476
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Assessing road network vulnerability: A user equilibrium interdiction model

ORCID Icon & ORCID Icon
Pages 1648-1663 | Received 06 Nov 2018, Accepted 12 Jan 2020, Published online: 26 Mar 2020

References

  • Afshari Rad, M., & Kakhki, H. T. (2013). Maximum dynamic network flow interdiction problem: New formulation and solution procedures. Computers & Industrial Engineering, 65(4), 531–536. doi:10.1016/j.cie.2013.04.014
  • Akbari-Jafarabadi, M., Tavakkoli-Moghaddam, R., Mahmoodjanloo, M., & Rahimi, Y. (2017). A tri-level r-interdiction median model for a facility location problem under imminent attack. Computers & Industrial Engineering, 114, 151–165. doi:10.1016/j.cie.2017.10.003
  • Aksen, D., Akca, S. Ş., & Aras, N. (2014). A bilevel partial interdiction problem with capacitated facilities and demand outsourcing. Computers & Operations Research, 41, 346–358. doi:10.1016/j.cor.2012.08.013
  • Aksen, D., Aras, N., & Piyade, N. (2013). A bilevel p-median model for the planning and protection of critical facilities. Journal of Heuristics, 19(2), 373–398. doi:10.1007/s10732-011-9163-5
  • Bekhor, S., & Toledo, T. (2005). Investigating path-based solution algorithms to the stochastic user equilibrium problem. Transportation Research Part B: Methodological, 39(3), 279–295. doi:10.1016/S0191-2615(04)00049-9
  • Bidgoli, M. M., & Kheirkhah, A. (2018). An arc interdiction vehicle routing problem with information asymmetry. Computers & Industrial Engineering, 115, 520–531. doi:10.1016/j.cie.2017.11.019
  • Blumenfeld, H. (1949). Theory of city form, past and present. Journal of the Society of Architectural Historians, 8(3/4), 7–16. doi:10.2307/987432
  • Brown, G., Carlyle, M., Salmerón, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530–544. doi:10.1287/inte.1060.0252
  • Bruynooghe, M. (1972). An optimal method of choice of investments in a transport network [Paper presentation]. PTRC Proceedings.
  • Bureau of Transportation Statistics. (2017a). 2016 North American freight numbers. Retrieved August 10, 2018, from https://www.bts.gov/newsroom/2016-north-american-freight-numbers
  • Bureau of Transportation Statistics. (2017b). Transportation statistics annual report (Technical report). Retrieved August 10, 2018, from http://www.transtats.bts.gov
  • Cadarso, L., & Marín, Á. (2016). Combining robustness and recovery in rapid transit network design. Transportmetrica A: Transport Science, 12(3), 203–229. doi:10.1080/23249935.2015.1123323
  • Cappanera, P., & Scaparra, M. P. (2011). Optimal allocation of protective resources in shortest-path networks. Transportation Science, 45(1), 64–80. doi:10.1287/trsc.1100.0340
  • Chen, L., & Miller-Hooks, E. (2012). Resilience: An indicator of recovery capability in intermodal freight transport. Transportation Science, 46(1), 109–123. doi:10.1287/trsc.1110.0376
  • Chiou, S.-W. (2005). Bilevel programming for the continuous transport network design problem. Transportation Research Part B: Methodological, 39(4), 361–383. doi:10.1016/S0191-2615(04)00085-2
  • Church, R. L., & Scaparra, M. P. (2007). Protecting critical assets: The r-interdiction median problem with fortification. Geographical Analysis, 39(2), 129–146. doi:10.1111/j.1538-4632.2007.00698.x
  • Church, R. L., Scaparra, M. P., & Middleton, R. S. (2004). Identifying critical infrastructure: The median and covering facility interdiction problems. Annals of the Association of American Geographers, 94(3), 491–502. doi:10.1111/j.1467-8306.2004.00410.x
  • Department for Transport. (2016). Transport statistics Great Britain 2016 (Technical report). Retrieved August 10, 2018, from https://assets.publishing.service.gov.uk
