a game theory approach for the measurement of …cxiong/pubs/game_theory.pdfmeasure the performance...

17
1 *Corresponding Author. Email: [email protected] A Game Theory Approach for the Measurement of Transport Network Vulnerability from the System Prospective Wenxin Qiao a,* , Yang Lu b , Chenfeng Xiong c and Ali Haghani d a MOE Key Laboratory for Urban Transportation Complex Systems Theory and Technology, School of Traffic and Transportation, Beijing Jiaotong University, Beijing, China b Singapore-MIT Alliance for Research and Technology (SMART), Singapore cd Department of Civil and Environmental Engineering, University of Maryland, College Park, U.S.A. ABSTRACT Measuring the transport network vulnerability has become an important research issue recently. With the increase on the road user’s value of time, users are now not only concerned about taking the shortest route to save travel times, but also decrease the variances by choosing a route that is more reliable to arrive at the destination within acceptable time frame. Ensuring a reliable network and providing alternative options under network breakdowns are very important to reduce the network vulnerability. This paper proposed a computationally efficient approach to measure system-level network vulnerability through a game theory approach. The most vulnerable link is indicated by link failure probabilities and the overall vulnerability measure of the network is represented by the expected total travel time. The performances are compared and discussed through the numerical results from several reliability improvement strategies. Key words: game theory, vulnerability, network, system perspective Introduction Network reliability refers to the ability of the network to maintain an acceptable level of performance when network failure occurs. Improving the transport network reliability has been an extensively studied research problem. Great efforts had been involved to identify and measure the performance reliability of the transport network in the purpose of construct and maintain a robust, reliable network for the benefits of road users. With the rapid economic growth, the value of time of the trip makers has raised significantly. Road users are not only concerned about taking the shortest route to save the travel times, but also choosing a route that is more reliable to arrive at the destination within acceptable time frame. Ensuring a reliable network and providing alternative options under network breakdowns and disruptions are very important issues now. As road users are trying to save travel time and decrease the variability at the same time, the sources of the variances need to be identified first. Variances or uncertainties in the network may come from both demand and supply sides (Lam et al. 2008). The variances in supply side may come from various network disturbances such as accident, road work or adverse weather that result in capacity reduction. For the demand side, the variances may come from the variations in day-to-day travel demand or special events. Many networks are designed to offer alternative routes considering the risk of single or several components failures. Methodologies to identify the most vulnerable links, whose failure would cause the most damage to the network performance, would be very useful. The

Upload: others

Post on 16-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

1

*Corresponding Author. Email: [email protected]

A Game Theory Approach for the Measurement of Transport Network Vulnerability

from the System Prospective

Wenxin Qiaoa,*, Yang Lu b, Chenfeng Xiongc and Ali Haghanid

a MOE Key Laboratory for

Urban Transportation Complex Systems Theory and Technology,

School of Traffic and Transportation, Beijing Jiaotong University, Beijing, China bSingapore-MIT Alliance for Research and Technology (SMART), Singapore

cd Department of Civil and Environmental Engineering,

University of Maryland, College Park, U.S.A.

ABSTRACT

Measuring the transport network vulnerability has become an important research issue recently.

With the increase on the road user’s value of time, users are now not only concerned about

taking the shortest route to save travel times, but also decrease the variances by choosing a

route that is more reliable to arrive at the destination within acceptable time frame. Ensuring a

reliable network and providing alternative options under network breakdowns are very

important to reduce the network vulnerability. This paper proposed a computationally efficient

approach to measure system-level network vulnerability through a game theory approach. The

most vulnerable link is indicated by link failure probabilities and the overall vulnerability

measure of the network is represented by the expected total travel time. The performances are

compared and discussed through the numerical results from several reliability improvement

strategies.

Key words: game theory, vulnerability, network, system perspective

Introduction

Network reliability refers to the ability of the network to maintain an acceptable level of

performance when network failure occurs. Improving the transport network reliability has

been an extensively studied research problem. Great efforts had been involved to identify and

measure the performance reliability of the transport network in the purpose of construct and

maintain a robust, reliable network for the benefits of road users. With the rapid economic

growth, the value of time of the trip makers has raised significantly. Road users are not only

concerned about taking the shortest route to save the travel times, but also choosing a route

that is more reliable to arrive at the destination within acceptable time frame. Ensuring a

reliable network and providing alternative options under network breakdowns and disruptions

are very important issues now.

As road users are trying to save travel time and decrease the variability at the same time, the

sources of the variances need to be identified first. Variances or uncertainties in the network

may come from both demand and supply sides (Lam et al. 2008). The variances in supply

side may come from various network disturbances such as accident, road work or adverse

weather that result in capacity reduction. For the demand side, the variances may come from

the variations in day-to-day travel demand or special events.

Many networks are designed to offer alternative routes considering the risk of single or

several components failures. Methodologies to identify the most vulnerable links, whose

failure would cause the most damage to the network performance, would be very useful. The

Page 2: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

2

network is robust if the links with a large potential impact on the network have low

probability of failure.

Game theory was introduced to provide mathematical background for the analysis of

interactive processes for decision making (Neumann and Morgenstern, 1944). Applications of

game theory to transportation systems have addressed a variety of problems including:

network design, pricing and reliability evaluation, competition between transport modes,

dynamic traffic assignment on urban networks and so on. Two main applications are:

application to the traffic user equilibrium problems and application to reliability problems.

The user equilibrium problem can be defined as determining the traffic flow on every link of

network. Wardrop (1952) was the first person to provide a theoretical framework for

formulating this problem. Later on, research indicated that his principles resembled a Nash

Equilibrium and the Game Theory gave transportation researchers a new way of looking at

the traffic user equilibrium problem (Boyce et al. 2005).

