Skip to main content
Log in

Capacitated multiple allocation hub location problems under the risk of interdiction: model formulations and solution approaches

  • Original Research
  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

Hub-and-spoke networks play a critical role in reducing cost and enhancing service levels in various infrastructural sectors since hubs act as the consolidation and transshipment points of the flows. The failure of hubs in such a network can cause severe disruptions. While disruptions can be natural or man-made, a disruption by a rational individual or entity can be significantly detrimental to the network and is often studied as an interdiction problem. It is important to take interdiction effects at the design stage; therefore, we study the three-level capacitated hub-and-spoke network design problem from the perspective of a defender who considers the risk of interdiction by a rational attacker. Within the three levels, the upper level represents the network design level, and the lower two levels represent the bi-level hub interdiction problem. The introduction of capacity constraints within an interdiction model dramatically increases the complexity of the problem, as there can be some unfulfilled flows post-interdiction. Moreover, a flow may or may not be fulfilled through the least-cost route using the nearest hubs. This work makes two major contributions: the first contribution is on the efficient handling of the bi-level hub interdiction problem using the Dual-based approach and the Penalty-based approach, and the second contribution is on solving the overall three-level problem using a super valid inequality. These two contributions allow us to solve large-scale versions of the capacitated multiple allocation p-median hub location problem under the risk of interdiction, which is otherwise mathematically intractable and can be handled only using complete enumeration techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4

Similar content being viewed by others

References

  • Aksen, D., Piyade, N., & Aras, N. (2010). The budget constrained r-interdiction median problem with capacity expansion. Central European Journal of Operations Research, 18(3), 269–291.

    MathSciNet  Google Scholar 

  • Altner, D. S., Ergun, Ö., & Uhan, N. A. (2010). The maximum flow network interdiction problem: Valid inequalities, integrality gaps, and approximability. Operations Research Letters, 38(1), 33–38.

    MathSciNet  Google Scholar 

  • Alumur, S. A., Campbell, J. F., Contreras, I., Kara, B. Y., Marianov, V., & O’Kelly, M. E. (2021). Perspectives on modeling hub location problems. European Journal of Operational Research, 291(1), 1–17.

    MathSciNet  Google Scholar 

  • Alumur, S., & Kara, B. Y. (2008). Network hub location problems: The state of the art. European Journal of Operational Research, 190(1), 1–21.

    MathSciNet  Google Scholar 

  • Audet, C., Hansen, P., Jaumard, B., & Savard, G. (1997). Links between linear bilevel and mixed 0–1 programming problems. Journal of Optimization Theory and Applications, 93(2), 273–300.

    MathSciNet  Google Scholar 

  • Baggio, A., Carvalho, M., Lodi, A., & Tramontani, A. (2021). Multilevel approaches for the critical node problem. Operations Research, 69(2), 486–508.

    MathSciNet  Google Scholar 

  • Boland, N., Krishnamoorthy, M., Ernst, A. T., & Ebery, J. (2004). Preprocessing and cutting for multiple allocation hub location problems. European Journal of Operational Research, 155(3), 638–653.

    MathSciNet  Google Scholar 

  • Campbell, J. F. (1994). Integer programming formulations of discrete hub location problems. European Journal of Operational Research, 72(2), 387–405.

    Google Scholar 

  • Campbell, J. F., & O’Kelly, M. E. (2012). Twenty-five years of hub location research. Transportation Science, 46(2), 153–169.

    Google Scholar 

  • Church, R. L., & Scaparra, M. P. (2007). Protecting critical assets: The r-interdiction median problem with fortification. Geographical Analysis, 39(2), 129–146.

    Google Scholar 

  • Church, R. L., Scaparra, M. P., & Middleton, R. S. (2004). Identifying critical infrastructure: The median and covering facility interdiction problems. Annals of the Association of American Geographers, 94(3), 491–502.

    Google Scholar 

  • Collado, R. A., & Papp, D. (2012). Network interdiction: Models, applications, unexplored directions. Rutcor Res Rep, RRR4, Rutgers University, New Brunswick, NJ.

  • Contreras, I. (2015). Hub location problems. In Location science (pp. 311–344). Springer.