  • Dimitriou, L., Stathopoulos, A., & Tsekeris, T. (2008). Reliable stochastic design of road network systems. International Journal of Industrial and Systems Engineering, 3(5), 549–574. doi:10.1504/IJISE.2008.018232
  • Drezner, Z., & Wesolowsky, G. O. (2003). Network design: Selection and design of links and facility location. Transportation Research Part A: Policy and Practice, 37(3), 241–256. doi:10.1016/S0965-8564(02)00014-9
  • El-Rashidy, R. A., & Grant-Muller, S. M. (2014). An assessment method for highway network vulnerability. Journal of Transport Geography, 34, 34–43. doi:10.1016/j.jtrangeo.2013.10.017
  • Environmental Agency. (2018). Estimating the economic costs of the 2015 to 2016 winter floods. Retrieved August 10, 2018, from www.gov.uk/environment-agency
  • Faturechi, R., & Miller-Hooks, E. (2014). Travel time resilience of roadway networks under disaster. Transportation Research Part B: Methodological, 70, 47–64. doi:10.1016/j.trb.2014.08.007
  • Feo, T. A., & Resende, M. G. C. (1995). Greedy randomized adaptive search procedures. Journal of Global Optimization, 6(2), 109–133. doi:10.1007/BF01096763
  • Fulkerson, D. R., & Harding, G. C. (1977). Maximizing the minimum source-sink path subject to a budget constraint. Mathematical Programming, 13(1), 116–118. doi:10.1007/BF01584329
  • Golany, B., Kaplan, E. H., Marmur, A., & Rothblum, U. G. (2009). Nature plays with dice–terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 192(1), 198–208. doi:10.1016/j.ejor.2007.09.001
  • He, X., & Liu, H. X. (2012). Modeling the day-to-day traffic evolution process after an unexpected network disruption. Transportation Research Part B: Methodological, 46(1), 50–71. doi:10.1016/j.trb.2011.07.012
  • Ishfaq, R. (2013). Intermodal shipments as recourse in logistics disruptions. Journal of the Operational Research Society, 64(2), 229–240. doi:10.1057/jors.2012.40
  • Israeli, E., & Wood, R. K. (2002). Shortest-path network interdiction. Networks, 40(2), 97–111. doi:10.1002/net.10039
  • Jahn, O., Möhring, R. H., Schulz, A. S., & Stier-Moses, N. E. (2005). System-optimal routing of traffic flows with user constraints in networks with congestion. Operations Research, 53(4), 600–616. doi:10.1287/opre.1040.0197
  • Jenelius, E., & Mattsson, L. G. (2012). Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study. Transportation Research Part A: Policy and Practice, 46(5), 746–760. doi:10.1016/j.tra.2012.02.003
  • Jenelius, E., Petersen, T., & Mattsson, L. G. (2006). Importance and exposure in road network vulnerability analysis. Transportation Research Part A: Policy and Practice, 40(7), 537–560. doi:10.1016/j.tra.2005.11.003
  • Jin, L., Wang, H., Xie, B., Yu, L., & Liu, L. (2017). A user exposure based approach for non-structural road network vulnerability analysis. Plos One, 12(11), e0188790. doi:10.1371/journal.pone.0188790
  • Kelly, J. C., David, P. M., & Kevin, R. W. (1998). Stochastic network interdiction. Operations Research, 46(2), 184–197. doi:10.1287/opre.46.2.184
  • Kepaptsoglou, K. L., Konstantinidou, M. A., Karlaftis, M. G., & Stathopoulos, A. (2014). Planning postdisaster operations in a highway network: Network design model with interdependencies. Transportation Research Record: Journal of the Transportation Research Board, 2459(1), 1–10. doi:10.3141/2459-01
  • Kermanshah, A., & Derrible, S. (2017). Robustness of road systems to extreme flooding: Using elements of gis, travel demand, and network science. Natural Hazards, 86(1), 151–164. doi:10.1007/s11069-016-2678-1
  • Kim, B. J., & Kim, W. (2006). An equilibrium network design model with a social cost function for multimodal networks. The Annals of Regional Science, 40(3), 473–491. doi:10.1007/s00168-005-0053-3
  • Lansing State Journal. (2019). Multiple roads in Eaton county closed due to flooding. Retrieved June 8, 2019.
