Skip to main content

2015 | OriginalPaper | Buchkapitel

Vulnerability Analysis of a Signal-Controlled Road Network for Equilibrium Flow

verfasst von : Suh-Wen Chiou

Erschienen in: Advanced Business Analytics

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Considering the reliability of an area traffic control road network, most travel delay is directly dependent on correct operation of signal settings. The purpose of this paper is to devise an efficient scheme to evaluate the reliability of a signal-controlled road network. A min-max complementarity problem is proposed to characterize user equilibrium flow in the presence of a worst-case disruption of given link capacity loss. A computationally tractable solution scheme is proposed to identify important links whose disruption could cause substantial increase in travel delay to all road users. Numerical computations are conducted in a medium-sized road network to demonstrate the feasibility of the proposed solution scheme. The results indicate that the most critical signal-controlled traffic streams can be conveniently identified, when failed to perform its normal functions, would give rise to maximum travel delay to all road users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aashtiani HZ, Magnanti TL (1981) Equilibria on a congested transportation network. SIAM J Algebr Discrete Meth 3(2):213–226CrossRef Aashtiani HZ, Magnanti TL (1981) Equilibria on a congested transportation network. SIAM J Algebr Discrete Meth 3(2):213–226CrossRef
2.
Zurück zum Zitat Allsop RE, Charlesworth JA (1977) Traffic in a signal-controlled road network: an example of different signal timings inducing different routeings. Traffic Eng Contr 18:262–264 Allsop RE, Charlesworth JA (1977) Traffic in a signal-controlled road network: an example of different signal timings inducing different routeings. Traffic Eng Contr 18:262–264
3.
Zurück zum Zitat Akgun I, Tansel B, Wood K (2011) The multi-terminal maximum-flow network-interdiction problem. Eur J Oper Res 211:241–251CrossRef Akgun I, Tansel B, Wood K (2011) The multi-terminal maximum-flow network-interdiction problem. Eur J Oper Res 211:241–251CrossRef
4.
Zurück zum Zitat Asakura Y (1999) Evaluation of network reliability using stochastic user equilibrium. J Adv Transp 33(2):147–158CrossRef Asakura Y (1999) Evaluation of network reliability using stochastic user equilibrium. J Adv Transp 33(2):147–158CrossRef
5.
Zurück zum Zitat Azaiez N, Bier VM (2007) Optimal resource allocation for security in reliability systems. Eur J Oper Res 181:773–786CrossRef Azaiez N, Bier VM (2007) Optimal resource allocation for security in reliability systems. Eur J Oper Res 181:773–786CrossRef
6.
Zurück zum Zitat Bell MGH (2003) The use of game theory to measure the vulnerability of stochastic networks. IEEE Trans Reliab 52(1):63–68CrossRef Bell MGH (2003) The use of game theory to measure the vulnerability of stochastic networks. IEEE Trans Reliab 52(1):63–68CrossRef
7.
Zurück zum Zitat Bell MGH (2000) A game theory approach to measuring the performance reliability of transport networks. Transp Res B 34(6):533–546CrossRef Bell MGH (2000) A game theory approach to measuring the performance reliability of transport networks. Transp Res B 34(6):533–546CrossRef
8.
Zurück zum Zitat Bell MGH, Cassir C (2002) Risk-averse user equilibrium traffic assignment: an application of game theory. Transp Res B 36(8):671–681CrossRef Bell MGH, Cassir C (2002) Risk-averse user equilibrium traffic assignment: an application of game theory. Transp Res B 36(8):671–681CrossRef
9.
Zurück zum Zitat Bell MGH, Iida Y (1997) Transportation network analysis. Wiley, ChichesterCrossRef Bell MGH, Iida Y (1997) Transportation network analysis. Wiley, ChichesterCrossRef
10.
Zurück zum Zitat Bell MGH, Kanturska U, Schmocker J-D, Fonzone A (2008) Attacker–defender models and road network vulnerability. Phil Trans R Soc A 366(1872):1893–1906CrossRef Bell MGH, Kanturska U, Schmocker J-D, Fonzone A (2008) Attacker–defender models and road network vulnerability. Phil Trans R Soc A 366(1872):1893–1906CrossRef
11.
Zurück zum Zitat Berdica K (2002) An introduction to road vulnerability: what has been done, is done and should be done. Transp Policy 9:117–127CrossRef Berdica K (2002) An introduction to road vulnerability: what has been done, is done and should be done. Transp Policy 9:117–127CrossRef
12.
