[7]   Methodology for identifying near-optimal interdiction strategies for a power transmission system [J].
Bier, Vicki M. ;
Gratz, Ell R. ;
Haphuriwat, Naraphorn J. ;
Magua, Wairimu ;
Wierzblcki, Kevin R. .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2007, 92 (09) :1155-1161
[8]   Protection of simple series and parallel systems with components of different values [J].
Bier, VM ;
Nagaraj, A ;
Abhichandani, V .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2005, 87 (03) :315-323
[9]   HIGHWAY CONGESTION AND CONGESTION TOLLS [J].
BOARDMAN, AE ;
LAVE, LB .
JOURNAL OF URBAN ECONOMICS, 1977, 4 (03) :340-359
[10]  
Braess D., 1968, Unternehmensforschung, V12, P258, DOI DOI 10.1007/BF01918335