Skip to main content
Log in

A decomposable resource allocation model with generalized overarching protections

  • Original Research
  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

This paper considers a defensive resource allocation problem in which a defender protects a set of assets either individually or collectively using overarching protections. An overarching protection refers to an option that protects multiple assets at the same time, e.g., emergency response, border security and counter intelligence. Most of the defensive resource allocation models with overarching protections assume that there is only one option that protects all targets. However, this may not be realistic considering that, for example, emergency response investment may cover only a certain region. In this paper, we develop a new resource allocation model to accommodate generalized overarching protections against intentional attacks. The model also considers multiple natural disaster types. We show that the proposed optimization model is a convex optimization problem and therefore can be solved to optimality in polynomial time. Furthermore, the overall country-level resource allocation problem can be decomposed into smaller city-level subproblems, thus resulting in a more efficient algorithm. The numerical experiments demonstrate the performance of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Bier, V. M., Haphuriwat, N., Menoyo, J., Zimmerman, R., & Culpen, A. M. (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis: An International Journal, 28(3), 763–770.

    Article  Google Scholar 

  • Boyd, S., Boyd, S. P., & Vandenberghe, L. (2004) Convex optimization. Cambridge University Press, Ex. 5.32.

  • Brown, G., Carlyle, M., Salmerón, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530–544.

    Article  Google Scholar 

  • Fletcher, R., & Leyffer, S. (1994). Solving mixed integer nonlinear programs by outer approximation. Mathematical Programming, 66(1–3), 327–349.

    Article  Google Scholar 

  • Golalikhani, M., & Zhuang, J. (2011). Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis: An International Journal, 31(4), 533–547.

    Article  Google Scholar 

  • Hao, M., Jin, S., & Zhuang, J. (2009) Robustness of optimal defensive resource allocations in the face of less fully rational attacker. In IIE annual conference. Proceedings (p. 886). Institute of Industrial and Systems Engineers (IISE).

  • Haphuriwat, N., & Bier, V. M. (2011). Trade-offs between target hardening and overarching protection. European Journal of Operational Research, 213(1), 320–328.

    Article  Google Scholar 

  • Hausken, K. (2013). Combined series and parallel systems subject to individual versus overarching defense and attack. Asia-Pacific Journal of Operational Research, 30(02), 1250056.

    Article  Google Scholar 

  • Hausken, K. (2014). Individual versus overarching protection and attack of assets. Central European Journal of Operations Research, 22(1), 89–112.

    Article  Google Scholar 

  • Hausken, K. (2017). Special versus general protection and attack of parallel and series components. Reliability Engineering & System Safety, 165, 239–256.

    Article  Google Scholar 

  • Hausken, K. (2019). Special versus general protection and attack of two assets. Operations Research and Decisions, 29(4), 53–93.

    Article  Google Scholar 

  • Hausken, K., & Levitin, G. (2012). Review of systems defense and attack models. International Journal of Performability Engineering, 8(4), 355–366.

    Google Scholar 

  • Levitin, G., & Hausken, K. (2012). Individual versus overarching protection against strategic attacks. Journal of the Operational Research Society, 63(7), 969–981.

    Article  Google Scholar 

  • Levitin, G., Hausken, K., & Dai, Y. (2013). Individual vs. overarching protection for minimizing the expected damage caused by an attack. Reliability Engineering & System Safety, 119, 117–125.

    Article  Google Scholar 

  • Levitin, G., Hausken, K., & Dai, Y. (2014). Optimal defense with variable number of overarching and individual protections. Reliability Engineering & System Safety, 123, 81–90.

    Article  Google Scholar 

  • Peng, R., Guo, L., Levitin, G., Mo, H., & Wang, W. (2014). Maintenance versus individual and overarching protections for parallel systems. Quality Technology & Quantitative Management, 11(3), 353–362.

    Article  Google Scholar 

  • Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review, 101(3), 527–541.

    Article  Google Scholar 

  • Seaberg, D., Devine, L., & Zhuang, J. (2017). A review of game theory applications in natural disaster management research. Natural Hazards, 89(3), 1461–1483.

    Article  Google Scholar 

  • Wang, C., & Bier, V. M. (2011). Target-hardening decisions based on uncertain multiattribute terrorist utility. Decision Analysis, 8(4), 286–302.

    Article  Google Scholar 

  • Yolmeh, A., & Baykal-Gürsoy, M. (2019). Two-stage invest-defend game: Balancing strategic and operational decisions. Decision Analysis, 16(1), 46–66.

    Article  Google Scholar 

  • Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Melike Baykal-Gürsoy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This material is based upon work supported by the National Science Foundation (Grant No. 1901721) and the United States National Institute of Justice (Grant No. 2018-R2-CX-0011).

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yolmeh, A., Baykal-Gürsoy, M. & Bier, V. A decomposable resource allocation model with generalized overarching protections. Ann Oper Res 320, 493–507 (2023). https://doi.org/10.1007/s10479-022-05064-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-022-05064-w

Keywords

Navigation