Skip to main content

Advertisement

Log in

Optimal placement of sensors and interception resource assessment for the protection of regional infrastructure from covert attack

  • Published:
Journal of Transportation Security Aims and scope Submit manuscript

Abstract

This paper considers two specific aspects for the problem of protection of regional infrastructure from covert attack. The first aspect considered is the optimal placement of sensors whose goal is to detect vehicles on the transportation network that pose a potential threat to regional infrastructure. These sensors generate both true alarms and false alarms that both need response from an interception team. The second aspect of our problem is related to the sizing of the interception team and on the placement of these resources on the network. A mathematical programming model is developed for the optimal placement of sensors. This model contains a master and a sub-problem; a Bender’s decomposition approach is used for solving the master problem whereas the sub-problem is solved by recognizing that it has the integrality property. For the interception team aspect, a p-median with server unavailability model is developed for determining locations for units, whereas the Hypercube queuing model is used for determining the performance of these units in responding to both true and false alarms generated from sensors. A demonstrative case analysis is offered for the region of Lancaster-Palmdale, CA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6

Similar content being viewed by others

References

  • Alp O, Erkut E, Drezner Z (2003) An efficient genetic algorithm for the p-Median problem. Ann Oper Res 122:21–42

    Article  Google Scholar 

  • Awerbuch B, Leighton T (1994) Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks. Annual ACM Symposium on Theory of Computing, Montreal, Quebec, ACM Press, vol. pp. 487–496

  • Bard J (1998) Practical bilevel optimization: algorithms and applications. Kluwer Academic Publishers, Boston

    Google Scholar 

  • Bayrak H, Bailey M (2008) Shortest path network interdiction with asymmetric information. Networks 52(3):133–140

    Article  Google Scholar 

  • Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces 36(6):530–544

    Article  Google Scholar 

  • Chelst K (1978) An algorithm for deploying a crime directed (tactical) patrol force. Manage Sci 24(12):1314–1327

    Article  Google Scholar 

  • Department of Homeland Security (2009) Critical Infrastructure and Key Resources. Retrieved August 20, 2009, from http://www.dhs.gov/files/programs/gc_1189168948944.shtm

  • Ellefsen R, Liu J (1994) Ubran terrain zone based GIS for MOUT. GIS/LIS '94 Annual Conference and Exposition, Phoenix, AZ, ACSM, vol. 1, pp. 254–262

  • Goldberg A, Oldham J, Plotkin S, Stein C (1998) An implementation of a combinatorial approximation algorithm for minimum-cost multi-commodity flow. Integer Programming and Combinatorial Optimization. Houston, Texas, Springer Berlin/Heidelberg. 1412/1998: 338

  • Israeli E, Wood K (2002) Shortest-path network interdiction. Networks 40(2):97–111

    Article  Google Scholar 

  • Jarvis JP (1985) Approximating the equilibrium behavior of multi-server loss systems. Manage Sci 31(2):235–239

    Article  Google Scholar 

  • Jenelius E, Petersen T, Mattsson L-G (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560

    Google Scholar 

  • Kara B, Verter V (2004) Designing a road network for hazardous materials transportation. Transp Sci 38(2):188–196

    Article  Google Scholar 

  • Kleinrock L (1975) Queuing systems. Wiley, New York

    Google Scholar 

  • Larson R (1975) Approximating the performance of urban emergency service systems. Oper Res 23(5):845–868

    Article  Google Scholar 

  • Larson R, Franck E (1978) Evaluating dispatching consequences of automatic vehicle locaiton in emergency services. Comput Oper Res 5:11–30

    Article  Google Scholar 

  • Larson R, Odoni A (2007) Urban operations research. Belmont, Massachusetts, Dynamic Ideas

  • Leonelli P, Bonvicini S, Spadoni G (2000) Hazardous materials transportation: a risk-analysis-based routing methodology. J Hazard Mater 71:283–300

    Article  Google Scholar 

  • Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39:15–26

    Article  Google Scholar 

  • Nemhauser G, Wolsey L (1999) Integer and combinatorial optimization. Wiley-Interscience, New York

    Google Scholar 

  • Qiao J, Jeong D, Lawley M, Richard J-P, Abraham D, Yih Y (2007) Allocating security resources to a water supply network. IIE Trans 39:95–109

    Article  Google Scholar 

  • ReVelle CS, Eislet HA (2005) Location analysis: a synthesis and survey. Eur J Oper Res 165:1–19

    Article  Google Scholar 

  • Schrank D, Lomax T (2005) The 2005 Urban Mobility Report. Texas Transportation Institute, Texas A&M University

  • Sherali H, Brizendine L, Glickman T, Subramanian S (1997) Low probability—high consequence considerations in routing hazardous material shipments. Transportation Science 31(3)

  • U.S. Census Bureau (2008) TIGER, TIGER/Line and TIGER-Related Products. Retrieved August 1st, 2008, from http://www.census.gov/geo/www/tiger/

  • Wein L, Atkinson M (2007) The last line of defense: designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack. IEEE Transactions on Nuclear Science

  • Zhang M, Ma Y, Went K (2005) Location-routing model of hazardous materials distribution system based on risk bottleneck. International Conference on Services Systems and Services Management, Proceedings of ICSSSM '05, vol. 1, pp. 362–368

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Justin Yates.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yates, J., Batta, R. & Karwan, M. Optimal placement of sensors and interception resource assessment for the protection of regional infrastructure from covert attack. J Transp Secur 4, 145–169 (2011). https://doi.org/10.1007/s12198-011-0063-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12198-011-0063-6

Keywords

Navigation