IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v257y2025ipbs0951832025000675.html
   My bibliography  Save this article

Optimal allocation of defensive resources in regional railway networks under intentional attacks

Author

Listed:
  • Hou, Benwei
  • Chen, Pengxu
  • Zhao, Xudong
  • Chen, Zhilong

Abstract

Railway network is one of the busiest regional transportation infrastructures, which is exposed to a high risk of intentional attacks. Given the railway network stations have a larger service area, attackers may have different biases toward the valuation of railway stations or lines. This paper proposes a method for optimally allocating defensive resources based on a Bayesian game model and a comprehensive importance evaluation model of stations by multi-layer network models, aiming to reduce the losses of defenders. The attack strategy was made according to the importance of railway stations evaluated by three-layer network models, namely topology layer, the ridership layer and the travel time layer, which depict the features of railway networks and also reflect the variety of attacker's biases. The optimal allocation of defensive resources was obtained under the Nash equilibrium of Bayesian game. The proposed method is implemented in a regional railway network in north China, and the case network's risk under various attack strategies were compared to validate the applicability of this model. The application results show that the optimal defensive resources allocation based on the importance evaluation by three-layer models has the lowest risk considering the variety in the attacker's biases.

Suggested Citation

  • Hou, Benwei & Chen, Pengxu & Zhao, Xudong & Chen, Zhilong, 2025. "Optimal allocation of defensive resources in regional railway networks under intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 257(PB).
  • Handle: RePEc:eee:reensy:v:257:y:2025:i:pb:s0951832025000675
    DOI: 10.1016/j.ress.2025.110864
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832025000675
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2025.110864?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to

    for a different version of it.

    References listed on IDEAS

    as
    1. Xueli Hu & Fujun Lai & Gufan Chen & Rongcheng Zou & Qingxiang Feng, 2019. "Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification," Sustainability, MDPI, vol. 11(5), pages 1-16, March.
    2. Wang, Nanxi & Wu, Min & Yuen, Kum Fai, 2023. "A novel method to assess urban multimodal transportation system resilience considering passenger demand and infrastructure supply," Reliability Engineering and System Safety, Elsevier, vol. 238(C).
    3. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    4. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
    5. Wang, Zhaojing & Jia, Limin & Ma, Xiaoping & Sun, Xuehui & Tang, Qianxue & Qian, Sina, 2022. "Accessibility-oriented performance evaluation of high-speed railways using a three-layer network model," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    6. Corman, Francesco & D’Ariano, Andrea & Marra, Alessio D. & Pacciarelli, Dario & Samà, Marcella, 2017. "Integrating train scheduling and delay management in real-time railway traffic control," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 105(C), pages 213-239.
    7. Sun, Daniel (Jian) & Guan, Shituo, 2016. "Measuring vulnerability of urban metro network from line operation perspective," Transportation Research Part A: Policy and Practice, Elsevier, vol. 94(C), pages 348-359.
    8. Xiao Feng & Shiwei He & Xuchao Chen & Guangye Li, 2021. "Mitigating the vulnerability of an air-high-speed railway transportation network: From the perspective of predisruption response," Journal of Risk and Reliability, , vol. 235(3), pages 474-490, June.
    9. Laobing Zhang & Genserik Reniers, 2016. "A Game‐Theoretical Model to Improve Process Plant Protection from Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 36(12), pages 2285-2297, December.
    10. Han, Lin & Zhao, Xudong & Chen, Zhilong & Gong, Huadong & Hou, Benwei, 2021. "Assessing resilience of urban lifeline networks to intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    11. Zhou, Jun & Zhu, Jiaxing & Liang, Guangchuan & Ma, Junjie & He, Jiayi & Du, Penghua & Ye, Zhanpeng, 2024. "Three-layer and robust planning models to evaluate the strategies of defense layer, attack layer, and operation layer for optimal protection in natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 249(C).
    12. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    13. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    14. Jamalzadeh, Saeed & Mettenbrink, Lily & Barker, Kash & González, Andrés D. & Radhakrishnan, Sridhar & Johansson, Jonas & Bessarabova, Elena, 2024. "Weaponized disinformation spread and its impact on multi-commodity critical infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
    15. Lu, Qing-Chang, 2018. "Modeling network resilience of rail transit under operational incidents," Transportation Research Part A: Policy and Practice, Elsevier, vol. 117(C), pages 227-237.
    16. Sun, Lishan & Huang, Yuchen & Chen, Yanyan & Yao, Liya, 2018. "Vulnerability assessment of urban rail transit based on multi-static weighted method in Beijing, China," Transportation Research Part A: Policy and Practice, Elsevier, vol. 108(C), pages 12-24.
    17. Alessandra Cornaro & Daniele Grechi, 2023. "Evaluation of Railway Systems: A Network Approach," Sustainability, MDPI, vol. 15(10), pages 1-19, May.
    18. Talebiyan, Hesam & Dueñas-Osorio, Leonardo, 2023. "Auctions for resource allocation and decentralized restoration of interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 237(C).
    19. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    20. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    21. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    22. B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.
    23. Shan, Xiaojun Gene & Zhuang, Jun, 2020. "A game-theoretic approach to modeling attacks and defenses of smart grids at three levels," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    24. Li, Tao & Rong, Lili, 2020. "A comprehensive method for the robustness assessment of high-speed rail network with operation data: A case in China," Transportation Research Part A: Policy and Practice, Elsevier, vol. 132(C), pages 666-681.
    25. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    26. White, Richard & Boult, Terrance & Chow, Edward, 2014. "A computational asset vulnerability model for the strategic protection of the critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(3), pages 167-177.
    27. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    28. Ilan Adler, 2013. "The equivalence of linear programs and zero-sum games," International Journal of Game Theory, Springer;Game Theory Society, vol. 42(1), pages 165-177, February.
    29. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    30. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
    31. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    2. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Han, Lin & Zhao, Xudong & Chen, Zhilong & Gong, Huadong & Hou, Benwei, 2021. "Assessing resilience of urban lifeline networks to intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    5. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    6. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    7. Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
    8. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    9. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    10. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    11. Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
    12. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    13. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    14. Li, Tao & Rong, Lili, 2020. "A comprehensive method for the robustness assessment of high-speed rail network with operation data: A case in China," Transportation Research Part A: Policy and Practice, Elsevier, vol. 132(C), pages 666-681.
    15. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    16. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    17. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    18. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    19. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    20. Zhang, Jianhua & Wang, Ziqi & Wang, Shuliang & Shao, Wenchao & Zhao, Xun & Liu, Weizhi, 2021. "Vulnerability assessments of weighted urban rail transit networks with integrated coupled map lattices," Reliability Engineering and System Safety, Elsevier, vol. 214(C).

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:257:y:2025:i:pb:s0951832025000675. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.