Zurück zum Zitat Bier VM, Hausken K (2013) Defending and attacking a network of two arcs subject to traffic congestion. Reliab Eng Syst Saf 112:214–224CrossRef Bier VM, Hausken K (2013) Defending and attacking a network of two arcs subject to traffic congestion. Reliab Eng Syst Saf 112:214–224CrossRef
13.
Zurück zum Zitat Bier VM, Nagaraj A, Abhichandani V (2005) Protection of simple series and parallel systems with components of different values. Reliab Eng Syst Saf 87:315–323CrossRef Bier VM, Nagaraj A, Abhichandani V (2005) Protection of simple series and parallel systems with components of different values. Reliab Eng Syst Saf 87:315–323CrossRef
14.
Zurück zum Zitat Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces 36:530–544CrossRef Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces 36:530–544CrossRef
15.
Zurück zum Zitat Cappanera P, Scaparra MP (2011) Optimal allocation of protective resources in shortest-path networks. Transp Sci 45(1):64–80CrossRef Cappanera P, Scaparra MP (2011) Optimal allocation of protective resources in shortest-path networks. Transp Sci 45(1):64–80CrossRef
16.
Zurück zum Zitat Chen A, Yang C, Kongsomsaksakul S, Lee M (2007) Network-based accessibility measures for vulnerability analysis of degradable transportation networks. Netw Spat Econ 7:241–256CrossRef Chen A, Yang C, Kongsomsaksakul S, Lee M (2007) Network-based accessibility measures for vulnerability analysis of degradable transportation networks. Netw Spat Econ 7:241–256CrossRef
17.
Zurück zum Zitat Chen A, Yang H, Lo HK, Tang WH (2002) Capacity reliability of a road network: an assessment methodology and numerical results. Transp Res B 36(3):225–252CrossRef Chen A, Yang H, Lo HK, Tang WH (2002) Capacity reliability of a road network: an assessment methodology and numerical results. Transp Res B 36(3):225–252CrossRef
18.
Zurück zum Zitat Chiou S-W (2003) TRANSYT derivatives for area traffic control optimisation with network equilibrium flows. Transp Res B 37(3):263–290CrossRef Chiou S-W (2003) TRANSYT derivatives for area traffic control optimisation with network equilibrium flows. Transp Res B 37(3):263–290CrossRef
19.
Zurück zum Zitat Church RL, Scaparra MP (2007) Analyzis of facility systems’ reliability when subject to attack or a natural disaster. In: Murray AT, Grubesic TH (eds) Critical infrastructure: reliability and vulnerability, Advances in spatial science. Springer, Berlin, pp 221–242CrossRef Church RL, Scaparra MP (2007) Analyzis of facility systems’ reliability when subject to attack or a natural disaster. In: Murray AT, Grubesic TH (eds) Critical infrastructure: reliability and vulnerability, Advances in spatial science. Springer, Berlin, pp 221–242CrossRef
20.
Zurück zum Zitat Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502CrossRef Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502CrossRef
21.
Zurück zum Zitat Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46(2):184–197CrossRef Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46(2):184–197CrossRef
22.
Zurück zum Zitat Grubesic TH, Matisziw TC, Murray AT, Snediker D (2008) Comparative approaches for assessing network vulnerability. Int Reg Sci Rev 31(1):88–112CrossRef Grubesic TH, Matisziw TC, Murray AT, Snediker D (2008) Comparative approaches for assessing network vulnerability. Int Reg Sci Rev 31(1):88–112CrossRef
23.
Zurück zum Zitat Hausken K (2008) Strategic defense and attack for reliability Systems. Reliab Eng Syst Saf 93(11):1740–1750CrossRef Hausken K (2008) Strategic defense and attack for reliability Systems. Reliab Eng Syst Saf 93(11):1740–1750CrossRef
24.
Zurück zum Zitat Hausken K, Levitin G (2009) Minmax defense strategy for complex multi-state systems. Reliab Eng Syst Saf 94:577–587CrossRef Hausken K, Levitin G (2009) Minmax defense strategy for complex multi-state systems. Reliab Eng Syst Saf 94:577–587CrossRef
25.
Zurück zum Zitat Israeli E, Wood K (2002) Shortest path network interdiction. Networks 40:97–111CrossRef Israeli E, Wood K (2002) Shortest path network interdiction. Networks 40:97–111CrossRef
26.
