Skip to main content
Log in

Location-coverage models for preventing attacks on interurban transportation networks

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

Interurban roads are constantly used by transient vehicles. In some places, however, network users are subject to attacks, resulting in assaults to drivers and cargo theft. In an attempt to solve this problem, a binary integer programming model is developed, whose objective is to maximize the expected vehicle coverage across the network. The model dynamically locates patrol units through a fixed time horizon, subject to movement and location constraints, considering a probability of not being able to attend to an attack, due to a distance factor. A chronological decomposition heuristic is developed, and achieves an optimality gap of less than 1 %, in less than 5 min. The problem is also solved by developing a geographical decomposition heuristic. To introduce a measure of equity, two sets of constraints are proposed. Three measures are considered: total vehicle coverage, inequity and network coverage. A trade-off between these three measures is observed and discussed. Finally, scalability of the model is explored, using decomposition in terms of patrolling units, until we obtain subproblems of equal size as the original instance. All of these features are applied to a case study in Northern Israel. In the last section, some adaptations and additions to the model that can be made in further research are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Notes

  1. Several connections (usually highways) between cities/towns in a given region of a country.

  2. As mentioned in Sect. 1, this work address the problem of prevention/deterrence rather than response to attacks. Also, attacks may occur once at a time, and not simultaneously.

  3. The reason for this assumption is that allowing more than one patrolling unit per location node/traveling segment would require to include combinatorial nonlinear terms in the objective function, which would make the model formulation (and hence its tractability) too complex (see Sect. 8 for a more elaborated explanation)

  4. Along with distance, traffic volume between the attack site and unit k may increase. As a way to consider this, we choose f such that \(\frac{df}{dx}<0\) and \(\frac{d^2f}{dx^2}>0\), for \(0\le x < H\), such as the function selected in the formulation.

  5. As the example consists in single road, the vehicle flow for each subsegment is the same (this implies every \(\lambda _{jlt}\) has the same value), and because the situation represents a given time period t, the flow is also considered homogeneous across a given road (and hence the \(\lambda _{jlt}\) term may be taken out of the integral).

  6. This fraction is calculated over \(T-2\), as we do not consider the first and last time period, because each unit is forced to be at their police station (starting point) at that time.

  7. Not considering the time periods \(t=1\) and \(t=T\), because unit k does not exerts any protection during those time periods.

  8. Time period \(t=1\) and \(t=T\) are not considered, because at those time periods there is no protection exerted from the units.

  9. This is because the location of every unit at the beginning of any subproblem must be physically consistent with the location at the end of the previous subproblem.

  10. This is guaranteed because of the use of dummy nodes.

  11. This results are based on this particular case study. On other instances, the result may differ from these.

  12. This results are based on this particular case study. On other instances, the result may be different from these.

  13. This would still imply an increase in solving times, but a significantly more acceptable time than not using this procedure, being the latter case even unsolvable in some cases

  14. This results are based on this particular case study. Results of applying this procedure in other instances may differ.

  15. Modifications in region size should be subject of further research, in order to evaluate more precisely the behavior of the scaled model in such situations.

References

  • Adler, N., Hakkert, A. S., Kornbluth, J., Raviv, T., & Sher, M. (2014a). Location-allocation models for traffic police patrol vehicles on an interurban network. Annals of Operations Research, 221(1), 9–31.

    Article  Google Scholar 

  • Adler, N., Hakkert, A. S., Raviv, T., & Sher, M. (2014b). The traffic police location and schedule assignment problem. Journal of Multi-Criteria Decision Analysis, 21(5–6), 315–333.

    Article  Google Scholar 

  • Anderson, B. (2007). Securing the supply chain-prevent cargo theft. Security, 44(5), 56–59.

    Google Scholar 

  • Badri, M. A., Mortagy, A. K., & Alsayed, C. A. (1998). A multi-objective model for locating fire stations. European Journal of Operational Research, 110(2), 243–260.

    Article  Google Scholar 

  • Barth, S., & White, M. (1998). Hazardous cargo. World, 11(11), 46–48.

    Google Scholar 

  • Bassett, M. H., Pekny, J. F., & Reklaitis, G. V. (1996). Decomposition techniques for the solution of large-scale scheduling problems. AIChE Journal, 42(12), 3373–3387.

