IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v266y2018i3p920-933.html
   My bibliography  Save this article

Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information

Author

Listed:
  • Jiang, J.
  • Liu, X.

Abstract

Water supply networks are infrastructures pivotal to economic development and living standards, of which the increasing complexity and interdependencies have brought challenges for the protection and enhancement of water supplies. We address the problem on how to defend water supply networks with hydraulic characteristics against an interdictor by building a multi-objective Stackelberg game model with incomplete information. In this model, the defender and the interdictor, both considered as rational players, choose a subset of network components to defend or interdict based on their payoffs. The defender, with incomplete information on the interdictor's efforts, initiates to trade off the two objectives of maximizing the expected network satisfaction rate and of minimizing defense efforts, whereas the interdictor, with no information on network operational capacity, follows to trade off the objectives of minimizing the expected network efficiency and of minimizing interdiction efforts. The algorithm of determining the final optimal defense strategies is presented, which consists of three steps: (1) develop the strategy sets by the assessments of network vulnerability and resilience; (2) analyze the equilibrium through a nested heuristic genetic algorithm; and (3) determine the final optimal defense strategy based on the minimax regret approach. A case study of D-town water supply network demonstrates the practical significance of the proposed approach. Furthermore, the impacts of the incomplete information are analyzed to provide suggestions on the defense strategy making.

Suggested Citation

  • Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
  • Handle: RePEc:eee:ejores:v:266:y:2018:i:3:p:920-933
    DOI: 10.1016/j.ejor.2017.10.034
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221717309475
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2017.10.034?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Jin, Jian Gang & Lu, Linjun & Sun, Lijun & Yin, Jingbo, 2015. "Optimal allocation of protective resources in urban rail transit networks against intentional attacks," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 84(C), pages 73-87.
    2. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    3. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    4. Mohd Abdy Sayyed & Rajesh Gupta & Tiku Tanyimboh, 2015. "Noniterative Application of EPANET for Pressure Dependent Modelling Of Water Distribution Systems," Water Resources Management: An International Journal, Published for the European Water Resources Association (EWRA), Springer;European Water Resources Association (EWRA), vol. 29(9), pages 3227-3242, July.
    5. Rocco S., Claudio M. & Emmanuel Ramirez-Marquez, José & Salazar A., Daniel E., 2010. "Bi and tri-objective optimization in the deterministic network interdiction problem," Reliability Engineering and System Safety, Elsevier, vol. 95(8), pages 887-896.
    6. Stergios Skaperdas, 1996. "Contest success functions (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
    7. Zhao, S. & Liu, X. & Zhuo, Y., 2017. "Hybrid Hidden Markov Models for resilience metrics in a dynamic infrastructure system," Reliability Engineering and System Safety, Elsevier, vol. 164(C), pages 84-97.
    8. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    9. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    10. Jack Hirshleifer, 1989. "Conflict and rent-seeking success functions: Ratio vs. difference models of relative success," Public Choice, Springer, vol. 63(2), pages 101-112, November.
    11. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    12. Zhang, C. & Liu, X. & Jiang, YP. & Fan, B. & Song, X., 2016. "A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis," European Journal of Operational Research, Elsevier, vol. 250(3), pages 855-864.
    13. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    14. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    15. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    16. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    17. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    18. Losada, Chaya & Scaparra, M. Paola & O’Hanley, Jesse R., 2012. "Optimizing system resilience: A facility protection model with recovery time," European Journal of Operational Research, Elsevier, vol. 217(3), pages 519-530.
    19. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Yun Chen & Zhigen Hu & Quan Liu & Shu Chen, 2020. "Evolutionary Game Analysis of Tripartite Cooperation Strategy under Mixed Development Environment of Cascade Hydropower Stations," Water Resources Management: An International Journal, Published for the European Water Resources Association (EWRA), Springer;European Water Resources Association (EWRA), vol. 34(6), pages 1951-1970, April.
    2. Jalali, Sajjad & Seifbarghy, Mehdi & Niaki, Seyed Taghi Akhavan, 2018. "A risk-averse location-protection problem under intentional facility disruptions: A modified hybrid decomposition algorithm," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 114(C), pages 196-219.
    3. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    4. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    5. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    6. Casorrán, Carlos & Fortz, Bernard & Labbé, Martine & Ordóñez, Fernando, 2019. "A study of general and security Stackelberg game formulations," European Journal of Operational Research, Elsevier, vol. 278(3), pages 855-868.
    7. Bhuiyan, Tanveer Hossain & Medal, Hugh R. & Nandi, Apurba K. & Halappanavar, Mahantesh, 2021. "Risk-averse bi-level stochastic network interdiction model for cyber-security risk management," International Journal of Critical Infrastructure Protection, Elsevier, vol. 32(C).
    8. Ali Zarei & Sayed-Farhad Mousavi & Madjid Eshaghi Gordji & Hojat Karami, 2019. "Optimal Reservoir Operation Using Bat and Particle Swarm Algorithm and Game Theory Based on Optimal Water Allocation among Consumers," Water Resources Management: An International Journal, Published for the European Water Resources Association (EWRA), Springer;European Water Resources Association (EWRA), vol. 33(9), pages 3071-3093, July.
    9. Li, Yulong & Lin, Jie & Zhang, Chi & Zhu, Huaxing & Zeng, Saixing & Sun, Chengshaung, 2022. "Joint optimization of structure and protection of interdependent infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    10. Richárd Kicsiny & Zoltán Varga, 2023. "New algorithm for checking Pareto optimality in bimatrix games," Annals of Operations Research, Springer, vol. 320(1), pages 235-259, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    2. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    3. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    4. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    5. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    6. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    7. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    8. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    9. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    10. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    11. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    12. Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
    13. Leitner, Markus & Ljubić, Ivana & Monaci, Michele & Sinnl, Markus & Tanınmış, Kübra, 2023. "An exact method for binary fortification games," European Journal of Operational Research, Elsevier, vol. 307(3), pages 1026-1039.
    14. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    15. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    16. Smith, J. Cole & Song, Yongjia, 2020. "A survey of network interdiction models and algorithms," European Journal of Operational Research, Elsevier, vol. 283(3), pages 797-811.
    17. Sarhadi, Hassan & Tulett, David M. & Verma, Manish, 2017. "An analytical approach to the protection planning of a rail intermodal terminal network," European Journal of Operational Research, Elsevier, vol. 257(2), pages 511-525.
    18. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    19. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    20. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:266:y:2018:i:3:p:920-933. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.