Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Exact algorithms for solving a Euclidean maximum flow network interdiction problem

Published: 01 September 2014 Publication History
  • Get Citation Alerts
  • Abstract

    We consider an interdiction problem that involves an operator or defender whose goal is to maximize flow from a source node to a sink node in some network that resides in Euclidean space. The problem we examine takes the perspective of an interdictor, who seeks to minimize the defender's maximum flow by locating a set of attacks that diminish arc capacities in accordance with the distance from the arc to the attack. Attacks are not restricted to node or arc locations, and can occur anywhere on the region in which the network is located. We refer to this problem as the Euclidean maximum flow network interdiction problem E-MFNIP. We show that E-MFNIP is NP-hard, as it generalizes the maximum flow interdiction problem studied by Wood . This article contributes two approaches to solving E-MFNIP based on solving a sequence of lower-bounding integer programs from which upper bounds can be readily obtained, and shows that these bounds are convergent. Computations on a set of test instances indicate that an approach based on space-discretization tends to converge much faster than one based on linearizing the nonlinear capacity functions. We demonstrate the application of our space-discretization approach on a real geographical network. © 2014 Wiley Periodicals, Inc. NETWORKS, Vol. 642, 109-124 2014

    References

    [1]
    P.Agarwal, A.Efrat, S.Ganjugunte, D.Hay, S.Sankararaman, and G.Zussman, Network vulnerability to single, multiple, and probabilistic physical attacks, IEEE Military Commun Conference MILCOM, San Jose, CA, 2010, pp. pp.1824-1829.
    [2]
    P.Agarwal, A.Efrat, S.Ganjugunte, D.Hay, S.Sankararaman, and G.Zussman, The resilience of WDM networks to probabilistic geographical failures, IEEE/ACM Trans Netw Volume 21 2013, pp.1525-1538.
    [3]
    R.K.Ahuja, T.L.Magnanti, and J.B.Orlin, Network flows: Theory, algorithms, and applications, Prentice Hall, Upper Saddle River, NJ, 1993.
    [4]
    D.S.Altner, O.Ergun, and N.A.Uhan, The maximum flow network interdiction problem: Valid inequalities, integrality gaps, and approximability, Oper Res Lett Volume 38 2010, pp.33-38.
    [5]
    N.Assimakopoulos, A network interdiction model for hospital infection control, Comput Biol Med Volume 17 1987, pp.413-422.
    [6]
    M.D.Bailey, S.M.Shechter, and A.J.Schaefer, SPAR: Stochastic programming with adversarial recourse, Oper Res Lett Volume 34 2006, pp.307-315.
    [7]
    M.O.Ball, B.L.Golden, and R.V.Vohra, Finding the most vital arcs in a network, Oper Res Lett Volume 8 1989, pp.73-76.
    [8]
    O.Berman, D.Krass, and C.W.Xu, Locating flow-intercepting facilities: New approaches and results, Ann Oper Res Volume 60 1995, pp.121-143.
    [9]
    A.Bernstein, D.Bienstock, D.Hay, M.Uzunoglu, and G.Zussman, Sensitivity analysis of the power grid vulnerability to large-scale cascading failures, ACM SIGMETRICS Perform Eval Rev Volume 40 2012, pp.33-37.
    [10]
    G.Brown, M.Carlyle, D.Diehl, J.Kline, and K.Wood, A two-sided optimization for theater ballistic missile defense, Oper Res Volume 53 2005, pp.745-763.
    [11]
    G.Brown, M.Carlyle, J.Salmerón, and K.Wood, Defending critical infrastructure, Interfaces Volume 36 2006, pp.530-544.
    [12]
    G.G.Brown, W.M.Carlyle, R.Harney, E.Skroch, and R.K.Wood, Interdicting a nuclear-weapons project, Oper Res Volume 57 2009, pp.866-877.
    [13]
    H.W.Corley and H.Chang, Finding the n most vital nodes in a flow network, Manage Sci Volume 21 1974, pp.362-364.
    [14]
    H.W.Corley and D.Y.Sha, Most vital links and nodes in weighted networks, Oper Res Lett Volume 1 1982, pp.157-160.
    [15]
    K.J.Cormican, D.P.Morton, and R.K.Wood, Stochastic network interdiction, Oper Res Volume 46 1998, pp.184-197.
    [16]
    J.E.Falk and R.M.Soland, Algorithm for separable nonconvex programming problems, Manage Sci Volume 15 1969, pp.550-569.
    [17]
    D.Fulkerson and G.Harding, Maximizing the minimum source-sink path subject to a budget constraint, Math Program Volume 13 1977, pp.116-118.
    [18]
    P.M.Ghare, D.C.Montgomery, and W.C.Turner, Optimal interdiction policy for a flow network, Naval Res Logist Q Volume 18 1971, pp.37-45.
    [19]
    B.Golden, A problem in network interdiction, Naval Res Logist Q Volume 25 1978, pp.711-713.
    [20]
