Skip to main content

Vulnerability Analysis of a Signal-Controlled Road Network for Equilibrium Flow

  • Chapter
  • First Online:
Advanced Business Analytics

Abstract

Considering the reliability of an area traffic control road network, most travel delay is directly dependent on correct operation of signal settings. The purpose of this paper is to devise an efficient scheme to evaluate the reliability of a signal-controlled road network. A min-max complementarity problem is proposed to characterize user equilibrium flow in the presence of a worst-case disruption of given link capacity loss. A computationally tractable solution scheme is proposed to identify important links whose disruption could cause substantial increase in travel delay to all road users. Numerical computations are conducted in a medium-sized road network to demonstrate the feasibility of the proposed solution scheme. The results indicate that the most critical signal-controlled traffic streams can be conveniently identified, when failed to perform its normal functions, would give rise to maximum travel delay to all road users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aashtiani HZ, Magnanti TL (1981) Equilibria on a congested transportation network. SIAM J Algebr Discrete Meth 3(2):213–226

    Article  Google Scholar 

  2. Allsop RE, Charlesworth JA (1977) Traffic in a signal-controlled road network: an example of different signal timings inducing different routeings. Traffic Eng Contr 18:262–264

    Google Scholar 

  3. Akgun I, Tansel B, Wood K (2011) The multi-terminal maximum-flow network-interdiction problem. Eur J Oper Res 211:241–251

    Article  Google Scholar 

  4. Asakura Y (1999) Evaluation of network reliability using stochastic user equilibrium. J Adv Transp 33(2):147–158

    Article  Google Scholar 

  5. Azaiez N, Bier VM (2007) Optimal resource allocation for security in reliability systems. Eur J Oper Res 181:773–786

    Article  Google Scholar 

  6. Bell MGH (2003) The use of game theory to measure the vulnerability of stochastic networks. IEEE Trans Reliab 52(1):63–68

    Article  Google Scholar 

  7. Bell MGH (2000) A game theory approach to measuring the performance reliability of transport networks. Transp Res B 34(6):533–546

    Article  Google Scholar 

  8. Bell MGH, Cassir C (2002) Risk-averse user equilibrium traffic assignment: an application of game theory. Transp Res B 36(8):671–681

    Article  Google Scholar 

  9. Bell MGH, Iida Y (1997) Transportation network analysis. Wiley, Chichester

    Book  Google Scholar 

  10. Bell MGH, Kanturska U, Schmocker J-D, Fonzone A (2008) Attacker–defender models and road network vulnerability. Phil Trans R Soc A 366(1872):1893–1906

    Article  Google Scholar 

  11. Berdica K (2002) An introduction to road vulnerability: what has been done, is done and should be done. Transp Policy 9:117–127

    Article  Google Scholar 

  12. Bier VM, Hausken K (2013) Defending and attacking a network of two arcs subject to traffic congestion. Reliab Eng Syst Saf 112:214–224

    Article  Google Scholar 

  13. Bier VM, Nagaraj A, Abhichandani V (2005) Protection of simple series and parallel systems with components of different values. Reliab Eng Syst Saf 87:315–323

    Article  Google Scholar 

  14. Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces 36:530–544

    Article  Google Scholar 

  15. Cappanera P, Scaparra MP (2011) Optimal allocation of protective resources in shortest-path networks. Transp Sci 45(1):64–80

    Article  Google Scholar 

  16. Chen A, Yang C, Kongsomsaksakul S, Lee M (2007) Network-based accessibility measures for vulnerability analysis of degradable transportation networks. Netw Spat Econ 7:241–256

    Article  Google Scholar 

  17. Chen A, Yang H, Lo HK, Tang WH (2002) Capacity reliability of a road network: an assessment methodology and numerical results. Transp Res B 36(3):225–252

    Article  Google Scholar 

  18. Chiou S-W (2003) TRANSYT derivatives for area traffic control optimisation with network equilibrium flows. Transp Res B 37(3):263–290

    Article  Google Scholar 

  19. Church RL, Scaparra MP (2007) Analyzis of facility systems’ reliability when subject to attack or a natural disaster. In: Murray AT, Grubesic TH (eds) Critical infrastructure: reliability and vulnerability, Advances in spatial science. Springer, Berlin, pp 221–242

    Chapter  Google Scholar 

  20. Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502

    Article  Google Scholar 

  21. Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46(2):184–197

    Article  Google Scholar 

  22. Grubesic TH, Matisziw TC, Murray AT, Snediker D (2008) Comparative approaches for assessing network vulnerability. Int Reg Sci Rev 31(1):88–112

    Article  Google Scholar 

  23. Hausken K (2008) Strategic defense and attack for reliability Systems. Reliab Eng Syst Saf 93(11):1740–1750

    Article  Google Scholar 

  24. Hausken K, Levitin G (2009) Minmax defense strategy for complex multi-state systems. Reliab Eng Syst Saf 94:577–587

    Article  Google Scholar 

  25. Israeli E, Wood K (2002) Shortest path network interdiction. Networks 40:97–111

    Article  Google Scholar 

  26. Jenelius E, Mattsson L (2012) Road network vulnerability analysis of area-covering disruptions: a grid-based approach with case study. Transp Res A 46:746–760

    Google Scholar 

  27. Jenelius E, Petersen T, Mattsson L (2006) Importance and exposure in road network vulnerability analysis. Transp Res A 40:537–560

    Google Scholar 

  28. Lam WHK, Chan KS, Li Z-C, Bell MGH (2010) A risk-averse user equilibrium model for route choice problem in signal-controlled networks. J Adv Transp 44:219–230

    Article  Google Scholar 

  29. Lam WHK, Shao H, Sumalee A (2008) Modeling impacts of adverse weather conditions on a road network with uncertainties in demand and supply. Transp Res B 42:890–910

    Article  Google Scholar 

  30. Levitin G (2004) Maximizing survivability of vulnerable weighted voting systems. Reliab Eng Syst Saf 83:17–26

    Article  Google Scholar 

  31. Levitin G (2007) Optimal defense strategy against intentional attacks. IEEE Trans Reliab 56:148–156

    Article  Google Scholar 

  32. Levitin G (2009) Redundancy vs. protection vs. false targets for systems under attack. Reliability. IEEE Trans Reliab 58(1):58–68

    Article  Google Scholar 

  33. Levitin G, Ben-Haim H (2008) Importance of protections against intentional attacks. Reliab Eng Syst Saf 93:639–646

    Article  Google Scholar 

  34. Levitin G, Gertsbakh I, Shpungin Y (2011) Evaluating the damage associated with intentional network disintegration. Reliab Eng Syst Saf 96:433–439

    Article  Google Scholar 

  35. Levitin G, Hausken K (2013) Is it wise to leave some false targets unprotected? Reliab Eng Syst Saf 112:176–186

    Article  Google Scholar 

  36. Levitin G, Hausken K, Ben-Haim H (2013) Defending majority voting systems against a strategic attacker. Reliab Eng Syst Saf 111:37–44

    Article  Google Scholar 

  37. Levitin G, Lisnianski A (2003) Optimizing survivability of vulnerable series-parallel multi-state systems. Reliab Eng Syst Saf 79:319–331

    Article  Google Scholar 

  38. Liberatore F, Scaparra MP, Daskin MS (2011) Analyzis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification. Comput Oper Res 38:357–366

    Article  Google Scholar 

  39. Lim C, Smith J (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39((Special Issue on Homeland Security)):15–26

    Article  Google Scholar 

  40. Lins ID, Rego LC, Moura MC, Droguett EL (2013) Selection of security system design via games of imperfect information and multi-objective genetic algorithm. Reliab Eng Syst Saf 112:59–66

    Article  Google Scholar 

  41. Lo HK, Luo XW, Siu BWY (2006) Degradable transport network: travel time budget of travelers with heterogeneous risk aversion. Transp Res B 40(9):792–806

    Article  Google Scholar 

  42. Lo HK, Tung YK (2003) Network with degradable links: capacity analysis and design. Transp Res B 37(4):345–363

    Article  Google Scholar 

  43. Losada C, Scaparra MP, O’Hanley JR (2012) Optimizing system resilience: a facility protection model with recovery time. Eur J Oper Res 217:519–530