    Article  Google Scholar 

  • Batta, R., Dolan, J. M., & Krishnamurthy, N. N. (1989). The maximal expected covering location problem: Revisited. Transportation Science, 23(4), 277–287.

    Article  Google Scholar 

  • Berman, O., & Krass, D. (2002). The generalized maximal covering location problem. Computers & Operations Research, 29(6), 563–581.

    Article  Google Scholar 

  • Brotcorne, L., Laporte, G., & Semet, F. (2003). Ambulance location and relocation models. European Journal of Operational Research, 147(3), 451–463.

    Article  Google Scholar 

  • Capar, I., Keskin, B. B., & Rubin, P. A. (2015). An improved formulation for the maximum coverage patrol routing problem. Computers & Operations Research, 59, 1–10.

    Article  Google Scholar 

  • Capar, I., & Kuby, M. (2012). An efficient formulation of the flow refueling location model for alternative-fuel stations. IIE Transactions, 44(8), 622–636.

    Article  Google Scholar 

  • Chapman, S., & White, J. (1974). Probabilistic formulations of emergency service facilities location problems. In ORSA/TIMS conference, San Juan, Puerto Rico.

  • Church, R., & ReVelle, C. (1974). The maximal covering location problem. Papers in Regional Science, 32(1), 101–118.

    Article  Google Scholar 

  • Cox, A., Prager, F., & Rose, A. (2011). Transportation security and the role of resilience: A foundation for operational metrics. Transport Policy, 18(2), 307–317.

    Article  Google Scholar 

  • Current, J., Min, H., & Schilling, D. (1990). Multiobjective analysis of facility location decisions. European Journal of Operational Research, 49(3), 295–307.

    Article  Google Scholar 

  • Current, J. R., Velle, C. R., & Cohon, J. L. (1985). The maximum covering/shortest path problem: A multiobjective network design and routing formulation. European Journal of Operational Research, 21(2), 189–199.

    Article  Google Scholar 

  • Curtin, K. M., Hayslett-McCall, K., & Qiu, F. (2010). Determining optimal police patrol areas with maximal covering and backup covering location models. Networks and Spatial Economics, 10(1), 125–145.

    Article  Google Scholar 

  • Curtin, K. M., Qiu, F., Hayslett-McCall, K., & Bray, T. M. (2005). Integrating GIS and maximal covering models to determine optimal police patrol areas. In F. Wang (Ed.), Geographic information systems and crime analysis (Chap. 13, pp. 214–235). Hershey: IDEA Group Publishing.

  • Daskin, M. S. (1983). A maximum expected covering location model: Formulation, properties and heuristic solution. Transportation Science, 17(1), 48–70.

    Article  Google Scholar 

  • Dijkstra, E. W. (1959). A note on two problems in connexion with graphs. Numerische Mathematik, 1(1), 269–271.

    Article  Google Scholar 

  • Ekwall, D. (2010). On analysing the official statistics for antagonistic threats against transports in EU: A supply chain risk perspective. Journal of Transportation Security, 3(4), 213–230.

    Article  Google Scholar 

  • Hodgson, M. J. (1990). A flow-capturing location-allocation model. Geographical Analysis, 22(3), 270–279.

    Article  Google Scholar 

  • International Road Transport Union. (2008). Attacks on drivers of international heavy goods vehicles. Technical report, 3, rue de Varembé B.P. 44 CH-1211 Geneva 20 Switzerland. http://www.iru.org/cms-filesystem-action?file=webnews2008/Attack

  • Kaza, S., Xu, J., Marshall, B., & Chen, H. (2009). Topological analysis of criminal activity networks: Enhancing transportation security. IEEE Transactions on Intelligent Transportation Systems, 10(1), 83–91.

    Article  Google Scholar 

  • Kelly, J. D. (2002). Chronological decomposition heuristic for scheduling: Divide and conquer method. AIChE Journal, 48(12), 2995–2999.

    Article  Google Scholar 

  • Keskin, B. B., Li, S. R., Steil, D., & Spiller, S. (2012). Analysis of an integrated maximum covering and patrol routing problem. Transportation Research Part E: Logistics and Transportation Review, 48(1), 215–232.

