Skip to main content
Log in

Optimal resource allocation for anti-terrorism in protecting overpass bridge based on AHP risk assessment model

  • Structural Engineering
  • Published:
KSCE Journal of Civil Engineering Aims and scope

Abstract

Terrorist attacks on infrastructures are serious incidents in many countries. Measures to prevent terrorist attacks and minimize the damage are critical in the design of infrastructures. This paper develops an Analytic Hierarchy Process (AHP) based risk assessment model to identify the key components of the overpass bridge in terrorist attacks, and prioritizes a variety of possible attack means with multiple criteria. The AHP risk assessment model can be used to not only set the priority of protected components, but also to allocate resources to the most critical protecting methods within a limited budget. An interchange overpass bridge in Beijing, China is analysed to validate the model. The results show that the method is suitable for the optimal resource allocation in the process of the overpass bridge anti-terrorism design, the formulation of a defence strategy and the protection resource allocation scheme for the overpass bridge against a terrorist attack. The method can also be used for dynamic allocating the resources for the overpass bridge under the early warning of terrorist attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Azaiez, M. N. and Bier, V. M. (2007). “Optimal resource allocation for security in reliability systems.” European Journal of Operational Research, Vol. 181, No. 2, pp. 773–786, DOI: 10.1016/j.ejor.2006.03.057

    Article  MathSciNet  Google Scholar 

  • Beijing Municipal Traffic Commission (2011). Beijing bridge contingency plans for emergencies.

    Google Scholar 

  • Chang, S. E., McDaniels, T. L., Mikawoz, J., and Peterson, K. (2007). “Infrastructure failure interdependencies in extreme events: Power outage consequences in the 1998 Ice Storm.” Natural Hazards, Vol. 41, No. 2, pp. 337–358, DOI: 10.1007/s11069-006-9039-4.

    Article  Google Scholar 

  • Cimellaro, G. P., Reinhorn, A. M., and Bruneau, M. (2010). “Framework for analytical quantification of disaster resilience.” Engineering Structures, Vol. 32, No. 11, pp. 3639–3649, DOI: 10.1016/j.engstruct.2010.08.008.

    Article  Google Scholar 

  • Cimellaro, G. P., Solari, D., and Bruneau, M. (2014). “Physical infrastructure Interdependency and regional resilience index after the 2011 Tohoku earthquake in Japan.” Earthquake Engineering & Structural Dynamics, DOI: 10.1002/eqe.2422.

    Google Scholar 

  • Fajfar, P. and Krawinkler, H. (1997). Seismic design methodologies for the next generation of codes: Proceedings of the international workshop on seismic design methologies for the next generation of codes, Bled, Slovenia, 24–27 Jun 1997: AA Balkema.

    Google Scholar 

  • Huang, Y., Fan, Y., and Cheu, R. L. (2007). “Optimal allocation of multiple emergency service resources for protection of critical transportation infrastructure.” Transportation Research Record: Journal of the Transportation Research Board, Vol. 2022, No. 1, pp. 1–8, DOI: 10.3141/2022-01.

    Article  Google Scholar 

  • Jha, M. K. (2009). “Dynamic Bayesian network for predicting the likelihood of a terrorist attack at critical transportation infrastructure facilities.” Journal of Infrastructure Systems, Vol. 15, No. 1, pp. 31–39, DOI: 10.1061/(ASCE)1076-0342(2009)15:1(31).

    Article  Google Scholar 

  • Khazaeni, G., Khanzadi, M., and Afshar, A. (2012). “Fuzzy adaptive decision making model for selection balanced risk allocation.” International Journal of Project Management, Vol. 30, No. 4, pp. 511–522, DOI: 10.1016/j.ijproman.2011.10.003.

    Article  Google Scholar 

  • Kinney, R., Crucitti, P., Albert, R., and Latora, V. (2005). “Modeling cascading failures in the North American power grid.” The European Physical Journal B-Condensed Matter and Complex Systems, Vol. 46, No. 1, pp. 101–107, DOI: 10.1140/epjb/e2005-00237-9.

    Article  Google Scholar 

  • Krawinkler, H. and Seneviratna, G. (1998). “Pros and cons of a pushover analysis of seismic performance evaluation.” Engineering structures, Vol. 20, No. 4, pp. 452–464, DOI: 10.1016/S0141-0296(97)00092-8.

    Article  Google Scholar 

  • Kuo, Y.-C. and Lu, S.-T. (2013). “Using fuzzy multiple criteria decision making approach to enhance risk assessment for metropolitan construction projects.” International Journal of Project Management, Vol. 31, No. 4, pp. 602–614, DOI: 10.1016/j.ijproman.2012.10.003.

    Article  Google Scholar 

  • Leung, M., Lambert, J. H., and Mosenthal, A. (2004). “A risk-based approach to setting priorities in protecting bridges against terrorist attacks.” Risk Analysis, Vol. 24, No. 4, pp. 963–984, DOI: 10.1111/j.0272-4332.2004.00500.x.

    Article  Google Scholar 

  • Liu, J., Li, Q., and Wang, Y. (2013). “Risk analysis in ultra deep scientific drilling project-A fuzzy synthetic evaluation approach.” International Journal of Project Management, Vol. 31, No. 3, pp. 449–458, DOI: 10.1016/j.ijproman.2012.09.015.