This research will focus on a two-player non-cooperative zero sum game between the

network user seeking a path to minimize the expected trip cost and a demon choosing link

performance scenarios to maximize the expected trip cost. A minmax optimization model is

proposed to evaluate the network vulnerability through game theory approach. Numerical

example is provided for discussions on possible approaches to reduce the network

vulnerability.

Literature Review

The network reliability problems have been studied over the decades and the research work

can be summarized in two folds (Bell, 2000): the network connectivity and performance

reliability. Earlier work on reliability problems had focused on the connectivity issues when

network becomes disconnected from link failure that one cannot reach his destination (Iida

and Wakabayashi, 1989; Du and Nicholson, 1997). On the other hand, a connected network

may not always provide sufficient road capacity or service level to ensure the users to arrive

their destination on time, which leads to the discussion of the network performance

reliability. One approach to study network performance reliability is to first gather the link

performance statistical distributions; then study the impact of link performance variation on

network performance (Bell et al., 1999). However, there are limitations in insufficient data

and the stability issues for this approach.

Other than connectivity and capacity measures, as in Bell’s paper (Bell, 2003), an alternative

method is proposed that seeks to identify the links whose failure would impair the network

performance the most, which is to measure the vulnerability of networks. Also, Berdica

(2002) discussed various other definition of network vulnerability. More recently, Igor et al.

(2010) measured the vulnerability of complex networks with different topologies through

game theoretic approach and indicated the vulnerability heavily depends on topology. Chen et

al. (2012) discussed a network vulnerability index called “impact area” vulnerability which is

obtained by evaluating the consequence of each link closure on the overall network

performance within a reasonable “sub network” defined as impact area. Szeto and Sumalee

(2009) used a game theoretical model to identify routing and scheduling decisions for

multiple hazmat carriers through a zero sum game. While the majority of traditional

definitions of network vulnerability were based on topology, connectivity, or capacity, this

paper defined vulnerability alternatively as the system-level total travel cost at the optimum

Page 3: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

3

state, following Bell’s measurement of vulnerability (Bell 2003). Compared to other

measures, this measure can be more conveniently calculated. When the model is potentially

applied to any network models, the implementation of the proposed approach is of less

computational burden. It is worth noting that the link failure probabilities are used to indicate

the most critical links for the network performance in order for the decision-makers to

determine strategies accordingly and achieve more reliable system-level outcome.

The network reliability is a research topic drawing increasing concern from transportation

communities. The definition of network reliability or network vulnerability also varies among

different studies. Broadly speaking, network reliability definitions from previous studies can

be grouped into the following three categories:

(1) Network connectivity reliability. The connectivity reliability defines the reliability of a

transportation network to be the probability of connectivity between different O-D pairs to

remain intact given particular links is disrupted (Wakabayashi and Iida, 1992). The main

problem with connectivity definition is that the method does not consider the capacity and

travel time of different links.

(2) Capacity reliability. The capacity reliability takes into the account of link capacities

within the network and defines the network reliability as the probability of the transportation

network accommodates a certain level of demand with acceptable level of service quality.

Relevant works include Chen et al., 2002.

(3) Travel time reliability. Under the travel time reliability concept, the network reliability is

measured by the expected travel time between O-D pair considering the possibility of link

capacity drop. Also the concept of travel time can be further generalized into travel cost

which considers the monetary cost of the transportation. Therefore this group of study can be

also named as travel cost reliability. Since travel time or travel cost is the most popular

measurement of network service quality, the travel cost reliability received high degree of

interests among researchers and practitioners.

Based on how the disturbance probability of each link is computed, travel time reliability

studies can be further categorized into two branches. The first group intends to investigate the

adverse impact of rare incidents on the network performance. Rare incidents include traffic

accidents, traffic flow breakdown, harsh weather, etc. These incidents happen at low

probability but can potentially cast huge negative impact to the network. For example,

Dalziell and Nicholson (2001) developed link failure duration probability distributions for

hazards using Monte Carlo simulation method. Regarding this group of models, link failure

probabilities are required inputs which are difficult to obtain unless there is a comprehensive

historical incident database.

The second branch along this direction is the game theory approach. Different from other

approaches, game theoretical formulation of network reliability, which is first introduced by

Bell (2000), is based on concept of depicting the expected network condition as the outcome

of a game between two players: network users and hypothetical demon (or network tester).

The hypothetical demon, which is also called network tester, seeks to maximize the total

network travel cost by adjusting the disturbance probability of each link; on the other hand,

users makes their own route choice usually in a non-cooperative way to minimize their

respective travel time. Bell (2000) first formulated the problem considering one driver and

one demon. In his study, the travel time of the disrupted link becomes ten times longer

Page 4: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

4

compared with its usual travel time. Following the same path, Bell and Cassir (2002) enhance

the model to include multiple drivers and demons. Since the demon is allowed to degrade any

link, the game theory model provides “pessimistic” estimation of network travel cost.

Therefore the outcome of the model describes the vulnerability of transportation network.

Bell (2003, 2006, 2008) presented a series of research revolving this topic and named the

model as “attacker-defender” model. Relevant studies along this direction also include Szeto

et al. (2006, 2007), Szeto and Sumalee (2009) and Szeto (2011, 2013). The game between the

network tester and drivers in this type of model is often transformed into a bi-level

optimization problem in which the upper level is controlled by the hypothetical demon who

attempts to maximize the expected total network travel cost while the lower level is

controlled by the network users who want to minimize their own travel costs. And based on

the definition of players, the game theory formulation may vary between different studies.

