Skip to main content
Top
Published in: Journal of Transportation Security 2/2011

01-06-2011

Optimal placement of sensors and interception resource assessment for the protection of regional infrastructure from covert attack

Authors: Justin Yates, Rajan Batta, Mark Karwan

Published in: Journal of Transportation Security | Issue 2/2011

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper considers two specific aspects for the problem of protection of regional infrastructure from covert attack. The first aspect considered is the optimal placement of sensors whose goal is to detect vehicles on the transportation network that pose a potential threat to regional infrastructure. These sensors generate both true alarms and false alarms that both need response from an interception team. The second aspect of our problem is related to the sizing of the interception team and on the placement of these resources on the network. A mathematical programming model is developed for the optimal placement of sensors. This model contains a master and a sub-problem; a Bender’s decomposition approach is used for solving the master problem whereas the sub-problem is solved by recognizing that it has the integrality property. For the interception team aspect, a p-median with server unavailability model is developed for determining locations for units, whereas the Hypercube queuing model is used for determining the performance of these units in responding to both true and false alarms generated from sensors. A demonstrative case analysis is offered for the region of Lancaster-Palmdale, CA.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Alp O, Erkut E, Drezner Z (2003) An efficient genetic algorithm for the p-Median problem. Ann Oper Res 122:21–42CrossRef Alp O, Erkut E, Drezner Z (2003) An efficient genetic algorithm for the p-Median problem. Ann Oper Res 122:21–42CrossRef
go back to reference Awerbuch B, Leighton T (1994) Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks. Annual ACM Symposium on Theory of Computing, Montreal, Quebec, ACM Press, vol. pp. 487–496 Awerbuch B, Leighton T (1994) Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks. Annual ACM Symposium on Theory of Computing, Montreal, Quebec, ACM Press, vol. pp. 487–496
go back to reference Bard J (1998) Practical bilevel optimization: algorithms and applications. Kluwer Academic Publishers, Boston Bard J (1998) Practical bilevel optimization: algorithms and applications. Kluwer Academic Publishers, Boston
go back to reference Bayrak H, Bailey M (2008) Shortest path network interdiction with asymmetric information. Networks 52(3):133–140CrossRef Bayrak H, Bailey M (2008) Shortest path network interdiction with asymmetric information. Networks 52(3):133–140CrossRef
go back to reference Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces 36(6):530–544CrossRef Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces 36(6):530–544CrossRef
go back to reference Chelst K (1978) An algorithm for deploying a crime directed (tactical) patrol force. Manage Sci 24(12):1314–1327CrossRef Chelst K (1978) An algorithm for deploying a crime directed (tactical) patrol force. Manage Sci 24(12):1314–1327CrossRef
go back to reference Ellefsen R, Liu J (1994) Ubran terrain zone based GIS for MOUT. GIS/LIS '94 Annual Conference and Exposition, Phoenix, AZ, ACSM, vol. 1, pp. 254–262 Ellefsen R, Liu J (1994) Ubran terrain zone based GIS for MOUT. GIS/LIS '94 Annual Conference and Exposition, Phoenix, AZ, ACSM, vol. 1, pp. 254–262
go back to reference Goldberg A, Oldham J, Plotkin S, Stein C (1998) An implementation of a combinatorial approximation algorithm for minimum-cost multi-commodity flow. Integer Programming and Combinatorial Optimization. Houston, Texas, Springer Berlin/Heidelberg. 1412/1998: 338 Goldberg A, Oldham J, Plotkin S, Stein C (1998) An implementation of a combinatorial approximation algorithm for minimum-cost multi-commodity flow. Integer Programming and Combinatorial Optimization. Houston, Texas, Springer Berlin/Heidelberg. 1412/1998: 338
go back to reference Israeli E, Wood K (2002) Shortest-path network interdiction. Networks 40(2):97–111CrossRef Israeli E, Wood K (2002) Shortest-path network interdiction. Networks 40(2):97–111CrossRef
go back to reference Jarvis JP (1985) Approximating the equilibrium behavior of multi-server loss systems. Manage Sci 31(2):235–239CrossRef Jarvis JP (1985) Approximating the equilibrium behavior of multi-server loss systems. Manage Sci 31(2):235–239CrossRef
