Abstract
In network interdiction problems, evaders (e.g., hostile agents or data packets) are moving through a network toward targets and we wish to choose locations for sensors in order to intercept the evaders. The evaders might follow deterministic routes or Markov chains, or they may be reactive, i.e., able to change their routes in order to avoid the sensors. The challenge in such problems is to choose sensor locations economically, balancing interdiction gains with costs, including the inconvenience sensors inflict upon innocent travelers. We study the objectives of (1) maximizing the number of evaders captured when limited by a budget on sensing cost and, (2) capturing all evaders as cheaply as possible.
We give algorithms for optimal sensor placement in several classes of special graphs and hardness and approximation results for general graphs, including evaders who are deterministic, Markov chain-based, reactive and unreactive.
A similar-sounding but fundamentally different problem setting was posed by Glazer and Rubinstein where both evaders and innocent travelers are reactive. We again give optimal algorithms for special cases and hardness and approximation results on general graphs.
Similar content being viewed by others
References
Agarwal, A., Alon, N., & Charikar, M. (2007). Improved approximation for directed cut problems. In STOC (pp. 671–680).
Bar-Noy, A., Khuller, S., & Schieber, B. (1995). The complexity of finding most vital arcs and nodes (Tech. Rep.). University of Maryland, College Park, MD, USA.
Chuzhoy, J., & Khanna, S. (2009). Polynomial flow-cut gaps and hardness of directed cut problems. Journal of the ACM, 56(2), 7.
Corley, J. H. W., & Chang, H. (1974). Finding the n most vital nodes in a flow network. Management Science, 21(3), 362–364.
Corley, H. W., & Sha, D. Y. (1982). Most vital links and nodes in weighted networks. Operations Research Letters, 1(4), 157–160.
Even, G., Levi, R., Rawitz, D., Schieber, B., Shahar, S., & Sviridenko, M. (2008). Algorithms for capacitated rectangle stabbing and lot sizing with joint set-up costs. ACM Transactions on Algorithms, 4(3), 34.
Even, S., & Even, G. (2011). Graph algorithms. Cambridge: Cambridge University Press.
Feige, U. (1998). A threshold of ln for approximating set cover. Journal of the ACM, 45(4), 634–652.
Garey, M. R., Johnson, D. S., & Stockmeyer, L. (1974). Some simplified NP-complete problems. In STOC ’74 (pp. 47–63). New York: ACM.
Garg, N., Vazirani, V., & Yannakakis, M. (1997). Primal-dual approximation algorithms for integral flow and multicut in trees. Algorithmica, 18(1), 3–20.
Gaur, D., Ibaraki, T., & Krishnamurti, R. (2002). Constant ratio approximation algorithms for the rectangle stabbing problem and the rectilinear partitioning problem. Journal of Algorithms, 43(1), 138–152.
Gavril, F. (1972). Algorithms for minimum coloring, maximum clique, minimum covering by cliques, and maximum independent set of a chordal graph. SIAM Journal on Computing, 1(2), 180–187.
Glazer, K., & Rubinstein, A. (2006). A study in the pragmatics of persuasion: a game theoretical approach. Theoretical Economics, 1, 395–410.
Golovin, D., Nagarajan, V., & Singh, M. (2006). Approximating the k-multicut problem. In Proceedings of the seventeenth annual ACM-SIAM symposium on discrete algorithm (pp. 621–630). New York: ACM.
Gutfraind, A., Hagberg, A., Izraelevitz, D., & Pan, F. (2011). Interdiction of a Markovian evader. In R. K. Wood & R. F. Dell (Eds.), Proceedings of the 12th INFORMS computing society conference on OR, computing, and homeland defense, INFORMS (pp. 3–15).
Gutfraind, A., Hagberg, A., & Pan, F. (2009). Optimal interdiction of unreactive Markovian evaders. In J. Hooker & W.-J. van Hoeve (Eds.), Lecture notes in computer science: Vol. 5547. Proc. CPAIOR (pp. 102–116). Berlin: Springer.
Hajiaghayi, M., Khandekar, R., Kortsarz, G., & Mestre, J. (2012). The checkpoint problem. Theoretical Computer Science, 452, 88–99.
Iwata, S., & Nagano, K. (2009). Submodular function minimization under covering constraints. In FOCS (pp. 671–680).
Johnson, D. B. (1975). Finding all the elementary circuits of a directed graph. SIAM Journal on Computing, 4(1), 77–84.
Katz, M., Nielsen, F., & Segal, M. (2003). Maintenance of a piercing set for intervals with applications. Algorithmica, 36(1), 59–73.
Khot, S., & Regev, O. (2008). Vertex cover might be hard to approximate to within 2−ϵ. Journal of Computer and System Sciences, 74(3), 335–349.
Koufogiannakis, C., & Young, N. E. (2009). Greedy Δ-approximation algorithm for covering with arbitrary constraints and submodular cost. In ICALP (1) (pp. 634–652).
Levin, A., & Segev, D. (2006). Partial multicuts in trees. Theoretical Computer Science, 369(1), 384–395.
McMasters, A. W., & Mustin, T. M. (1970). Optimal interdiction of a supply network. Naval Research Logistics Quarterly, 17(3), 261–268.
Megiddo, N., Zemel, E., & Hakimi, S. L. (1983). The maximum coverage location problem. SIAM Journal on Algebraic and Discrete Methods, 4(2), 253–261.
Miettinen, P. (2008). On the positive-negative partial set cover problem. Information Processing Letters, 108(4), 219–221.
Nielsen, F. (2000). Fast stabbing of boxes in high dimensions. Theoretical Computer Science, 246(1), 53–72.
Pan, F., Charlton, W. S., & Morton, D. P. (2003). Interdicting smuggled nuclear material. In D. Woodruff (Ed.) Network interdiction and stochastic integer programming (pp. 1–19). Boston: Kluwer Academic.
Ratliff, H. D., Sicilia, G. T., & Lubore, S. H. (1975). Finding the n most vital links in flow networks. Management Science, 21(5), 531–539.
Robertson, N., Sanders, D. P., Seymour, P., & Thomas, R. (1996). Efficiently four-coloring planar graphs. In STOC ’96 (pp. 571–575). New York: ACM.
Zuckerman, D. (2007). Linear degree extractors and the inapproximability of max clique and chromatic number. Theory of Computing, 3(1), 103–128.
Acknowledgements
We thank Amotz Bar-Noy and Rohit Parikh for useful discussions and two anonymous reviewers for valuable criticism. This work was funded by the Department of Energy at the Los Alamos National Laboratory through the LDRD program, and by the Defense Threat Reduction Agency. AG would like to thank Robert Kleinberg for fascinating lectures, and Feng Pan and Aric Hagberg for the support.
Some of the above results appeared as an extended abstract in the Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS) 2011. We have added proofs to many of the theorems and Theorem 6, which establishes a connection from Network Interdiction to graph coloring.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was performed in part while first author’s visiting Los Alamos National Laboratory.
Rights and permissions
About this article
Cite this article
Johnson, M.P., Gutfraind, A. & Ahmadizadeh, K. Evader interdiction: algorithms, complexity and collateral damage. Ann Oper Res 222, 341–359 (2014). https://doi.org/10.1007/s10479-013-1372-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10479-013-1372-x