For interested readers, there are also more comprehensive introduction of game theory

method, for example Cassir and Bell (2001). Hollander and Prashker (2006) conducted an

extensive literature review on the applicability of non-cooperative game theory in transport

analysis.

Due to the complex nature of bi-level optimization formulation, effective solution algorithms

need to be developed. A solution method which iterates between upper and lower level

problem was proposed by Yang (1995) in order to solve the bi-level O-D flow estimation

problem considering user equilibrium assignment. Bell and Cassir (2002) proposed a risk

averse equilibrium assignment algorithm based on MSA (Method of Successive Average).

Also similar approach was also adopted in Bell (2003) and Bell and Kanturska (2008). Also

based on game theoretical modelling approach, several studies were reported on optimal

design of the transportation network from reliability point of view, such as Chen et al (2007)

and Bianco et al. (2009).

In this study, we developed a new game theoretical formulation for network vulnerability

from a system perspective, thus in order to minimize the adverse impact from the demon, a

network dispatcher is assumed to adjust the link flows according to the strategy of the

hypothetical network disrupter. A zero sum game between these two entities is formulated in

this study. Compared with previous studies, drivers no longer make their route choice only

considering their own utility but rather controlled by the network dispatcher. Such kind of

system optimal assignment is adopted to counter the link disturbances from the network

tester. Then the system vulnerability is estimated by computing the expected total travel time

of network users. Also in this study, the travel time of each link is modelled as non-linear

function of link flow (BPR function) to better measure the impact of traffic volume on the

vulnerability of the network. The sensitivity of link capacity and traffic volume is

investigated using the proposed game theory formulation. A heuristic solution algorithm is

also proposed based on MSA principle. Finally the application of the proposed model is

presented and discussed using numerical examples.

Problem Statement and Solution Methodology

In this paper, a game theoretical model is used to estimate the network vulnerability. The

game theoretical model is formulated as a minmax problem following the original “attacker-

defender” model proposed by Bell (2000, 2002, 2003, 2006 and 2008). The network

vulnerability is considered as an equilibrium outcome of a two player non cooperative zero

sum game: the first player is a network coordinator who tries to minimize the total cost of the

Page 5: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

5

network by controlling the flow assignment on each link subject to OD flow constraints; the

other player is a hypothetical demon who attempts to maximize the total network cost by

disrupting a particular link of the network. In the remaining part of this paper, these two

players are referred as network coordinator and network tester respectively. In this study, we

emphasize on predicting the network vulnerability using the equilibrium outcome of above

two-player zero sum game considering the non-linear relationship between demand flow

volume and travel time. In this study, the correlation between link flow x and link travel time

t is modeled by the following BPR function form,

t(x) = tf (1 + α (x

c)β

) (1)

tf and c are respectively free flow travel time and link capacity; α and β are shape parameters

of the function.

Consider a general transport network represented by a directed graph <M, N> where M and

N are node and link set, the notations used in this paper are given as follows:

xi the traffic flow on link i;

yj probability of link j to be disturbed by the network tester;

X is the link flow volume vector determined by the network dispatcher;

Y is the link disturbance probability vector determined by the demon or network tester;

tij(xi): the travel time of link i under the scenario when link j is disrupted. tij is a function of

both link flow xi and disturbance strategy of the demon. Since a link is either disturbed or not

disturbed, therefore tij takes the following form:

tij(xi) = fij (1 + α(xi

cij)

β

) (2)

where fij is the free flow travel time of link i in scenario j, cij is the capacity of link i in

scenario j and α and β are parameters;

dm: the demand generation or absorption of node m;

δim: Node-link incidence matrix defined by the following expression,

δim = {1 if link i is the incoming link of node m−1 if link i is the outgoing link of node m0 if link i is not connected with node m

(3)

In this study, the status of each link is either disturbed or not disturbed. When the link is not

disturbed, it remains its original capacity ci; otherwise when the link is disrupted, its capacity

will be reduced to a significantly lower level γci where γ is a fraction between zero and one.

Therefore when a particular link is disturbed, the travel time of all paths using the link will

increase depending on the volume passing the link. Therefore the two player zero sum game

is formulated as a minmax problem presented in P1, the network coordinator tries to

minimize the total network flow cost by adjusting xi, i = 1,2, … , N; on the other hand, the

network tester aims at maximizing the total network flow cost by changing yj, j = 1,2, … , N;

Note that we assume only one link is degraded by the demon under one scenario. Due to the

property of zero-sum game, the payoff of the network coordinator and the demon sums up to

zero, namely the game is a zero sum game.

pc = ∑∑xitij(xi)yj

ji

(4)

Page 6: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

6

pd = −∑∑xitij(xi)yj

ji

(5)

pc + pd = 0

(6)

Where pcand pd are the expected payoff of network coordinator and tester respectively.

Given above notations, this two-player zero sum game can be formulated into the following

minmax problem (P1).

P1:

minmaxxi,yj

∑∑xitij(xi)yj

N

j=1

N

i=1

(7)

s.t.

∑yj

N

j=1

= 1 (8)

∑xiδik

N

i=1

+ dk = 0, k = 1,2, … ,M (9)

xi ≥ 0, yj ≥ 0 (10)

Above minmax problem can then be transformed into the following bi-level optimization

problem (P2):

P2:

Upper level:

maxyj

∑∑xitij(xi)yj

N

j=1

N

i=1

(11)

s.t.

∑yj

N

j=1

= 1, yj ≥ 0 (12)

Lower level:

minxi

∑∑xitij(xi)yj

N

j=1

N

i=1

(13)

s.t.

∑xiδik

N

i=1

+ dk = 0, k = 1,2, … ,M

xi ≥ 0

(14)

In the upper level of P2, given fixed link flows xi, the network tester attempts to maximize

the expected total network travel time by adjusting link disturbance probabilities Y; on the

lower level, the network dispatcher performs a system optimal assignment given link

disturbance probabilities given by the upper level problem. The existence of the solution of

problem P2 is proved by Proposition 1. For each set of given link disturbance probabilities,

the lower level optimization problem is proved to be a non-linear minimization problem with

Page 7: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

7

convex objective function and convex constraints under certain assumption of the shape of

link cost functions.

Proposition 1: If all link cost functions are continuous and differentiable functions that satisfy

condition (15), then for each set of link disturbance probabilities yj j=1,2,...,N, the lower level

optimization problem of P2 is a convex optimization problem with unique solution:

∂tij(xi)

∂xi2

2

xi + 2∂tij(xi)

∂xi> 0 ∀ i, j

(15)

Proof

The Hessian matrix of objective function of lower level is computed as follows,

∂∑ ∑ xitij(xi)yj Nj=1

Ni=1

∂xm ∂xr= {

∑[∂tmj(xm)

∂xm2

2

xm + 2∂tmj(xm)

∂xm]

N

j=1

yj, if m = r

0 o. w.

(16)

∇2

=

[ ∑[

∂t1j(x1)

∂x12

2

x1 + 2∂t1j(x1)

∂x1]

N

j=1

yj ⋯ 0

⋮ ⋱ ⋮

0 ⋯ ∑[∂tnj(xn)

∂xn2

2

xn + 2∂tnj(xn)

∂xn]

N

j=1

yj

]

(17)

Hence the determinant of Hessian matrix is given by Eq. (18)

Det(∇2) = ∏∑[∂tij(xi)

∂xi2

2

xi + 2∂tij(xi)

∂xi]

N

j=1

yj

N

i=1

(18)

We will show that if the link cost function takes the form of BPR function, then the above

determinant is strictly larger than zero. Since

∂tij(xi)

∂xi=

αβ

cij(xi

cij)

β−1

,∂tij(xi)

∂xi2

2

=αβ(β − 1)

cij2 (

xi

cij)

β−2

(19)

Then

∂tij(xi)

∂xi2

2

xi + 2∂tij(xi)

∂xi=

αβ(β − 1)

cij2 (

xi

cij)

β−2

xi + 2αβ

cij(xi

cij)

β−1

=αβ(β + 1)

cij(xi

cij)

β−1

(20)

Page 8: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

8

Because α, β and cij > 0 , the value of αβ(β+1)

ckj(

xk

ckj)

β−1

is strictly larger than zero for any link

i. Therefore,

∑[∂tij(xi)

∂xi2

2

xi + 2∂tij(xi)

∂xi]

N

j=1

yj > 0, 𝑖 = 1,2, …𝑁 → ∏∑[∂tij(xi)

∂xi2

2

xi + 2∂tij(xi)

∂xi]

N

j=1

yj

N

i=1

> 0

(21)

More generally,

∂tij(xi)

∂xi2

2

xi + 2∂tij(xi)

∂xi> 0 𝑓𝑜𝑟 𝑎𝑙𝑙 𝑖 𝑎𝑛𝑑 𝑗 → ∏∑[

∂tij(xi)

∂xi2

2

xi + 2∂tij(xi)

∂xi]

N

j=1

yj

N

i=1

> 0

(22)

Therefore, if the link cost functions of the network satisfies condition (15), then the lower

optimization problem of P2 is a minimization problem with convex objective function and

convex constraints. A unique global solution exists. Essentially, the lower level of P2 is a

system optimal traffic assignment given modified link capacities given by link disturbance

probabilities from the network tester. Therefore there exists a single set of optimal link flows

which minimize the total network travel time. Such property of the model allows us to

construct a heuristic algorithm which is discussed in the next section.

Solution Algorithm

The solution method developed in this section resembles to the iterative solution method

proposed by Yang (1995). The basic idea is to iterate between upper and lower level problem

until the stopping criteria is met. Let X(k) and Y(k), k = 1,2, … , K be the estimated link flow

and disturbance probability vector after kth iteration. And X(k) and Y(k) are the auxiliary link

flows and disturbance probability vector at iteration k. The solution procedure is summarized

here.

1) Step 1, initialization: Let y1(0)

= y2(0)

= ⋯ = yN(0)

=1

N, then solve X(0) using system

optimal assignment method given Y(0).

2) Step 2, determine the auxiliary link disturbance probability Y(k): based on link

volumes from previous iteration, X(k−1), determine the optimal disturbing strategy of

the network tester by finding the scenario with highest marginal increase of expected

network travel time. Thus, find j which maximize the following expression,

maxj

∑xitij(xi)

N

i=1

And auxiliary link disturbance probability vector Y(k) is a vector whose jth element is

one while all remaining elements are zero.

3) Step 3, update Y(k) using moving successive average (MSA) method,

Y(k) = Y(k−1) +1

k[Y(k) − Y(k−1)]

4) Step 4, update link flows. Given Y(k), the network dispatcher solve for a set of new

auxiliary link flows X(k) using system optimal assignment principle. Then update

network link flows using MSA.

Page 9: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

9

X(k) = X(k−1) +1

k[X(k) − X(k−1)]

5) check stop criteria: if |Y(k) − Y(k−1)| ≤ ε and |X(k) − X(k−1)| ≤ ε then stop

computation, return to step 2 otherwise. Here ε is the pre-defined tolerance.