    A.Gutfraind, A.Hagberg, and F.Pan, Optimal interdiction of unreactive Markovian evaders, Proc 6th Int Conference Integration AI OR Techniques in Constraint Program Combinatorial Optim Prob, Springer, Berlin, 2009, pp. pp.102-116.
    [21]
    U.Janjarassuk and J.T.Linderoth, Reformulation and sampling to solve a stochastic network interdiction problem, Networks Volume 52 2008, pp.120-132.
    [22]
    C.Lim and J.C.Smith, Algorithms for discrete and continuous multicommodity flow network interdiction problems, IIE Trans Volume 39 2007, pp.15-26.
    [23]
    S.H.Lubore, H.D.Ratliff, and G.T.Sicilia, Determining the most vital link in a flow network, Naval Res Logist Q Volume 18 1971, pp.497-502.
    [24]
    K.Malik, A.Mittal, and S.Gupta, The k most vital arcs in the shortest path problem, Oper Res Lett Volume 8 1989, pp.223-227.
    [25]
    A.McMasters and T.Mustin, Optimal interdiction of a supply network, Naval Res Logist Q Volume 17 1970, pp.261-268.
    [26]
    P.B.Mirchandani and R.L.Francis, Discrete location theory, Wiley, New York, 1990.
    [27]
    D.P.Morton, F.Pan, and K.J.Saeger, Models for nuclear smuggling interdiction, IIE Trans Volume 39 2007, pp.3-14.
    [28]
    S.Neumayer, A.Efrat, and E.Modiano, Geographic max-flow and min-cut under a circular disk failure model, Int Conference Comput Commun INFOCOM, Orlando, FL, 2012, pp. pp.2736-2740.
    [29]
    S.Neumayer and E.Modiano, Network reliability with geographically correlated failures, IEEE Int Conference Comput Commun INFOCOM, San Diego, CA, 2010, pp. pp.1-9.
    [30]
    S.Neumayer, G.Zussman, R.Cohen, and E.Modiano, Assessing the impact of geographically correlated network failures, IEEE Military Commun Conference MILCOM, San Jose, CA, 2008, pp. pp.1-6.
    [31]
    S.Neumayer, G.Zussman, R.Cohen, and E.Modiano, Assessing the vulnerability of the fiber infrastructure to disasters, IEEE Int Conference Comput Commun INFOCOM, Rio de Janeiro, Brazil, 2009, pp. pp.1566-1574.
    [32]
    F.Pan and D.P.Morton, Minimizing a stochastic maximum-reliability path, Networks Volume 52 2008, pp.111-119.
    [33]
    C.A.Phillips, The network inhibition problem, Proc 25th Ann ACM Symp Theory Comput, ACM Press, New York, NY, 1993, pp. pp.776-785.
    [34]
    H.D.Ratliff, G.T.Sicilia, and S.H.Lubore, Finding the n most vital links in flow networks, Manage Sci Volume 21 1975, pp.531-539.
    [35]
    C.M.Rocco and J.E.Ramirez-Marquez, A bi-objective approach for shortest-path network interdiction, Comput Ind Eng Volume 59 2010, pp.232-240.
    [36]
    J.O.Royset and R.K.Wood, Solving the bi-objective maximum-flow network-interdiction problem, INFORMS J Comput Volume 19 2007, pp.175-184.
    [37]
    J.Salmerón, Deception tactics for network interdiction: A multiobjective approach, Networks Volume 60 2012, pp.45-58.
    [38]
    J.Salmerón, K.Wood, and R.Baldick, Analysis of electric grid security under terrorist threat, IEEE Trans Power Syst Volume 19 2004, pp.905-912.
    [39]
    J.Salmerón, K.Wood, and R.Baldick, Worst-case interdiction analysis of large-scale electric power grids, IEEE Trans Power Syst Volume 24 2009, pp.96-104.
    [40]
    J.C.Smith, C.Lim, and F.Sudargho, Survivable network design under optimal and heuristic interdiction scenarios, J Global Optim Volume 38 2007, pp.181-199.
    [41]
    K.M.Sullivan, D.P.Morton, F.Pan, and J.C.Smith, Securing a border under asymmetric information, Naval Res Logist Volume 61 2014, pp.91-100.
    [42]
    K.M.Sullivan, J.C.Smith, and D.P.Morton, Convex hull representation of the deterministic bipartite network interdiction problem, Math Program Volume 145 2014, pp.349-376.
    [43]
    Y.Wang and S.K.Au, Spatial distribution of water supply reliability and critical links of water supply to crucial water consumers under an earthquake, Reliab Eng Syst Saf Volume 94 2009, pp.534-541.
    [44]
    J.P.Watson, R.Murray, and W.E.Hart, Formulation and optimization of robust sensor placement problems for drinking water contamination warning systems, J Infrastructure Syst Volume 15 2009, pp.330-339.
    [45]
    R.D.Wollmer, Removing arcs from a network, Oper Res Volume 12 1964, pp.934-940.
    [46]
    R.D.Wollmer, Algorithms for targeting strikes in a lines-of-communication network, Oper Res Volume 18 1970, pp.497-515.
    [47]
    R.Wood, Deterministic network interdiction, Math Comput Model Volume 17 1993, pp.1-18.
    [48]
    W.Wu, B.Moran, J.Manton, and M.Zukerman, Topology design of undersea cables considering survivability under major disasters, Proc IEEE WAINA 2009, Bradford, UK, 2009, pp. pp.1154-1159.

