Attacker-Defender Models and Road Network Vulnerability

The reliability of road networks depends directly on their vulnerability to disruptive incidents, ranging in severity from minor disruptions to terrorist attacks. This paper presents a game theoretic approach to the analysis of road network vulnerability. The approach posits predefined disruption, a...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:Philosophical Transactions: Mathematical, Physical and Engineering Sciences. - The Royal Society. - 366(2008), 1872, Seite 1893-1906
1. Verfasser: Bell, M. G. H. (VerfasserIn)
Weitere Verfasser: Kanturska, U., Schmöcker, J.-D., Fonzone, A.
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2008
Zugriff auf das übergeordnete Werk:Philosophical Transactions: Mathematical, Physical and Engineering Sciences
Schlagworte:Transport network vulnerability Defender-attacker-defender Risk-averse routing Game theory Networks under attack Mathematics Applied sciences Economics Behavioral sciences Social sciences
Beschreibung
Zusammenfassung:The reliability of road networks depends directly on their vulnerability to disruptive incidents, ranging in severity from minor disruptions to terrorist attacks. This paper presents a game theoretic approach to the analysis of road network vulnerability. The approach posits predefined disruption, attack or failure scenarios and then considers how to use the road network so as to minimize the maximum expected loss in the event of one of these scenarios coming to fruition. A mixed route strategy is adopted, meaning that the use of the road network is determined by the worst scenario probabilities. This is equivalent to risk-averse route choice. A solution algorithm suitable for use with standard traffic assignment software is presented, thereby enabling the use of electronic road navigation networks. A variant of this algorithm suitable for risk-averse assignment is developed. A numerical example relating to the central London road network is presented. The results highlight points of vulnerability in the road network. Applications of this form of network vulnerability analysis together with improved solution methods are discussed.
ISSN:1364503X