Skip to main content
Log in

Evader interdiction: algorithms, complexity and collateral damage

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

In network interdiction problems, evaders (e.g., hostile agents or data packets) are moving through a network toward targets and we wish to choose locations for sensors in order to intercept the evaders. The evaders might follow deterministic routes or Markov chains, or they may be reactive, i.e., able to change their routes in order to avoid the sensors. The challenge in such problems is to choose sensor locations economically, balancing interdiction gains with costs, including the inconvenience sensors inflict upon innocent travelers. We study the objectives of (1) maximizing the number of evaders captured when limited by a budget on sensing cost and, (2) capturing all evaders as cheaply as possible.

We give algorithms for optimal sensor placement in several classes of special graphs and hardness and approximation results for general graphs, including evaders who are deterministic, Markov chain-based, reactive and unreactive.

A similar-sounding but fundamentally different problem setting was posed by Glazer and Rubinstein where both evaders and innocent travelers are reactive. We again give optimal algorithms for special cases and hardness and approximation results on general graphs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3

Similar content being viewed by others

References

  • Agarwal, A., Alon, N., & Charikar, M. (2007). Improved approximation for directed cut problems. In STOC (pp. 671–680).

    Google Scholar 

  • Bar-Noy, A., Khuller, S., & Schieber, B. (1995). The complexity of finding most vital arcs and nodes (Tech. Rep.). University of Maryland, College Park, MD, USA.

  • Chuzhoy, J., & Khanna, S. (2009). Polynomial flow-cut gaps and hardness of directed cut problems. Journal of the ACM, 56(2), 7.

    Article  Google Scholar 

  • Corley, J. H. W., & Chang, H. (1974). Finding the n most vital nodes in a flow network. Management Science, 21(3), 362–364.

    Article  Google Scholar 

  • Corley, H. W., & Sha, D. Y. (1982). Most vital links and nodes in weighted networks. Operations Research Letters, 1(4), 157–160.

    Article  Google Scholar 

  • Even, G., Levi, R., Rawitz, D., Schieber, B., Shahar, S., & Sviridenko, M. (2008). Algorithms for capacitated rectangle stabbing and lot sizing with joint set-up costs. ACM Transactions on Algorithms, 4(3), 34.

    Article  Google Scholar 

  • Even, S., & Even, G. (2011). Graph algorithms. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Feige, U. (1998). A threshold of ln for approximating set cover. Journal of the ACM, 45(4), 634–652.

    Article  Google Scholar 

  • Garey, M. R., Johnson, D. S., & Stockmeyer, L. (1974). Some simplified NP-complete problems. In STOC ’74 (pp. 47–63). New York: ACM.

    Google Scholar 

  • Garg, N., Vazirani, V., & Yannakakis, M. (1997). Primal-dual approximation algorithms for integral flow and multicut in trees. Algorithmica, 18(1), 3–20.

    Article  Google Scholar 

  • Gaur, D., Ibaraki, T., & Krishnamurti, R. (2002). Constant ratio approximation algorithms for the rectangle stabbing problem and the rectilinear partitioning problem. Journal of Algorithms, 43(1), 138–152.

    Article  Google Scholar 

  • Gavril, F. (1972). Algorithms for minimum coloring, maximum clique, minimum covering by cliques, and maximum independent set of a chordal graph. SIAM Journal on Computing, 1(2), 180–187.

    Article  Google Scholar 

  • Glazer, K., & Rubinstein, A. (2006). A study in the pragmatics of persuasion: a game theoretical approach. Theoretical Economics, 1, 395–410.

    Google Scholar 

  • Golovin, D., Nagarajan, V., & Singh, M. (2006). Approximating the k-multicut problem. In Proceedings of the seventeenth annual ACM-SIAM symposium on discrete algorithm (pp. 621–630). New York: ACM.

    Chapter  Google Scholar 

  • Gutfraind, A., Hagberg, A., Izraelevitz, D., & Pan, F. (2011). Interdiction of a Markovian evader. In R. K. Wood & R. F. Dell (Eds.), Proceedings of the 12th INFORMS computing society conference on OR, computing, and homeland defense, INFORMS (pp. 3–15).

