A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms

Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on reliability 2018-03, Vol.67 (1), p.381-400
Hauptverfasser: Zhang, Xiao-Yi, Zheng, Zheng, Cai, Kai-Yuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 400
container_issue 1
container_start_page 381
container_title IEEE transactions on reliability
container_volume 67
creator Zhang, Xiao-Yi
Zheng, Zheng
Cai, Kai-Yuan
description Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's supply systems tend to be organized in a decentralized manner, with different components belonging to different entities, keeping much information private. Therefore, a protection plan must balance its benefits among these entities for universal agreement to be reached. This paper addresses the issue of decentralized supply chain fortification by proposing the R-Interdiction Median problem with Fortification for Decentralized supply systems (D-RIMF). In the D-RIMF, each demand node is private and is a client of a certain facility; each facility evaluates its potential worst-case reduction in accessibility, measured as the increase in service provision costs considering only its own clients, and the objective is to minimize the largest evaluation values. To model the D-RIMF, we introduce a bilevel multiagent framework, in which all facilities and the defender are considered as independent agents. To solve the D-RIMF, both heuristic and optimal algorithms are designed to satisfy different requirements. Finally, the usefulness of the D-RIMF and the performances of the proposed algorithms are observed through simulations performed on typical datasets.
doi_str_mv 10.1109/TR.2017.2761827
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8114274</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8114274</ieee_id><sourcerecordid>2010540469</sourcerecordid><originalsourceid>FETCH-LOGICAL-c289t-e2b615cafb6e7f41d0bf0b4c5654e3febe9d3d92710177f82d400b9b04f06ee63</originalsourceid><addsrcrecordid>eNo9kD1PwzAQhi0EEqUwM7BYYk7rc5w4HqtCoVIRUlvmKB9ncJXGwXaG8utJacV0Oul53tO9hNwDmwAwNd2uJ5yBnHCZQsblBRlBkmQRSA6XZMQYZJFKuLomN97vhlUIlY3IekYX1gWjTVUEY1v6ZmtsqLaOPmGFbXBFY36wppu-65oD3Rx8wL2nRVvTZfB0Y5v-z5s1n9aZ8LX3t-RKF43Hu_Mck4_F83b-Gq3eX5bz2SqqeKZChLxMIakKXaYotYCalZqVokrSRGCssURVx7XiEoavpM54LRgrVcmEZiliGo_J4ym3c_a7Rx_yne1dO5zMhyJYIphI1UBNT1TlrPcOdd45sy_cIQeWH4vLt-sjL_NzcYPxcDIMIv7TGYDgUsS_7bNprQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2010540469</pqid></control><display><type>article</type><title>A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms</title><source>IEEE Electronic Library (IEL)</source><creator>Zhang, Xiao-Yi ; Zheng, Zheng ; Cai, Kai-Yuan</creator><creatorcontrib>Zhang, Xiao-Yi ; Zheng, Zheng ; Cai, Kai-Yuan</creatorcontrib><description>Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's supply systems tend to be organized in a decentralized manner, with different components belonging to different entities, keeping much information private. Therefore, a protection plan must balance its benefits among these entities for universal agreement to be reached. This paper addresses the issue of decentralized supply chain fortification by proposing the R-Interdiction Median problem with Fortification for Decentralized supply systems (D-RIMF). In the D-RIMF, each demand node is private and is a client of a certain facility; each facility evaluates its potential worst-case reduction in accessibility, measured as the increase in service provision costs considering only its own clients, and the objective is to minimize the largest evaluation values. To model the D-RIMF, we introduce a bilevel multiagent framework, in which all facilities and the defender are considered as independent agents. To solve the D-RIMF, both heuristic and optimal algorithms are designed to satisfy different requirements. Finally, the usefulness of the D-RIMF and the performances of the proposed algorithms are observed through simulations performed on typical datasets.</description><identifier>ISSN: 0018-9529</identifier><identifier>EISSN: 1558-1721</identifier><identifier>DOI: 10.1109/TR.2017.2761827</identifier><identifier>CODEN: IERQAD</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Accessibility ; Algorithms ; Analytical models ; bi-level programming models ; Computer simulation ; Critical infrastructure protection (CIP) ; decentralized ; fortification models ; Heuristic algorithms ; location analyses ; Multiagent systems ; Robustness ; Sabotage ; Security ; Solution strengthening ; Supply chains ; supply systems ; system accessibility</subject><ispartof>IEEE transactions on reliability, 2018-03, Vol.67 (1), p.381-400</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c289t-e2b615cafb6e7f41d0bf0b4c5654e3febe9d3d92710177f82d400b9b04f06ee63</citedby><cites>FETCH-LOGICAL-c289t-e2b615cafb6e7f41d0bf0b4c5654e3febe9d3d92710177f82d400b9b04f06ee63</cites><orcidid>0000-0001-7414-8057</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8114274$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8114274$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhang, Xiao-Yi</creatorcontrib><creatorcontrib>Zheng, Zheng</creatorcontrib><creatorcontrib>Cai, Kai-Yuan</creatorcontrib><title>A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms</title><title>IEEE transactions on reliability</title><addtitle>TR</addtitle><description>Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's supply systems tend to be organized in a decentralized manner, with different components belonging to different entities, keeping much information private. Therefore, a protection plan must balance its benefits among these entities for universal agreement to be reached. This paper addresses the issue of decentralized supply chain fortification by proposing the R-Interdiction Median problem with Fortification for Decentralized supply systems (D-RIMF). In the D-RIMF, each demand node is private and is a client of a certain facility; each facility evaluates its potential worst-case reduction in accessibility, measured as the increase in service provision costs considering only its own clients, and the objective is to minimize the largest evaluation values. To model the D-RIMF, we introduce a bilevel multiagent framework, in which all facilities and the defender are considered as independent agents. To solve the D-RIMF, both heuristic and optimal algorithms are designed to satisfy different requirements. Finally, the usefulness of the D-RIMF and the performances of the proposed algorithms are observed through simulations performed on typical datasets.</description><subject>Accessibility</subject><subject>Algorithms</subject><subject>Analytical models</subject><subject>bi-level programming models</subject><subject>Computer simulation</subject><subject>Critical infrastructure protection (CIP)</subject><subject>decentralized</subject><subject>fortification models</subject><subject>Heuristic algorithms</subject><subject>location analyses</subject><subject>Multiagent systems</subject><subject>Robustness</subject><subject>Sabotage</subject><subject>Security</subject><subject>Solution strengthening</subject><subject>Supply chains</subject><subject>supply systems</subject><subject>system accessibility</subject><issn>0018-9529</issn><issn>1558-1721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kD1PwzAQhi0EEqUwM7BYYk7rc5w4HqtCoVIRUlvmKB9ncJXGwXaG8utJacV0Oul53tO9hNwDmwAwNd2uJ5yBnHCZQsblBRlBkmQRSA6XZMQYZJFKuLomN97vhlUIlY3IekYX1gWjTVUEY1v6ZmtsqLaOPmGFbXBFY36wppu-65oD3Rx8wL2nRVvTZfB0Y5v-z5s1n9aZ8LX3t-RKF43Hu_Mck4_F83b-Gq3eX5bz2SqqeKZChLxMIakKXaYotYCalZqVokrSRGCssURVx7XiEoavpM54LRgrVcmEZiliGo_J4ym3c_a7Rx_yne1dO5zMhyJYIphI1UBNT1TlrPcOdd45sy_cIQeWH4vLt-sjL_NzcYPxcDIMIv7TGYDgUsS_7bNprQ</recordid><startdate>201803</startdate><enddate>201803</enddate><creator>Zhang, Xiao-Yi</creator><creator>Zheng, Zheng</creator><creator>Cai, Kai-Yuan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0001-7414-8057</orcidid></search><sort><creationdate>201803</creationdate><title>A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms</title><author>Zhang, Xiao-Yi ; Zheng, Zheng ; Cai, Kai-Yuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c289t-e2b615cafb6e7f41d0bf0b4c5654e3febe9d3d92710177f82d400b9b04f06ee63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Accessibility</topic><topic>Algorithms</topic><topic>Analytical models</topic><topic>bi-level programming models</topic><topic>Computer simulation</topic><topic>Critical infrastructure protection (CIP)</topic><topic>decentralized</topic><topic>fortification models</topic><topic>Heuristic algorithms</topic><topic>location analyses</topic><topic>Multiagent systems</topic><topic>Robustness</topic><topic>Sabotage</topic><topic>Security</topic><topic>Solution strengthening</topic><topic>Supply chains</topic><topic>supply systems</topic><topic>system accessibility</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Xiao-Yi</creatorcontrib><creatorcontrib>Zheng, Zheng</creatorcontrib><creatorcontrib>Cai, Kai-Yuan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on reliability</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhang, Xiao-Yi</au><au>Zheng, Zheng</au><au>Cai, Kai-Yuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms</atitle><jtitle>IEEE transactions on reliability</jtitle><stitle>TR</stitle><date>2018-03</date><risdate>2018</risdate><volume>67</volume><issue>1</issue><spage>381</spage><epage>400</epage><pages>381-400</pages><issn>0018-9529</issn><eissn>1558-1721</eissn><coden>IERQAD</coden><abstract>Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in critical infrastructure protection. Today's supply systems tend to be organized in a decentralized manner, with different components belonging to different entities, keeping much information private. Therefore, a protection plan must balance its benefits among these entities for universal agreement to be reached. This paper addresses the issue of decentralized supply chain fortification by proposing the R-Interdiction Median problem with Fortification for Decentralized supply systems (D-RIMF). In the D-RIMF, each demand node is private and is a client of a certain facility; each facility evaluates its potential worst-case reduction in accessibility, measured as the increase in service provision costs considering only its own clients, and the objective is to minimize the largest evaluation values. To model the D-RIMF, we introduce a bilevel multiagent framework, in which all facilities and the defender are considered as independent agents. To solve the D-RIMF, both heuristic and optimal algorithms are designed to satisfy different requirements. Finally, the usefulness of the D-RIMF and the performances of the proposed algorithms are observed through simulations performed on typical datasets.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TR.2017.2761827</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0001-7414-8057</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0018-9529
ispartof IEEE transactions on reliability, 2018-03, Vol.67 (1), p.381-400
issn 0018-9529
1558-1721
language eng
recordid cdi_ieee_primary_8114274
source IEEE Electronic Library (IEL)
subjects Accessibility
Algorithms
Analytical models
bi-level programming models
Computer simulation
Critical infrastructure protection (CIP)
decentralized
fortification models
Heuristic algorithms
location analyses
Multiagent systems
Robustness
Sabotage
Security
Solution strengthening
Supply chains
supply systems
system accessibility
title A Fortification Model for Decentralized Supply Systems and Its Solution Algorithms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T06%3A01%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Fortification%20Model%20for%20Decentralized%20Supply%20Systems%20and%20Its%20Solution%20Algorithms&rft.jtitle=IEEE%20transactions%20on%20reliability&rft.au=Zhang,%20Xiao-Yi&rft.date=2018-03&rft.volume=67&rft.issue=1&rft.spage=381&rft.epage=400&rft.pages=381-400&rft.issn=0018-9529&rft.eissn=1558-1721&rft.coden=IERQAD&rft_id=info:doi/10.1109/TR.2017.2761827&rft_dat=%3Cproquest_RIE%3E2010540469%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2010540469&rft_id=info:pmid/&rft_ieee_id=8114274&rfr_iscdi=true