Abstract
Considering the reliability of an area traffic control road network, most travel delay is directly dependent on correct operation of signal settings. The purpose of this paper is to devise an efficient scheme to evaluate the reliability of a signal-controlled road network. A min-max complementarity problem is proposed to characterize user equilibrium flow in the presence of a worst-case disruption of given link capacity loss. A computationally tractable solution scheme is proposed to identify important links whose disruption could cause substantial increase in travel delay to all road users. Numerical computations are conducted in a medium-sized road network to demonstrate the feasibility of the proposed solution scheme. The results indicate that the most critical signal-controlled traffic streams can be conveniently identified, when failed to perform its normal functions, would give rise to maximum travel delay to all road users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aashtiani HZ, Magnanti TL (1981) Equilibria on a congested transportation network. SIAM J Algebr Discrete Meth 3(2):213–226
Allsop RE, Charlesworth JA (1977) Traffic in a signal-controlled road network: an example of different signal timings inducing different routeings. Traffic Eng Contr 18:262–264
Akgun I, Tansel B, Wood K (2011) The multi-terminal maximum-flow network-interdiction problem. Eur J Oper Res 211:241–251
Asakura Y (1999) Evaluation of network reliability using stochastic user equilibrium. J Adv Transp 33(2):147–158
Azaiez N, Bier VM (2007) Optimal resource allocation for security in reliability systems. Eur J Oper Res 181:773–786
Bell MGH (2003) The use of game theory to measure the vulnerability of stochastic networks. IEEE Trans Reliab 52(1):63–68
Bell MGH (2000) A game theory approach to measuring the performance reliability of transport networks. Transp Res B 34(6):533–546
Bell MGH, Cassir C (2002) Risk-averse user equilibrium traffic assignment: an application of game theory. Transp Res B 36(8):671–681
Bell MGH, Iida Y (1997) Transportation network analysis. Wiley, Chichester
Bell MGH, Kanturska U, Schmocker J-D, Fonzone A (2008) Attacker–defender models and road network vulnerability. Phil Trans R Soc A 366(1872):1893–1906
Berdica K (2002) An introduction to road vulnerability: what has been done, is done and should be done. Transp Policy 9:117–127
Bier VM, Hausken K (2013) Defending and attacking a network of two arcs subject to traffic congestion. Reliab Eng Syst Saf 112:214–224
Bier VM, Nagaraj A, Abhichandani V (2005) Protection of simple series and parallel systems with components of different values. Reliab Eng Syst Saf 87:315–323
Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces 36:530–544
Cappanera P, Scaparra MP (2011) Optimal allocation of protective resources in shortest-path networks. Transp Sci 45(1):64–80
Chen A, Yang C, Kongsomsaksakul S, Lee M (2007) Network-based accessibility measures for vulnerability analysis of degradable transportation networks. Netw Spat Econ 7:241–256
Chen A, Yang H, Lo HK, Tang WH (2002) Capacity reliability of a road network: an assessment methodology and numerical results. Transp Res B 36(3):225–252
Chiou S-W (2003) TRANSYT derivatives for area traffic control optimisation with network equilibrium flows. Transp Res B 37(3):263–290
Church RL, Scaparra MP (2007) Analyzis of facility systems’ reliability when subject to attack or a natural disaster. In: Murray AT, Grubesic TH (eds) Critical infrastructure: reliability and vulnerability, Advances in spatial science. Springer, Berlin, pp 221–242
Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502
Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46(2):184–197
Grubesic TH, Matisziw TC, Murray AT, Snediker D (2008) Comparative approaches for assessing network vulnerability. Int Reg Sci Rev 31(1):88–112
Hausken K (2008) Strategic defense and attack for reliability Systems. Reliab Eng Syst Saf 93(11):1740–1750
Hausken K, Levitin G (2009) Minmax defense strategy for complex multi-state systems. Reliab Eng Syst Saf 94:577–587
Israeli E, Wood K (2002) Shortest path network interdiction. Networks 40:97–111
Jenelius E, Mattsson L (2012) Road network vulnerability analysis of area-covering disruptions: a grid-based approach with case study. Transp Res A 46:746–760
Jenelius E, Petersen T, Mattsson L (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560
Lam WHK, Chan KS, Li Z-C, Bell MGH (2010) A risk-averse user equilibrium model for route choice problem in signal-controlled networks. J Adv Transp 44:219–230
Lam WHK, Shao H, Sumalee A (2008) Modeling impacts of adverse weather conditions on a road network with uncertainties in demand and supply. Transp Res B 42:890–910
Levitin G (2004) Maximizing survivability of vulnerable weighted voting systems. Reliab Eng Syst Saf 83:17–26
Levitin G (2007) Optimal defense strategy against intentional attacks. IEEE Trans Reliab 56:148–156