Zurück zum Zitat Jenelius E, Mattsson L (2012) Road network vulnerability analysis of area-covering disruptions: a grid-based approach with case study. Transp Res A 46:746–760 Jenelius E, Mattsson L (2012) Road network vulnerability analysis of area-covering disruptions: a grid-based approach with case study. Transp Res A 46:746–760
27.
Zurück zum Zitat Jenelius E, Petersen T, Mattsson L (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560 Jenelius E, Petersen T, Mattsson L (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560
28.
Zurück zum Zitat Lam WHK, Chan KS, Li Z-C, Bell MGH (2010) A risk-averse user equilibrium model for route choice problem in signal-controlled networks. J Adv Transp 44:219–230CrossRef Lam WHK, Chan KS, Li Z-C, Bell MGH (2010) A risk-averse user equilibrium model for route choice problem in signal-controlled networks. J Adv Transp 44:219–230CrossRef
29.
Zurück zum Zitat Lam WHK, Shao H, Sumalee A (2008) Modeling impacts of adverse weather conditions on a road network with uncertainties in demand and supply. Transp Res B 42:890–910CrossRef Lam WHK, Shao H, Sumalee A (2008) Modeling impacts of adverse weather conditions on a road network with uncertainties in demand and supply. Transp Res B 42:890–910CrossRef
30.
Zurück zum Zitat Levitin G (2004) Maximizing survivability of vulnerable weighted voting systems. Reliab Eng Syst Saf 83:17–26CrossRef Levitin G (2004) Maximizing survivability of vulnerable weighted voting systems. Reliab Eng Syst Saf 83:17–26CrossRef
31.
Zurück zum Zitat Levitin G (2007) Optimal defense strategy against intentional attacks. IEEE Trans Reliab 56:148–156CrossRef Levitin G (2007) Optimal defense strategy against intentional attacks. IEEE Trans Reliab 56:148–156CrossRef
32.
Zurück zum Zitat Levitin G (2009) Redundancy vs. protection vs. false targets for systems under attack. Reliability. IEEE Trans Reliab 58(1):58–68CrossRef Levitin G (2009) Redundancy vs. protection vs. false targets for systems under attack. Reliability. IEEE Trans Reliab 58(1):58–68CrossRef
33.
Zurück zum Zitat Levitin G, Ben-Haim H (2008) Importance of protections against intentional attacks. Reliab Eng Syst Saf 93:639–646CrossRef Levitin G, Ben-Haim H (2008) Importance of protections against intentional attacks. Reliab Eng Syst Saf 93:639–646CrossRef
34.
Zurück zum Zitat Levitin G, Gertsbakh I, Shpungin Y (2011) Evaluating the damage associated with intentional network disintegration. Reliab Eng Syst Saf 96:433–439CrossRef Levitin G, Gertsbakh I, Shpungin Y (2011) Evaluating the damage associated with intentional network disintegration. Reliab Eng Syst Saf 96:433–439CrossRef
35.
Zurück zum Zitat Levitin G, Hausken K (2013) Is it wise to leave some false targets unprotected? Reliab Eng Syst Saf 112:176–186CrossRef Levitin G, Hausken K (2013) Is it wise to leave some false targets unprotected? Reliab Eng Syst Saf 112:176–186CrossRef
36.
Zurück zum Zitat Levitin G, Hausken K, Ben-Haim H (2013) Defending majority voting systems against a strategic attacker. Reliab Eng Syst Saf 111:37–44CrossRef Levitin G, Hausken K, Ben-Haim H (2013) Defending majority voting systems against a strategic attacker. Reliab Eng Syst Saf 111:37–44CrossRef
37.
Zurück zum Zitat Levitin G, Lisnianski A (2003) Optimizing survivability of vulnerable series-parallel multi-state systems. Reliab Eng Syst Saf 79:319–331CrossRef Levitin G, Lisnianski A (2003) Optimizing survivability of vulnerable series-parallel multi-state systems. Reliab Eng Syst Saf 79:319–331CrossRef
38.
Zurück zum Zitat Liberatore F, Scaparra MP, Daskin MS (2011) Analyzis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification. Comput Oper Res 38:357–366CrossRef Liberatore F, Scaparra MP, Daskin MS (2011) Analyzis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification. Comput Oper Res 38:357–366CrossRef
39.
