An implicit optimization approach for survivable network design

We consider the problem of designing a network of minimum cost while satisfying a prescribed survivability criterion. The survivability criterion requires that a feasible flow must still exists (i.e. all demands can be satisfied without violating arc capacities) even after the disruption of a subset of the network's arcs. Specifically, we consider the case in which a disruption (random or malicious) can destroy a subset of the arcs, with the cost of the disruption not to exceed a disruption budget. This problem takes the form of a tri-level, two-player game, in which the network operator designs (or augments) the network, then the attacker launches a disruption that destroys a subset of arcs, and then the network operator attempts to find a feasible flow over the residual network. We first show how this can be modeled as a two-stage stochastic program from the network operator's perspective, with each of the exponential number of potential attacks considered as a disruption scenario. We then reformulate this problem, via a Benders decomposition, to consider the recourse decisions implicitly, greatly reducing the number of variables but at the expense of an exponential increase in the number of constraints. We next develop a cut-generation based algorithm. Rather than explicitly considering each disruption scenario to identify these Benders cuts, however, we develop a bi-level program and corresponding separation algorithm that enables us to implicitly evaluate the exponential set of disruption scenarios. Our computational results demonstrate the efficacy of this approach.

[1]  Daniel Bienstock,et al.  Using mixed-integer programming to solve power grid blackout problems , 2007, Discret. Optim..

[2]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[3]  J. C. Smith,et al.  Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .

[4]  R. Carr,et al.  A Decomposition-Based Pseudoapproximation Algorithm for Network Flow Inhibition , 2003 .

[5]  R. Alvarez,et al.  Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[6]  D. Bienstock,et al.  The N − k Problem in Power Grids : New Models , Formulations and Computation , 2010 .

[7]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[8]  Jacques F. Benders,et al.  Partitioning procedures for solving mixed-variables programming problems , 2005, Comput. Manag. Sci..

[9]  Anthony Chen,et al.  Network-based Accessibility Measures for Vulnerability Analysis of Degradable Transportation Networks , 2007 .

[10]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[11]  Lawrence M Wein,et al.  Analyzing a bioterror attack on the food supply: the case of botulinum toxin in milk. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[12]  Daniel Bienstock,et al.  The N-k Problem in Power Grids: New Models, Formulations, and Numerical Experiments , 2009, SIAM J. Optim..

[13]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[14]  Jonathan Cole Smith,et al.  Survivable network design under optimal and heuristic interdiction scenarios , 2007, J. Glob. Optim..

[15]  Juan C. Meza,et al.  Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid , 2010, SIAM J. Optim..