Promoting Resiliency in Emergency Communication Networks: A Network Interdiction Stylized Initial Case Study Model of a Miami-Dade County Network

Promoting Resiliency in Emergency Communication Networks: A Network Interdiction Stylized Initial Case Study Model of a Miami-Dade County Network

Michael R. Bartolacci, Stanko Dimitrov
DOI: 10.4018/978-1-5225-6195-8.ch048
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Police, fire, and emergency personnel rely on wireless networks to serve the public. Whether it is during a natural disaster, or just an ordinary calendar day, wireless nodes of varying types form the infrastructure that local, regional, and even national scale agencies use to communicate while keeping the population served safe and secure. In this article, Michael R. Bartolacci and Stanko Dimitrov present a network interdiction modeling approach that can be utilized for analyzing vulnerabilities in public service wireless networks; subject to hacking, terrorism, or destruction from natural disasters. They develop a case study for wireless networks utilized by the sheriff's department of Miami-Dade County in Florida in the United States. Finally, the authors' modeling approach—given theoretical budgets for the “hardening” of wireless network nodes and for would-be destroyers of such nodes—highlights parts of the network where further investment may prevent damage and loss of capacity.
Chapter Preview
Top

Network Interdiction Modeling

Network interdiction models fall under the general category of game theory models. Such models attempt to capture the interplay between two or more actors, each seeking some goal. Various types of game theory models exist with most models having an assumption that each actor involved intends to maximize their reward within the “game” for him or herself as it plays out. The term “interdiction” is seen throughout optimization research literature, particularly with respect to modeling military and governmental processes such as supply logistics as utilized in the work by McMasters and Mustin (1970). Its military definition broadly deals with the destruction or disruption of supplies and the processes used to deliver them. One of the first applications of deterministic network interdiction modeling was conducted by Wood (1993) on the flow of raw materials for illicit drug production into various regions in South America. Network interdiction models tend to follow the process outlined by Smith (2008). Dimitrov and Morton (2013) describe four applications of network interdiction modeling, including one that is similar to the case study model, in this work: identifying vulnerabilities in an electric power system. Work that utilized the notion of network interdiction for analyzing source-destination path availability in a network infrastructure was conducted by Murray, et al. (2007) and Matisziw and Murray (2009). A description of the basic workings of an interdiction model is necessary to fully understand its applicability to our case study.

Complete Chapter List

Search this Book:
Reset