A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms
Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on reliability 2018-03, Vol.67 (1), p.381-400 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 400 |
---|---|
container_issue | 1 |
container_start_page | 381 |
container_title | IEEE transactions on reliability |
container_volume | 67 |
creator | Zhang, Xiao-Yi Zheng, Zheng Cai, Kai-Yuan |
description | Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's supply systems tend to be organized in a decentralized manner, with different components belonging to different entities, keeping much information private. Therefore, a protection plan must balance its benefits among these entities for universal agreement to be reached. This paper addresses the issue of decentralized supply chain fortification by proposing the R-Interdiction Median problem with Fortification for Decentralized supply systems (D-RIMF). In the D-RIMF, each demand node is private and is a client of a certain facility; each facility evaluates its potential worst-case reduction in accessibility, measured as the increase in service provision costs considering only its own clients, and the objective is to minimize the largest evaluation values. To model the D-RIMF, we introduce a bilevel multiagent framework, in which all facilities and the defender are considered as independent agents. To solve the D-RIMF, both heuristic and optimal algorithms are designed to satisfy different requirements. Finally, the usefulness of the D-RIMF and the performances of the proposed algorithms are observed through simulations performed on typical datasets. |
doi_str_mv | 10.1109/TR.2017.2761827 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8114274</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8114274</ieee_id><sourcerecordid>2010540469</sourcerecordid><originalsourceid>FETCH-LOGICAL-c289t-e2b615cafb6e7f41d0bf0b4c5654e3febe9d3d92710177f82d400b9b04f06ee63</originalsourceid><addsrcrecordid>eNo9kD1PwzAQhi0EEqUwM7BYYk7rc5w4HqtCoVIRUlvmKB9ncJXGwXaG8utJacV0Oul53tO9hNwDmwAwNd2uJ5yBnHCZQsblBRlBkmQRSA6XZMQYZJFKuLomN97vhlUIlY3IekYX1gWjTVUEY1v6ZmtsqLaOPmGFbXBFY36wppu-65oD3Rx8wL2nRVvTZfB0Y5v-z5s1n9aZ8LX3t-RKF43Hu_Mck4_F83b-Gq3eX5bz2SqqeKZChLxMIakKXaYotYCalZqVokrSRGCssURVx7XiEoavpM54LRgrVcmEZiliGo_J4ym3c_a7Rx_yne1dO5zMhyJYIphI1UBNT1TlrPcOdd45sy_cIQeWH4vLt-sjL_NzcYPxcDIMIv7TGYDgUsS_7bNprQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2010540469</pqid></control><display><type>article</type><title>A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms</title><source>IEEE Electronic Library (IEL)</source><creator>Zhang, Xiao-Yi ; Zheng, Zheng ; Cai, Kai-Yuan</creator><creatorcontrib>Zhang, Xiao-Yi ; Zheng, Zheng ; Cai, Kai-Yuan</creatorcontrib><description>Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's supply systems tend to be organized in a decentralized manner, with different components belonging to different entities, keeping much information private. Therefore, a protection plan must balance its benefits among these entities for universal agreement to be reached. This paper addresses the issue of decentralized supply chain fortification by proposing the R-Interdiction Median problem with Fortification for Decentralized supply systems (D-RIMF). In the D-RIMF, each demand node is private and is a client of a certain facility; each facility evaluates its potential worst-case reduction in accessibility, measured as the increase in service provision costs considering only its own clients, and the objective is to minimize the largest evaluation values. To model the D-RIMF, we introduce a bilevel multiagent framework, in which all facilities and the defender are considered as independent agents. To solve the D-RIMF, both heuristic and optimal algorithms are designed to satisfy different requirements. Finally, the usefulness of the D-RIMF and the performances of the proposed algorithms are observed through simulations performed on typical datasets.</description><identifier>ISSN: 0018-9529</identifier><identifier>EISSN: 1558-1721</identifier><identifier>DOI: 10.1109/TR.2017.2761827</identifier><identifier>CODEN: IERQAD</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Accessibility ; Algorithms ; Analytical models ; bi-level programming models ; Computer simulation ; Critical infrastructure protection (CIP) ; decentralized ; fortification models ; Heuristic algorithms ; location analyses ; Multiagent systems ; Robustness ; Sabotage ; Security ; Solution strengthening ; Supply chains ; supply systems ; system accessibility</subject><ispartof>IEEE transactions on reliability, 2018-03, Vol.67 (1), p.381-400</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c289t-e2b615cafb6e7f41d0bf0b4c5654e3febe9d3d92710177f82d400b9b04f06ee63</citedby><cites>FETCH-LOGICAL-c289t-e2b615cafb6e7f41d0bf0b4c5654e3febe9d3d92710177f82d400b9b04f06ee63</cites><orcidid>0000-0001-7414-8057</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8114274$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8114274$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhang, Xiao-Yi</creatorcontrib><creatorcontrib>Zheng, Zheng</creatorcontrib><creatorcontrib>Cai, Kai-Yuan</creatorcontrib><title>A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms</title><title>IEEE transactions on reliability</title><addtitle>TR</addtitle><description>Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's supply systems tend to be organized in a decentralized manner, with different components belonging to different entities, keeping much information private. Therefore, a protection plan must balance its benefits among these entities for universal agreement to be reached. This paper addresses the issue of decentralized supply chain fortification by proposing the R-Interdiction Median problem with Fortification for Decentralized supply systems (D-RIMF). In the D-RIMF, each demand node is private and is a client of a certain facility; each facility evaluates its potential worst-case reduction in accessibility, measured as the increase in service provision costs considering only its own clients, and the objective is to minimize the largest evaluation values. To model the D-RIMF, we introduce a bilevel multiagent framework, in which all facilities and the defender are considered as independent agents. To solve the D-RIMF, both heuristic and optimal algorithms are designed to satisfy different requirements. Finally, the usefulness of the D-RIMF and the performances of the proposed algorithms are observed through simulations performed on typical datasets.