Optimizing system resilience: A facility protection model with recovery time

Optimizing system resilience is concerned with the development of strategies to restore a system to normal operations as quickly and efficiently as possible following potential disruption. To this end, we present in this article a bilevel mixed integer linear program for protecting an uncapacitated median type facility network against worst-case losses, taking into account the role of facility recovery time on system performance and the possibility of multiple disruptions over time. The model differs from previous types of facility protection models in that protection is not necessarily assumed to prevent facility failure altogether, but more precisely to speed up recovery time following a potential disruption. Three different decomposition approaches are devised to optimally solve medium to large problem instances. Computational results provide a cross comparison of the efficiency of each algorithm. Additionally, we present an analysis to estimate cost-efficient levels of investments in protection resources.

[1]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[2]  Natalia Alguacil,et al.  Analysis of Electric Grid Interdiction With Line Switching , 2010, IEEE Transactions on Power Systems.

[3]  J. C. Smith,et al.  Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .

[4]  Christodoulos A. Floudas Generalized Benders Decomposition , 2009, Encyclopedia of Optimization.

[5]  Maria Paola Scaparra,et al.  Optimal Allocation of Protective Resources in Shortest-Path Networks , 2011, Transp. Sci..

[6]  Hanif D. Sherali,et al.  A modification of Benders' decomposition algorithm for discrete subproblems: An approach for stochastic programs with integer recourse , 2002, J. Glob. Optim..

[7]  Z. Caner Taskin,et al.  Cutting plane algorithms for solving a stochastic edge-partition problem , 2009, Discret. Optim..

[8]  Jonathan F. Bard,et al.  The Mixed Integer Linear Bilevel Programming Problem , 1990, Oper. Res..

[9]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[10]  N. Waters Methodology For Servicing The Geography Of Urban Fire: An Exploration With Special Reference To London, Ontario , 1977 .

[11]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[12]  Necati Aras,et al.  The budget constrained r-interdiction median problem with capacity expansion , 2010, Central Eur. J. Oper. Res..

[13]  Alan T. Murray,et al.  Critical infrastructure : reliability and vulnerability , 2007 .

[14]  Gareth W. Parry Common cause failure analysis: A critique and some suggestions , 1991 .

[15]  Christodoulos A. Floudas,et al.  Global optimization of mixed-integer bilevel programming problems , 2005, Comput. Manag. Sci..

[16]  J. C. Smith,et al.  Models and algorithms for the design of survivable multicommodity flow networks with general failure scenarios , 2008 .

[17]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[18]  Antonio J. Conejo,et al.  A Benders decomposition method for discretely-constrained mathematical programs with equilibrium constraints , 2010, J. Oper. Res. Soc..

[19]  Richard L. Church,et al.  Production , Manufacturing and Logistics An exact solution approach for the interdiction median problem with fortification , 2008 .

[20]  Maria Paola Scaparra,et al.  Hedging against disruptions with ripple effects in location analysis , 2012 .

[21]  A. A. Oluoko-Odingo,et al.  Vulnerability and Adaptation to Food Insecurity and Poverty in Kenya , 2011 .

[22]  Wang Qian,et al.  BILEVEL PROGRAMS WITH MULTIPLE FOLLOWERS , 2000 .

[23]  M. P. Scaparra,et al.  The Multiple Resource Probabilistic Interdiction Median Problem , 2022 .

[24]  David G. Kamien The McGraw-Hill homeland security handbook , 2006 .

[25]  Jørgen Tind,et al.  L-shaped decomposition of two-stage stochastic programs with integer recourse , 1998, Math. Program..

[26]  M. P. Scaparra,et al.  Optimizing Protection Strategies for Supply Chains: Comparing Classic Decision-Making Criteria in an Uncertain Environment , 2011 .

[27]  Jesse R. O'Hanley,et al.  Designing robust coverage networks to hedge against worst-case facility losses , 2008, Eur. J. Oper. Res..

[28]  J. F. Benders Partitioning procedures for solving mixed-variables programming problems , 1962 .

[29]  Richard L. Church,et al.  Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .

[30]  Maria Paola Scaparra,et al.  Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification , 2011, Comput. Oper. Res..

[31]  Marianthi G. Ierapetritou,et al.  Resolution method for mixed integer bi-level linear problems based on decomposition technique , 2009, J. Glob. Optim..

[32]  J. Arroyo,et al.  On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.

[33]  Gregory Levitin,et al.  Defence and attack of systems with variable attacker system structure detection probability , 2010, J. Oper. Res. Soc..

[34]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[35]  P. Marcotte,et al.  A bilevel model of taxation and its application to optimal highway pricing , 1996 .

[36]  Dulcy M. Abraham,et al.  Allocating security resources to a water supply network , 2007 .

[37]  Richard L. Church,et al.  Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .

[38]  Erik Jenelius,et al.  Critical infrastructure protection under imperfect attacker perception , 2010, Int. J. Crit. Infrastructure Prot..

[39]  M. P. Scaparra,et al.  Protecting Supply Systems to Mitigate Potential Disaster , 2012 .

[40]  Åke J. Holmgren,et al.  Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.