    Article  Google Scholar 

  • Kuby, M., & Lim, S. (2005). The flow-refueling location problem for alternative-fuel vehicles. Socio-Economic Planning Sciences, 39(2), 125–145.

    Article  Google Scholar 

  • Kuby, M., & Lim, S. (2007). Location of alternative-fuel stations using the flow-refueling location model and dispersion of candidate sites on arcs. Networks and Spatial Economics, 7(2), 129–152.

    Article  Google Scholar 

  • Marianov, V., & Revelle, C. (1994). The queuing probabilistic location set covering problem and some extensions. Socio-Economic Planning Sciences, 28(3), 167–178.

    Article  Google Scholar 

  • Marshall, B., Kaza, S., Xu, J., Atabakhsh, H., Petersen, T., Violette, C., & Chen, H. (2004). Cross-jurisdictional criminal activity networks to support border and transportation security. In The 7th international IEEE conference on intelligent transportation systems, 2004. Proceedings (pp. 100–105). IEEE.

  • Patel, D. J., Batta, R., & Nagi, R. (2005). Clustering sensors in wireless ad hoc networks operating in a threat environment. Operations Research, 53(3), 432–442.

    Article  Google Scholar 

  • Rajagopalan, H. K., Saydam, C., & Xiao, J. (2008). A multiperiod set covering location model for dynamic redeployment of ambulances. Computers & Operations Research, 35(3), 814–826.

    Article  Google Scholar 

  • Revelle, C., & Hogan, K. (1989). The maximum reliability location problem and \(\alpha \)-reliablep-center problem: Derivatives of the probabilistic location set covering problem. Annals of Operations Research, 18(1), 155–173.

    Article  Google Scholar 

  • ReVelle, C. S., & Eiselt, H. A. (2005). Location analysis: A synthesis and survey. European Journal of Operational Research, 165(1), 1–19.

    Article  Google Scholar 

  • Sahinidis, N., & Grossmann, I. E. (1991). Reformulation of multiperiod milp models for planning and scheduling of chemical processes. Computers & Chemical Engineering, 15(4), 255–272.

    Article  Google Scholar 

  • Secretariado Ejecutivo del Sistema Nacional de Seguridad Pública. (2015). Incidencia delictiva del fuero común 2014. Technical report, Gral. Mariano Escobedo 456, Anzures, Miguel Hidalgo, 11590 Ciudad de México, D.F., Mexico. http://www.secretariadoejecutivo.gob.mx/docs/pdfs/estadisticas.

  • Toregas, C., Swain, R., ReVelle, C., & Bergman, L. (1971). The location of emergency service facilities. Operations Research, 19(6), 1363–1373.

    Article  Google Scholar 

  • Vaa, T. (1997). Increased police enforcement: Effects on speed. Accident Analysis & Prevention, 29(3), 373–385.

    Article  Google Scholar 

  • Van den Engel, A., & Prummel, E. (2007). Organised theft of commercial vehicles and their loads in the european union. European Parliament. Directorate General Internal Policies of the Union. Policy Department Structural and Cohesion Policies. Transport and Tourism, Brussels.

  • Welch, T. F., & Mishra, S. (2013). A measure of equity for public transit connectivity. Journal of Transport Geography, 33, 29–41.

    Article  Google Scholar 

  • Wright, P. D., Liberatore, M. J., & Nydick, R. L. (2006). A survey of operations research models and applications in homeland security. Interfaces, 36(6), 514–529.

    Article  Google Scholar 

  • Yan, T., Gu, Y., He, T., & Stankovic, J. A. (2008). Design and optimization of distributed sensing coverage in wireless sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 7(3), 33.

    Article  Google Scholar 

  • Yoon, S. W., Velasquez, J. D., Partridge, B., & Nof, S. Y. (2008). Transportation security decision support system for emergency response: A training prototype. Decision Support Systems, 46(1), 139–148.

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the Associate Editor and anonymous referees for their comments on earlier versions of this paper. This proved to be of great help, specially for improving many explanations in this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajan Batta.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Auad, R., Batta, R. Location-coverage models for preventing attacks on interurban transportation networks. Ann Oper Res 258, 679–717 (2017). https://doi.org/10.1007/s10479-015-2087-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-015-2087-y

Keywords

Navigation