</description><subject>Accessibility</subject><subject>Algorithms</subject><subject>Analytical models</subject><subject>bi-level programming models</subject><subject>Computer simulation</subject><subject>Critical infrastructure protection (CIP)</subject><subject>decentralized</subject><subject>fortification models</subject><subject>Heuristic algorithms</subject><subject>location analyses</subject><subject>Multiagent systems</subject><subject>Robustness</subject><subject>Sabotage</subject><subject>Security</subject><subject>Solution strengthening</subject><subject>Supply chains</subject><subject>supply systems</subject><subject>system accessibility</subject><issn>0018-9529</issn><issn>1558-1721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kD1PwzAQhi0EEqUwM7BYYk7rc5w4HqtCoVIRUlvmKB9ncJXGwXaG8utJacV0Oul53tO9hNwDmwAwNd2uJ5yBnHCZQsblBRlBkmQRSA6XZMQYZJFKuLomN97vhlUIlY3IekYX1gWjTVUEY1v6ZmtsqLaOPmGFbXBFY36wppu-65oD3Rx8wL2nRVvTZfB0Y5v-z5s1n9aZ8LX3t-RKF43Hu_Mck4_F83b-Gq3eX5bz2SqqeKZChLxMIakKXaYotYCalZqVokrSRGCssURVx7XiEoavpM54LRgrVcmEZiliGo_J4ym3c_a7Rx_yne1dO5zMhyJYIphI1UBNT1TlrPcOdd45sy_cIQeWH4vLt-sjL_NzcYPxcDIMIv7TGYDgUsS_7bNprQ</recordid><startdate>201803</startdate><enddate>201803</enddate><creator>Zhang, Xiao-Yi</creator><creator>Zheng, Zheng</creator><creator>Cai, Kai-Yuan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0001-7414-8057</orcidid></search><sort><creationdate>201803</creationdate><title>A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms</title><author>Zhang, Xiao-Yi ; Zheng, Zheng ; Cai, Kai-Yuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c289t-e2b615cafb6e7f41d0bf0b4c5654e3febe9d3d92710177f82d400b9b04f06ee63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Accessibility</topic><topic>Algorithms</topic><topic>Analytical models</topic><topic>bi-level programming models</topic><topic>Computer simulation</topic><topic>Critical infrastructure protection (CIP)</topic><topic>decentralized</topic><topic>fortification models</topic><topic>Heuristic algorithms</topic><topic>location analyses</topic><topic>Multiagent systems</topic><topic>Robustness</topic><topic>Sabotage</topic><topic>Security</topic><topic>Solution strengthening</topic><topic>Supply chains</topic><topic>supply systems</topic><topic>system accessibility</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Xiao-Yi</creatorcontrib><creatorcontrib>Zheng, Zheng</creatorcontrib><creatorcontrib>Cai, Kai-Yuan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on reliability</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhang, Xiao-Yi</au><au>Zheng, Zheng</au><au>Cai, Kai-Yuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms</atitle><jtitle>IEEE transactions on reliability</jtitle><stitle>TR</stitle><date>2018-03</date><risdate>2018</risdate><volume>67</volume><issue>1</issue><spage>381</spage><epage>400</epage><pages>381-400</pages><issn>0018-9529</issn><eissn>1558-1721</eissn><coden>IERQAD</coden><abstract>Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's supply systems tend to be organized in a decentralized manner, with different components belonging to different entities, keeping much information private. Therefore, a protection plan must balance its benefits among these entities for universal agreement to be reached. This paper addresses the issue of decentralized supply chain fortification by proposing the R-Interdiction Median problem with Fortification for Decentralized supply systems (D-RIMF). In the D-RIMF, each demand node is private and is a client of a certain facility; each facility evaluates its potential worst-case reduction in accessibility, measured as the increase in service provision costs considering only its own clients, and the objective is to minimize the largest evaluation values. To model the D-RIMF, we introduce a bilevel multiagent framework, in which all facilities and the defender are considered as independent agents. To solve the D-RIMF, both heuristic and optimal algorithms are designed to satisfy different requirements. Finally, the usefulness of the D-RIMF and the performances of the proposed algorithms are observed through simulations performed on typical datasets.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TR.2017.2761827</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0001-7414-8057</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0018-9529 |
ispartof | IEEE transactions on reliability, 2018-03, Vol.67 (1), p.381-400 |
issn | 0018-9529 1558-1721 |
language | eng |
recordid | cdi_ieee_primary_8114274 |
source | IEEE Electronic Library (IEL) |
subjects | Accessibility Algorithms Analytical models bi-level programming models Computer simulation Critical infrastructure protection (CIP) decentralized fortification models Heuristic algorithms location analyses Multiagent systems Robustness Sabotage Security Solution strengthening Supply chains supply systems system accessibility |
title | A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T06%3A01%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Fortification%20Model%20for%20Decentralized%20Supply%20Systems%20and%20Its%20Solution%20Algorithms&rft.jtitle=IEEE%20transactions%20on%20reliability&rft.au=Zhang,%20Xiao-Yi&rft.date=2018-03&rft.volume=67&rft.issue=1&rft.spage=381&rft.epage=400&rft.pages=381-400&rft.issn=0018-9529&rft.eissn=1558-1721&rft.coden=IERQAD&rft_id=info:doi/10.1109/TR.2017.2761827&rft_dat=%3Cproquest_RIE%3E2010540469%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2010540469&rft_id=info:pmid/&rft_ieee_id=8114274&rfr_iscdi=true |