    Article  Google Scholar 

  • Ma, H. and Lv, X. (2002). “Some problems about performance-based seismic design.” Journal of Tongji University, Vol. 30, No. 12, pp. 1429–1434 (In Chinese).

    Google Scholar 

  • Nieto-Morote, A. and Ruz-Vila, F. (2011). “A fuzzy approach to construction project risk assessment.” International Journal of Project Management, Vol. 29, No. 2, pp. 220–231, DOI: 10.1016/j.ijproman.2010.02.002.

    Article  Google Scholar 

  • Ouyang, M., Hong, L., Mao, Z.-J., Yu, M.-H., and Qi, F. (2009). “A methodological approach to analyze vulnerability of interdependent infrastructures.” Simulation Modelling Practice and Theory, Vol. 17, No. 5, pp. 817–828, DOI: 10.1016/j.simpat.2009.02.001.

    Article  Google Scholar 

  • Perez-Gladish, B. and M'Zali, B. (2010). “An AHP-based approach to mutual funds' social performance measurement.” International Journal of Multicriteria Decision Making, Vol. 1, No. 1, 103–127, DOI: 10.1504/IJMCDM.2010.033689.

    Article  Google Scholar 

  • Priestley, M. (2000). “Performance based seismic design.” Bulletin of the New Zealand Society for Earthquake Engineering, Vol. 33, No. 3, 325–346, INIST: 19015, 35400009138885.0080.

    Article  Google Scholar 

  • Ramirez-Marquez, J. E. and Rocco S, C. M. (2009). “Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery.” Reliability Engineering & System Safety, Vol. 94, No. 5, pp. 913–921, DOI: 10.1016/j.ress.2008.10.006.

    Article  Google Scholar 

  • Ray, J. C. (2007). “Risk-based prioritization of terrorist threat mitigation measures on bridges.” Journal of Bridge Engineering, Vol. 12, No. 2, pp. 140–146, DOI: 10.1061/(ASCE)1084-0702(2007)12:2(140).

    Article  Google Scholar 

  • Rocco, S., Claudio, M., Ramirez-Marquez, J. E., Salazar, A., Daniel, E., and Zio, E. (2010). “A flow importance measure with application to an italian transmission power system.” International Journal of Performability Engineering, Vol. 6, No. 1, OAI: hal-supelec.archivesouvertes. fr:hal-00609103.

    Google Scholar 

  • Saaty, T. (1980). The analytic hierarchical process, New York.

    Google Scholar 

  • Von Ferber, C., Holovatch, T., and Holovatch, Y. (2009). “Attack vulnerability of public transport networks.” Traffic and Granular Flow’07 (pp. 721–731): Springer.

    Chapter  Google Scholar 

  • Wang, J.-W. and Rong, L.-L. (2009). “Cascade-based attack vulnerability on the US power grid.” Safety Science, Vol. 47, No. 10, pp. 1332–1336, DOI: 10.1016/j.ssci.2009.02.002.

    Article  Google Scholar 

  • Wang, S., Hong, L., and Chen, X. (2012). “Vulnerability analysis of interdependent infrastructure systems: A methodological framework.” Physica A: Statistical Mechanics and its Applications, Vol. 391, No. 11, pp. 3323–3335, DOI: 10.1016/j.physa.2011.12.043.

    Article  Google Scholar 

  • Williamson, E. B. and Winget, D. G. (2005). “Risk management and design of critical bridges for terrorist attacks.” Journal of Bridge Engineering, Vol. 10, No. 1, pp. 96–106, DOI: 10.1061/(ASCE)1084-0702(2005)10:1(96).

    Article  Google Scholar 

  • Yulong, L., Xiande, W., and Zhongfu, L. (2008). “Safety risk assessment on communication system based on satellite constellations with the analytic hierarchy process.” Aircraft Engineering and Aerospace Technology, Vol. 80, No. 6, pp. 595–604, DOI: 10.1108/00022660810911536.

    Article  Google Scholar 

  • Zayed, T., Amer, M., and Pan, J. (2008). “Assessing risk and uncertainty inherent in Chinese highway projects using AHP.” International Journal of Project Management, Vol. 26, No. 4, pp. 408–419, DOI: 10.1016/j.ijproman.2007.05.012.

    Article  Google Scholar 

  • Zhang, C. and Ramirez-Marquez, J. E. (2013). Protecting critical infrastructures against intentional attacks: A two-stage game with incomplete information.” IIE Transactions, Vol. 45, No. 3, pp. 244–258, DOI: 10.1080/0740817X.2012.676749.

    Article  Google Scholar 

  • Zhang, C., Ramirez-Marquez, J. E., and Sanseverino, C. M. R. (2011). “A holistic method for reliability performance assessment and critical components detection in complex networks.” IIE Transactions, Vol. 43, No. 9, pp. 661–675, DOI: 10.1080/0740817X.2010.546387.

    Article  Google Scholar 

  • Zio, E. (2009). “Reliability engineering: Old problems and new challenges.” Reliability Engineering & System Safety, Vol. 94, No. 2, pp. 125–141, DOI: 10.1016/j.ress.2008.06.002.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Y., Wang, T., Song, X. et al. Optimal resource allocation for anti-terrorism in protecting overpass bridge based on AHP risk assessment model. KSCE J Civ Eng 20, 309–322 (2016). https://doi.org/10.1007/s12205-015-0233-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12205-015-0233-3

Keywords

Navigation