Skip to main content

Advertisement

Log in

Modeling and mitigating the effects of supply chain disruption in a defender–attacker game

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

The outcomes of a defender–attacker game depend on the defender’s resources delivered through military supply chains. These are subject to disruptions from various sources, such as natural disasters, social disasters, and terrorism. The attacker and defender are at war; the defender needs resources to defeat the attacker, but those resources may not be available due to a supply chain disruption that occurs exogenously to the game. In this paper, we integrate a defender–attacker game with supply chain risk management, and study the defender’s optimal preparation strategy. We provide analytical solutions, conduct numerical analysis, and compare the combined strategy with other protection strategies. Our results indicate that: (a) the defender benefits in a defender–attacker game by utilizing supply chain risk management tools; and (b) the attacker’s best response resource allocation would not be deterred by capacity backup protection and/or inventory protection. The feature of this paper is that the defender, being the downstream user of the supply chain, is involved in a strategic contest against the attacker. This model is different than game theory applied to private-sector supply chains because most game theoretic models of private sector supply chains usually explore relationships between suppliers and firms in the same supply chain or between multiple firms competing in the marketplace for customers. Therefore, supply chain risk management for such a military application imposes effects that have not been studied before.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. We acknowledge that resource means all kinds of supplies that would be used to defend/attack against the other adversary; e.g., weapons or armaments.

  2. The peace time \((x)\) means time with no disruption or outage.

References

  • Bier, V. M., & Haphuriwat, N. (2011). Analytical method to identify the number of containers to inspect at us ports to deter terrorist attacks. Annals of Operations Research, 187(1), 137–158.

    Article  Google Scholar 

  • Bier, V. M., Nagaraj, A., & Abhichandani, V. (2005). Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety, 87(3), 315–323.

    Article  Google Scholar 

  • Chopra, S., Reinhardt, G., & Mohan, U. (2007). The importance of decoupling recurrent and disruption risks in a supply chain. Naval Research Logistics, 54(5), 544–555.

    Article  Google Scholar 

  • Chopra, S., & Sodhi, M. S. (2004). Managing risk to avoid supply-chain breakdown. MIT Sloan Management Review, 46(1), 53–61.

    Google Scholar 

  • Christopher, M., & Lee, H. (2004). Mitigating supply chain risk through improved confidence. International Journal of Physical Distribution and Logistics Management, 34(5), 388–396.

    Article  Google Scholar 

  • Christopher, M., & Peck, H. (2004). Building the resilient supply chain. International Journal of Logistics Management, 15(2), 1–13.

    Article  Google Scholar 

  • Dutta, P. K. (1999). Strategies and games: Theory and practice. Cambridge, MA: MIT Press.

    Google Scholar 

  • Hopp, J. W., Liu, M., & Liu, Z. (2010). Protecting supply chain networks against catastrophic failures. Working paper, Department of Operations and Information Management, Wisconsin School of Business, University of Wisconsin-Madison.

  • Insua, D. R., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), 841–854.

    Article  Google Scholar 

  • Jin, S., Liu, Z., & Zhuang, J. (2010). Monte carlo simulation-based supply chain disruption management for wargames. In Proceedings of the 2010 winter simulation conference (pp. 2682–2693).

  • Jose, V. R. R., & Zhuang, J. (2013). Technology adoption, accumulation, and competition in multi-period attacker–defender games. Military Operations Research, 18(2), 33–47.

    Article  Google Scholar 

  • Kane, T. M. (2001). Military logistics and strategic performance (Vol. 1). Taylor: Psychology Press.

    Google Scholar 

  • Kress, M. (2012). Modeling armed conflicts. Science, 336(6083), 865–869.

    Article  Google Scholar 

  • Mas-Colell, A., Whinston, M. D., & Green, J. R. (1995). Microeconomic theory. New York, NY: Oxford University Press.

    Google Scholar 

  • National Public Radio. (2011). Among the costs of war: Billions a year in A.C.? http://www.npr.org/2011/06/25/137414737/among-the-costs-of-war-20b-in-air-conditioning/. Accessed in January, 2015.

  • Paul, J. A., & Hariharan, G. (2012). Location-allocation planning of stockpiles for effective disaster mitigation. Annals of Operations Research, 196(1), 469–490.

    Article  Google Scholar 

  • Sandler, T., & Siqueira, K. (2006). Global terrorism: Deterrence versus pre-emption. Canadian Journal of Economics, 39(4), 1370–1387.

    Article  Google Scholar 

  • Shan, X., & Zhuang, J. (2013a). Cost of equity in homeland security resource allocation in the face of a strategic attacker. Risk Analysis, 33(6), 1083–1099.

    Article  Google Scholar 

  • Shan, X., & Zhuang, J. (2013b). Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game. European Journal of Operational Research, 228(1), 262–272.

    Article  Google Scholar 

  • Simon, S. J. (2001). The art of military logistics. Communications of the ACM, 44(6), 62–66.