go back to reference Jenelius E, Petersen T, Mattsson L-G (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560 Jenelius E, Petersen T, Mattsson L-G (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560
go back to reference Kara B, Verter V (2004) Designing a road network for hazardous materials transportation. Transp Sci 38(2):188–196CrossRef Kara B, Verter V (2004) Designing a road network for hazardous materials transportation. Transp Sci 38(2):188–196CrossRef
go back to reference Kleinrock L (1975) Queuing systems. Wiley, New York Kleinrock L (1975) Queuing systems. Wiley, New York
go back to reference Larson R (1975) Approximating the performance of urban emergency service systems. Oper Res 23(5):845–868CrossRef Larson R (1975) Approximating the performance of urban emergency service systems. Oper Res 23(5):845–868CrossRef
go back to reference Larson R, Franck E (1978) Evaluating dispatching consequences of automatic vehicle locaiton in emergency services. Comput Oper Res 5:11–30CrossRef Larson R, Franck E (1978) Evaluating dispatching consequences of automatic vehicle locaiton in emergency services. Comput Oper Res 5:11–30CrossRef
go back to reference Larson R, Odoni A (2007) Urban operations research. Belmont, Massachusetts, Dynamic Ideas Larson R, Odoni A (2007) Urban operations research. Belmont, Massachusetts, Dynamic Ideas
go back to reference Leonelli P, Bonvicini S, Spadoni G (2000) Hazardous materials transportation: a risk-analysis-based routing methodology. J Hazard Mater 71:283–300CrossRef Leonelli P, Bonvicini S, Spadoni G (2000) Hazardous materials transportation: a risk-analysis-based routing methodology. J Hazard Mater 71:283–300CrossRef
go back to reference Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39:15–26CrossRef Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39:15–26CrossRef
go back to reference Nemhauser G, Wolsey L (1999) Integer and combinatorial optimization. Wiley-Interscience, New York Nemhauser G, Wolsey L (1999) Integer and combinatorial optimization. Wiley-Interscience, New York
go back to reference Qiao J, Jeong D, Lawley M, Richard J-P, Abraham D, Yih Y (2007) Allocating security resources to a water supply network. IIE Trans 39:95–109CrossRef Qiao J, Jeong D, Lawley M, Richard J-P, Abraham D, Yih Y (2007) Allocating security resources to a water supply network. IIE Trans 39:95–109CrossRef
go back to reference ReVelle CS, Eislet HA (2005) Location analysis: a synthesis and survey. Eur J Oper Res 165:1–19CrossRef ReVelle CS, Eislet HA (2005) Location analysis: a synthesis and survey. Eur J Oper Res 165:1–19CrossRef
go back to reference Schrank D, Lomax T (2005) The 2005 Urban Mobility Report. Texas Transportation Institute, Texas A&M University Schrank D, Lomax T (2005) The 2005 Urban Mobility Report. Texas Transportation Institute, Texas A&M University
go back to reference Sherali H, Brizendine L, Glickman T, Subramanian S (1997) Low probability—high consequence considerations in routing hazardous material shipments. Transportation Science 31(3) Sherali H, Brizendine L, Glickman T, Subramanian S (1997) Low probability—high consequence considerations in routing hazardous material shipments. Transportation Science 31(3)
go back to reference Wein L, Atkinson M (2007) The last line of defense: designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack. IEEE Transactions on Nuclear Science Wein L, Atkinson M (2007) The last line of defense: designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack. IEEE Transactions on Nuclear Science
go back to reference Zhang M, Ma Y, Went K (2005) Location-routing model of hazardous materials distribution system based on risk bottleneck. International Conference on Services Systems and Services Management, Proceedings of ICSSSM '05, vol. 1, pp. 362–368 Zhang M, Ma Y, Went K (2005) Location-routing model of hazardous materials distribution system based on risk bottleneck. International Conference on Services Systems and Services Management, Proceedings of ICSSSM '05, vol. 1, pp. 362–368
Metadata
Title
Optimal placement of sensors and interception resource assessment for the protection of regional infrastructure from covert attack
Authors
Justin Yates
Rajan Batta
Mark Karwan
Publication date
01-06-2011
Publisher
Springer US
Published in
Journal of Transportation Security / Issue 2/2011
Print ISSN: 1938-7741
Electronic ISSN: 1938-775X
DOI
https://doi.org/10.1007/s12198-011-0063-6

Other articles of this Issue 2/2011

Journal of Transportation Security 2/2011 Go to the issue