Abstract
This paper considers a defensive resource allocation problem in which a defender protects a set of assets either individually or collectively using overarching protections. An overarching protection refers to an option that protects multiple assets at the same time, e.g., emergency response, border security and counter intelligence. Most of the defensive resource allocation models with overarching protections assume that there is only one option that protects all targets. However, this may not be realistic considering that, for example, emergency response investment may cover only a certain region. In this paper, we develop a new resource allocation model to accommodate generalized overarching protections against intentional attacks. The model also considers multiple natural disaster types. We show that the proposed optimization model is a convex optimization problem and therefore can be solved to optimality in polynomial time. Furthermore, the overall country-level resource allocation problem can be decomposed into smaller city-level subproblems, thus resulting in a more efficient algorithm. The numerical experiments demonstrate the performance of the proposed approach.
Similar content being viewed by others
References
Bier, V. M., Haphuriwat, N., Menoyo, J., Zimmerman, R., & Culpen, A. M. (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis: An International Journal, 28(3), 763–770.
Boyd, S., Boyd, S. P., & Vandenberghe, L. (2004) Convex optimization. Cambridge University Press, Ex. 5.32.
Brown, G., Carlyle, M., Salmerón, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530–544.
Fletcher, R., & Leyffer, S. (1994). Solving mixed integer nonlinear programs by outer approximation. Mathematical Programming, 66(1–3), 327–349.
Golalikhani, M., & Zhuang, J. (2011). Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis: An International Journal, 31(4), 533–547.
Hao, M., Jin, S., & Zhuang, J. (2009) Robustness of optimal defensive resource allocations in the face of less fully rational attacker. In IIE annual conference. Proceedings (p. 886). Institute of Industrial and Systems Engineers (IISE).
Haphuriwat, N., & Bier, V. M. (2011). Trade-offs between target hardening and overarching protection. European Journal of Operational Research, 213(1), 320–328.
Hausken, K. (2013). Combined series and parallel systems subject to individual versus overarching defense and attack. Asia-Pacific Journal of Operational Research, 30(02), 1250056.
Hausken, K. (2014). Individual versus overarching protection and attack of assets. Central European Journal of Operations Research, 22(1), 89–112.
Hausken, K. (2017). Special versus general protection and attack of parallel and series components. Reliability Engineering & System Safety, 165, 239–256.
Hausken, K. (2019). Special versus general protection and attack of two assets. Operations Research and Decisions, 29(4), 53–93.
Hausken, K., & Levitin, G. (2012). Review of systems defense and attack models. International Journal of Performability Engineering, 8(4), 355–366.
Levitin, G., & Hausken, K. (2012). Individual versus overarching protection against strategic attacks. Journal of the Operational Research Society, 63(7), 969–981.
Levitin, G., Hausken, K., & Dai, Y. (2013). Individual vs. overarching protection for minimizing the expected damage caused by an attack. Reliability Engineering & System Safety, 119, 117–125.
Levitin, G., Hausken, K., & Dai, Y. (2014). Optimal defense with variable number of overarching and individual protections. Reliability Engineering & System Safety, 123, 81–90.
Peng, R., Guo, L., Levitin, G., Mo, H., & Wang, W. (2014). Maintenance versus individual and overarching protections for parallel systems. Quality Technology & Quantitative Management, 11(3), 353–362.
Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review, 101(3), 527–541.
Seaberg, D., Devine, L., & Zhuang, J. (2017). A review of game theory applications in natural disaster management research. Natural Hazards, 89(3), 1461–1483.
Wang, C., & Bier, V. M. (2011). Target-hardening decisions based on uncertain multiattribute terrorist utility. Decision Analysis, 8(4), 286–302.
Yolmeh, A., & Baykal-Gürsoy, M. (2019). Two-stage invest-defend game: Balancing strategic and operational decisions. Decision Analysis, 16(1), 46–66.
Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This material is based upon work supported by the National Science Foundation (Grant No. 1901721) and the United States National Institute of Justice (Grant No. 2018-R2-CX-0011).
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yolmeh, A., Baykal-Gürsoy, M. & Bier, V. A decomposable resource allocation model with generalized overarching protections. Ann Oper Res 320, 493–507 (2023). https://doi.org/10.1007/s10479-022-05064-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10479-022-05064-w