Many-to-Many Game-Theoretic Approach for the Measurement of Transportation Network Vulnerability

The vulnerability of a transportation network is strongly correlated with the ability of the network to withstand shocks and disruptions. A robust network with strategic redundancy allows traffic to be redistributed or reassigned without unduly compromising system performance. High-volume edges with limited alternative paths represent system vulnerabilities—a feature of transportation networks that has been exploited to identify critical components. A mixed-strategy, stochastic game-theoretic approach is presented for the measurement of network vulnerability. This method is designed to incorporate all origins and destinations in a network in a computationally efficient manner. The presented method differs from previous efforts in that it provides a many-to-many measure of vulnerability and edge-based disruptions that may not reside on a common path. A game that considers all possible origin–destination pairs is constructed between a router, which seeks minimum cost paths for travelers, and a network tester, which maximizes travel cost by disabling edges within the network. The method of successive averages is used for routing probabilities, and a weighted entropy function is employed to compute edge-disruption probabilities. The method is demonstrated on a small example network and then applied to the Sioux Falls, South Dakota, network. Results indicate good correspondence with a previous method that used equilibrium assignment and rapid solution convergence.

[1]  Ravindra K. Ahuja,et al.  Network Flows: Theory, Algorithms, and Applications , 1993 .

[2]  M G H Bell,et al.  Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[3]  Massimo Marchiori,et al.  Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[4]  Pamela Murray-Tuite Transportation Network Risk Profile for an Origin–Destination Pair , 2008 .

[5]  Gilbert Laporte,et al.  A game theoretic framework for the robust railway transit network design problem , 2010 .

[6]  R. Vohra,et al.  Finding the most vital arcs in a network , 1989 .

[7]  Darren M. Scott,et al.  Network Robustness Index : a new method for identifying critical links and evaluating the performance of transportation networks , 2006 .

[8]  Pamela Murray-Tuite,et al.  Methodology for Determining Vulnerable Links in a Transportation Network , 2004 .

[9]  Michael G.H. Bell,et al.  Risk-averse user equilibrium traffic assignment: an application of game theory , 2002 .

[10]  Satish V. Ukkusuri,et al.  A methodology to assess the criticality of highway transportation networks , 2009 .

[11]  Joseph N. Prashker,et al.  The applicability of non-cooperative game theory in transport analysis , 2006 .

[12]  Brian Michael Jenkins,et al.  Explosives and Incendiaries Used in Terrorist Attacks on Public Surface Transportation , 2010 .

[13]  H. W. Corley,et al.  Most vital links and nodes in weighted networks , 1982, Oper. Res. Lett..

[14]  Larry J. LeBlanc,et al.  An Algorithm for the Discrete Network Design Problem , 1975 .

[15]  Y. She Urban Transportation Networks: Equilibrium Analysis with Mathematical Programming Methods , 1985 .

[16]  Michael G. H. Bell The use of game theory to measure the vulnerability of stochastic networks , 2003, IEEE Trans. Reliab..