    Article  Google Scholar 

  • Skaperdas, S. (1996). Contest success functions. Economic Theory, 7(2), 283–290.

    Article  Google Scholar 

  • von Clausewitz, C. (2004). On war. Boston: Digireads.com Publishing.

    Google Scholar 

  • Wang, X., & Zhuang, J. (2011). Balancing congestion and security in the presence of strategic applicants with private information. European Journal of Operational Research, 212(1), 100–111.

    Article  Google Scholar 

  • Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters—Defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.

    Article  Google Scholar 

  • Zhuang, J., Saxton, G. D., & Wu, H. (2014). Publicity vs. impact in nonprofit disclosures and donor preferences: A sequential game with one nonprofit organization and N donors. Annals of Operations Research, 221(1), 469–491.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Zhuang.

Additional information

This research was partially supported by the United States Department of Homeland Security (DHS) through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under Award Number 2010-ST-061-RE0001. This research was also partially supported by the United States National Science Foundation under Award Numbers 1200899 and 1334930. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the DHS, CREATE, or NSF. We thank guest editors Drs. Katherine Daniell, Alec Morton, and David Rios Insua and two anonymous referees for their helpful comments.

Appendices

Appendices

In this section, we provide proofs for different protection strategies, including capacity backup protection, inventory protection, and combined protection, as well as dominated cases (Proposition 1).

1.1 Appendix 1: Proof of best response function for different protections

From the attacker’s utility function (Eq. 11), since the attacker’s resource allocation \(R\) is a continuous variable, we could calculate the optimum of \(R\) as a function of the defender’s resource allocation, \(r\), decision on using capacity backup, \(k\), and on using inventory, \(I\). In particular, if \(R\ge 0\), the first derivative should be zero:

$$\begin{aligned} \begin{aligned} \frac{dE[u_T]}{dR}&= \left( \frac{V(r+R)-RV}{(r+R)^2}-\gamma _T\right) \left[ E[X]+\int _l\int _d \min \left\{ \frac{I}{r},(1-k)l+kd\right\} f_D(d)f_L(l)\hbox {d}d\hbox {d}l\right. \\&\left. \quad +\,k(E[L]-E[D])\right] -\gamma _T\int _l\int _d \left[ (1-k)l+kd-\frac{I}{r}\right] ^{+}f_D(d)f_L(l)\hbox {d}d\hbox {d}l = 0\\ \end{aligned} \end{aligned}$$

We solve this equation and get:

$$\begin{aligned}&\hat{R}(r, k, I)\nonumber \\&\quad = {\left\{ \begin{array}{ll} G_{k,I}, &{}\hbox {if}\, r<\frac{V\cdot \left[ E[X]+k(E[L]-E[d])+\int _l\int _d\min \left\{ \frac{I}{r},(1-k)l+kd\right\} f_D(d)f_L(l)\hbox {d}d\hbox {d}l\right] }{\gamma _T\left[ E[X]+k(E[L]-E[d])+\int _l\int _d\min \left\{ \frac{I}{r},(1-k)l+kd\right\} f_D(d)f_L(l)\hbox {d}d\hbox {d}l+\int _l\int _d\left[ kd+(1-k)l-\frac{I}{r}\right] ^{+}f_D(d)f_L(l)\hbox {d}d\hbox {d}l\right] }\\ 0, &{}\hbox {if}\, r\ge \frac{V\cdot \left[ E[X]+k(E[L]-E[d])+\int _l\int _d\min \left\{ \frac{I}{r},(1-k)l+kd\right\} f_D(d)f_L(l)\hbox {d}d\hbox {d}l\right] }{\gamma _T\left[ E[X]+k(E[L]-E[d])+\int _l\int _d\min \left\{ \frac{I}{r},(1-k)l+kd\right\} f_D(d)f_L(l)\hbox {d}d\hbox {d}l+\int _l\int _d\left[ kd+(1-k)l-\frac{I}{r}\right] ^{+}f_D(d)f_L(l)\hbox {d}d\hbox {d}l\right] } \end{array}\right. } \end{aligned}$$

where \(G_{k,I}=\sqrt{\frac{V\cdot r\cdot \left[ E[X]+k(E[L]-E[d])+\int _l\int _d\min \left\{ \frac{I}{r},(1-k)l+kd\right\} f_D(d)f_L(l)\hbox {d}d\hbox {d}l\right] }{\gamma _T\left[ E[X]+k(E[L]-E[d])+\int _l\int _d\min \left\{ \frac{I}{r},(1-k)l+kd\right\} f_D(d)f_L(l)\hbox {d}d\hbox {d}l+\int _l\int _d\left[ kd+(1-k)l-\frac{I}{r}\right] ^{+}f_D(d)f_L(l)\hbox {d}d\hbox {d}l\right] }}-r.\)

The second order condition is satisfied, since

$$\begin{aligned}&\frac{d^2E[u_T]}{d^2R}\\&\quad =-\frac{2Vr\left[ E[X]+k(E[L]-E[d])+\int _l\int _d \min \left\{ \frac{I}{r},(1-k)l+kd\right\} f_D(d)f_L(l)\hbox {d}d\hbox {d}l\right] }{(r+R)^3}\le 0. \end{aligned}$$

Best response functions for no protection in Eq. (3), capacity backup protection in Eq. (6), and inventory protection in Eq. (9) are special cases of best response functions for combined protection in Eq. (12) when \(I=k=0\), \(I=0\), and \(k=0\), respectively. Please see above for the proof.

