Skip to main content
Log in

Role of Spatial Data in the Protection of Critical Infrastructure and Homeland Defense

  • Published:
Applied Spatial Analysis and Policy Aims and scope Submit manuscript

Abstract

This paper examines how the use of spatial analysis techniques and geographic information systems may assist in developing a more complete understanding of underlying solutions trends and properties in complex optimization problems. In the model, an attacker with multiple attractive targets and multiple entry points into the region attempts to find a complete network path offering the highest probability of non-detection by a defender who has allocated detection resources to reduce arc non-detection and who wishes to minimize this maximum attacker path (this problem is a direct variant of the shortest path network interdiction problem). This paper introduces spatial analysis techniques to analyze defender resource allocation and attacker path selection in two sample networks (Lancaster-Palmdale, California and Northridge, California). The resulting discussion begins to examine how network diversity and other problem parameters can impact observed defender/attacker solutions and illustrates the importance of this knowledge in the making and evaluating of governmental and public policy decisions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Anselin, L. (1995). Local indicators of spatial association—LISA. Geographical Analysis, 27, 93–115.

    Article  Google Scholar 

  • Bard, J. (1998). Practical bilevel optimization; algorithms and applications. Boston: Kluwer Academic.

    Google Scholar 

  • Bayrak, H., & Baily, M. (2008). Shortest path network interdiction with asymmetric information. Networks, 52(3), 133–140.

    Article  Google Scholar 

  • Bier, V., Haphuriwat, N., Zimmerman, J., Menoyo, R., & Culpen, A. (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 28(3), 763–770.

    Article  Google Scholar 

  • Brown, G., Carlyle, M., Salmeron, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530–544.

    Article  Google Scholar 

  • Department of Homeland Security. (2007). Transportation systems: Critical infrastructure and key resources sector-specific plan as input to th eNational Infrastructure Protection Plan.

  • Department of Homeland Security. (2008). Homeland security advisory system. http://www.dhs.gov/xinfoshare/programs/Copy_of_press_release_0046.shtm (accessed April 18, 2008).

  • Getis, A., & Ord, J. K. (1996). The analysis of spatial association by use of distance statistics. Geographical Analysis, 24(3), 189–206.

    Article  Google Scholar 

  • Grubesic, T. (2010). Sex offender clusters. Applied Geography, 30, 2–18.

    Article  Google Scholar 

  • Israeli, E., & Wood, K. (2002). Shortest-path network interdiction. Networks, 40(2), 97–111.

    Article  Google Scholar 

  • Kies, U., Mrosek, T., & Schulte, A. (2009). Spatial analysis of regional industrial clusters in the German forest sector. International Forestry Review, 11(1), 38–51.

    Article  Google Scholar 

  • Lim, C., & Smith, J. C. (2007). Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Transactions, 39, 15–26.

    Article  Google Scholar 

  • List, G., Mirchandani, P., Turnquist, M., & Zografos, K. (1991). Modeling and analysis for hazardous materials transportation: Risk analysis, routing/scheduling and facility location. Transportation Science 25, no. 2.

    Google Scholar 

  • Montgomery, D. (2001). Design and analysis of experiments. New York City: Wiley.

    Google Scholar 

  • Nemhauser, G., & Wolsey, L. (1999). Integer and combinatorial optimization. New York: Wiley-Interscience.

    Google Scholar 

  • U.S. Census Bureau. (2008). TIGER/Line and TIGER-related products. http://www.census.gov/geo/www/tiger/ (accessed August 1, 2008).

  • Willis, H. (2007). Guiding resource allocations based on terrorism risk. Risk Analysis, 27(3), 597–606.

    Article  Google Scholar 

  • Zhang, T., Madhani, S., Berg, E. V. D., & Mohanty, S. (2005). Sensor on patrol (SOP): Using mobile sensors to detect potential airborn nuclear, biological, and chemical attacks. Military Communications Conference 2005, MILCOM 2005. IEEE. 2924–2929.

  • Zhuang, J., & Bier, V. (2007). Balancing terrorism and natural disasters—defensive strategy with endogenous attacker effect. Operations Research, 55(5), 976–991.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Justin Yates.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yates, J., Casas, I. Role of Spatial Data in the Protection of Critical Infrastructure and Homeland Defense. Appl. Spatial Analysis 5, 1–23 (2012). https://doi.org/10.1007/s12061-010-9057-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12061-010-9057-1

Keywords

Navigation