Survivable network design under optimal and heuristic interdiction scenarios

نویسندگان

  • Jonathan Cole Smith
  • Churlzu Lim
  • Fransisca Sudargho
چکیده

We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular, we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed arcs in the designer's network, and the designer acts last to transmit a final set of flows in the network. Most studies of this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action: an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits obtained from transmitting flows. Draft for JOGO, pp. 1 – 27. Survivable Network Design Under Optimal and Heuristic Interdiction Scenarios J. Cole Smith∗, Churlzu Lim∗, and Fransisca Sudargho† ∗Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL †Department of Systems and Industrial Engineering, The University of Arizona, Tucson, AZ Abstract We examine the problem of building or fortifying a network to defend against enemy attacks inWe examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular, we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action: an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits obtained from transmitting flows.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survivable Network Design under Various Interdiction Scenarios

We examine the problem of building or fortifying a network to defend against enemy attack scenarios. In particular, we examine the case in which an enemy can destroy all or part of the arcs that we construct on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which we act first to construct our network and simultaneously transmi...

متن کامل

Topological Design of Survivable Wireless Access Networks

Wireless mobile networks have become crucial in providing untethered communication services to mobile users. In this paper, we propose an optimization model for the design of survivable wireless access networks. The main objective of the model is to optimize the network design cost of wireless backhaul networks while meeting survivability requirements. This paper also presents a simple and effi...

متن کامل

Algorithms for Discrete and Continuous Multicommodity Flow Network Interdiction Problems

We consider a network interdiction problem on a multicommodity flow network, in which an attacker disables a set of network arcs in order to minimize the maximum profit that can be obtained from shipping commodities across the network. The attacker is assumed to have some budget for destroying (or “interdicting”) arcs, and each arc is associated with a positive interdiction expense. In this pap...

متن کامل

QoS Aware and Survivable Network Design for Planned Wireless Sensor Networks

We study the problem of wireless sensor network design by deploying a minimum number of additional relay nodes (to minimize network cost) at a subset of given potential relay locations, in order to convey the data from already existing sensor nodes (hereafter called source nodes) to a Base Station, while meeting a certain specified hop count bound (the hop count bound is chosen to ensure a pre-...

متن کامل

Reliable Designing of Capacitated Logistics Network with Multi Configuration Structure under Disruptions: A Hybrid Heuristic Based Sample Average Approximation Algorithm

We consider the reliable multi configuration capacitated logistics network design problem (RMCLNDP) with system disruptions, concerned with facilities locating, transportation links constructing, and also allocating their limited capacities to the customers in order to satisfy their demands with a minimum expected total cost (including locating costs, link constructing costs, as well as expecte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Global Optimization

دوره 38  شماره 

صفحات  -

تاریخ انتشار 2007