Abstract
Terrorist attacks on infrastructures are serious incidents in many countries. Measures to prevent terrorist attacks and minimize the damage are critical in the design of infrastructures. This paper develops an Analytic Hierarchy Process (AHP) based risk assessment model to identify the key components of the overpass bridge in terrorist attacks, and prioritizes a variety of possible attack means with multiple criteria. The AHP risk assessment model can be used to not only set the priority of protected components, but also to allocate resources to the most critical protecting methods within a limited budget. An interchange overpass bridge in Beijing, China is analysed to validate the model. The results show that the method is suitable for the optimal resource allocation in the process of the overpass bridge anti-terrorism design, the formulation of a defence strategy and the protection resource allocation scheme for the overpass bridge against a terrorist attack. The method can also be used for dynamic allocating the resources for the overpass bridge under the early warning of terrorist attacks.
Similar content being viewed by others
References
Azaiez, M. N. and Bier, V. M. (2007). “Optimal resource allocation for security in reliability systems.” European Journal of Operational Research, Vol. 181, No. 2, pp. 773–786, DOI: 10.1016/j.ejor.2006.03.057
Beijing Municipal Traffic Commission (2011). Beijing bridge contingency plans for emergencies.
Chang, S. E., McDaniels, T. L., Mikawoz, J., and Peterson, K. (2007). “Infrastructure failure interdependencies in extreme events: Power outage consequences in the 1998 Ice Storm.” Natural Hazards, Vol. 41, No. 2, pp. 337–358, DOI: 10.1007/s11069-006-9039-4.
Cimellaro, G. P., Reinhorn, A. M., and Bruneau, M. (2010). “Framework for analytical quantification of disaster resilience.” Engineering Structures, Vol. 32, No. 11, pp. 3639–3649, DOI: 10.1016/j.engstruct.2010.08.008.
Cimellaro, G. P., Solari, D., and Bruneau, M. (2014). “Physical infrastructure Interdependency and regional resilience index after the 2011 Tohoku earthquake in Japan.” Earthquake Engineering & Structural Dynamics, DOI: 10.1002/eqe.2422.
Fajfar, P. and Krawinkler, H. (1997). Seismic design methodologies for the next generation of codes: Proceedings of the international workshop on seismic design methologies for the next generation of codes, Bled, Slovenia, 24–27 Jun 1997: AA Balkema.
Huang, Y., Fan, Y., and Cheu, R. L. (2007). “Optimal allocation of multiple emergency service resources for protection of critical transportation infrastructure.” Transportation Research Record: Journal of the Transportation Research Board, Vol. 2022, No. 1, pp. 1–8, DOI: 10.3141/2022-01.
Jha, M. K. (2009). “Dynamic Bayesian network for predicting the likelihood of a terrorist attack at critical transportation infrastructure facilities.” Journal of Infrastructure Systems, Vol. 15, No. 1, pp. 31–39, DOI: 10.1061/(ASCE)1076-0342(2009)15:1(31).
Khazaeni, G., Khanzadi, M., and Afshar, A. (2012). “Fuzzy adaptive decision making model for selection balanced risk allocation.” International Journal of Project Management, Vol. 30, No. 4, pp. 511–522, DOI: 10.1016/j.ijproman.2011.10.003.
Kinney, R., Crucitti, P., Albert, R., and Latora, V. (2005). “Modeling cascading failures in the North American power grid.” The European Physical Journal B-Condensed Matter and Complex Systems, Vol. 46, No. 1, pp. 101–107, DOI: 10.1140/epjb/e2005-00237-9.
Krawinkler, H. and Seneviratna, G. (1998). “Pros and cons of a pushover analysis of seismic performance evaluation.” Engineering structures, Vol. 20, No. 4, pp. 452–464, DOI: 10.1016/S0141-0296(97)00092-8.
Kuo, Y.-C. and Lu, S.-T. (2013). “Using fuzzy multiple criteria decision making approach to enhance risk assessment for metropolitan construction projects.” International Journal of Project Management, Vol. 31, No. 4, pp. 602–614, DOI: 10.1016/j.ijproman.2012.10.003.
Leung, M., Lambert, J. H., and Mosenthal, A. (2004). “A risk-based approach to setting priorities in protecting bridges against terrorist attacks.” Risk Analysis, Vol. 24, No. 4, pp. 963–984, DOI: 10.1111/j.0272-4332.2004.00500.x.
Liu, J., Li, Q., and Wang, Y. (2013). “Risk analysis in ultra deep scientific drilling project-A fuzzy synthetic evaluation approach.” International Journal of Project Management, Vol. 31, No. 3, pp. 449–458, DOI: 10.1016/j.ijproman.2012.09.015.