  • Contreras, I., & O’Kelly, M. (2019). Hub location problems. In Location science (pp. 327–363). Springer.

  • Contreras, I., Díaz, J. A., & Fernández, E. (2009). Lagrangean relaxation for the capacitated hub location problem with single assignment. OR Spectrum, 31(3), 483–505.

    MathSciNet  Google Scholar 

  • Contreras, I., Díaz, J. A., & Fernández, E. (2011). Branch and price for large-scale capacitated hub location problems with single assignment. INFORMS Journal on Computing, 23(1), 41–55.

    MathSciNet  Google Scholar 

  • Contreras, I., Tanash, M., & Vidyarthi, N. (2017). Exact and heuristic approaches for the cycle hub location problem. Annals of Operations Research, 258(2), 655–677.

    MathSciNet  Google Scholar 

  • Cormican, K. J., Morton, D. P., & Wood, R. K. (1998). Stochastic network interdiction. Operations Research, 46(2), 184–197.

    Google Scholar 

  • Dolan, E. D., & Moré, J. J. (2002). Benchmarking optimization software with performance profiles. Mathematical Programming, 91(2), 201–213.

    MathSciNet  Google Scholar 

  • Ebery, J., Krishnamoorthy, M., Ernst, A., & Boland, N. (2000). The capacitated multiple allocation hub location problem: Formulations and algorithms. European Journal of Operational Research, 120(3), 614–631.

    Google Scholar 

  • Elhedhli, S., & Hu, F. X. (2005). Hub-and-spoke network design with congestion. Computers & Operations Research, 32(6), 1615–1632.

    Google Scholar 

  • Elhedhli, S., & Wu, H. (2010). A Lagrangean heuristic for hub-and-spoke system design with capacity selection and congestion. INFORMS Journal on Computing, 22(2), 282–296.

    MathSciNet  Google Scholar 

  • Ernst, A. T., & Krishnamoorthy, M. (1996). Efficient algorithms for the uncapacitated single allocation p-hub median problem. Location Science, 4(3), 139–154.

    Google Scholar 

  • Ernst, A. T., & Krishnamoorthy, M. (1998). Exact and heuristic algorithms for the uncapacitated multiple allocation p-hub median problem. European Journal of Operational Research, 104(1), 100–112.

    Google Scholar 

  • Ernst, A. T., & Krishnamoorthy, M. (1999). Solution algorithms for the capacitated single allocation hub location problem. Annals of Operations Research, 86, 141–159.

    MathSciNet  Google Scholar 

  • Farahani, R. Z., Hekmatfar, M., Arabani, A. B., & Nikbakhsh, E. (2013). Hub location problems: A review of models, classification, solution techniques, and applications. Computers & Industrial Engineering, 64(4), 1096–1109.

    Google Scholar 

  • Fischetti, M., Ljubić, I., Monaci, M., & Sinnl, M. (2017). A new general-purpose algorithm for mixed-integer bilevel linear programs. Operations Research, 65(6), 1615–1637.

    MathSciNet  Google Scholar 

  • Fischetti, M., Ljubić, I., Monaci, M., & Sinnl, M. (2019). Interdiction games and monotonicity, with application to knapsack problems. INFORMS Journal on Computing, 31(2), 390–410.

    MathSciNet  Google Scholar 

  • Frangioni, A. (1995). On a new class of bilevel programming problems and its use for reformulating mixed integer problems. European Journal of Operational Research, 82(3), 615–646.

    Google Scholar 

  • Furini, F., Ljubić, I., San Segundo, P., & Zhao, Y. (2021). A branch-and-cut algorithm for the edge interdiction clique problem. European Journal of Operational Research, 294(1), 54–69.

    MathSciNet  Google Scholar 

  • Ghaffarinasab, N., & Atayi, R. (2018). An implicit enumeration algorithm for the hub interdiction median problem with fortification. European Journal of Operational Research, 267(1), 23–39.

    MathSciNet  Google Scholar 

  • Ghaffarinasab, N., & Motallebzadeh, A. (2018). Hub interdiction problem variants: Models and metaheuristic solution algorithms. European Journal of Operational Research, 267(2), 496–512.