  • Laporte, G., Marín, A., Mesa, J. A., & Perea, F. (2011). Designing robust rapid transit networks with alternative routes. Journal of Advanced Transportation, 45(1), 54–65. doi:10.1002/atr.132
  • Leblanc, L. J. (1975). An algorithm for the discrete network design problem. Transportation Science, 9(3), 183–199. doi:10.1287/trsc.9.3.183
  • Leng, J.-q., Zhai, J., Li, Q-w., & Zhao, L. (2018). Construction of road network vulnerability evaluation index based on general travel cost. Physica A: Statistical Mechanics and its Applications, 493, 421–429. doi:10.1016/j.physa.2017.11.018
  • Liberatore, F., Scaparra, M. P., & Daskin, M. S. (2012). Hedging against disruptions with ripple effects in location analysis. Omega, 40(1), 21–30. doi:10.1016/j.omega.2011.03.003
  • Losada, C., Scaparra, M. P., Church, R. L., & Daskin, M. S. (2012). The stochastic interdiction median problem with disruption intensity levels. Annals of Operations Research, 201(1), 345–365. doi:10.1007/s10479-012-1170-x
  • Luathep, P., Sumalee, A., Ho, H. W., & Kurauchi, F. (2011). Large-scale road network vulnerability analysis: A sensitivity analysis based approach. Transportation, 38(5), 799–817. doi:10.1007/s11116-011-9350-0
  • Lunday, B. J., & Sherali, H. D. (2012). Minimizing the maximum network flow: Models and algorithms with resource synergy considerations. Journal of the Operational Research Society, 63(12), 1693–1707. doi:10.1057/jors.2012.8
  • Martel, A., Benmoussa, A., Chouinard, M., Klibi, W., & Kettani, O. (2013). Designing global supply networks for conflict or disaster support: The case of the Canadian Armed Forces. Journal of the Operational Research Society, 64(4), 577–596. doi:10.1057/jors.2012.65
  • Mattsson, L.-G., & Jenelius, E. (2015). Vulnerability and resilience of transport systems – A discussion of recent research. Transportation Research Part A: Policy and Practice, 81, 16–34. doi:10.1016/j.tra.2015.06.002
  • Murray, A. T., Matisziw, T. C., & Grubesic, T. H. (2007). Critical network infrastructure analysis: Interdiction and system flow. Journal of Geographical Systems, 9(2), 103–117. doi:10.1007/s10109-006-0039-4
  • Myung, Y. S., & Kim, H. J. (2004). A cutting plane algorithm for computing k-edge survivability of a network. European Journal of Operational Research, 156(3), 579–589. doi:10.1016/S0377-2217(03)00135-8
  • NASA. Climate Change: Vital Signs of the Planet. Retrieved August 10, 2018, from https://climate.nasa.gov/effects
  • Poorzahedy, H., & Abulghasemi, F. (2005). Application of Ant System to network design problem. Transportation, 32(3), 251–273. doi:10.1007/s11116-004-8246-7
  • Poorzahedy, H., & Turnquist, M. A. (1982). Approximate algorithms for the discrete network design problem. Transportation Research Part B: Methodological, 16(1), 45–55. doi:10.1016/0191-2615(82)90040-6
  • Rad, M. A., & Kakhki, H. T. (2017). Two extended formulations for cardinality maximum flow network interdiction problem. Networks, 69(4), 367–377. doi:10.1002/net.21732
  • Wollmer, R. (1964). Removing arcs from a network. Operations Research, 12(6), 934–940. doi:10.1287/opre.12.6.934
  • Scott, D. M., Novak, D. C., Aultman-Hall, L., & Guo, F. (2006). Network robustness index: A new method for identifying critical links and evaluating the performance of transportation networks. Journal of Transport Geography, 14(3), 215–227. doi:10.1016/j.jtrangeo.2005.10.003
  • Sheffi, Y. (1985). Urban transportation network. Prentice-Hall.
  • Sohn, J. (2006). Evaluating the significance of highway network links under the flood damage: An accessibility approach. Transportation Research Part A: Policy and Practice, 40(6), 491–506. doi:10.1016/j.tra.2005.08.006
  • Soleimani-Alyar, M., & Ghaffari-Hadigheh, A. (2018). Dynamic network interdiction problem with uncertain data. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 26(02), 327–342. doi:10.1142/S0218488518500174
  • Starita, S., Amideo, A. E., & Scaparra, M. P. (2017a). Assessing urban rail transit systems vulnerability: Metrics vs. interdiction models [Paper presentation]. International Conference on Critical Information Infrastructures Security, Springer, pp. 144–155.