Zurück zum Zitat Lim C, Smith J (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39((Special Issue on Homeland Security)):15–26CrossRef Lim C, Smith J (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39((Special Issue on Homeland Security)):15–26CrossRef
40.
Zurück zum Zitat Lins ID, Rego LC, Moura MC, Droguett EL (2013) Selection of security system design via games of imperfect information and multi-objective genetic algorithm. Reliab Eng Syst Saf 112:59–66CrossRef Lins ID, Rego LC, Moura MC, Droguett EL (2013) Selection of security system design via games of imperfect information and multi-objective genetic algorithm. Reliab Eng Syst Saf 112:59–66CrossRef
41.
Zurück zum Zitat Lo HK, Luo XW, Siu BWY (2006) Degradable transport network: travel time budget of travelers with heterogeneous risk aversion. Transp Res B 40(9):792–806CrossRef Lo HK, Luo XW, Siu BWY (2006) Degradable transport network: travel time budget of travelers with heterogeneous risk aversion. Transp Res B 40(9):792–806CrossRef
42.
Zurück zum Zitat Lo HK, Tung YK (2003) Network with degradable links: capacity analysis and design. Transp Res B 37(4):345–363CrossRef Lo HK, Tung YK (2003) Network with degradable links: capacity analysis and design. Transp Res B 37(4):345–363CrossRef
43.
Zurück zum Zitat Losada C, Scaparra MP, O’Hanley JR (2012) Optimizing system resilience: a facility protection model with recovery time. Eur J Oper Res 217:519–530CrossRef Losada C, Scaparra MP, O’Hanley JR (2012) Optimizing system resilience: a facility protection model with recovery time. Eur J Oper Res 217:519–530CrossRef
44.
Zurück zum Zitat Nicholson A, Du Z-P (1997) Degradable transportation systems: an integrated equilibrium model. Transp Res B 31(3):209–223CrossRef Nicholson A, Du Z-P (1997) Degradable transportation systems: an integrated equilibrium model. Transp Res B 31(3):209–223CrossRef
45.
Zurück zum Zitat O’hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209:23–36CrossRef O’hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209:23–36CrossRef
46.
Zurück zum Zitat Ramirez-Marquez JE, Rocco C (2009) Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery. Reliab Eng Syst Saf 94:913–921CrossRef Ramirez-Marquez JE, Rocco C (2009) Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery. Reliab Eng Syst Saf 94:913–921CrossRef
47.
Zurück zum Zitat Ramirez-Marquez JE, Rocco C, Levitin G (2009) Optimal protection of general source–sink networks via evolutionary techniques. Reliab Eng Syst Saf 94(10):1676–1684CrossRef Ramirez-Marquez JE, Rocco C, Levitin G (2009) Optimal protection of general source–sink networks via evolutionary techniques. Reliab Eng Syst Saf 94(10):1676–1684CrossRef
48.
Zurück zum Zitat Ramirez-Marquez JE, Rocco C, Levitin G (2011) Optimal network protection against diverse interdictor strategies. Reliabil Eng Syst Saf 96(3):374–382CrossRef Ramirez-Marquez JE, Rocco C, Levitin G (2011) Optimal network protection against diverse interdictor strategies. Reliabil Eng Syst Saf 96(3):374–382CrossRef
49.
Zurück zum Zitat Rocco CM, Ramirez-Marquez JE (2009) Deterministic network interdiction optimization via an evolutionary approach. Reliab Eng Syst Saf 94:568–576CrossRef Rocco CM, Ramirez-Marquez JE (2009) Deterministic network interdiction optimization via an evolutionary approach. Reliab Eng Syst Saf 94:568–576CrossRef
50.
Zurück zum Zitat Rocco CM, Ramirez-Marquez JE (2010) A bi-objective approach for shortest-path network interdiction. Reliab Eng Syst Saf 59:232–240 Rocco CM, Ramirez-Marquez JE (2010) A bi-objective approach for shortest-path network interdiction. Reliab Eng Syst Saf 59:232–240
51.
Zurück zum Zitat Rocco CM, Ramirez-Marquez JE, Salazar DE (2010) Bi and tri-objective optimization in the deterministic network interdiction problem. Reliab Eng Syst Saf 95(8):887–896CrossRef Rocco CM, Ramirez-Marquez JE, Salazar DE (2010) Bi and tri-objective optimization in the deterministic network interdiction problem. Reliab Eng Syst Saf 95(8):887–896CrossRef
52.