    MathSciNet  Google Scholar 

  • Israeli, E., & Wood, R. K. (2002). Shortest-path network interdiction. Networks: An International Journal, 40(2), 97–111.

    MathSciNet  Google Scholar 

  • Kleinert, T., Labbé, M., Ljubić, I., & Schmidt, M. (2021). A survey on mixed-integer programming techniques in bilevel optimization. EURO Journal on Computational Optimization, 9, 100007.

    MathSciNet  Google Scholar 

  • Lei, T. L. (2013). Identifying critical facilities in hub-and-spoke networks: A hub interdiction median problem. Geographical Analysis, 45(2), 105–122.

    Google Scholar 

  • Lim, C., & Smith, J. C. (2007). Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Transactions, 39(1), 15–26.

    Google Scholar 

  • Lozano, L., Smith, J. C., & Kurz, M. E. (2017). Solving the traveling salesman problem with interdiction and fortification. Operations Research Letters, 45(3), 210–216.

    MathSciNet  Google Scholar 

  • McMasters, A. W., & Mustin, T. M. (1970). Optimal interdiction of a supply network. Naval Research Logistics Quarterly, 17(3), 261–268.

    Google Scholar 

  • O’Hanley, J. R., & Church, R. L. (2011). Designing robust coverage networks to hedge against worst-case facility losses. European Journal of Operational Research, 209(1), 23–36.

    MathSciNet  Google Scholar 

  • O’Kelly, M. E. (1986). Activity levels at hub facilities in interacting networks. Geographical Analysis, 18(4), 343–356.

    Google Scholar 

  • O’Kelly, M. E. (1987). A quadratic integer program for the location of interacting hub facilities. European Journal of Operational Research, 32(3), 393–404.

    MathSciNet  Google Scholar 

  • O’Kelly, M. E., & Bryan, D. (1998). Hub location with flow economies of scale. Transportation Research Part B: Methodological, 32(8), 605–616.

    Google Scholar 

  • Parvaresh, F., Husseini, S. M., Golpayegany, S. H., & Karimi, B. (2014). Hub network design problem in the presence of disruptions. Journal of Intelligent Manufacturing, 25(4), 755–774.

    Google Scholar 

  • Ramamoorthy, P., Jayaswal, S., Sinha, A., & Vidyarthi, N. (2018). Multiple allocation hub interdiction and protection problems: Model formulations and solution approaches. European Journal of Operational Research, 270(1), 230–245.

    MathSciNet  Google Scholar 

  • Scaparra, M. P., & Church, R. L. (2008). A bilevel mixed-integer program for critical infrastructure protection planning. Computers & Operations Research, 35(6), 1905–1923.

    Google Scholar 

  • Scaparra, M. P., & Church, R. L. (2008). An exact solution approach for the interdiction median problem with fortification. European Journal of Operational Research, 189(1), 76–92.

    Google Scholar 

  • Smith, J. C., Lim, C., & Sudargho, F. (2007). Survivable network design under optimal and heuristic interdiction scenarios. Journal of Global Optimization, 38(2), 181–199.

    MathSciNet  Google Scholar 

  • Tahernejad, S., Ralphs, T. K., & DeNegre, S. T. (2020). A branch-and-cut algorithm for mixed integer bilevel linear optimization problems and its implementation. Mathematical Programming Computation, 12, 529–568.

    MathSciNet  Google Scholar 

  • Ullmert, T., Ruzika, S., & Schöbel, A. (2020). On the p-hub interdiction problem. Computers & Operations Research, 124, 105056.

    MathSciNet  Google Scholar 

  • Wood, R. K. (1993). Deterministic network interdiction. Mathematical and Computer Modelling, 17(2), 1–18.

    MathSciNet  Google Scholar 

Download references

Funding

No funding was received to assist with the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Bansal.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A Proofs of Propositions

Appendix A Proofs of Propositions

1.1 A.1 Proof of Proposition 1

There are two possible cases:

  • Case 1: Total capacity of the surviving hubs < Total flow demand of the network

    There will be at least one source-destination pair (ij) for which Constraint (12) will have a strict inequality. And so, there is going to be some unfulfilled flow demand. For this case, any positive value of \(P_{ij}\) will work to incur a penalty for not fulfilling the demand.