    Google Scholar 

  • Gutfraind, A., Hagberg, A., & Pan, F. (2009). Optimal interdiction of unreactive Markovian evaders. In J. Hooker & W.-J. van Hoeve (Eds.), Lecture notes in computer science: Vol. 5547. Proc. CPAIOR (pp. 102–116). Berlin: Springer.

    Google Scholar 

  • Hajiaghayi, M., Khandekar, R., Kortsarz, G., & Mestre, J. (2012). The checkpoint problem. Theoretical Computer Science, 452, 88–99.

    Article  Google Scholar 

  • Iwata, S., & Nagano, K. (2009). Submodular function minimization under covering constraints. In FOCS (pp. 671–680).

    Google Scholar 

  • Johnson, D. B. (1975). Finding all the elementary circuits of a directed graph. SIAM Journal on Computing, 4(1), 77–84.

    Article  Google Scholar 

  • Katz, M., Nielsen, F., & Segal, M. (2003). Maintenance of a piercing set for intervals with applications. Algorithmica, 36(1), 59–73.

    Article  Google Scholar 

  • Khot, S., & Regev, O. (2008). Vertex cover might be hard to approximate to within 2−ϵ. Journal of Computer and System Sciences, 74(3), 335–349.

    Article  Google Scholar 

  • Koufogiannakis, C., & Young, N. E. (2009). Greedy Δ-approximation algorithm for covering with arbitrary constraints and submodular cost. In ICALP (1) (pp. 634–652).

    Google Scholar 

  • Levin, A., & Segev, D. (2006). Partial multicuts in trees. Theoretical Computer Science, 369(1), 384–395.

    Article  Google Scholar 

  • McMasters, A. W., & Mustin, T. M. (1970). Optimal interdiction of a supply network. Naval Research Logistics Quarterly, 17(3), 261–268.

    Article  Google Scholar 

  • Megiddo, N., Zemel, E., & Hakimi, S. L. (1983). The maximum coverage location problem. SIAM Journal on Algebraic and Discrete Methods, 4(2), 253–261.

    Article  Google Scholar 

  • Miettinen, P. (2008). On the positive-negative partial set cover problem. Information Processing Letters, 108(4), 219–221.

    Article  Google Scholar 

  • Nielsen, F. (2000). Fast stabbing of boxes in high dimensions. Theoretical Computer Science, 246(1), 53–72.

    Article  Google Scholar 

  • Pan, F., Charlton, W. S., & Morton, D. P. (2003). Interdicting smuggled nuclear material. In D. Woodruff (Ed.) Network interdiction and stochastic integer programming (pp. 1–19). Boston: Kluwer Academic.

    Chapter  Google Scholar 

  • Ratliff, H. D., Sicilia, G. T., & Lubore, S. H. (1975). Finding the n most vital links in flow networks. Management Science, 21(5), 531–539.

    Article  Google Scholar 

  • Robertson, N., Sanders, D. P., Seymour, P., & Thomas, R. (1996). Efficiently four-coloring planar graphs. In STOC ’96 (pp. 571–575). New York: ACM.

    Chapter  Google Scholar 

  • Zuckerman, D. (2007). Linear degree extractors and the inapproximability of max clique and chromatic number. Theory of Computing, 3(1), 103–128.

    Article  Google Scholar 

Download references

Acknowledgements

We thank Amotz Bar-Noy and Rohit Parikh for useful discussions and two anonymous reviewers for valuable criticism. This work was funded by the Department of Energy at the Los Alamos National Laboratory through the LDRD program, and by the Defense Threat Reduction Agency. AG would like to thank Robert Kleinberg for fascinating lectures, and Feng Pan and Aric Hagberg for the support.

Some of the above results appeared as an extended abstract in the Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS) 2011. We have added proofs to many of the theorems and Theorem 6, which establishes a connection from Network Interdiction to graph coloring.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Gutfraind.

Additional information

This work was performed in part while first author’s visiting Los Alamos National Laboratory.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Johnson, M.P., Gutfraind, A. & Ahmadizadeh, K. Evader interdiction: algorithms, complexity and collateral damage. Ann Oper Res 222, 341–359 (2014). https://doi.org/10.1007/s10479-013-1372-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-013-1372-x

Keywords

Navigation