Numerical Example

In the process of transport network design, it is an important practical problem to establish

the performance reliability of a transport network. There are various approaches to enhance

the network reliability such as enhancing the link component strength, performing preventive

maintenance work, improving network structure, and having alternative route choices for the

users. In the network design problems, Braess presented an example demonstrating where

adding a new route can increase travel time for all, called the Braess Paradox. Similarly, there

is phenomenal that increasing capacity to an existing link in a congested network may not

necessarily improve the overall network performance which is referred as the “Pigou-Knight-

Downs paradox” by Arnott and Small (1994) and may actually increase the travel time (Yang,

1997). Yang and Bell (1998) introduced the capacity paradox and demonstrated that creating

a new link in a network may actually reduce the potential capacity of the network and

proposed the concept of network reserve capacity to avoid this capacity paradox.

In this paper, some possible approaches to improve the road network vulnerability are

discussed through several numerical examples and the performance test results under

different improvement strategies are analyzed.

Network Setup

The network structures of the numerical examples are designed to test the impact of various

planning and policy strategies on the system-level vulnerability performance measures. Two

types of networks are specified in this section, as illustrated in Figures 1(a) and 1(b). The two

networks are used in Scenario A and Scenario B, respectively. On Scenario A network, a

number of incremental link capacity levels are defined and tested. For Scenario B, the

addition of a new roadway segment is defined based on the network for Scenario A. Both

networks consider a 4-node system with single origin-destination (OD) pair (origin: Node 1,

destination: Node 4). The demands are set to be external and constant in the numerical

example for illustrative purposes.

Page 10: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

10

Figure 1. Numerical example networks

The above two networks have similar link setups. Links 1 to 7 are identical in Figures 1(a)

and 1(b). The Scenario network in Figure 1(a) has only one “express” link connecting Node 1

and 4 directly, while in Figure 1(b), Link 8 is added as the new expressway to the Scenario A

network. And the impacts of its capacity variations on the performance of network reliability

are examined in Scenario B and C. This example seeks answer to the empirical question that

through which way one can more efficiently enhance the system reliability, capacity

expansion (i.e. increase the capacity of existing links) or infrastructure expansion (i.e. add

more links on the system). The BPR volume-delay function is used to compute travel time for

simplicity. For each case, it is assumed that the capacity of one link is decreased to 10% if the

demon selects that specific link to disrupt. Detailed link properties are provided in Table 1

below.

Table 1. Link setup of the numerical example

Link Free-flow time (minutes) Capacity (vph)

Scenario A Scenario B Scenario C Scenario A Scenario B Scenario C

1 30 30 30 2500 – V 1250 V

2 20 20 20 800 800 800

3 25 25 25 500 500 500

4 10 10 10 500 500 500

5 10 10 10 600 600 600

6 30 30 30 1000 1000 1000

7 30 30 30 600 600 600

8 n/a 30 30 n/a 1250 – V 2500 – V

The capacity variables tested by the three scenario setups are denoted by V. Link 1 capacity

in Scenario A is set always equal to the total capacity of Link 1 and 8 in Scenario B in order

to make the expressways in these two cases comparable (Link 1 in Scenario A v.s. Link 1 and

8 in Scenario B). Scenario C assumes that the total capacity of link 1 and 8 remains the same

and seeks the optimal capacity design.

1

2 3

4

4

5

3

6

2

7

1

1

2 3

4

Origin

b. Scenario B and C a. Scenario A

Destination

Origin

Destination

4

5

3

6

2

7

1 8

Page 11: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

11

In Scenario A, the analysis of a series of capacity decreases is conducted. First, the “do-

nothing” scenario is studied and the most vulnerable link is identified, based on which we

designed various capacity scenarios. The solution results are provided in the Figure 2. The

two numbers shown in bracket on each link indicate the percentage of the optimal volume

and the disturbance probability, respectively.

Figure 2. The Results to the “Do Nothing” Scenario

Based on the result, Link 1 is identified as the most vulnerable link since it attracts the

highest traffic volume and has the highest failure probability. This result is as expected since

link 1 is set to be a relatively faster (with capacity: 2500 vph) freeway connecting the origin

and the destination directly. In this case, one key operations and planning question regarding

reliability is, what if the capacity of this vulnerable link drops significantly due to an

unexpected event such as a severe incident. In Scenario A, capacity decrease scenarios of the

link 1 are specified, varying the capacity for 0 to 50% decrease (capacity varies from 2500

vph to 1250 vph) in a uniform step size.

In Scenario B we try to explain the impact of link addition on an existing Scenario A network

and compare this policy strategy with Scenario A. For comparison purposes, the total

capacity and the capacity decrease between the origin and destination are kept the same in the

two scenario setups. For instance, if link 1 capacity is set to drop by 250 vph (10% decrease,

from 2500 vph to 2250 vph) in Scenario A, the corresponding Scenario B case is to set link 8

capacity to drop from its original 1250 vph down to 1000 vph while link 1 capacity (1250

vph) remains unchanged. When the capacity decrease is set to 1250 vph, the two scenarios

are identical. The solutions are presented in Figure 3. By comparing these two scenarios, we

can gain some insights in the vulnerability of the two network designs when the capacity

drops to a certain level. In Scenario C, we try to obtain the optimal capacity given that the

sum of Link 1 and Link 8 capacity is set at a certain level. This scenario helps answer

network design questions, such as: (1) how many links should it build to meet the

predetermined travel demand; (2) What is the optimal capacity for each of the links.