    Article  Google Scholar 

  44. Nicholson A, Du Z-P (1997) Degradable transportation systems: an integrated equilibrium model. Transp Res B 31(3):209–223

    Article  Google Scholar 

  45. O’hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209:23–36

    Article  Google Scholar 

  46. Ramirez-Marquez JE, Rocco C (2009) Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery. Reliab Eng Syst Saf 94:913–921

    Article  Google Scholar 

  47. Ramirez-Marquez JE, Rocco C, Levitin G (2009) Optimal protection of general source–sink networks via evolutionary techniques. Reliab Eng Syst Saf 94(10):1676–1684

    Article  Google Scholar 

  48. Ramirez-Marquez JE, Rocco C, Levitin G (2011) Optimal network protection against diverse interdictor strategies. Reliabil Eng Syst Saf 96(3):374–382

    Article  Google Scholar 

  49. Rocco CM, Ramirez-Marquez JE (2009) Deterministic network interdiction optimization via an evolutionary approach. Reliab Eng Syst Saf 94:568–576

    Article  Google Scholar 

  50. Rocco CM, Ramirez-Marquez JE (2010) A bi-objective approach for shortest-path network interdiction. Reliab Eng Syst Saf 59:232–240

    Google Scholar 

  51. Rocco CM, Ramirez-Marquez JE, Salazar DE (2010) Bi and tri-objective optimization in the deterministic network interdiction problem. Reliab Eng Syst Saf 95(8):887–896

    Article  Google Scholar 

  52. Royset JO, Wood RK (2007) Solving the bi-objective maximum-flow network-interdiction problem. INFORMS J Comput 19(2):175–184

    Article  Google Scholar 

  53. Salmeron J, Wood K, Baldick R (2004) Analyzis of electric grid security under terrorist threat. IEEE Trans Power Syst 19:905–912

    Article  Google Scholar 

  54. Scaparra MP, Church RL (2008) A Bilevel mixed-integer program for critical infrastructure protection planning. Comput Oper Res 35:1905–1923

    Article  Google Scholar 

  55. Sullivan JL, Novak DC, Aultman-Hall L, Scott DM (2010) Identifying critical road segments and measuring system-wide robustness in transportation networks with isolating links: a link-based capacity-reduction approach. Transp Res A 44:323–336

    Google Scholar 

  56. Sumalee A, Kurauchi F (2006) Network capacity reliability analysis considering traffic regulation after a major disaster. Netw Spat Econ 6(3–4):205–219

    Article  Google Scholar 

  57. Szeto WY, O’Brien L, O’Mahony M (2006) Risk-averse traffic assignment with elastic demands: NCP formulation and solution method for assessing performance reliability. Netw Spat Econ 6(3):313–332

    Article  Google Scholar 

  58. Szeto WY (2011) Cooperative game approaches to measuring network reliability considering paradoxes. Transp Res C 19:229–241

    Article  Google Scholar 

  59. Vincent RA, Mitchell AI, Robertson DI (1980) User guide to TRANSYT. TRRL report, LR888. Transport and Road Research Laboratory, Crowthorne

    Google Scholar 

  60. Wardrop JG (1952) Some theoretical aspects of road traffic approach. Proc Inst Civil Eng II 1(325–378):1952

    Google Scholar 

  61. Wollmer R (1964) Removing arcs from a network. J Oper Res Soc Am 12:934–940

    Google Scholar 

  62. Wong SC (1995) Derivatives of the performance index for the traffic model from TRANSYT. Transp Res B 29(5):303–327

    Article  Google Scholar 

  63. Wood K (1993) Deterministic network interdiction. Math Comput Model 17:1–18

    Article  Google Scholar 

Download references

Acknowledgments

The author is grateful to Editors for every aspect of arrangement about this book. The work reported in this paper has been financially supported via grants 98-2410-H-259-009-MY3 & 101-2628-H-259-001-MY2 from Taiwan National Science Council.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suh-Wen Chiou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Chiou, SW. (2015). Vulnerability Analysis of a Signal-Controlled Road Network for Equilibrium Flow. In: García Márquez, F., Lev, B. (eds) Advanced Business Analytics. Springer, Cham. https://doi.org/10.1007/978-3-319-11415-6_6

Download citation

Publish with us

Policies and ethics