  • Starita, S., & Scaparra, M. P. (2016). Optimizing dynamic investment decisions for railway systems protection. European Journal of Operational Research, 248(2), 543–557. doi:10.1016/j.ejor.2015.07.025
  • Starita, S., & Scaparra, M. P. (2018). Passenger railway network protection: A model with variable post-disruption demand service. Journal of the Operational Research Society, 69(4), 603–618. doi:10.1057/s41274-017-0255-y
  • Starita, S., Scaparra, M. P., & O’Hanley, J. R. (2017b). A dynamic model for road protection against flooding. Journal of the Operational Research Society, 68(1), 74–88. doi:10.1057/s41274-016-0019-0
  • Sullivan, J., Novak, D., Aultman-Hall, L., & Scott, D. (2010). Identifying critical road segments and measuring system-wide robustness in transportation networks with isolating links: A link-based capacity-reduction approach. Transportation Research Part A: Policy and Practice, 44(5), 323–336. doi:10.1016/j.tra.2010.02.003
  • Sun, L., Huang, Y., Chen, Y., & Yao, L. (2018). Vulnerability assessment of urban rail transit based on multi-static weighted method in Beijing, China. Transportation Research Part A: Policy and Practice, 108, 12–24. doi:10.1016/j.tra.2017.12.008
  • Taylor, M. A. P., Sekhar, S. V. C., & D'Este, G. M. (2006). Application of accessibility based methods for vulnerability analysis of strategic road networks. Networks and Spatial Economics, 6(3–4), 267–291. doi:10.1007/s11067-006-9284-9
  • Taylor, M. A., & Susilawati. (2012). Remoteness and accessibility in the vulnerability analysis of regional road networks. Transportation Research Part A: Policy and Practice, 46(5), 761–771. doi:10.1016/j.tra.2012.02.008
  • Tran, T. H., O’Hanley, J. R., & Scaparra, M. P. (2017). Reliable hub network design: Formulation and solution techniques. Transportation Science, 51(1), 358–375. doi:10.1287/trsc.2016.0679
  • Ukkusuri, S. V., Mathew, T. V., & Waller, S. T. (2007). Robust transportation network design under demand uncertainty. Computer-Aided Civil and Infrastructure Engineering, 22(1), 6–18. doi:10.1111/j.1467-8667.2006.00465.x
  • Wang, J. W., & Rong, L. L. (2009). Cascade-based attack vulnerability on the US power grid. Safety Science, 47(10), 1332–1336. doi:10.1016/j.ssci.2009.02.002
  • Wardrop, J. G. (1952). Some theoretical aspects of road traffic research. Proceedings of the Institution of Civil Engineers, 1(3), 325–362. doi:10.1680/ipeds.1952.11259
  • Watling, D., & Balijepalli, N. (2012). A method to assess demand growth vulnerability of travel times on road network links. Transportation Research Part A: Policy and Practice, 46(5), 772–789. doi:10.1016/j.tra.2012.02.009
  • Wei, X., Zhu, C., Xiao, K., Yin, Q., & Zha, Y. (2018). Shortest path network interdiction with goal threshold. IEEE Access., 6, 29332–29343. doi:10.1109/ACCESS.2018.2838570
  • Wiesemann, W., Tsoukalas, A., Kleniati, P.-M., & Rustem, B. (2013). Pessimistic bilevel optimization. SIAM Journal on Optimization, 23(1), 353–380. doi:10.1137/120864015
  • Wood, R. K. (1993). Deterministic network interdiction. Mathematical and Computer Modelling, 17(2), 1–18. doi:10.1016/0895-7177(93)90236-R
  • Yahoo News. (2016). Cabbies block roads as France hit by multiple strikes. Retrieved June 8, 2019.
  • Yin, H. Y., & Xu, L. Q. (2010). Measuring the structural vulnerability of road network: A network efficiency perspective. Journal of Shanghai Jiaotong University (Science), 15(6), 736–742. doi:10.1007/s12204-010-1078-z
  • Zhang, L., de Gier, J., & Garoni, T. M. (2014). Traffic disruption and recovery in road networks. Physica A: Statistical Mechanics and its Applications, 401, 82–102. doi:10.1016/j.physa.2014.01.034
  • Zhang, X., Zheng, Z., Zhang, S., & Du, W. (2016). Partial interdiction median models for multi-sourcing supply systems. The International Journal of Advanced Manufacturing Technology, 84(1–4), 165–181. doi:10.1007/s00170-015-7756-0

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.