Results

To solve this network problem, the authors employed the proposed bi-level optimization and

iterative solution algorithm. An interesting question that arises naturally is how the proposed

algorithm performs compared to other algorithms. To demonstrate the contribution in terms

1

2 3

4

(0.01,0)

(0.04,0)

(0.17,0.15)

(0.28,0)

(0.25,0.27)

(0.14,0)

Origin

Destination

(0.58,0.58)

Page 12: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

12

of computational efficiency, the proposed method is compared with the MultiStart Algorithm

(Ugray, et al., 2007). This heuristic endeavors to find the global optima by seeking a series of

local solutions from a subset of n starting points. The search from multiple starting points

which are defined on the feasible region improves the heuristic’s efficiency in finding the

best local optimum. And this algorithm can run in parallel, distributing start points to multiple

processors for local solution. This method is still an approximation to the global optimum.

Both algorithms are employed to solve the problem raised in Scenario B. Comparing the two

algorithms, it is clear that Bi-level optimization and iterative solution algorithm performs as

good as the Multi-Start Algorithm. The average computational time for the proposed

algorithm is 118.7 seconds compared to 547.3 seconds for the Multi-Start Algorithm (both

experiments conducted on a computer with Intel Core-i7 CPU 2.90 GHz and 4G RAM). The

results are compared in Appendix. More rigorous discussion on algorithms to solve this

proposed system optimization model can be a direction for future studies.

The results of these scenarios are presented in Figure 3(a), 3(b), 3(c), and 3(d). The X axis of

Figures 3(a), 3(b), and 3(c) represents the amount of capacity decrease. The Y axis of Figure

3(a) represents the system-level reliability measure (i.e. the expected total travel time, in

minutes). We consider the network more robust with lower value of the reliability measure.

Figure 3(a) indicates that capacity expansion of an existing roadway (Scenario A) is not

always a desirable network development option. In some cases, infrastructure expansion

(Scenario B) can be more efficient in reducing system vulnerability. Figure 3(b) illustrates

different performance measures of Scenario A and B. We employ the difference of the

system expected total travel times of Scenario A and Scenario B as the measure of travel time

savings from infrastructure expansion when compared with capacity expansion. When there

is no capacity drop at point 0, the vulnerability measure of the infrastructure expansion case

(Scenario B) is 32.5% lower than that of Scenario A. The percentage of travel time savings

gradually decreases when the capacity drops in Scenario A and B. However, in terms of

absolute travel time saving, it is observed that when Link 8 capacity decreases to 350, the

infrastructure expansion achieves the highest total travel time savings when compared to

Scenario A. Figure 3(c) illustrates the expressway volume. When the capacity drops, the

number of vehicles served by expressways also decreases. Compared with the expressway

link in Scenario A, the expressway links in Scenario B can serve more travel demand. Figure

3(d) illustrates the system-level vulnerability measures of Scenario C. It indicates that the

optimal design whence the total capacity of expressway link 1 and 8 is set to 2500 vph is

1250 vph for each expressway link. And the optimal total expected travel time is about 30%

lower than that of the do-nothing scenario (point zero in Scenario C).

a. System-level vulnerability measure

(Scenario A and B)

b. Travel time saving from infrastructure

expansion (Scenario A and B)

125 250 375 500 625 750 875 1000 1125 1250

0

1

2

3

4

5

6

7

8

9

10x 10

8

Capacity Decrease

Syste

m E

xpecte

d T

ota

l Tra

vel T

ime (

min

.)

Scenario A

Scenario B

125 250 375 500 625 750 875 1000 1125 1250

0

3

6

9

12

15x 10

7

Capacity Decrease

Scenario B

Tra

vel T

ime S

avin

g (

min

.)

5 10 15 20 25 30 35 40 45 50

0

0.1

0.2

0.3

0.4

0.5

Scenario B

Tra

vel T

ime S

avin

g (

%)

Scenario B Time Saving (min.)

Scenario B Time Saving (%)

Page 13: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

13

c. Expressway Traffic Volume

(Scenario A and B)

d. Expressway Traffic Volume

(Scenario C)

Figure 3. The comparison results from scenario A and B

In this numerical example, the results of capacity variation and adding infrastructure vary

drastically with respect to the system-level reliability measures. Planning strategies should be

carefully examined since it can be detrimental if the capacity expansion is intended to

accommodate a future fast-growing demand for travel. The implication of this comparison is

that the network travel time reliability should be considered in the decision making process in

network infrastructure design. Compared to Scenario A, evidently, the addition of link 8

results in a significant improvement of the network reliability. Scenario C further

demonstrates that an optimal design of the network can be derived through this analysis.

Overall, these three scenarios are designed for illustration purposes, demonstrating the

capability of the model in supporting decision-making processes. More general conclusions

should be carefully drawn based on a complete scenario analysis with the specifications of

various supply- and demand-side uncertainties.

Conclusion and Direction for Future Research

This paper proposed a more computationally efficient approach to measure system-level

network vulnerability. The first contribution of the paper was the originality of the model. It

formulated a game theoretical model to solve the network vulnerability problem and the

reliability performances are compared and discussed through the results from several

reliability improvement strategies. Also, link-level BPR functions were built in the model

formulation to reflect network traffic details.

The paper also contributed to the state-of-the-practice in how to solve this type of minmax

problems. Solving the problem in its original form can be computationally extensive. The

paper transformed the problem into a bi-level optimization model. Then a heuristic algorithm

that iteratively solves the bi-level optimization model is also discussed and compared with

multi-start algorithm in the numerical example.

