transport infrastructure vul bilit h t kthlnerability ...€¦ · transport infrastructure vul...
TRANSCRIPT
![Page 1: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/1.jpg)
Transport infrastructure l bilit h t KTHvulnerability research at KTH
L Gö M ttLars-Göran MattssonDepartment of Transport and Economics
Centre for Transport StudiesRoyal Institute of TechnologyRoyal Institute of [email protected]
1
![Page 2: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/2.jpg)
Transport reliability and vulnerabilityRailRail
• Empirical studies of the Swedish rail system • Empirical studies of the Swedish rail system (Wiklund)
• Railway operation analysis (O Lindfeldt)• Railway operation analysis (O Lindfeldt)• Empirical studies of delays and capacity
utilisation (A Lindfeldt)utilisation (A Lindfeldt)
2
![Page 3: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/3.jpg)
Transport reliability and vulnerabilityRoadRoad
T l ti li bilit (Bö j Eli • Travel time reliability (Börjesson, Eliasson, Franklin, Karlström)
Theoretical and empirical studies of the value – Theoretical and empirical studies of the value of reliability
– What is the cost of necessary safety margins What is the cost of necessary safety margins to cope with (known) randomness in travel times?
• Road network vulnerability (Berdica, Jenelius, Mattsson, Petersen)
3
![Page 4: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/4.jpg)
Road network vulnerabilityBased on research by Erik Jenelius
Events sometimes occur that severely • Events sometimes occur that severely disrupt transportation services
• Can have big impacts on individuals and • Can have big impacts on individuals and businesses
• For individuals: reduced accessibility to ysocial services, loss of access to/time for work, school, daycare, shopping, recreation, etcetc.
• For businesses: loss of manpower/ customers, delayed deliveries, increased , y ,freight costs, etc.
4
![Page 5: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/5.jpg)
Network disruptionsNetwork disruptions
5
![Page 6: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/6.jpg)
Aim
• Before occurrence identify scenarios that• Before occurrence, identify scenarios that– would have severe consequences for society– could occur in the futurecould occur in the future
• Important sub-tasks:– Identify critical points/areas where incidents Identify critical points/areas where incidents
are likely and/or could have particularly severe impacts
– Identify users/regions that would be particularly affected by an incident
6
![Page 7: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/7.jpg)
ValueValue
• In planning stage: • In planning stage: – Adjust location/structure of roads to risks– Support road projects providing redundancy Support road projects providing redundancy
to existing network
• In maintenance/operations stage: p g– Probability of disruption can be reduced by
upgrades and maintenance– Consequences can be reduced by information
and swift restoration
7
![Page 8: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/8.jpg)
ImportanceImportance
• A link or larger area is important if disruption • A link or larger area is important if disruption there would have severe impacts for users overall
• An operator’s perspective of vulnerability
8
![Page 9: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/9.jpg)
ExposureExposure
• A group of users is exposed to a certain • A group of users is exposed to a certain scenario if it would have severe impacts for the groupg p
• We study regional exposure: users grouped according to municipality/county of trip origin
• User’s perspective
9
![Page 10: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/10.jpg)
Analysis focusAnalysis focus
• Large-scale real-world road networks• Large scale real world road networks• Full-range analysis (”all links”)• Draw general conclusions• Draw general conclusions
10
![Page 11: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/11.jpg)
Impact modelImpact model
• Simple indicator: Delay with only route • Simple indicator: Delay with only route adjustment
• Users assumed to minimise travel timeUsers assumed to minimise travel time• For computational reasons: link travel
times assumed unchanged by disruptiong y p
• Unsatisfied demand: Users unable to Unsatisfied demand: Users unable to travel during disruption
• Calculate delay as waiting time until y greopening, assuming constant travel demand
11
![Page 12: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/12.jpg)
12
![Page 13: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/13.jpg)
Link importance(Critical link analysis)
• Total delay due to link Total delay due to link closure
• 48 h closure
13
![Page 14: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/14.jpg)
Case studies – recent research Case studies recent research
1 Geographical disparities in vulnerability1. Geographical disparities in vulnerability2. Area-covering disruptions3 Secondary link importance3. Secondary link importance4. Traveller costs of unplanned transport
network disruptionsnetwork disruptions
14
![Page 15: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/15.jpg)
1 Regional disparities in vulnerability1. Regional disparities in vulnerability
• Study geographical variations in • Study geographical variations in vulnerability
• Can these differences be explained by Can these differences be explained by network structure and travel patterns?