  • Case 2: Total capacity of the surviving hubs \(\ge \) Total flow demand of the network

    In this case, all the flow demands have to be satisfied by taking any route having an unsaturated hub. Suppose for a given source-destination pair (ij), only \(\eta \) fraction of the flow is remaining to be allocated. In the worst-case scenario, this demand will be satisfied through the only possible path having the highest transportation cost. Then, from the objective function (11), we can see that:

    Worst case cost to fulfill this demand = \( \eta W_{ij} \max _{k,m} \{d_{ijkm}\}\).

    On the other hand, the cost of not fulfilling this demand = \( \eta P_{ij}\).

    Hence, to ensure that the remaining unfulfilled demand is satisfied, as we have enough capacity left to accommodate that, the following condition needs to be satisfied

    $$\begin{aligned}&\eta P_{ij}> \eta W_{ij} \max _{k,m} \{d_{ijkm}\} \\&\quad \implies P_{ij} > W_{ij} \max _{k,m} \{d_{ijkm}\} \end{aligned}$$

Hence, \( \tilde{P}_{ij} = W_{ij} \max _{k,m} \{d_{ijkm}\} + \epsilon \) is a valid value for \(P_{ij}\) for any positive \(\epsilon \).

1.2 A.2 Proof of Proposition 2

Suppose \(\bar{P}_{ij}\) is the tight value of \(P_{ij}\) such that \(\bar{P}_{ij} < \tilde{P}_{ij}\). Then, \(\bar{P}_{ij} = W_{ij} \max _{k,m} \{d_{ijkm}\}\). Now, consider case 1 of the proof for Proposition 1. As the cost for fulfilling this demand through the only available path having the highest cost is equal to the penalty for not fulfilling it, there is a possibility that the mathematical program leaves this demand unfulfilled even when the network has sufficient capacity to fulfill it. So, \(\bar{P}_{ij}\) is not a valid value for \(P_{ij}\). Therefore, \(\tilde{P}_{ij}\) is the best-known value of \(P_{ij}\), and any value less than this may lead to under-utilization of the available capacity.

1.3 A.3 Proof of Proposition 3

From constraint sets (21),(22) and (25), we get

$$\begin{aligned}&P_{ij} - W_{ij}d_{ijkm} -\phi _{ij} - W_{ij}\theta _{k} \le \delta _{ijk}&\forall i,j \in N; \forall k,m \in H; m = k \\&P_{ij} - W_{ij}d_{ijkm} -\phi _{ij} - W_{ij}\theta _{k} - \delta _{ijm} \le \delta _{ijk}&\forall i,j \in N; \forall k,m \in H; m \ne k \\&0 \le \delta _{ijk}&\forall i,j \in N; \forall k \in H \end{aligned}$$

As \(\delta _{ijk}\) appears with a negative sign in the maximization type objective function (16), it will take the minimum possible value which satisfies the constraints having \(\delta _{ijk}\). Now, rewriting these equations as follows:

$$\begin{aligned}&\delta _{ijk} \ge P_{ij} - W_{ij}d_{ijkk} -\hat{\phi }_{ij} - W_{ij}\hat{\theta }_{k}\\&\delta _{ijk} \ge P_{ij} - W_{ij}\min \limits _{m \mid m \ne k} \{d_{ijkm}\} -\hat{\phi }_{ij} - W_{ij}\hat{\theta }_{k}- \min \limits _{m \mid m \ne k} \{\hat{\delta }_{ijm}\} \\&\delta _{ijk} \ge 0 \\&\text {where }\hat{\phi }_{ij}, \hat{\delta }_{ijm} \hbox { and } \hat{\theta }_{k}\hbox { are the minimum possible values of } \phi _{ij}, \delta _{ijm} \hbox { and } \theta _{k}, \hbox { respectively.} \end{aligned}$$

\(\phi _{ij}\) and \(\theta _{k}\) are the dual variables associated with the constraint sets (12) and (14) in \(\hbox {HIMP}_{{2L}}\), respectively. And hence their values will be the shadow prices associated with those constraints. Then, we can clearly see that

  • \(\hat{\phi }_{ij} = 0\) as the minimum possible change in the objective function (11) will happen when the complete flow demand from the source i to destination j can not be met post-interdiction. For a given source-destination pair (ij), if the right-hand side of constraint (12) is 0, then it will cost objective function a value of \(P_{ij}\); while if the right side is increased to 1, then because of the limited capacity this complete demand will incur a penalty of \(P_{ij}\) for not being met. So, there will be no change in the objective function.

  • \(\hat{\theta }_{k} = 0 \) as the minimum possible change in the objective function (11) will happen when there is more than enough capacity with surviving hub k. So, even if the right-hand side of constraint (14) is increased by 1 unit, there will be no change in the objective function.

Therefore, to satisfy the above set of conditions on \(\delta _{ijk}\), we can set the worst case (maximum possible) value of \(\delta _{ijk}\) as follows:

$$\begin{aligned} \delta _{ijk} \le \max \{P_{ij} - W_{ij}d_{ijkk}, P_{ij} - W_{ij}\min \limits _{m \mid m \ne k}\{d_{ijkm}\},0 \} = P_{ij} - W_{ij}\min _{m} \{d_{ijkm}\} \end{aligned}$$

Hence, \(\hat{M}_{ijk} = P_{ij} - W_{ij}\min _{m} \{d_{ijkm}\} \) is a valid value of \(M_{ijk}\) for the \(\hbox {HIMP}_{{DF}}\) formulation.

1.4 A.4 Proof of Proposition 4

As \(\hat{M}_{ijk} = P_{ij} - W_{ij}\min _{m} \{d_{ijkm}\} \), so \(\bar{M}_{ijkm} = P_{ij} - W_{ij}\min _{m} \{d_{ijkm}\} + \epsilon \)

\(M_{ijkm}\) should take such value so that there is no flow through an interdicted hub. There are three possible cases for a given source-destination pair (ij), a positive fraction (\(\eta \)) of flow demand between i and j via hub k and hub m in that order:

  • Case 1: Both of the hubs are surviving

    Any value of \(M_{ijkm}\) will work as \(q_{k} = q_{m} = 1\) in the objective function (29) making the associated terms 0.

  • Case 2: One of the two hubs is interdicted

    Suppose only hub k is interdicted; while hub m is surviving,i.e., \(q_{k} = 0\) and \(q_{m} = 1\) Then,

    • The total cost for fulfilling such flow = \(\eta W_{ij} d_{ijkm} + \eta \bar{M}_{ijkm}\)

    • On the other hand, the total cost for not fulfilling such flow = \(\eta P_{ij}\)

    In order to restrict the flow from passing through the interdicted hub, the cost for fulfillment should be greater than that of unfulfilled flow.

    $$\begin{aligned}&\eta W_{ij} d_{ijkm} + \eta \bar{M}_{ijkm}> \eta P_{ij} \\&\quad \implies W_{ij} d_{ijkm} + \bar{M}_{ijkm}> P_{ij} \\&\quad \implies W_{ij} d_{ijkm} + P_{ij} - W_{ij}\min _{m} \{d_{ijkm}\} + \epsilon> P_{ij} \\&\quad \implies W_{ij} \left( d_{ijkm} - \min _{m} \{d_{ijkm}\}\right) + \epsilon > 0 \end{aligned}$$

    which is true and hence a valid value.

  • Case 3: Both the hubs are interdicted

    Here, \( q_k = q_m = 0\). Then,

    • The total cost for fulfilling such flow = \(\eta W_{ij} d_{ijkm} + 2 \eta \bar{M}_{ijkm}\)

    • On the other hand, the total cost for not fulfilling such flow = \(\eta P_{ij}\)

    In order to restrict the flow from passing through the interdicted hub, the cost for fulfillment should be greater than that of unfulfilled flow.

    $$\begin{aligned}&\eta W_{ij} d_{ijkm} + 2 \eta \bar{M}_{ijkm}> \eta P_{ij} \\&\quad \implies W_{ij} d_{ijkm} + 2 \bar{M}_{ijkm}> P_{ij} \\&\quad \implies W_{ij} d_{ijkm} + 2 \left( P_{ij} - W_{ij}\min _{m} \{d_{ijkm}\} + \epsilon \right)> P_{ij} \\&\quad \implies W_{ij} (d_{ijkm} - \min _{m} \{d_{ijkm}\}) + \left( P_{ij} - W_{ij}\min _{m} \{d_{ijkm}\}\right) + 2 \epsilon > 0 \end{aligned}$$

    which is true and hence a valid value.

1.5 A.5 Proof of Proposition 5

There are three possible cases for a given source-destination pair (ij), a positive fraction (\(\eta \)) of flow demand between i and j through hub k and hub m:

  • Case 1: Both of the hubs are surviving

    Any value of \(M_{ijkm}\) will work as \(q_{k} = q_{m} = 1\) in the objective function (29) making the associated terms 0.

  • Case 2: One of the two hubs is interdicted

    Suppose only hub k is interdicted while hub m is surviving,i.e., \(q_{k} = 0\) and \(q_{m} = 1\) Then,

    • The total cost for fulfilling such flow = \(\eta W_{ij} d_{ijkm} + \eta M_{ijkm}\)

    • On the other hand, the total cost for not fulfilling such flow = \(\eta P_{ij}\)

  • Case 3: Both the hubs are interdicted

    Here, \( q_k = q_m = 0\). Then,

    • The total cost for fulfilling such flow = \(\eta W_{ij} d_{ijkm} + 2 \eta M_{ijkm}\)

    • On the other hand, the total cost for not fulfilling such flow = \(\eta P_{ij}\)

Here, we are concerned about only Case 2 and Case 3, as in Case 1, any value of \(M_{ijkm}\) will work. The value of \(M_{ijkm}\) applicable for Case 2 will also be a valid value for Case 3. So, we are going to analyze only Case 2.

The total cost of flow using the path containing an interdicted hub should be greater than the cost of not fulfilling the same, in order to discourage any flow using an interdicted hub. This means,

$$\begin{aligned}&\eta W_{ij} d_{ijkm} + \eta M_{ijkm}> \eta P_{ij} \\&\quad \implies W_{ij} d_{ijkm} + M_{ijkm}> P_{ij} \\&\quad \implies M_{ijkm} > P_{ij} - W_{ij} d_{ijkm} \end{aligned}$$

Hence, \(\tilde{M}_{ijkm} = P_{ij} - W_{ij}d_{ijkm} + \epsilon \) is a valid as well as the best-known value of \(M_{ijkm}\) for a given source-destination pair (ij) and routing of flow through hubs k and m in \(\hbox {HIMP}_{{PDF}}\), where \(\epsilon \) is a positive infinitesimal quantity.

1.6 A.6 Proof of Proposition 6

We know,

$$\begin{aligned}&\bar{M}_{ijkm} = \hat{M}_{ijk} + \epsilon \\&\quad \implies \bar{M}_{ijkm} = P_{ij} - W_{ij}\min _{m} \{d_{ijkm}\} + \epsilon \\&\quad \implies \bar{M}_{ijkm} \ge P_{ij} - W_{ij}d_{ijkm} + \epsilon \\&\quad \implies \bar{M}_{ijkm} \ge \tilde{M}_{ijkm} \end{aligned}$$

1.7 A.7 Proof of Proposition 7

We know \(\tilde{P}_{ij}\) is the best-known value of \(P_{ij}\) for \(\hbox {HIMP}_{{2L}}\) such that any other value of \(P_{ij}\) less than \(\tilde{P}_{ij}\) will result into under-utilization of the capacity of hubs. As

$$\begin{aligned} \bar{P}_{ij}&= \max \limits _{H \in \mathcal {H}} \tilde{P}_{ij}(H)&\\ \implies \bar{P}_{ij}&\ge \tilde{P}_{ij}(H)&\forall H \in \mathcal {H} \end{aligned}$$

Therefore, \(\bar{P}_{ij}\) is a valid value of \(P_{ij}\) for SP, which is a \(\hbox {HIMP}_{{2L}}\).

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bansal, V., Jayaswal, S. & Sinha, A. Capacitated multiple allocation hub location problems under the risk of interdiction: model formulations and solution approaches. Ann Oper Res 332, 213–251 (2024). https://doi.org/10.1007/s10479-023-05563-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-023-05563-4

Keywords

Navigation