The model has its practical value in various decision-support applications, including

identifying the most vulnerable network link(s), achieving a more reliable system through

network design strategies, among others. As demonstrated by the numerical example, the

model is capable in analyzing system-level reliability measures under various planning and

policy scenarios. Using a simple network example, this paper illustrated that the expansion to

the capacity of existing road may actually reduce the network reliability at certain service

level. This situation could be detrimental if the network improvement plan such as expanding

125 250 375 500 625 750 875 1000 1125 1250

1250

1500

1750

2000

2250

2500

Capacity Decrease

Volu

me o

f Lin

k 1

and 8

(vph)

Scenario A

Scenario B

Link 1 & 8 Capacity

250 500 750 1000 1250 1500 1750 2000 2250 2500

0

0.5

1

1.5

2

2.5x 10

8

Capacity of Link 1

Syste

m E

xpecte

d T

ota

l Tra

vel T

ime (

min

.)

Scenario C

Page 14: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

14

one lane for existing freeway corridor is designated to accommodate future potential high

travel demands.

The second scenario further indicates that the addition of a new “express” road almost always

improves the network reliability, as the users of the most vulnerable link (link 1) are provided

with an alternative route (link 8). It is worth noting that the expansion to the existing network

may or may not be a wise choice because of the possible existence of the capacity paradox

(Yang and Bell, 1998) and the stochastic Braess’ paradox (Szeto, 2011).

For future research, first, more rigorous discussion on algorithms to solve this proposed

system optimization model can be future studied. Second, the network reliability measure can

be extended to be time-dependent. Finally, the potential integration of this model with other

network and/or demand models may be studied to provide a more insightful suggestion to this

research issue.

REFERENCES

Arnott, R. and Small, K. (1994) The economics of traffic congestion. American Scientist 82,

446-455.

Bell, M.G.H. and Cassir, C., (2002) Risk-Averse User Equilibrium Traffic Assignment: An

Application of Game Theory. Transportation Research, Vol. 36B, pp. 671-681.

Bell, M.G.H., Cassir, C., Iida, Y., and Lam, W.H.K., (1999) A sensitivity based approach to

network reliability assessment. Proceedings of the 14th International Symposium on

Transportation and Traffic Theory, Pergamon, Oxford, pp. 283-300.

Bell, M.G.H., Kanturska, U., Schmocker, J.D. and Fonzone, A., (2008) Attacker-defender

models and road network vulnerability. Philosophical Transactions of the Royal Society

a-Mathematical Physical and Engineering Sciences, 366, pp. 1893-1906.

Bell, M.G.H., (2000) A game theory approach to measuring the performance reliability of

transport networks. Transportation Research Part B: Methodological 34, no. 6 (August):

533-545.

Bell, M.G.H., (2003) The use of game theory to measure the vulnerability of stochastic

networks. IEEE Transactions on Reliability. 52, no. 1: 63-68.

Bell, M.G.H., (2006) Mixed Route Strategies for the Risk-Averse Shipment of Hazardous

Materials. Networks & Spatial Economics 6, no. 3/4: 253-265.

Berdica, K., (2002) An introduction to road vulnerability: what has been done, is done and

should be done. Transport Policy, 9, pp. 117-127.

Bersani, C. (2008). "Finding Solutions to Mixed Route Strategies for Transporting Hazardous

Materials." Advanced Technologies and Methodologies for Risk Management in the

Global Transport of Dangerous Goods, vol. 45, p. 133.

Boyce, D.E., Mahmassani, H.S. and Nagurney, A., (2005) A retrospective on Beckmann,

McGuire and Winsten's Studies in the Economics of Transportation. Regional Science

Page 15: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

15

84, no. 1: 85-103.

Bianco, L., Caramia, M. and Giordani, S. (2009). "A bilevel flow model for hazmat

transportation network design." Transportation Research Part C: Emerging

Technologies, 17(2), 175-196.

Cassir, C. and Bell, M. (2001). RELIABILITY OF TRANSPORT NETWORKS. CHAPTER 7.

THE N+ M PERSON GAME APPROACH TO NETWORK VARIABILITY.

Chen A., Kim J., Zhou, Z. and Chootinan, P., (2007) Alpha Reliable Network Design

Problem, Transportation Research Record: Journal of the Transportation Research

Board, No. 2029, pp.49-57.

Chen, A., Yang, H., Lo, H.K. and Tang, W.H., (2002). Capacity reliability of a road network:

an assessment methodology and numerical results. Transportation Research Part B

36(3), 225-252.

Chen, B.Y., Lam, W.H.K., Sumalee, A., Li, Q. and Li, Z.C., (2012) Vulnerability analysis for

large-scale and congested road networks with demand uncertainty. Transportation

Research Part A-Policy and Practice, 46, pp. 501-516.

Dalziell, E.P. and Nicholson, A.J., (2001) Risk and impact of natural hazards on a road

network. ASCE Journal of Transportation Engineering, 127(2), 159-166.

Du, Z.P. and Nicholson, A.J., (1997) Degradable transportation systems: sensitivity and

reliability analysis. Transportation Research B 31 (3), 225-237.

Hillier, F.S. and Lieberman, G.J., (1990) Introduction to Operations Research. McGraw-Hill,

New York.

Hollander, Y. and Prashker, J., (2006) The applicability of non-cooperative game theory in

transport analysis. Transportation 33:481–496

Igor, M., Filiposka, S., Gramatikov, S., Trajanov D. and Kocarev, L., (2010) Game Theoretic

Approach for Discovering Vulnerable Links in Complex Networks, Novel Algorithms

and Techniques in Telecommunications and Networking, 211-216.

Iida, Y. and Wakabayashi, H., (1989) An approximation method of terminal reliability of road

network using partial minimal path and cut set. In: Proceedings of the Fifth World

Conference, vol. IV. Yokohama, Japan, pp. 367-380.

Neumann, J. and Morgenstern, O., (1944) Theory of Games and Economic Behavior.

Princeton University Press.

Lam, W.H.K., Shao, H. and Sumalee, A., (2008) Modeling impacts of adverse weather

conditions on a road network with uncertainties in demand and supply. Transportation

Research Part B 42 890-910.