    Cited By

    View all
    • (2022)Probability Distributions on Partially Ordered Sets and Network Interdiction GamesMathematics of Operations Research10.1287/moor.2021.114047:1(458-484)Online publication date: 1-Feb-2022
    • (2021)A Progressive Approximation Approach for the Exact Solution of Sparse Large-Scale Binary Interdiction GamesINFORMS Journal on Computing10.1287/ijoc.2021.108534:2(890-908)Online publication date: 18-Oct-2021
    • (2017)Analysis of budget for interdiction on multicommodity network flowsJournal of Global Optimization10.1007/s10898-016-0422-867:3(495-525)Online publication date: 1-Mar-2017
    • Show More Cited By

    Index Terms

    1. Exact algorithms for solving a Euclidean maximum flow network interdiction problem
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Networks
        Networks  Volume 64, Issue 2
        September 2014
        75 pages

        Publisher

        Wiley-Interscience

        United States

        Publication History

        Published: 01 September 2014

        Author Tags

        1. Euclidean space
        2. bilevel optimization
        3. global optimization
        4. integer programming
        5. network interdiction
        6. space-discretization

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Jul 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Probability Distributions on Partially Ordered Sets and Network Interdiction GamesMathematics of Operations Research10.1287/moor.2021.114047:1(458-484)Online publication date: 1-Feb-2022
        • (2021)A Progressive Approximation Approach for the Exact Solution of Sparse Large-Scale Binary Interdiction GamesINFORMS Journal on Computing10.1287/ijoc.2021.108534:2(890-908)Online publication date: 18-Oct-2021
        • (2017)Analysis of budget for interdiction on multicommodity network flowsJournal of Global Optimization10.1007/s10898-016-0422-867:3(495-525)Online publication date: 1-Mar-2017
        • (2017)Two extended formulations for cardinality maximum flow network interdiction problemNetworks10.1002/net.2173269:4(367-377)Online publication date: 1-Jul-2017

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media