This paper extends previous works developed for evaluating the security characteristics of a network system (e.g. for water supply, electric power or gas distribution) exposed to a terrorist "attack", by taking into account simultaneously several characteristics. Given a source node where the hazard is injected, two criteria are used to assess the vulnerability of the network: the time to reach all network destination nodes (TTRAD), a problem similar to the "all-terminal network" evaluation, often performed within network reliability analysis and a measure related to the damage it causes, like the average number of persons affected (ANPA) or other entities (ANEA), in the system. The use of simulation models allows the identification of the network most critical vulnerabilities, i.e. the nodes where an "attack" can cause the worst damage. To effectively handle attacks, several "immunization" schemata with different characteristics could be proposed in order to maximize TTRAD or to minimize ANAP. The single implementation of any of the immunization schemata could mitigate the effects of the attacks; however a more realistic formulation should consider the simultaneous optimization of two or more objectives, such as cost and vulnerability or vulnerability and reliability. Using a single-objective (SO) formulation, any designer or decision-maker (DM) must solve several problems by varying a group of constraints to obtain a set of alternatives from which to choose the final solution. On the contrary, a multiple objective (MO) approach allows determining directly the Pareto set of alternatives from which the DM can choose the preferred one. The MO problem is solved using multiple objective evolutionary algorithms (MOEA), a group of evolutionary algorithms tailored to cope with MO problems. This group of algorithms conjugates the basic concepts of dominance with the general characteristics of evolutionary algorithms. In this paper we propose a MO formulation, which is able to generate a set of alternatives, based on two or more conflicting objectives. The DM can perform a complete vulnerability study and, a posteriori, define a possible protective scheme. Using the MO approach, it is also possible to define a robust protective scheme. That is to select a set of nodes whose protection generates on average, the least damage. Numerical examples illustrate the approach
[1]
Lothar Thiele,et al.
Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach
,
1999,
IEEE Trans. Evol. Comput..
[2]
Wolfram,et al.
Origins of randomness in physical systems.
,
1985,
Physical review letters.
[3]
Marco Laumanns,et al.
A Tutorial on Evolutionary Multiobjective Optimization
,
2004,
Metaheuristics for Multiobjective Optimisation.
[4]
Blas Galván,et al.
Optimization of constrained multiple-objective reliability problems using evolutionary algorithms
,
2006,
Reliab. Eng. Syst. Saf..
[5]
Enrico Zio,et al.
Security Assessment in Complex Networks Exposed to Terrorist Hazard: A Methodological Approach Based on Cellular Automata and Monte Carlo Simulation
,
2006
.
[6]
Enrico Zio,et al.
Solving advanced network reliability problems by means of cellular automata and Monte Carlo sampling
,
2005,
Reliab. Eng. Syst. Saf..
[7]
Jeffery D. Lewins,et al.
Basics of the Monte Carlo Method with Application to System Reliability
,
2003
.
[8]
Roy Billinton,et al.
Reliability evaluation of engineering systems : concepts and techniques
,
1992
.
[9]
E. Reingold,et al.
Combinatorial Algorithms: Theory and Practice
,
1977
.
[10]
Ana Sánchez,et al.
Alternatives and challenges in optimizing industrial safety using genetic algorithms
,
2004,
Reliab. Eng. Syst. Saf..
[11]
Ignacio J. Ramirez-Rosado,et al.
Reliability and Costs Optimization for Distribution Networks Expansion Using an Evolutionary Algorithm
,
1989
.
[12]
Kalyanmoy Deb,et al.
A fast and elitist multiobjective genetic algorithm: NSGA-II
,
2002,
IEEE Trans. Evol. Comput..
[13]
Francesco Maffioli,et al.
Fishman's sampling plan for computing network reliability
,
2001,
IEEE Trans. Reliab..