Levitin G (2009) Redundancy vs. protection vs. false targets for systems under attack. Reliability. IEEE Trans Reliab 58(1):58–68
Levitin G, Ben-Haim H (2008) Importance of protections against intentional attacks. Reliab Eng Syst Saf 93:639–646
Levitin G, Gertsbakh I, Shpungin Y (2011) Evaluating the damage associated with intentional network disintegration. Reliab Eng Syst Saf 96:433–439
Levitin G, Hausken K (2013) Is it wise to leave some false targets unprotected? Reliab Eng Syst Saf 112:176–186
Levitin G, Hausken K, Ben-Haim H (2013) Defending majority voting systems against a strategic attacker. Reliab Eng Syst Saf 111:37–44
Levitin G, Lisnianski A (2003) Optimizing survivability of vulnerable series-parallel multi-state systems. Reliab Eng Syst Saf 79:319–331
Liberatore F, Scaparra MP, Daskin MS (2011) Analyzis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification. Comput Oper Res 38:357–366
Lim C, Smith J (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39((Special Issue on Homeland Security)):15–26
Lins ID, Rego LC, Moura MC, Droguett EL (2013) Selection of security system design via games of imperfect information and multi-objective genetic algorithm. Reliab Eng Syst Saf 112:59–66
Lo HK, Luo XW, Siu BWY (2006) Degradable transport network: travel time budget of travelers with heterogeneous risk aversion. Transp Res B 40(9):792–806
Lo HK, Tung YK (2003) Network with degradable links: capacity analysis and design. Transp Res B 37(4):345–363
Losada C, Scaparra MP, O’Hanley JR (2012) Optimizing system resilience: a facility protection model with recovery time. Eur J Oper Res 217:519–530
Nicholson A, Du Z-P (1997) Degradable transportation systems: an integrated equilibrium model. Transp Res B 31(3):209–223
O’hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209:23–36
Ramirez-Marquez JE, Rocco C (2009) Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery. Reliab Eng Syst Saf 94:913–921
Ramirez-Marquez JE, Rocco C, Levitin G (2009) Optimal protection of general source–sink networks via evolutionary techniques. Reliab Eng Syst Saf 94(10):1676–1684
Ramirez-Marquez JE, Rocco C, Levitin G (2011) Optimal network protection against diverse interdictor strategies. Reliabil Eng Syst Saf 96(3):374–382
Rocco CM, Ramirez-Marquez JE (2009) Deterministic network interdiction optimization via an evolutionary approach. Reliab Eng Syst Saf 94:568–576
Rocco CM, Ramirez-Marquez JE (2010) A bi-objective approach for shortest-path network interdiction. Reliab Eng Syst Saf 59:232–240
Rocco CM, Ramirez-Marquez JE, Salazar DE (2010) Bi and tri-objective optimization in the deterministic network interdiction problem. Reliab Eng Syst Saf 95(8):887–896
Royset JO, Wood RK (2007) Solving the bi-objective maximum-flow network-interdiction problem. INFORMS J Comput 19(2):175–184
Salmeron J, Wood K, Baldick R (2004) Analyzis of electric grid security under terrorist threat. IEEE Trans Power Syst 19:905–912
Scaparra MP, Church RL (2008) A Bilevel mixed-integer program for critical infrastructure protection planning. Comput Oper Res 35:1905–1923
Sullivan JL, Novak DC, Aultman-Hall L, Scott DM (2010) Identifying critical road segments and measuring system-wide robustness in transportation networks with isolating links: a link-based capacity-reduction approach. Transp Res A 44:323–336
Sumalee A, Kurauchi F (2006) Network capacity reliability analysis considering traffic regulation after a major disaster. Netw Spat Econ 6(3–4):205–219
Szeto WY, O’Brien L, O’Mahony M (2006) Risk-averse traffic assignment with elastic demands: NCP formulation and solution method for assessing performance reliability. Netw Spat Econ 6(3):313–332
Szeto WY (2011) Cooperative game approaches to measuring network reliability considering paradoxes. Transp Res C 19:229–241
Vincent RA, Mitchell AI, Robertson DI (1980) User guide to TRANSYT. TRRL report, LR888. Transport and Road Research Laboratory, Crowthorne
Wardrop JG (1952) Some theoretical aspects of road traffic approach. Proc Inst Civil Eng II 1(325–378):1952
Wollmer R (1964) Removing arcs from a network. J Oper Res Soc Am 12:934–940
Wong SC (1995) Derivatives of the performance index for the traffic model from TRANSYT. Transp Res B 29(5):303–327
Wood K (1993) Deterministic network interdiction. Math Comput Model 17:1–18
Acknowledgments
The author is grateful to Editors for every aspect of arrangement about this book. The work reported in this paper has been financially supported via grants 98-2410-H-259-009-MY3 & 101-2628-H-259-001-MY2 from Taiwan National Science Council.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Chiou, SW. (2015). Vulnerability Analysis of a Signal-Controlled Road Network for Equilibrium Flow. In: GarcÃa Márquez, F., Lev, B. (eds) Advanced Business Analytics. Springer, Cham. https://doi.org/10.1007/978-3-319-11415-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-11415-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11414-9
Online ISBN: 978-3-319-11415-6
eBook Packages: Business and EconomicsBusiness and Management (R0)