Minimizing a stochastic maximum‐reliability path

We consider a stochastic network interdiction problem in which the goal is to detect an evader, who selects a maximum-reliability path. Subject to a resource constraint, the interdictor installs sensors on a subset of the network’s arcs to minimize the value of the evader’s maximum-reliability path, i.e., to maximize the detection probability. When this decision is made, the evader’s origin–destination pair is known to the interdictor only through a probability distribution. Our model is framed as a stochastic mixed-integer program and solved by an enhanced L-shaped decomposition method. Our primary enhancement is via a valid inequality, which we call a step inequality. In earlier work [Morton et al., IIE Trans 39 (2007), 3–14], we developed step inequalities for the special case in which the evader encounters at most one sensor on an origin–destination path. Here, we generalize the step inequality to the case where the evader encounters multiple sensors. In this more general setting, the step inequality is tightly coupled to the decomposition scheme. An efficient separation algorithm identifies violated step inequalities and strengthens the linear programming relaxation of the L-shaped method’s master program. We apply this solution procedure with further computational enhancements to a collection of test problems. © 2008 Wiley Periodicals, Inc. NETWORKS, Vol. 52(3), 111–119 2008

[1]  H. W. Corley,et al.  Most vital links and nodes in weighted networks , 1982, Oper. Res. Lett..

[2]  D. Y. Ball U.S. second line of defense: preventing nuclear smuggling across Russia's borders , 1998 .

[3]  David L. Woodruff,et al.  Interdicting Stochastic Networks with Binary Interdiction Effort , 2003 .

[4]  Andrew J. Schaefer,et al.  SPAR: stochastic programming with adversarial recourse , 2006, Oper. Res. Lett..

[5]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[6]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[7]  R. Wets,et al.  L-SHAPED LINEAR PROGRAMS WITH APPLICATIONS TO OPTIMAL CONTROL AND STOCHASTIC PROGRAMMING. , 1969 .

[8]  Richard D. Wollmer,et al.  Two stage linear programming under uncertainty with 0–1 integer first stage variables , 1980, Math. Program..

[9]  Dulcy M. Abraham,et al.  Issues in risk management of water networks against intentional attacks , 2004 .

[10]  Brian K. Reed Models for Proliferation Interdiction Response Analysis. , 1994 .

[11]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[12]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[13]  Delbert Ray Fulkerson,et al.  Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..

[14]  Alan W. McMasters,et al.  Optimal interdiction of a supply network , 1970 .

[15]  Gerald G. Brown,et al.  Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..

[16]  David P. Morton,et al.  Models for nuclear smuggling interdiction , 2007 .

[17]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[18]  A. K. Mittal,et al.  The k most vital arcs in the shortest path problem , 1990 .

[19]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[20]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[21]  R. Vohra,et al.  Finding the most vital arcs in a network , 1989 .

[22]  B. Golden A problem in network interdiction , 1978 .

[23]  J. Birge,et al.  A multicut algorithm for two-stage stochastic linear programs , 1988 .

[24]  Samir Khuller,et al.  The complexity of finding most vital arcs and nodes , 1995 .

[25]  W. C. Turner,et al.  Optimal interdiction policy for a flow network , 1971 .