4.7 Article

Designing networks with resiliency to edge failures using two-stage robust optimization

Journal

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH
Volume 279, Issue 3, Pages 704-720

Publisher

ELSEVIER
DOI: 10.1016/j.ejor.2019.06.021

Keywords

Networks; Network design; Network resiliency; Two-stage robust optimization; Column and constraint generation

Funding

  1. DoD
  2. Air Force Office of Scientific Research, National Defense Science and Engineering Graduate (NDSEG) Fellowship [32 CFR 168a]
  3. National Institutes of Health (NBIB) [1U01EB021956-01]
  4. DARPA (Lagrange Program) [N66001-18-C-4031]

Ask authors/readers for more resources

We study the design of resilient single-commodity flow networks that can remain robust against multiple concurrent edge failures. We model these failures as binary random variables, allowing us to formally formulate the network design problem as a two-stage robust optimization problem. With an objective of minimizing the overall cost of building and operating the network, the capacities of the edges are decided in the first stage, while the optimal flows are determined in the second stage once the uncertainty has been realized. We first examine the standard affine decision rules approach and show that it is not a viable approach when two or more edges are allowed to fail at the same time. We then propose a column and constraint generation algorithm that we tailor to this application. Since the problem does not satisfy the relatively complete recourse assumption, we employ an oracle with two subproblems: one to determine edge failure scenarios that render the required demand satisfaction infeasible, and if no such scenario exists, a second one to determine the flow rerouting plan of highest cost. Our column and constraint generation algorithm is applied to networks adapted from the Survivable Network Design Library. For each instance, we determine sequences of fully adaptive, robust optimal solutions for various levels of resiliency, identifying also the maximum number of concurrent edge failures that can be sustained by these networks. Finally, we demonstrate how our algorithm can be applied to a defender versus attacker context, via the use of a decision-dependent uncertainty set. (C) 2019 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available