Szeto, W. (2013). "Routing and scheduling hazardous material shipments: Nash game

approach." Transportmetrica B: Transport Dynamics, 1(3), 237-260.

Page 16: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

16

Szeto, W.Y., (2011) Cooperative game approaches to measuring network reliability

considering paradoxes, Transportation Research Part C 19, 229-241.

Szeto, W.Y., O’Brien, L. and O’Mahony, M. (2006). Risk-averse traffic assignment with

elastic demands: NCP formulation and solution method for assessing performance

reliability. Network and Spatial Economics 6 (3), 313–332.

Szeto, W.Y., O’Brien, L. and O’Mahony, M. (2007). Generalisation of risk averse traffic

assignment. In: Allsop, R.E., Bell, M.G.H., Heydecker, B.G. (Eds.), Transportation and

Traffic Theory. Elsevier Science, Amsterdam, pp. 127–153

Szeto, W.Y. and Sumalee, A., (2009) A Game Theoretic Approach to Routing and Scheduling

Hazardous Materials in Transport Networks with Multiple Origin-Destination Pairs.

Transportation Research Board Annual Meeting, Washington D.C.

Ugray, Z., Lasdon, L., Plummer, J., Glover, F., Kelly, J., and Martí, R., (2007) Scatter Search

and Local NLP Solvers: A Multistart Framework for Global Optimization. INFORMS

Journal on Computing, 19 (3): 328–340.

Wakabayashi, H. and Iida, Y., (1992) Upper and lower bounds of terminal reliability of road

networks: an efficient method with Boolean algebra. Journal of Natural Disaster

Science, 14, 29-44.

Wardrop, J.G., (1952) Some Theoretical Aspects of Road Traffic Research. In Proceedings of

the Institute of Civil Engineers, 1:325-362. Greenford, UK.

Watling, D.P. and Cantarellab, G.E., (2013). Modelling sources of variation in transportation

systems: theoretical foundations of day-to-day dynamic models. Transportmetrica B:

Transport Dynamics, 1 (1), 3-32

Yang, H. and Bell, M.G.H., (1998) A Capacity Paradox in Network Design and How to Avoid

it, Transpn Res.-A, Vol. 32, No. 7, pp. 539-545

Yang, H. (1995). Heuristic algorithms for the bilevel origin-destination matrix estimation

problem. Transportation Research Part B: Methodological, 29(4), 231-242.

Yang, H. (1997) Sensitivity analysis for the elastic-demand network equilibrium problem

with applications, Transportation Research 31B, 55-70.

Page 17: A Game Theory Approach for the Measurement of …cxiong/pubs/game_theory.pdfmeasure the performance reliability of the transport network in the purpose of construct and maintain a

17

Appendix

Table A1: Experimental Results Using the Bi-level Optimization and Iterative Solution

Algorithm

Scenario B Obj.

Function Value

Computational

Time

Scenario B Obj.

Function Value

Computational

Time

Bi-

Level

Multi-

Start

Bi-

Level

Multi-

Start

Bi-

Level

Multi-

Start

Bi-

Level

Multi-

Start

1 1.3445 1.3440 123.2 585.1 26 2.6432 2.6431 115.3 522.2

2 1.3778 1.3775 119.2 575.6 27 2.7240 2.7235 111.3 522.1

3 1.4126 1.4124 122.0 557.0 28 2.8074 2.8074 111.1 562.8

4 1.4486 1.4482 112.9 592.7 29 2.8940 2.8933 109.7 525.5

5 1.4855 1.4855 118.8 539.3 30 2.9859 2.9847 115.8 530.5

6 1.5237 1.5235 113.7 534.6 31 3.0793 3.0789 111.2 573.7

7 1.5628 1.5628 115.7 531.9 32 3.1772 3.1770 120.7 522.2

8 1.6039 1.6035 117.1 531.2 33 3.2795 3.2790 127.0 578.7

9 1.6459 1.6459 116.2 521.7 34 3.3857 3.3853 120.3 521.3

10 1.6896 1.6892 121.2 543.5 35 3.4965 3.4965 118.9 543.6

11 1.7366 1.7364 113.3 526.4 36 3.6120 3.6120 120.0 536.4

12 1.7821 1.7815 114.6 525.7 37 3.7326 3.7326 116.5 534.2

13 1.8299 1.8293 113.0 530.0 38 3.8587 3.8587 123.3 542.0

14 1.8798 1.8795 113.3 530.5 39 3.9908 3.9902 128.7 547.9

15 1.9323 1.9320 123.5 524.4 40 4.1277 4.1277 134.7 545.5

16 1.9848 1.9846 126.8 521.0 41 4.2714 4.2710 123.4 542.2

17 2.0411 2.0406 128.5 547.1 42 4.4214 4.4211 114.8 597.7

18 2.0965 2.0964 114.0 543.5 43 4.5786 4.5783 114.0 557.1

19 2.1581 2.1578 112.0 525.3 44 4.7429 4.7427 120.9 563.4

20 2.2200 2.2196 112.4 555.0 45 4.9149 4.9149 118.2 571.6

21 2.2838 2.2838 110.5 530.5 46 5.0952 5.0952 115.1 580.6

22 2.3504 2.3504 109.7 556.3 47 5.2842 5.2842 125.7 564.3

23 2.4194 2.4194 119.7 540.9 48 5.4824 5.4824 129.2 567.3

24 2.4911 2.4911 110.6 555.9 49 5.6911 5.6907 131.8 567.2

25 2.5651 2.5651 112.2 531.5 50 5.9092 5.9086 136.8 581.3