1.2 Appendix 2: Proof of dominated cases as shown in Table 3

There are four cases as shown in the following:

  1. 1.

    When \(k=1\) and \(r=0\), from Eq. (10), the payoff function of the defender becomes:

    $$\begin{aligned} \max _{k=1, r=0, I\ge 0} E[u_G(k,r,R,I)] =-\left[ h\cdot I\cdot \int _{x} x\cdot f_X(x)\hbox {d}x+h\cdot \int _{l} \left[ I-rl\right] ^{+}f_L(l)\hbox {d}l\right] \end{aligned}$$

    When \(I=0\), \(E[u_G(k,r,R,I)]\) reaches a maximum at \(0\) due to the first derivative \(\frac{dE[u_G]}{dI}\le 0\). So, for the defender, case #4 is dominated by cases #6 and #8. Similarly, for the defender, case #7 is dominated by cases #6 and #8.

  2. 2.

    When \(k=1\) and \(r=0\), from Eq. (11), the payoff function of the attacker becomes:

    $$\begin{aligned} \max _{R\ge 0} E[u_T(k,r,R,I)]&= \left( V-\gamma _{T} R\right) \left( \int _x\int _l\int _d\left( x+min\left\{ \frac{I}{r},(1-k)l+kd\right\} +k(l-d)\right) \right. \\&\left. \times \,f_X(x)f_L(l)f_D(d)\hbox {d}d\hbox {d}l\hbox {d}x\right. \nonumber \\&\left. + \int _l\int _d \left[ kd+(1-k)l-\frac{I}{r}\right] ^{+} f_L(l)f_D(d)\hbox {d}d\hbox {d}l\right) \end{aligned}$$

    When \(R=0\), \(E[u_T(k,r,R,I)]\) reaches a maximum at \(V\cdot \left( \int _{x}x\cdot f_{X}(x)\hbox {d}x +\int _l l\cdot f_L(l)\hbox {d}l\right) \) due to the first derivative \(\frac{dE[u_T]}{dR}\le 0\). Therefore, for the attacker, case #6 is dominated by cases #7 and #8.

  3. 3.

    When \(k=0\) and \(r=0\), Eq. (10) implies:

    $$\begin{aligned} \max _{k=0, r=0, I\ge 0} E[u_G(k,r,R,I)] =-\left[ h\cdot I\cdot \int _{x} x\cdot f_X(x)\hbox {d}x+h\cdot \int _{l}\int _{z=0}^{l} \left[ I-rz\right] ^{+}f_L(l)\mathrm{d}z\hbox {d}l\right] \end{aligned}$$

    When \(I=0\), \(E[u_G(k,r,R,I)]\) reaches a maximum at \(0\) due to the first derivative \(\frac{dE[u_G]}{dI}\le 0\). So, for the defender, case #12 is dominated by cases #15 and #16. Similarly, case #15 is dominated by cases #14 and #16.

  4. 4.

    When \(k=0\) and \(r=0\), from Eq. (11), the payoff function of the attacker becomes:

    $$\begin{aligned}&\max _{R\ge 0} E[u_T(r,R,I)]\\&\quad = \left( V-\gamma _{T}\cdot R\right) \cdot \left[ \int _x\int _l\left( x+min\left\{ \frac{I}{r},l\right\} \right) f_X(x)f_L(l)\hbox {d}l\hbox {d}x + \int _l \left[ l-\frac{I}{r}\right] ^{+}f_L(l)\hbox {d}l \right] \end{aligned}$$

    When \(R=0,\, E[u_T(r,R,I)]\) reaches a maximum at \(\left[ \int _x\int _l\left( x+min\left\{ \frac{I}{r},l\right\} \right) f_X(x)f_L(l)\right. \) \(\left. \hbox {d}l\hbox {d}x\right. \left. + \int _l \left[ l-\frac{I}{r}\right] ^{+}f_L(l)\hbox {d}l \right] \cdot V\) due to the first derivative \(\frac{dE[u_T]}{dR}\le 0\). Therefore, for the attacker, case #14 is dominated by cases #15 and #16.

    In summary, there are nine possible cases: #1, #2, #3, #5, #9, #10, #11, #13 and #16, as shown in Table 3.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, J., Zhuang, J. & Liu, Z. Modeling and mitigating the effects of supply chain disruption in a defender–attacker game. Ann Oper Res 236, 255–270 (2016). https://doi.org/10.1007/s10479-015-1810-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-015-1810-z

Keywords

Navigation