Zurück zum Zitat Royset JO, Wood RK (2007) Solving the bi-objective maximum-flow network-interdiction problem. INFORMS J Comput 19(2):175–184CrossRef Royset JO, Wood RK (2007) Solving the bi-objective maximum-flow network-interdiction problem. INFORMS J Comput 19(2):175–184CrossRef
53.
Zurück zum Zitat Salmeron J, Wood K, Baldick R (2004) Analyzis of electric grid security under terrorist threat. IEEE Trans Power Syst 19:905–912CrossRef Salmeron J, Wood K, Baldick R (2004) Analyzis of electric grid security under terrorist threat. IEEE Trans Power Syst 19:905–912CrossRef
54.
Zurück zum Zitat Scaparra MP, Church RL (2008) A Bilevel mixed-integer program for critical infrastructure protection planning. Comput Oper Res 35:1905–1923CrossRef Scaparra MP, Church RL (2008) A Bilevel mixed-integer program for critical infrastructure protection planning. Comput Oper Res 35:1905–1923CrossRef
55.
Zurück zum Zitat Sullivan JL, Novak DC, Aultman-Hall L, Scott DM (2010) Identifying critical road segments and measuring system-wide robustness in transportation networks with isolating links: a link-based capacity-reduction approach. Transp Res A 44:323–336 Sullivan JL, Novak DC, Aultman-Hall L, Scott DM (2010) Identifying critical road segments and measuring system-wide robustness in transportation networks with isolating links: a link-based capacity-reduction approach. Transp Res A 44:323–336
56.
Zurück zum Zitat Sumalee A, Kurauchi F (2006) Network capacity reliability analysis considering traffic regulation after a major disaster. Netw Spat Econ 6(3–4):205–219CrossRef Sumalee A, Kurauchi F (2006) Network capacity reliability analysis considering traffic regulation after a major disaster. Netw Spat Econ 6(3–4):205–219CrossRef
57.
Zurück zum Zitat Szeto WY, O’Brien L, O’Mahony M (2006) Risk-averse traffic assignment with elastic demands: NCP formulation and solution method for assessing performance reliability. Netw Spat Econ 6(3):313–332CrossRef Szeto WY, O’Brien L, O’Mahony M (2006) Risk-averse traffic assignment with elastic demands: NCP formulation and solution method for assessing performance reliability. Netw Spat Econ 6(3):313–332CrossRef
58.
Zurück zum Zitat Szeto WY (2011) Cooperative game approaches to measuring network reliability considering paradoxes. Transp Res C 19:229–241CrossRef Szeto WY (2011) Cooperative game approaches to measuring network reliability considering paradoxes. Transp Res C 19:229–241CrossRef
59.
Zurück zum Zitat Vincent RA, Mitchell AI, Robertson DI (1980) User guide to TRANSYT. TRRL report, LR888. Transport and Road Research Laboratory, Crowthorne Vincent RA, Mitchell AI, Robertson DI (1980) User guide to TRANSYT. TRRL report, LR888. Transport and Road Research Laboratory, Crowthorne
60.
Zurück zum Zitat Wardrop JG (1952) Some theoretical aspects of road traffic approach. Proc Inst Civil Eng II 1(325–378):1952 Wardrop JG (1952) Some theoretical aspects of road traffic approach. Proc Inst Civil Eng II 1(325–378):1952
61.
Zurück zum Zitat Wollmer R (1964) Removing arcs from a network. J Oper Res Soc Am 12:934–940 Wollmer R (1964) Removing arcs from a network. J Oper Res Soc Am 12:934–940
62.
Zurück zum Zitat Wong SC (1995) Derivatives of the performance index for the traffic model from TRANSYT. Transp Res B 29(5):303–327CrossRef Wong SC (1995) Derivatives of the performance index for the traffic model from TRANSYT. Transp Res B 29(5):303–327CrossRef
63.
Zurück zum Zitat Wood K (1993) Deterministic network interdiction. Math Comput Model 17:1–18CrossRef Wood K (1993) Deterministic network interdiction. Math Comput Model 17:1–18CrossRef
Metadaten
Titel
Vulnerability Analysis of a Signal-Controlled Road Network for Equilibrium Flow
verfasst von
Suh-Wen Chiou
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-11415-6_6