An integrated tri-level model for enhancing the resilience of facilities against intentional attacks

It is paramount to enhance the resilience of many facilities that are known to be critical for modern societies and threatened by intentional attacks. For this purpose, it is important to not only protect them before disruptions, but also recover them after disruptions. To deal with this problem, this paper proposes a tri-level model explicitly integrating the decision making on recovery strategies of disrupted facilities with the decision making on protecting facilities from intentional attacks. The facilities studied in this research are assumed to be capacitated and a recovery strategy is considered to include repairing a subset of disrupted facilities and expanding the capacities of a subset of non-interdicted facilities. We are concerned with the defender’s objective of maximizing the resilience of the given set of facilities making profit within a prescribed time interval. To deal with the complexity of solving the proposed tri-level model, the ant colony system algorithm is employed with necessary adaptations.

[1]  Zhu Han,et al.  Stochastic Pre-hurricane Restoration Planning for Electric Power Systems Infrastructure , 2015, IEEE Transactions on Smart Grid.

[2]  Jesse R. O'Hanley,et al.  Optimizing system resilience: A facility protection model with recovery time , 2012, Eur. J. Oper. Res..

[3]  Richard L. Church,et al.  Locating and protecting critical reserve sites to minimize expected and worst-case losses , 2007 .

[4]  Christiano Lyra,et al.  Hierarchical multiple criteria optimization of maintenance activities on power distribution networks , 2015, Ann. Oper. Res..

[5]  Maria Paola Scaparra,et al.  Hedging against disruptions with ripple effects in location analysis , 2012 .

[6]  S. L. Hakimi,et al.  Optimum Locations of Switching Centers and the Absolute Centers and Medians of a Graph , 1964 .

[7]  Charles ReVelle,et al.  Central Facilities Location , 2010 .

[8]  Richard L. Church,et al.  Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .

[9]  Slavko Krajcar,et al.  Integrated approach to energy security and critical infrastructure in Croatia , 2009, 2009 6th International Conference on the European Energy Market.

[10]  Yiping Fang,et al.  A Mathematical Framework to Optimize Critical Infrastructure Resilience against Intentional Attacks , 2017, Comput. Aided Civ. Infrastructure Eng..

[11]  Devanandham Henry,et al.  Generic metrics and quantitative approaches for system resilience as a function of time , 2012, Reliab. Eng. Syst. Saf..

[12]  Richard L. Church,et al.  The stochastic interdiction median problem with disruption intensity levels , 2012, Ann. Oper. Res..

[13]  Min Ouyang,et al.  A three-stage resilience analysis framework for urban infrastructure systems , 2012 .

[14]  Türkay Dereli,et al.  An ant colony algorithm for solving budget constrained and unconstrained dynamic facility layout problems , 2006 .

[15]  John E. Mitchell,et al.  Restoring infrastructure systems: An integrated network design and scheduling (INDS) problem , 2012, Eur. J. Oper. Res..

[16]  Jose Emmanuel Ramirez-Marquez,et al.  Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .

[17]  Erik Jenelius,et al.  Critical infrastructure protection under imperfect attacker perception , 2010, Int. J. Crit. Infrastructure Prot..

[18]  Georgios K. D. Saharidis,et al.  Strategies for protecting supply chain networks against facility and transportation disruptions: an improved Benders decomposition approach , 2013, Ann. Oper. Res..

[19]  Necati Aras,et al.  The budget constrained r-interdiction median problem with capacity expansion , 2010, Central Eur. J. Oper. Res..

[20]  Jesse R. O'Hanley,et al.  Designing robust coverage networks to hedge against worst-case facility losses , 2008, Eur. J. Oper. Res..

[21]  Thomas Stützle,et al.  Ant Colony Optimization , 2009, EMO.

[22]  Zvi Drezner,et al.  A defensive maximal covering problem on a network , 2009, Int. Trans. Oper. Res..

[23]  Min Ouyang,et al.  Resilience assessment of interdependent infrastructure systems: With a focus on joint restoration modeling and analysis , 2015, Reliab. Eng. Syst. Saf..

[24]  C.-H. Lee,et al.  A revised ant algorithm for solving location-allocation problem with risky demand in a multi-echelon supply chain network , 2015, Appl. Soft Comput..

[25]  John E. Mitchell,et al.  Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems , 2013, Ann. Oper. Res..

[26]  Richard L. Church,et al.  The maximal covering location problem , 1974 .

[27]  Deniz Aksen,et al.  A bilevel partial interdiction problem with capacitated facilities and demand outsourcing , 2014, Comput. Oper. Res..

[28]  James C. Chu,et al.  Optimal threshold-based network-level transportation infrastructure life-cycle management with heterogeneous maintenance actions , 2012 .

[29]  Herminia I. Calvete,et al.  Bilevel model for production-distribution planning solved by using ant colony optimization , 2011, Comput. Oper. Res..

[30]  Chase Rainwater,et al.  Robust facility location: Hedging against failures , 2014, Reliab. Eng. Syst. Saf..

[31]  Kai-Yuan Cai,et al.  The r-interdiction median problem with probabilistic protection and its solution algorithm , 2013, Comput. Oper. Res..

[32]  Richard L. Church,et al.  Production , Manufacturing and Logistics An exact solution approach for the interdiction median problem with fortification , 2008 .

[33]  R. Swain A decomposition algorithm for a class of facility location problems , 1971 .

[34]  Richard L. Church,et al.  Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .

[35]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[36]  Qing Li,et al.  Locating and protecting facilities from intentional attacks using secrecy , 2018, Reliab. Eng. Syst. Saf..

[37]  William L. Waugh,et al.  Handbook of Emergency Management: Programs and Policies Dealing with Major Hazards and Disasters , 1990 .

[38]  Chi Zhang,et al.  Critical infrastructure protection using secrecy - A discrete simultaneous game , 2015, Eur. J. Oper. Res..

[39]  Maria Paola Scaparra,et al.  Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification , 2011, Comput. Oper. Res..