15
![Page 16: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/16.jpg)
Regional exposure and importance
• Expected user exposure: Average delay per Expected user exposure: Average delay per traveller starting in the region due to disruption of random link in the whole network
• Expected importance: Total delay for travellers in the whole network due to disruption of random link in the regionrandom link in the region
Delay in region
Delay in wholeregion whole
Disruption in region
Importanceeg o
Disruption in whole
Exposure
16
![Page 17: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/17.jpg)
utsatthet/resenär (10^ 6 h) betydelsefullhet (h)user exposure (10-6 h) importance (h)utsatthet/resenär (10^-6 h)1.763 - 3.8463.846 - 5.3385.338 - 7.0247.024 - 9.839
betydelsefullhet (h)0.1 - 0.3220.322 - 0.4990.499 - 0.7720.772 - 1.501
p ( ) p ( )
9.839 - 52.468
Stockholm Stockholm
1.501 - 10.085
G th b
Stockholm Stockholm
G th bGothenburg Gothenburg
170 100 200 300 400 Kilometers
NSkåne Skåne
N
0 100 200 300 400 Kilometers
![Page 18: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/18.jpg)
Regression analysisRegression analysis
• Regress exposure on variables capturing • Regress exposure on variables capturing network structure and travel patterns of the own regiong
• Exposure should be high if network density low (low -index = #links / #nodes and high average link length)
• Exposure high if average user travel timelong
18
![Page 19: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/19.jpg)
link length (km) genomsn. restid (h)0.118 - 0.2360 236 0 275
aver. user travel time (h)beta index1.036 - 1.2771 277 1 343
länklängd (km)0.422 - 1.8381 838 2 431
link length (km)
0.236 - 0.2750.275 - 0.3250.325 - 0.370.37 - 0.783
1.277 - 1.3431.343 - 1.3881.388 - 1.4341.434 - 1.554
1.838 - 2.4312.431 - 3.0253.025 - 3.8583.858 - 11.005
StockholmStockholm Stockholm
Gothenburg GothGothenburg Gothenburg
0 100 200 300 400 Kilometers
NSkåne
0 100 200 300 400 Kilometers
NSkåne Skåne
N
0 100 200 300 400 Kilometers
19
![Page 20: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/20.jpg)
Explaining user exposure (UE)
Adj. R2 = 0.90
ln 4.8 2.1ln 0.70ln 0.83lnr r r rUE l T
20
![Page 21: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/21.jpg)
ConclusionsConclusions
• Long-term vulnerability strongly • Long term vulnerability strongly determined by network structure and travel patternsp
• Complex measures can be approximated with simple variables
• Difficult to affect patterns with infrastructure investments
21
![Page 22: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/22.jpg)
2 Area-covering disruptions2. Area covering disruptions
• Extend single-link analysis to areas• Extend single link analysis to areas• Develop methodology for systematic
analysisanalysis• Apply to large real-world road networks• Where are area-covering disruptions most • Where are area covering disruptions most
severe?• What differs from single-link failures?What differs from single link failures?
22
![Page 23: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/23.jpg)
Methodology
• Study area is covered with grid of equally h d d i d llshaped and sized cells
• Each cell represents spatial extent of disruptive eventdisruptive event
• Event representation: All links intersecting cell are closed remaining links unaffectedcell are closed, remaining links unaffected
Square
23
![Page 24: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/24.jpg)
Cell importanceCell importance
• 25 km grids• 25 km grids• Each small square shows
mean importance of the mean importance of the four intersecting cells
24
![Page 25: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/25.jpg)
Cell importanceCell importance
• Unsatisfied demand constitutes on Unsatisfied demand constitutes on average 60% - 90% of total delay
• For most important cells, almost all delay due to unsatisfied demand
• Unsatisfied demand consists of internal, inbound/outbound and crossing demandinbound/outbound and crossing demand
25
![Page 26: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/26.jpg)
Ratio cell/mean linkimportance• Ratio largest where both • Ratio largest where both
demand and network are dense
26
![Page 27: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/27.jpg)
ConclusionsConclusions
• Other factors behind vulnerability to area-• Other factors behind vulnerability to areacovering disruptions compared to single link failures: demand concentration
• Vulnerability reduced through allocation of restoration resources rather than increasing redundancy
• For important cells, unsatisfied demand constitutes nearly all increase in travel time
27
![Page 28: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/28.jpg)
3 Secondary link importance3. Secondary link importance
• To allocate resources for maintenance, To allocate resources for maintenance, operations and upgrades, it is useful to rank road links according to importance
• Measures of link importance usually reflect role under normal conditions
• Here we are interested in measuring link
importance as rerouting alternative to importance as rerouting alternative to
other links during disruptions
28
![Page 29: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/29.jpg)
Primary and secondary importancePrimary and secondary importance
• Primary importance: Total travel delay caused Primary importance: Total travel delay caused by disruption of link k (typical vulnerability analysis)
• Captures availability of alternatives• Secondary importance: Additional delay for
e o ted flo if link k also o ld be dis pted rerouted flow if link k also would be disrupted • Captures quality of next-best alternatives• Some similarity with synergistic consequences • Some similarity with synergistic consequences
analysis
29
![Page 30: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/30.jpg)
Original link flowsOriginal link flows
30
![Page 31: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/31.jpg)
Primary importancePrimary importance
• 12 h closure duration• 12 h closure duration• Link important if average
user delay is largeuser delay is large
31
![Page 32: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/32.jpg)
Secondary importanceSecondary importance
• Link important if • Link important if average difference in delay ywith/without link is large
32
![Page 33: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/33.jpg)
ConclusionsConclusions
• Identify links important as rerouting • Identify links important as rerouting alternatives
• May motivate extra maintenance although May motivate extra maintenance although normal traffic is not particular high
33
![Page 34: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/34.jpg)
4. Traveller costs of unplanned transport network disruptionstransport network disruptions
• Monetary values for delays needed for e.g. y y gcost-benefit assessment of mitigation measures
• User’s cost per unit of delay may depend on– Characteristics of the user and her
situationWhat information the user has– What information the user has
– When the delay occurs– How long the delay lasts– How long the delay lasts– What adjustments the user can make
34
![Page 35: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/35.jpg)
Average delay cost per hour delayA two way work trip
35
Fixed work schedule Flexible work schedule
![Page 36: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/36.jpg)
ConclusionsConclusions
• Travel time value of unplanned disruptions • Travel time value of unplanned disruptions could be up to 6 times normal value of travel time
• Cost is less if user is informed about the disruption
• Cost is less if user has flexible work schedule
36
![Page 37: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/37.jpg)
Thank you!y
For papers and more information see:
http://www infra kth se/tla/projects/vulnerability/index eng htmlhttp://www.infra.kth.se/tla/projects/vulnerability/index_eng.html
37
![Page 38: Transport infrastructure vul bilit h t KTHlnerability ...€¦ · Transport infrastructure vul bilit h t KTHlnerability research at KTH Lars-Gö M ttGöran Mattsson Department of](https://reader033.vdocuments.net/reader033/viewer/2022060221/5f077bf57e708231d41d35e4/html5/thumbnails/38.jpg)
Not only transport
• Also electric power networks (Holmgren, Jenelius, Molin, Thedéen, Westin)– Framework for vulnerability assessment
– Empirical studies of disturbance data– Application of graph models– Branching network models to explain power laws– Optimal defence against antagonistic attacks– Game theoretic applications to infrastructure
protection under imperfect attacker perceptionprotection under imperfect attacker perception
38