Ma, H. and Lv, X. (2002). “Some problems about performance-based seismic design.” Journal of Tongji University, Vol. 30, No. 12, pp. 1429–1434 (In Chinese).
Nieto-Morote, A. and Ruz-Vila, F. (2011). “A fuzzy approach to construction project risk assessment.” International Journal of Project Management, Vol. 29, No. 2, pp. 220–231, DOI: 10.1016/j.ijproman.2010.02.002.
Ouyang, M., Hong, L., Mao, Z.-J., Yu, M.-H., and Qi, F. (2009). “A methodological approach to analyze vulnerability of interdependent infrastructures.” Simulation Modelling Practice and Theory, Vol. 17, No. 5, pp. 817–828, DOI: 10.1016/j.simpat.2009.02.001.
Perez-Gladish, B. and M'Zali, B. (2010). “An AHP-based approach to mutual funds' social performance measurement.” International Journal of Multicriteria Decision Making, Vol. 1, No. 1, 103–127, DOI: 10.1504/IJMCDM.2010.033689.
Priestley, M. (2000). “Performance based seismic design.” Bulletin of the New Zealand Society for Earthquake Engineering, Vol. 33, No. 3, 325–346, INIST: 19015, 35400009138885.0080.
Ramirez-Marquez, J. E. and Rocco S, C. M. (2009). “Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery.” Reliability Engineering & System Safety, Vol. 94, No. 5, pp. 913–921, DOI: 10.1016/j.ress.2008.10.006.
Ray, J. C. (2007). “Risk-based prioritization of terrorist threat mitigation measures on bridges.” Journal of Bridge Engineering, Vol. 12, No. 2, pp. 140–146, DOI: 10.1061/(ASCE)1084-0702(2007)12:2(140).
Rocco, S., Claudio, M., Ramirez-Marquez, J. E., Salazar, A., Daniel, E., and Zio, E. (2010). “A flow importance measure with application to an italian transmission power system.” International Journal of Performability Engineering, Vol. 6, No. 1, OAI: hal-supelec.archivesouvertes. fr:hal-00609103.
Saaty, T. (1980). The analytic hierarchical process, New York.
Von Ferber, C., Holovatch, T., and Holovatch, Y. (2009). “Attack vulnerability of public transport networks.” Traffic and Granular Flow’07 (pp. 721–731): Springer.
Wang, J.-W. and Rong, L.-L. (2009). “Cascade-based attack vulnerability on the US power grid.” Safety Science, Vol. 47, No. 10, pp. 1332–1336, DOI: 10.1016/j.ssci.2009.02.002.
Wang, S., Hong, L., and Chen, X. (2012). “Vulnerability analysis of interdependent infrastructure systems: A methodological framework.” Physica A: Statistical Mechanics and its Applications, Vol. 391, No. 11, pp. 3323–3335, DOI: 10.1016/j.physa.2011.12.043.
Williamson, E. B. and Winget, D. G. (2005). “Risk management and design of critical bridges for terrorist attacks.” Journal of Bridge Engineering, Vol. 10, No. 1, pp. 96–106, DOI: 10.1061/(ASCE)1084-0702(2005)10:1(96).
Yulong, L., Xiande, W., and Zhongfu, L. (2008). “Safety risk assessment on communication system based on satellite constellations with the analytic hierarchy process.” Aircraft Engineering and Aerospace Technology, Vol. 80, No. 6, pp. 595–604, DOI: 10.1108/00022660810911536.
Zayed, T., Amer, M., and Pan, J. (2008). “Assessing risk and uncertainty inherent in Chinese highway projects using AHP.” International Journal of Project Management, Vol. 26, No. 4, pp. 408–419, DOI: 10.1016/j.ijproman.2007.05.012.
Zhang, C. and Ramirez-Marquez, J. E. (2013). Protecting critical infrastructures against intentional attacks: A two-stage game with incomplete information.” IIE Transactions, Vol. 45, No. 3, pp. 244–258, DOI: 10.1080/0740817X.2012.676749.
Zhang, C., Ramirez-Marquez, J. E., and Sanseverino, C. M. R. (2011). “A holistic method for reliability performance assessment and critical components detection in complex networks.” IIE Transactions, Vol. 43, No. 9, pp. 661–675, DOI: 10.1080/0740817X.2010.546387.
Zio, E. (2009). “Reliability engineering: Old problems and new challenges.” Reliability Engineering & System Safety, Vol. 94, No. 2, pp. 125–141, DOI: 10.1016/j.ress.2008.06.002.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, Y., Wang, T., Song, X. et al. Optimal resource allocation for anti-terrorism in protecting overpass bridge based on AHP risk assessment model. KSCE J Civ Eng 20, 309–322 (2016). https://doi.org/10.1007/s12205-015-0233-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12205-015-0233-3