主管:中国科学院
主办:中国优选法统筹法与经济数学研究会
   中国科学院科技战略咨询研究院

Chinese Journal of Management Science ›› 2020, Vol. 28 ›› Issue (9): 188-198.doi: 10.16381/j.cnki.issn1003-207x.2020.09.019

• Articles • Previous Articles     Next Articles

Interdiction Network Design for Preventing Terrorist Invasion with Asymmetric Information

XIANG Yin   

  1. School of Business, University of Science and Technology of Suzhou, Suzhou 215009, China
  • Received:2018-01-26 Revised:2018-08-28 Online:2020-09-20 Published:2020-09-25

Abstract: Since September 11 and a series of terrorist attacks, terror has become a major threat in the world. In order to prevent the terrorists abroad from invading into our country and mitigate the attack risk, the government can design an effective interdiction network in the border area.
A counter-terrorism interdiction network design problem is considered which is in essence a security resources allocation problem in a fixed transportation network. This problem consists of two decision stages: the first decision stage belongs to the government who decides the optimal allocation of both "unconcealed" and "concealed" security resource in part of roads. Here the "unconcealed" resource is like security checkpoints that can be observed, while the "concealed" resource can be sensors which can't be observed directly. Both type of security resource can be used for reducing terrorist's passing probability on the fortified road. The second stage refers to the terrorist. After only observing the "unconcealed" resource, the terrorist decides the best attack target and intrusion path to maximize her perceived attack risk. Thus, the government's optimization problem is how to allocate both type of security resource in the network, such that the attack risk can be mitigate the most.
According to the decision order, above problem is addressed as a bi-level programming model. The upper level problem is associated to the resource allocation problem of the government, and the lower level problem refers to terrorist's target choosing and intrusion path optimization. In order to solve this model, a hybrid algorithm is proposed, where an improved genetic algorithm is used in the upper level problem for enumerating and updating interdict plans, and the an exact algorithm is designed for solving the lower level problem when the interdict plans are fixed.
Our model is finally applied in a case study of Kashi area. The numerical results show that: (i) the hybrid algorithm can always find good quality solutions in a very short time. (ii) As both types of resources are allocated ingenious enough, the "unconcealed" interdicts always function in the road chosen by terrorists, which greatly reduces the attack risk. (iii) the "concealed" resource is more effective in mitigating attack risk than the "unconcealed" resource.

Key words: counter-terrorism, interdiction network design, bi-level programming, improved genetic algorithm

CLC Number: