Skip to main content

A Stochastic Program for Interdicting Smuggled Nuclear Material

  • Chapter
Network Interdiction and Stochastic Integer Programming

Part of the book series: Operations Research/Computer Science Interfaces Series ((ORCS,volume 22))

Abstract

This paper describes a stochastic network interdiction model for identifying locations for installing detectors sensitive to nuclear material. A nuclear material smuggler selects a path through a transportation network that maximizes the probability of avoiding detection An interdictor installs sensors to minimize that maximum probability. This problem is formulated as a bi-level stochastic mixed-integer program. The program is stochastic because the evader’s origin and destination are unknown at the time the detectors are installed. The model is reformulated as a two-stage stochastic mixed-integer program with recourse and is shown to be strongly NP-Hard. We describe an application of our model to help strengthen the overall capability of preventing the illicit trafficking of nuclear materials.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R.K. Ahuja, T.L. Magnanti, and J.B. Orlin. Network Flows. Prentice Hall, Upper Saddle River, NJ, 1993.

    Google Scholar 

  2. O. Ben-Ayed. Bi-level linear programming. Computers and Operations Research 20:485–501, 1993.

    Article  MATH  MathSciNet  Google Scholar 

  3. G.G. Brown, R.F. Dell, and R.K. Wood. Optimization and persistence. Interfaces, 27:15–37, 1997.

    Google Scholar 

  4. M.O. Ball, B.L. Golden, and R.V. Vohra. Finding the most vital arcs in a network. Operations Research Letters, 8:73–76, 1989.

    Article  MathSciNet  MATH  Google Scholar 

  5. A. Brooke, D. Kendrick, A. Meeraus, and R. Raman. GAMS, A User’s Guide, 1998. http://www.gams.com/.

    Google Scholar 

  6. A. Bar-Noy, S. Khuller, and B. Schieber. The complexity of finding most vital arcs and nodes. Technical Report CS-TR-35-39, Computer Science Department, University of Maryland, 1995.

    Google Scholar 

  7. J. Bard and J. Moore. A branch and bound algorithm for the bi-level programming problem. SIAM Journal on Scientific and Statistical Computing, 11:281–292, 1990.

    Article  MathSciNet  MATH  Google Scholar 

  8. M.S. Chern and K.C. Lin. Interdicting the activities of a linear program—a parametric approach. European Journal of Operational Research, 86:580–591, 1995.

    Article  MATH  Google Scholar 

  9. K. Cormican, D.P. Morton, and R.K. Wood. Stochastic network interdiction. Operations Research, 46:184–197, 1998.

    MATH  Google Scholar 

  10. ILOG CPLEX 7.1 User’s Manual, 2001.

    Google Scholar 

  11. H.W. Corley and D.Y. Sha. Most vital links and nodes in weighted networks. Operations Research Letters, 1:157–160, 1982.

    Article  MathSciNet  MATH  Google Scholar 

  12. D.R. Fulkerson and G.C. Harding. Maximizing the minimum source-sink path subject to a budget constraint. Mathematical Programming, 13:116–118, 1977.

    Article  MathSciNet  MATH  Google Scholar 

  13. P.M. Ghare, D.C. Montgomery, and T.M. Turner. Optimal interdiction policy for a flow network. Naval Research Logistics Quarterly, 18:37–45, 1971.

    MathSciNet  MATH  Google Scholar 

  14. B. Golden. A problem in network interdiction. Naval Research Logistics Quarterly, 25:711–713, 1978.

    MATH  Google Scholar 

  15. E. Israeli. System interdiction and defense. Operations Research Department, Naval Postgraduate School, Monterey, California, 1999. PhD Dissertation.

    Google Scholar 

  16. E. Israeli and R.K. Wood. Shortest-path network interdiction. Networks, to appear.

    Google Scholar 

  17. E. Israeli and R.K. Wood. System interdiction and defense. Working paper, Operations Research Department, Naval Postgraduate School, Monterey, CA, 2001.

    Google Scholar 

  18. G. Laporte and F.V. Louveaux. The integer L-shaped method for stochastic integer programs with complete recourse. Operations Research Letters, 13:133–142, 1993.

    Article  MathSciNet  MATH  Google Scholar 

  19. A.W. McMasters and T.M. Mustin. Optimal interdiction of a supply network. Naval Research Logistics Quarterly, 17:261–268, 1970.

    MATH  Google Scholar 

  20. K. Malik, A.K. Mittal, and S.K. Gupta. The k-most vital arcs in the shortest path problem. Operations Research Letters, 8:223–227, 1989.

    Article  MathSciNet  MATH  Google Scholar 

  21. D.P. Morton and R.K. Wood. Restricted-recourse bounds for stochastic linear programming. Operations Research, 47:943–956, 1999.

    Article  MathSciNet  MATH  Google Scholar 

  22. B.K. Reed. Models for proliferation interdiction response analysis. Operations Research Department, Naval Postgraduate School, Monterey, California, 1994. M.S. Thesis.

    Google Scholar 

  23. R.M. Van Slyke and R.J.-B. Wets. L-shaped linear programs with applications to optimal control and stochastic programming. SIAM Journal on Applied Mathematics, 17:638–663, 1969.

    MathSciNet  MATH  Google Scholar 

  24. R.D. Wollmer. Removing arcs from a network. Journal of the Operations Research Society of America, 12:934–940, 1964.

    MATH  MathSciNet  Google Scholar 

  25. R.D. Wollmer. Two-stage linear programming under uncertainty with 0–1 integer first stage variables. Mathematical Programming, 19:279–288, 1980.

    Article  MATH  MathSciNet  Google Scholar 

  26. R.K. Wood. Deterministic network interdiction. Mathematical and Computer Modeling, 17:1–18, 1993.

    MATH  Google Scholar 

  27. A.R. Washburn and R.K. Wood. Two-person zero-sum games for network interdiction. Operations Research, 43:243–251, 1994.

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Kluwer Academic Publishers

About this chapter

Cite this chapter

Pan, F., Charlton, W.S., Morton, D.P. (2003). A Stochastic Program for Interdicting Smuggled Nuclear Material. In: Woodruff, D.L. (eds) Network Interdiction and Stochastic Integer Programming. Operations Research/Computer Science Interfaces Series, vol 22. Springer, Boston, MA. https://doi.org/10.1007/0-306-48109-X_1

Download citation

  • DOI: https://doi.org/10.1007/0-306-48109-X_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7302-1

  • Online ISBN: 978-0-306-48109-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics