Introduction

Understanding the vulnerability of transportation networks has taken on a heightened urgency following the events of the last decade, as Government agencies scramble to develop investment strategies to protect these networks from security threats. The little we know about transportation security suggests increased vulnerability at points of inter-modal connection or at large scale termini, where two conditions arise: large numbers of people making transfers and an institutional ambiguity regarding who is responsible for securing the system. This ambiguity can result in unbalanced and inefficient security investment. For example while large amounts of money are spent on securing an airport, little or nothing, is done to secure the shuttle buses that penetrate deep into the airport infrastructure!

Current literature on the vulnerability of transportation systems focuses mainly on the problem of physical topological deficiency and deals with the loss of particular links or nodes in a network. Du and Nicholson (1997) measure vulnerability using performance of the transportation network. Berdica (2002) analyzes vulnerability from a perspective of reliability of connectivity, travel time and capacity, which he calls serviceability. Jenelius et al. (2006) uses graph theory to depict exposure, criticality and importance. Nagurney and Qiang (2007) define an efficiency measure to assess the performance of a transportation network.

Little has been done on how to reduce vulnerability or to allocate security investment between transportation agencies and among the different components of the transportation network. But the literature on reliability economics does provide a way of thinking about the problem of transportation network security. The framework of investment in public goods has been used for this considering that security is in many respects a public good. Hirshleifer (1983) considered the marginal cost and marginal return of each individual involved in the provision of public good and defined conditions for a Nash equilibrium. Varian (2004), in his work on information system reliability built on Hirshleifer’s work, defined three prototypical cases in the context of system reliability: (a) Total effort, where reliability depends on the sum of the efforts exerted by the individuals, (b) Weakest link, where reliability depends on the minimum effort, and (c) Best shot, where reliability depends on the maximum effort. He analyzed the Nash equilibrium and social optimum of the utility of individuals with different cost-benefit for each case.

In this paper we analyze the endogenous and exogenous features of transportation network that affect the security investment behavior of agencies and thus the security of the transportation network. We also analyze the effect of the knowledge of the attacker to different network types. We aim to extend Varian’s work to the level of a transportation network, of which different components come under the jurisdiction of different agencies. We map two of the three prototypical cases mentioned above to the particular transportation networks, with the total effort case applying to a shared node dominated network and the weakest link case to a perfect information exclusive node dominated network. We also create a combination of total effort and weakest link applying to the imperfect information exclusive node dominated network and the mixed network. We draw a comparison between the Nash equilibrium and social optimal, as defined by the utility of the actors and security level of the system in each case and show that social optimal is always preferable to Nash equilibrium. Finally, we give two examples of two-agency mixed network, one with similar investment incentive and the other with different investment incentives with application to the security of airport-shuttle bus operator system. We conclude with some policy recommendations regarding the organization of investment in system security.

Definitions and concepts

Transportation facilities that make up a complex transportation network often come under the jurisdiction of different transportation agencies. Questions regarding the following arise when more than one agency is involved in investment on security: (a) the incentive of each agency to invest; (b) the effectiveness of each agency to invest; (c) the relationship between the actions of different agencies; and (d) the attacker’s knowledge of the level of security in each node. The first and second questions can be dealt with in a cost-benefit analysis (an endogenous agency feature), the third and fourth questions require an analysis of the type of transportation network the agencies are involved in (an exogenous system feature) based on a perfect or imperfect information assumption separately.

Agency feature (endogenous)

We define a taxonomy of agencies involved in the transportation system based on two criteria: whether they are motivated to invest in the security of the system, and whether they are effective in doing so. The resulting four categories are shown in the Table 1.

Table 1 Different agency behavior according to different motivation and effectiveness.

We assume the following behavior for each category as shown below, with some examples for each:

  1. 1.

    Motivated and Effective (++): this agency will invest in securing its system themselves. Examples include Pentagon, White House

  2. 2.

    Motivated but Not Effective (+ −): pay other effective agencies to invest, e.g. airport on the security of shuttle bus

  3. 3.

    Not Motivated but Effective (− +): paid by other motivated agencies to invest, e.g. shuttle bus operator for an airport

  4. 4.

    Not Motivated and Not Effective (− −): not involved check the wording here!

In which category an agency falls in is mostly determined by its intrinsic feature, partially determined by the part to secure and the current security level of the facility. For example, the airport is effective to secure its facilities while it has no way to secure the shuttle buses owned by another agency that penetrate deep into the airport infrastructure. Also, when the security level of an agency is already very high, it is not motivated or effective to invest any more. Thus each agency invests on the security of the system with different investment incentive and investment effectiveness.

System feature (exogenous)

The transportation system is composed of nodes (stations, airports, ports) and links (roads, subway lines, air routes). Each node or link may be under the jurisdiction of one (exclusively owned) or more (shared) agencies. The securing of shared nodes is subject to investment decisions made by the agencies that have jurisdiction over them. For example, railway and highway agencies may be involved in the securing of a same bridge they share. Exclusive system components may come under the jurisdiction of one agency, even though their operation may involve intermodal connections that involve systems that come under the jurisdiction of other agencies. For example, a shuttle bus operator may have the sole responsibility to secure its buses that connect between a city terminal and an airport.

In this context we can think of shared node dominated networks, exclusive node dominated networks and mixed networks. In a shared node dominated network, most of the nodes are shared and the lack of investment by one agency will not necessarily result in increased vulnerability since other agencies may decide to invest in the system. In an exclusive node dominated network, each node is exclusively owned by one agency and the absence of investment by the cognizant agency will lead to increased vulnerability. In a mixed network, there are significant amounts of both shared and exclusive nodes and the network will have the common features of the former two network types.

The attacker’s knowledge (counterpart)

In a shared node dominated network, the attacker’s knowledge of the current security level of each nodes does not quite matter in the system security and the invest incentive of agencies. Since almost all nodes are shared nodes, if some agencies fail to invest, other agencies can still invest in the shared nodes and sustain a high security level of the system. The attackers will always find themselves in a situation where almost all the nodes are in the same security level. Knowledge of the security level of each agency does not help them make decision, they just pick up one node randomly to attack. On the other side, the agencies, knowing that the knowledge of the attacker on their decision of investments on the security is of little use to the attacker, make decision without considering whether the attacker knows their decision or not.

In an exclusive node dominated network, however, the attacker’s knowledge of the current security level of each nodes can make big difference in the system security and the invest incentive of agencies. Since exclusive node dominated network can be deficient in certain part if some agencies fail to invest, if the attacker knows the security level of each nodes, they will always attack the nodes belong to the agency with the fewest investment, rendering the additional investment of other agencies on their nodes useless. If the attacker does not know the security level of each node, they will attack randomly, with a probability of attack on each node. This lead to the discussion of perfect information and imperfect information of the attacker on exclusive node dominated network.

Our interest in this paper is in shared node networks and exclusive node networks in different information set of the attacker and their common features adaptable to mixed networks, and in the interplay between investment decisions of multiple agencies.

Utility function

Following Varian (2004) we adopt the following utility function to describe an agency’s goal of securing its system at minimum cost:

$$ {U_i} = P\left( {{x_1},{x_2}, \cdots, {x_n}} \right){v_i} - {c_i}{x_i},\;\;i = 1,2, \cdots, n $$

where:

U i :

is the utility of agency i.

x i :

is the level of effort expended by agency i in system security.

P(x1, x2,···, x n ),:

is the security function—a measure of the resulting level of security, such as the probability that the system is secured. P(·) can take different forms depending on the relationship between agencies.

v i :

is the utility received by agency i if the system is secured. It measures an agency’s motivation or incentive to enhance the security.

c i :

is the cost to exert one unit of effort. It measures an agency’s effectiveness to enhance the security—the smaller c i , the more effective agency i in securing its system. We can use c i /v i , the cost-benefit ratio of agency i as a comparative indicator of incentive and effectiveness for security investment.

The following properties of the utility function: \( {U_i} = P\left( {{x_1},{x_2}, \cdots, {x_n}} \right){v_i} - {c_i}{x_i} \) are fairly obvious:

  1. 1.

    Nonnegative: x i  ≥ 0, v i  ≥ 0, c i  ≥ 0, P(x 1, x 2,···, x n ) ≥ 0

  2. 2.

    Diminishing investment incentive: P(x 1, x 2,···, x n ) is C 1, \( {\left. {\frac{{\partial P}}{{\partial {x_i}}}} \right|_{x_i^{-} }} \) is nonnegative and decreasing on x i , where \( x_i^{-} \triangleq \left( {{x_1},{x_2}, \cdots, {x_{i - 1}},{x_{i + 1}}, \cdots, {x_n}} \right) \)

  3. 3.

    Relative investment advantage: \( \frac{{\partial P}}{{\partial {x_i}}} > \frac{{\partial P}}{{\partial {x_j}}} \) when \( {x_i} \ll {x_j} \)

  4. 4.

    Investment motivations: Agency i is motivated to invest on security when \( \frac{{\partial {U_i}}}{{\partial {x_i}}} = {v_i}\frac{{\partial P}}{{\partial {x_i}}} - {c_i} > 0 \), i.e. marginal return \( MR = {v_1}\frac{{\partial P}}{{\partial {x_1}}} \) > marginal cost MC = c 1. Let G(·) be the inverse of \( P\prime \left( \cdot \right) \), define Individual investment optimum \( x_i^* = G\left( {\frac{{{c_i}}}{{{v_i}}}} \right) \), thus \( x_i^* \) satisfies \( {v_i}\frac{{\partial P}}{{\partial {x_i}}} = {c_i} \Leftrightarrow \frac{{\partial {U_i}}}{{\partial {x_i}}} = {v_i}\frac{{\partial P}}{{\partial {x_i}}} - {c_i} = 0 \).

Then \( \frac{{\partial {U_i}}}{{\partial {x_i}}} > 0 \) when \( {x_i} < x_i^* \), \( \frac{{\partial {U_i}}}{{\partial {x_i}}} < 0 \) when \( {x_i} > x_i^* \). This implies Claim 1:

  1. Claim 1:

    Under free will, one agency wants to match its investment to its individual optimum, it will never invest in its negative incentive zone. That is, the agency will never invest more than \( x_i^* \).

Mapping

In this section we develop the security investment models for a number of situations that might arise in real world transportation systems. We first consider the case of a shared node dominated network in which the security of the system depends on the total effort expended by all agencies involved. We then consider the case of an exclusive node dominated network in which each agency decides separately on its security investment and in which the attacker has perfect information about the level of security in each node, thus making this a case of weakest-link vulnerability. We follow that with a case representing a combination of these conditions. We conclude the mapping in Table 2.

Table 2 Map from network types to reliability prototypical cases in different information set.

Shared node dominated network—Total effort

In a shared node dominated network, any agency can invest in any of the nodes, the efforts are substitutable and cumulative, i.e. \( \frac{{\partial P}}{{\partial {x_i}}} = \frac{{\partial P}}{{\partial {x_j}}} \) for all x i  ≥ 0, x j  ≥ 0, making this a total effort case as defined in Varian (2004) with the security function:

$$ P\left( {{x_1},{x_2}, \cdots, {x_n}} \right) \triangleq P\left( {\sum\limits_{i = 1}^n {{x_i}} } \right) $$

Without loss of generality, we look at the case of two agencies, 1&2, both of which can invest in any node of the network. The diminishing margin of P(x 1, x 2,···, x n ) implies that if agency 2 invests more, agency 1’s investment is squeezed in the diminished part, causing a reduction of incentive and resulting in free riding. An illustration is shown in Figure 1a, where \( \boxed{1,2} \) means both agency 1 and 2 can invest in the node. The isoquant map of security function P is shown in Figure 1b, which illustrates the diminishing returns of P.

Figure 1
figure 1

a Shared node dominated network b Isoquant map of security function

Let’s say agency 1 has a higher cost-benefit ratio, \( {{{{c_1}}} \left/ {{{v_1}}} \right.} > {{{{c_2}}} \left/ {{{v_2}}} \right.} \), then agency 2 has higher investment incentive than agency 1 (either has higher security incentive, higher v 2; or is more effective, lower c 2). For the sake of reader, we recap Varian’s model for Nash equilibrium and social optimum with extensions of our own understanding. Note that \( x_i^N \), \( U_i^N \), U N, P N are the effort and utility of agency i, the utility of the system and the security level of Nash equilibrium (when agencies choose to plan individually). Similarly, \( x_i^S \), \( U_i^S \), U S, P S are the same quantities of social optimum (when agencies choose to plan coordinately).

Nash equilibrium

Agency 1 makes decision (chooses x 1) with respect to agency 2’s decision (x 2) by solving: \( \mathop {{\max }}\limits_{{x_1}} {\left. {{U_1}} \right|_{{x_2}}} \)

$$ {\hbox{i}}{\hbox{.e}}{.}\;\;\mathop {{\max }}\limits_{{x_1}} {v_1}P\left( {{x_1} + {x_2}} \right) - {c_1}{x_1} $$

Let G(·) be the inverse of \( P\prime \left( \cdot \right) \), then it is decreasing. From claim 1, we know the individual investment optimum of agency 1&2 are \( x_1^* = G\left( {\frac{{{c_1}}}{{{v_1}}}} \right) \) and \( x_2^* = G\left( {\frac{{{c_2}}}{{{v_2}}}} \right) \), neither of them choose to invest more than \( x_1^* \) and \( x_2^* \).

Take first order condition: \( {v_1}P\prime \left( {{x_1} + {x_2}} \right) - {c_1} = 0 \), we get agency 1’s decision (x 1) with respect to agency 2’s decision (x 2):

$$ {x_1} = \max \left\{ {\begin{array}{*{20}{c}} {G\left( {\frac{{{c_1}}}{{{v_1}}}} \right) - {x_2},} & 0 \\\end{array} } \right\} = \max \left\{ {\begin{array}{*{20}{c}} {x_1^* - {x_2},} & 0 \\\end{array} } \right\} $$

Similarly, agency 2’s decision (x 2) with respect to agency 1’s decision (x 1) is:

$$ {x_2} = \max \left\{ {\begin{array}{*{20}{c}} {G\left( {\frac{{{c_2}}}{{{v_2}}}} \right) - {x_1},} & 0 \\\end{array} } \right\} = \max \left\{ {\begin{array}{*{20}{c}} {x_2^* - {x_1},} & 0 \\\end{array} } \right\} $$

The two decision curves only have one intersection point, this is the Nash equilibrium, where \( x_1^N = 0 \), \( x_2^N = G\left( {\frac{{{c_2}}}{{{v_2}}}} \right) \). Since the efforts are substitutable and cumulative, agency 2, with higher investment incentive, fulfills its obligation by investing at its individual optimum \( x_2^* = G\left( {\frac{{{c_2}}}{{{v_2}}}} \right) \) while agency 1 frees rides. In a word, the security is determined by the most motivated or effective agency (with the lowest cost-benefit ratio), others free ride. This is shown in Figure 2.

Figure 2
figure 2

Nash equilibrium and social optimum of total effort

Social optimum

We want to maximize the utility of the system by solving \( \mathop {{\max }}\limits_{{x_1},{x_2}} \left( {{U_1} + {U_2}} \right) \)

$$ {\hbox{i}}{\hbox{.e}}{.}\;\mathop {{\max }}\limits_{{x_1},{x_2}} \left( {{v_1} + {v_2}} \right)P\left( {{x_1} + {x_2}} \right) - {c_1}{x_1} - {c_2}{x_2} $$

if c 1 < c 2, this reduces to \( \mathop {{\max }}\limits_{{x_1},{x_2} = 0} \left( {{v_1} + {v_2}} \right)P\left( {{x_1}} \right) - {c_1}{x_1} \)

Take first order condition: \( \left( {{v_1} + {v_2}} \right)P\prime \left( {{x_1}} \right) - {c_1} = 0 \)

We get social optimum when \( x_1^S = G\left( {\frac{{{c_1}}}{{{v_1} + {v_2}}}} \right) \), \( x_2^S = 0 \) for c 1 < c 2

Similarly, We get social optimum when \( x_1^S = 0 \), \( x_2^S = G\left( {\frac{{{c_2}}}{{{v_1} + {v_2}}}} \right) \) for c 1 > c 2

We have \( x_1^S = G\left( {\frac{{{c_1}}}{{{v_1} + {v_2}}}} \right) > G\left( {\frac{{{c_1}}}{{{v_1}}}} \right) = x_1^* \) and \( x_2^S = G\left( {\frac{{{c_2}}}{{{v_1} + {v_2}}}} \right) > G\left( {\frac{{{c_2}}}{{{v_2}}}} \right) = x_2^* \).

While the agency with the lowest cost exerts enough efforts for itself, there is still marginal benefit for the system. The system demand the lowest-cost agency to invest in its negative incentive zone, that is, to invest more than its individual optimum, which is a violation of claim 1. The lowest-cost agency is not willing to cooperate for social optimum. Other agencies could give the lowest-cost agency money to offset the difference between individual and social optimum. Alternatively, the government could give the lowest-cost agency some subsidy to entice it to invest at social optimum.

To sum up, we have the investment strategies of agency 1&2 and the outcomes as shown in Table 3 (c 1 < c 2) and Table 4 (c 1 > c 2).

Table 3 Nash equilibrium and social optimum of shared node dominated network \( {{{{c_1}}} \left/ {{{v_1}}} \right.} > {{{{c_2}}} \left/ {{{v_2}}} \right.} \), c 1 < c 2.
Table 4 Nash equilibrium and social optimum of shared node dominated network \( {{{{c_1}}} \left/ {{{v_1}}} \right.} > {{{{c_2}}} \left/ {{{v_2}}} \right.} \), c 1 > c 2.

At the Nash equilibrium, the level of security is determined by the agency with the lowest cost-benefit ratio and the other agencies free ride. But at the social optimum the security level is determined by the agency with the lowest cost, and the other agencies free ride. The social optimum results in a higher level of security (P S > P N) and of system utility (U S > U N).

Perfect information exclusive node dominated network—Weakest link

In an exclusive node dominated network, only one agency can invest in a node, the investments are neither cumulative nor substitutable. Each agency will always find the need of investment for itself and the burden cannot be pushed to others. The failure of one agency will lead to large deficiency of the transportation system. All the agencies have the incentive to invest on their own nodes. As described below system vulnerability in this case depends on the weakest link, rather than on the total effort by all agencies.

Since exclusive node dominated network can be deficient in certain part if some agencies fail to invest, the attacker’s knowledge of the current security level of each nodes can make a big difference in the system security and the invest incentive of agencies. This lead to the discussion of perfect information and imperfect information of the attacker on exclusive node dominated network.

If the attacker knows the current security level of the nodes in an exclusive node dominated network, then they will always attack through the most vulnerable node, the security of the network is determined by the agency that exerts fewest effort, i.e. \( \frac{{\partial P}}{{\partial {x_i}}} > \frac{{\partial P}}{{\partial {x_j}}} = 0 \) when \( {x_i} \ll {x_j} \). The security function takes the form:

$$ P\left( {{x_1},{x_2}, \cdots, {x_n}} \right) \triangleq \min \left\{ {P\left( {{x_1}} \right),P\left( {{x_2}} \right), \cdots, P\left( {{x_n}} \right)} \right\} = P\left( {\min \left\{ {{x_1},{x_2}, \cdots, {x_n}} \right\}} \right) $$

The equality holds because P(x i ) is monotonically increasing.

The network type and the isoquant map of security function P are shown in Figure 3a and b for the case of two agencies, where \( \boxed1 \) means only agency 1 can invest in the node and \( \boxed2 \) means only agency 2 can invest in the node.

Figure 3
figure 3

a Perfect Information exclusive node dominated network b Isoquant map of security function

Using the same assumption (\( {{{{c_1}}} \left/ {{{v_1}}} \right.} > {{{{c_2}}} \left/ {{{v_2}}} \right.} \)) and notation in Shared node dominated network—Total effort, We repeat Varian’s model for Nash equilibrium and social optimum with extensions of our own understanding.

Nash equilibrium

Agency 1 makes decision (chooses x 1) with respect to agency 2’s decision (x 2) by solving: \( \mathop {{\max }}\limits_{{x_1}} {\left. {{U_1}} \right|_{{x_2}}} \)

$$ {\hbox{i}}{\hbox{.e}}{.}\;\mathop {{\max }}\limits_{{x_1}} {v_1}P\left( {\min \left\{ {{x_1},{x_2}} \right\}} \right) - {c_1}{x_1} $$
  1. (i)

    If x 1 < x 2, \( \mathop {{\max }}\limits_{{x_1}} {v_1}P\left( {{x_1}} \right) - {c_1}{x_1} \)

Take first order condition: \( {v_1}P\prime \left( {{x_1}} \right) - {c_1} = 0 \Rightarrow {x_1} = G\left( {\frac{{{c_1}}}{{{v_1}}}} \right) < {x_2} \)

  1. (ii)

    If x 1 ≥ x 2, \( \mathop {{\max }}\limits_{{x_1}} {v_1}P\left( {{x_2}} \right) - {c_1}{x_1} \), agency 1 sets x 1 as small as possible, thus x 1 = x 2

We get agency 1’s decision (x 1) with respect to agency 2’s decision (x 2):

$$ {x_1} = \min \left\{ {\begin{array}{*{20}{c}} {G\left( {\frac{{{c_1}}}{{{v_1}}}} \right),} & {{x_2}} \\\end{array} } \right\} = \min \left\{ {x_1^*, {x_2}} \right\} $$

Similarly, agency 2’s decision (x 2) with respect to agency 1’s decision (x 1) is:

$$ {x_2} = \min \left\{ {\begin{array}{*{20}{c}} {G\left( {\frac{{{c_2}}}{{{v_2}}}} \right),} & {{x_1}} \\\end{array} } \right\} = \min \left\{ {x_2^*, {x_1}} \right\} $$

As Varian observed, there are a whole range of Nash equilibria. The largest of these is at \( x_1^N = x_2^N = \min \left\{ {\begin{array}{*{20}{c}} {G\left( {\frac{{{c_1}}}{{{v_1}}}} \right),} & {G\left( {\frac{{{c_2}}}{{{v_2}}}} \right)} \\\end{array} } \right\} \). This Nash equilibrium Pareto dominates the others, so it is natural to think of it as the likely outcome (Varian 2004).

Since agency 1 has a higher cost-benefit ratio by assumption and G is decreasing, we have \( G\left( {\frac{{{c_1}}}{{{v_1}}}} \right) < G\left( {\frac{{{c_2}}}{{{v_2}}}} \right),x_1^N = x_2^N = G\left( {\frac{{{c_1}}}{{{v_1}}}} \right) \).

We could see that claim 1 holds in that agency 1&2 never choose to invest more than their individual investment optimum. Also, they never choose to invest more than the other one does. This is because the nodes exclusively owned by the agency with the fewest investment become the most vulnerable part of the network. The attacker, knowing this, will always attack the nodes belong to the agency with the fewest investment, rendering the additional investment of other agencies on their nodes useless. Thus other agencies choose to match their investment to that of the one with the fewest investment and of course not to surpass their own individual investment optimum. As a result, each agency matches their investment to the least individual investment optimum, \( \min \left\{ {x_1^*, x_2^*, \cdots, x_n^* } \right\} = G\left( {\max \left\{ {{{{{c_i}}} \left/ {{{v_i}}} \right.}} \right\}} \right) \). In a word, the security is determined by the least motivated or effective agency (with the highest cost-benefit ratio), no one free ride. This is shown in Figure 4.

Figure 4
figure 4

Nash equilibrium and social optimum of weakest link

Social optimum

We want to maximize the utility of the system by solving \( \mathop {{\max }}\limits_{{x_1},{x_2}} \left( {{U_1} + {U_2}} \right) \)

$$ {\hbox{i}}{\hbox{.e}}{.}\;\;\mathop {{\max }}\limits_{{x_1},{x_2}} \left( {{v_1} + {v_2}} \right)P\left( {\min \left\{ {{x_1},{x_2}} \right\}} \right) - {c_1}{x_1} - {c_2}{x_2} $$

It is obvious that x 1 = x 2 at optimum, thus the problem reduces to

$$ \mathop {{\max }}\limits_x \left( {{v_1} + {v_2}} \right)P(x) - \left( {{c_1} + {c_2}} \right)x $$

Take first order condition: \( \left( {{v_1} + {v_2}} \right)P\prime (x) - \left( {{c_1} + {c_2}} \right) = 0 \)

We get social optimum when \( x_1^S = x_2^S = G\left( {\frac{{{c_1} + {c_2}}}{{{v_1} + {v_2}}}} \right) \). Since G is decreasing, we have

$$ x_1^S = x_2^S = G\left( {\frac{{{c_1} + {c_2}}}{{{v_1} + {v_2}}}} \right) > \min \left\{ {\begin{array}{*{20}{c}} {G\left( {\frac{{{c_1}}}{{{v_1}}}} \right),} & {G\left( {\frac{{{c_2}}}{{{v_2}}}} \right)} \\\end{array} } \right\} = x_1^N = x_2^N. $$

Follow our assumption, \( x_1^S = x_2^S = G\left( {\frac{{{c_1} + {c_2}}}{{{v_1} + {v_2}}}} \right) > G\left( {\frac{{{c_1}}}{{{v_1}}}} \right) = x_1^N = x_2^N \)

While at Nash equilibrium each agency matches their investment to the least individual investment optimum, there is still marginal benefit for the system. The system demand each agency to enhance their investment to the system investment optimum \( G\left( {{{{\sum\limits_{i = 1}^n {{c_i}} }} \left/ {{\sum\limits_{i = 1}^n {{v_i}} }} \right.}} \right) \). Agencies with lower individual investment optimum (with a higher cost-benefit ratio than \( {{{\sum\limits_{i = 1}^n {{c_i}} }} \left/ {{\sum\limits_{i = 1}^n {{v_i}} }} \right.} \)) than the system optimum do not want to cooperate. Other agencies could give these higher cost-benefit agencies money to offset the difference between the Nash equilibrium and the social optimum. Alternatively, the government could give these higher cost-benefit ratio agencies some subsidy to entice them to cooperate.

To sum up, we have the investment strategies of agency 1&2 and the outcomes as shown in Table 5.

Table 5 Nash equilibrium and social optimum of exclusive node dominated network \( {{{{c_1}}} \left/ {{{v_1}}} \right.} > {{{{c_2}}} \left/ {{{v_2}}} \right.} \).

In Nash equilibrium, the security level is determined by the agency with the highest cost-benefit ratio, with all the agencies contribute the same, whereas at the social optimum the security level is determined by the cost-benefit ratio of the system \( {{{\sum\limits_{i = 1}^n {{c_i}} }} \left/ {{\sum\limits_{i = 1}^n {{v_i}} }} \right.} \), with all agencies contributing the same. The social optimum results in a higher level of security (P S > P N) and of system utility (U S > U N).

Imperfect information exclusive node dominated network and mixed network—Combination of total effort and weakest link

If the attacker does not know the current security level of the nodes of an exclusive node dominated network, they will attack randomly, this becomes a partial weakest link case. i.e. \( \frac{{\partial P}}{{\partial {x_i}}} > \frac{{\partial P}}{{\partial {x_j}}} > 0 \) when \( {x_i} \ll {x_j} \). The security function takes the form:

$$ P\left( {{x_1},{x_2}, \cdots, {x_n}} \right) \triangleq \frac{{\sum\limits_{i = 1}^n {P\left( {{x_i}} \right)} }}{n} = P\left( {\sum\limits_{i = 1}^n {{a_i}{x_i}} } \right),\;{\hbox{where}}\;\sum\limits_{i = 1}^n {{a_i}} = 1\;{\hbox{and}}\;{a_i} > {a_j}\;{\hbox{if}}\;{x_i} < {x_j} $$

The equality holds because of the concavity of P(·)

If n = 2, and x 1 < x 2, then a 1 > a 2

$$ P\left( {{a_1}{x_1} + {a_2}{x_2}} \right) = P\left( {\left( {{a_1} - {a_2}} \right){x_1} + {a_2}{x_1} + {a_2}{x_2}} \right) = P\left( {\left( {{a_1} - {a_2}} \right)\min \left( {{x_1},{x_2}} \right) + {a_2}\left( {{x_1} + {x_2}} \right)} \right) $$

This is a combination of weakest link and total effort as shown in Figure 5.

Figure 5
figure 5

Combination of total effort and weakest link

Another case that ends in the combination of total effort and weakest link is the mixed network. The network type and the isoquant of security function P are shown in Figure 6a and b.

Figure 6
figure 6

a Mixed network b Isoquant map of security function

Since we have social optimum is better than Nash equilibrium in both total effort and weakest link cases, this should also hold for their combination.

Examples

For a mixed network, one could see that to plan coordinately is better than plan individually. Here we set up a simple topology, two-agency example to illustrate this.

We have two transportation agencies: agency 1 owns node 0, node 1; agency 2 owns node 0, node 2. They have a shared node 0, which is the target, and each has an exclusively owned node, as shown in Figure 7.

Figure 7
figure 7

Layout of two agencies

Agency 1&2 want to secure the system at minimum cost. Let x 11, x 10 be the investment on node 1, node 0 (target) by agency 1, and x 22, x 20 the investment on node 2, node 0 by agency 2. Then the security budget of agency 1 is \( {x_1} = {x_{10}} + {x_{11}} \), and the security budget of agency 2 is \( {x_2} = {x_{20}} + {x_{22}} \). The security budget of the system is x 1 + x 2.

The attacker could either insert the bomb directly at node 0 (target) or insert the bomb at either node 1 or 2 and make the bomb propagate to node 0.

Let p 0 the probability bomb inserted directly at node 0, and p 10, p 20 the probability bomb inserted indirectly at node 0 from node 1 and node 2. p(x) should be decreasing since more invest leads to lower bomb insertion rate, and be convex since the more you invest the less you will decrease the probability of bomb insertion. Thus we have

$$ {p_0} = \frac{1}{{1 + {x_{10}} + {x_{20}}}},{p_{10}} = \frac{1}{{1 + {x_{11}}}}\frac{1}{{1 + {x_{10}} + {x_{20}}}},{p_{20}} = \frac{1}{{1 + {x_{22}}}}\frac{1}{{1 + {x_{10}} + {x_{20}}}} $$

Let P be the probability that the system is secured:

$$ P = 1 - \left( {{p_0} + {p_{10}} + {p_{20}}} \right) = 1 - \left( {\frac{1}{{1 + {x_1}}}\frac{1}{{1 + {x_{10}} + {x_{20}}}} + \frac{1}{{1 + {x_{10}} + {x_{20}}}} + \frac{1}{{1 + {x_2}}}\frac{1}{{1 + {x_{10}} + {x_{20}}}}} \right) = 1 - \frac{1}{{1 + {x_{10}} + {x_{20}}}}\left( {1 + \frac{1}{{1 + {x_{11}}}} + \frac{1}{{1 + {x_{22}}}}} \right) $$

Agency 1&2 each gets v 1, v 2 if the system is secured, their utilities are:

$$ \begin{array}{*{20}{c}} {{U_1} = {v_1}P - {x_1} = {v_1}P - {x_{11}} - {x_{10}}} \hfill \\{{U_2} = {v_2}P - {x_2} = {v_2}P - {x_{22}} - {x_{20}}} \hfill \\\end{array} $$

And the utility of the system \( U = {U_1} + {U_2} \).

Similar incentive

If the two agencies have similar incentive to secure the system, let us say v 1 = v 2 = 1000. If the two agencies act coordinately under the regulation of the government, they solve \( \mathop {{\max }}\limits_{{x_{10}},{x_{11}},{x_{20}},{x_{22}}} U \), such that \( {x_{10}} + {x_{11}} = {x_1} \), \( {x_{20}} + {x_{22}} = {x_2} \). From the symmetry of the problem, we know the optimum is reached when x 1 = x 2, x 10 = x 20, x 11 = x 22. Table 6 shows the optimal investment of each agency on each node when the security budget of the system (x 1 + x 2) ranges from 5 to 30.

Table 6 Investments, utilities and security level when agency 1 & 2 act coordinately.

However, if the two agencies make their investment decision individually, they might lose the holistic view and make decisions superficially because of the complexity of transportation system security. For example, agency 2 might find itself end in higher utility than agency 1 if it chooses to free ride as shown in Table 7 (Note that Table 7 only shows one unwise decision of agency 1 and 2 when they plan individually, it is not a case of Nash equilibrium).

Table 7 Investments, utilities and security level when agency 1 invests, agency 2 free rides.

Table 7 shows that the agency that free rides has higher utility than the agency that invests (U 1 < U 2). This dilemma is more obviously shown in Figure 8. As a result, both the agencies want to free ride on the system and it ends in responsibility ambiguity (as one Chinese idiom says: one monk fetches the water to drink, two monks have no water to drink).

Figure 8
figure 8

Utilities when two agencies act individually and coordinately

Compare Tables 6 and 7 for the same security budget of the system (x 1 + x 2), we could see that when two agencies act coordinately, both of them have higher utility and enjoy higher security level than they act individually. The government plays a significant role in making agencies act coordinately under a holistic view and pulling them out of the dilemma of responsibility ambiguity. This is shown in Figures 8 and 9.

Figure 9
figure 9

Security levels when two agencies act individually and coordinately

Different incentive

It is not uncommon in transportation systems that agencies have different incentive to invest in security, some may be indifferent of the damage caused. For example, each airport has shuttle buses serving the passengers, and the bus terminals are usually set close to the airport. While the airport is for all practical purposes barricaded with layers of security, little or nothing, is done to secure the shuttle buses that oftentimes penetrate deep into its terminal buildings.

Secure the airport alone is not enough while the shuttle bus operator has little incentive to secure its shuttle buses. From the previous example with agency 1 representing airport, v 1 = 1000, and agency 2 representing shuttle bus operator, v 2 = 0. The shuttle bus operator will always set x 20 = x 22 = 0 since it has no incentive to secure the system. The airport makes investment decision by solving \( \mathop {{\max }}\limits_{{x_{10}},{x_{11}}} {U_1} \), such that \( {x_{10}} + {x_{11}} = {x_1} \), x 20 = x 22 = 0. Table 8 shows the Nash Equilibrium when the airport and the shuttle bus operator acts individually under different security budget of the system.

Table 8 Investments, utilities and security level when agency 2 is indifferent of the damage.

However, this is not the best strategy for the airport, the attacker could easily insert a bomb on a shuttle bus to an airport and the explosion may blow up the whole terminal. It would be better for the airport (agency 1) to pay the shuttle bus operator (agency 2) to secure its buses. In this case, the airport makes investment decision by solving \( \mathop {{\max }}\limits_{{x_{10}},{x_{11}},{x_{20}},{x_{22}}} {U_1} \), such that \( {x_{10}} + {x_{11}} = {x_1} \), \( {x_{20}} + {x_{22}} = {x_2} \). This is shown in Table 9:

Table 9 Investments, utilities and security level when agency sponsors agency 2 to invest on security.

Compare Table 8 with 9 for the same security budget of the system (x 1 + x 2), we could see that this 1 + 1 strategy is better than 2 + 0 strategy. The airport ends up in higher utility and enjoys higher security level when it wisely sponsors the shuttle bus operator on its security as shown in Figures 10 and 11.

Figure 10
figure 10

Utilities when two agencies act individually and coordinately

Figure 11
figure 11

Security levels when two agencies act individually and coordinately

Conclusions

  1. 1.

    In a multi-agency environment, each agency has its own motivation and effectiveness in the investment on security of the transportation system under its jurisdiction. An agency is motivated to invest on security if its marginal return is larger than marginal cost. Diminishing marginal return and constant marginal cost leads to diminishing utility, thus diminishing incentive to invest. An increase in the investment of one agency is always good for the other agencies dealing with liked transportation systems.

  2. 2.

    In a shared node dominated network, the security level is determined by the advanced agency (the one with either the lowest cost or cost-benefit ratio), other agencies always free ride. Government will allocate the whole security budget to this most advanced agency, thereby letting the most capable and effective agency do everything if the efforts are totally substitutable.

  3. 3.

    In a perfect information exclusive node dominated network, since one agency alone cannot secure the system, each agency only chooses to match the effort of the least capable agency (with highest cost-benefit ratio). In a Nash equilibrium, every agency is dragged down to the performance of the least capable agency. In social optimum, every agency matches the performance of the whole system.

  4. 4.

    In an imperfect information exclusive node dominated network or a mixed network, a combination of total effort and weakest link applies.

  5. 5.

    In all cases, the social optimum is always superior to the Nash equilibrium, resulting in higher security level and sum of utility. The government should mandate the agencies to coordinate or set some incentives to encourage agencies that are not cooperative to coordinate. Alternatively, the more motivated agencies will find it advantageous to pay the less motivated agencies in order to entice them to coordinate.