Attacker-defender models and road network vulnerability.

نویسندگان

  • M G H Bell
  • U Kanturska
  • J-D Schmöcker
  • A Fonzone
چکیده

The reliability of road networks depends directly on their vulnerability to disruptive incidents, ranging in severity from minor disruptions to terrorist attacks. This paper presents a game theoretic approach to the analysis of road network vulnerability. The approach posits predefined disruption, attack or failure scenarios and then considers how to use the road network so as to minimize the maximum expected loss in the event of one of these scenarios coming to fruition. A mixed route strategy is adopted, meaning that the use of the road network is determined by the worst scenario probabilities. This is equivalent to risk-averse route choice. A solution algorithm suitable for use with standard traffic assignment software is presented, thereby enabling the use of electronic road navigation networks. A variant of this algorithm suitable for risk-averse assignment is developed. A numerical example relating to the central London road network is presented. The results highlight points of vulnerability in the road network. Applications of this form of network vulnerability analysis together with improved solution methods are discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Heuristic Method for Identifying Near-Optimal Defending Strategies for a Road Network Subject to Traffic Congestion

In this study we investigate the vulnerability of road networks to interdictions. We consider that an intentional attacker wants to maximize the congestion level on the network by interdicting some links of the network. The drivers are assumed to be selfish and always choose the route that minimizes the individual travel cost. In this case, network traffic flow follows user equilibrium (UE) tra...

متن کامل

Achieving Cost-Effective Power Grid Hardening through Transmission Network Topology Control

Vulnerability of power grid is a critical issue in power industry. In order to understand and reduce power grid vulnerability under threats, existing research often employs defender-attacker-defender (DAD) models to derive effective protection plans and evaluate grid performances under various contingencies. Transmission line switching (also known as topology control) is an effective operation ...

متن کامل

Optimal power grid protection through a defender-attacker-defender model

Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender-attacker-defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the devel...

متن کامل

Preventive Strike vs. False Targets in Defense Strategy

Abstract: A defender allocates its resource between defending an object passively by deploying false targets, and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender allocates its entire resource to deploying false targets, which the attacker cannot distinguish from the genuine object. If the defender strikes preventively, the attacker...

متن کامل

Vulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models

Reliable operation of power systems is a primary challenge for the system operators. With the advancement in technology and grid automation, power systems are becoming more vulnerable to cyber-attacks. The main goal of adversaries is to take advantage of these vulnerabilities and destabilize the system. This paper describes a game-theoretic approach to attacker / defender modeling in power syst...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Philosophical transactions. Series A, Mathematical, physical, and engineering sciences

دوره 366 1872  شماره 

صفحات  -

تاریخ انتشار 2008