IDEAS home Printed from https://ideas.repec.org/a/wly/navres/v58y2011i3p223-235.html
   My bibliography  Save this article

A defender‐attacker optimization of Port Radar surveillance

Author

Listed:
  • Gerald Brown
  • Matthew Carlyle
  • Ahmad Abdul‐Ghaffar
  • Jeffrey Kline

Abstract

The U.S. Coast Guard, Customs and Border Patrol, Marine Corps, and Navy have deployed several hundred port patrol vessels to protect waterways, U.S. Navy ships and other high‐value assets in ports world‐wide. Each vessel has an armed crew of four, is relatively fast, and features a surface search radar, radios, and a machine gun. These vessels coordinate surveillance patrols in groups of two or four. We developed a mathematical model for advantageously positioning these vessels, and possibly shore‐based radar too, to minimize the probability that an intelligent adversary in one or more speedboats will evade detection while mounting an attack. Attackers can use elevated obstructions to evade radar detection in their attack paths, and ports feature many such restrictions to navigation and observation. A key, but realistic assumption complicates planning: the attackers will be aware of defensive positions and capabilities in advance of mounting their attack. The defender‐attacker optimization suggests plans here for a fictitious port, the port of Hong Kong, and the U.S. Navy Fifth Fleet Headquarters in Bahrain. In these cases, the defender can almost certainly detect any attack, even though the attacker, observing defender prepositioning, plans clever, and evasive attack tracks. Published 2011 Wiley Periodicals, Inc.† Naval Research Logistics, 2011

Suggested Citation

  • Gerald Brown & Matthew Carlyle & Ahmad Abdul‐Ghaffar & Jeffrey Kline, 2011. "A defender‐attacker optimization of Port Radar surveillance," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(3), pages 223-235, April.
  • Handle: RePEc:wly:navres:v:58:y:2011:i:3:p:223-235
    DOI: 10.1002/nav.20423
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/nav.20423
    Download Restriction: no

    File URL: https://libkey.io/10.1002/nav.20423?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    2. Mustafa Abdallah & Parinaz Naghizadeh & Ashish R. Hota & Timothy Cason & Saurabh Bagchi & Shreyas Sundaram, 2020. "Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs," Papers 2001.03213, arXiv.org, revised May 2020.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    2. Chan Y. Han & Brian J. Lunday & Matthew J. Robbins, 2016. "A Game Theoretic Model for the Optimal Location of Integrated Air Defense System Missile Batteries," INFORMS Journal on Computing, INFORMS, vol. 28(3), pages 405-416, August.
    3. David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
    4. Alexander Shiroky & Andrey Kalashnikov, 2021. "Mathematical Problems of Managing the Risks of Complex Systems under Targeted Attacks with Known Structures," Mathematics, MDPI, vol. 9(19), pages 1-11, October.
    5. Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017. "Optimal design and defense of networks under link attacks," Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
    6. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    7. Laan, Corine M. & van der Mijden, Tom & Barros, Ana Isabel & Boucherie, Richard J. & Monsuur, Herman, 2017. "An interdiction game on a queueing network with multiple intruders," European Journal of Operational Research, Elsevier, vol. 260(3), pages 1069-1080.
    8. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    9. Yi‐Ping Fang & Giovanni Sansavini & Enrico Zio, 2019. "An Optimization‐Based Framework for the Identification of Vulnerabilities in Electric Power Grids Exposed to Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1949-1969, September.
    10. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    11. Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
    12. Nguyen, Di H. & Smith, J. Cole, 2022. "Network interdiction with asymmetric cost uncertainty," European Journal of Operational Research, Elsevier, vol. 297(1), pages 239-251.
    13. Ghaneshvar Ramineni & Nafiseh Ghorbani-Renani & Kash Barker & Andrés D. González & Talayeh Razzaghi & Sridhar Radhakrishnan, 2023. "Machine learning approaches to modeling interdependent network restoration time," Environment Systems and Decisions, Springer, vol. 43(1), pages 22-35, March.
    14. Zhang, Laobing & Reniers, Genserik & Qiu, Xiaogang, 2019. "Playing chemical plant protection game with distribution-free uncertainties," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    15. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    16. Juan S. Borrero & Oleg A. Prokopyev & Denis Sauré, 2019. "Sequential Interdiction with Incomplete Information and Learning," Operations Research, INFORMS, vol. 67(1), pages 72-89, January.
    17. Losada, Chaya & Scaparra, M. Paola & O’Hanley, Jesse R., 2012. "Optimizing system resilience: A facility protection model with recovery time," European Journal of Operational Research, Elsevier, vol. 217(3), pages 519-530.
    18. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    19. Chaya Losada & M. Scaparra & Richard Church & Mark Daskin, 2012. "The stochastic interdiction median problem with disruption intensity levels," Annals of Operations Research, Springer, vol. 201(1), pages 345-365, December.
    20. Zio, E. & Golea, L.R., 2012. "Analyzing the topological, electrical and reliability characteristics of a power transmission system for identifying its critical elements," Reliability Engineering and System Safety, Elsevier, vol. 101(C), pages 67-74.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:navres:v:58:y:2011:i:3:p:223-235. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1520-6750 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.