Figure - available from: Journal of Transportation Security
This content is subject to copyright. Terms and conditions apply.
Comparative results for Four Scenarios. Top Row: Base case scenario (no interdictions). Second Row: Suez Canal failure scenario. Third Row: Panama Canal failure scenario. Last Row: Straits of Malacca failure scenario

Comparative results for Four Scenarios. Top Row: Base case scenario (no interdictions). Second Row: Suez Canal failure scenario. Third Row: Panama Canal failure scenario. Last Row: Straits of Malacca failure scenario

Source publication
Article
Full-text available
We model the global maritime transportation system as a multilayer network of sea routes and land routes that work together to deliver cargo on a global scale. The nodes of this network represent seaports and maritime chokepoints, and the arcs represent route segments at sea or on land, respectively. We construct our network using free, publicly av...

Similar publications

Article
Full-text available
The paper deals with the impact that an environmental way of thinking has on shipping and transport company customers regarding their preferences in choosing a transport route. Nowadays, maritime transport plays a very important role mainly in transoceanic container transport. It also deals with the statistics focused on container shipping, especia...

Citations

... Also, it highlights the maritime system's levels and the functions of several shipping sectors. Including various maritime and land trade routes, a multilayer network model offers a comprehensive perspective on maritime trade patterns while permitting more trade-specific patterns (Alderson, Funk, and Gera 2020). They thoroughly list all potential situations with precisely interdicted ports or maritime chokepoints in order to determine the most crucial ports (i.e. ...
Article
Full-text available
International ports play critical roles in maintaining transportation flows and sustaining the effectiveness of global maritime logistics. Although the concept of versatile ports has been introduced to represent the specific patterns that these ports play at the regional and global levels, there is still a need for the design and development of computational approaches that support these notions. This paper introduces a flexible multi-layer network approach for an international maritime network whose interest is that it offers a flexible model that favours the identification of the different transportation flows and versatile ports. The model is complemented by a series of structural indices complemented by a new overlap measure that evaluates the specific role of a given port across various transportation trades. The whole approach is implemented and experimented with using massive AIS maritime data that supports the automatic generation of the multi-layer network, and derivation of the structural measures while maintaining a flexible view of the maritime network. The experiments applied to the global maritime transportation network identify key versatile ports and highlight significant differences at the regional and trade flow levels.
... Research has focused on road networks (e.g., Murray-tuite and Comparison of Transportation Network Resilience under Simulated System Optimum and User Equilibrium Conditions. Presented at the, , 2006; Tamvakis and Xenidis, 2012;Ganin et al., 2017;Calvert and Snelder, 2018;Gauthier et al., 2018;Do and Jung, 2018;El Rashidy and Grant-Muller, 2019;Gonçalves and Ribeiro, 2020), supply chain networks (e.g., (Goodchild et al., 2009;Nair et al., 2010;Chen and Miller-Hooks, 2012;Chen et al., 2017; National Academies of Sciences, 2019; Hassan et al., 2019), maritime and waterway transportation networks (e.g., Mansouri et al., 2009;Baroud et al., 2014;Baroud et al., 2015;Zhang et al., 2016;Asadabadi and Miller-Hooks, 2018;Alderson et al., 2020;Nursey-Bray et al., 2013), air transportation networks (e.g., Janić, 2015;Dunn and Wilkinson, 2016;Chandramouleeswaran and Tran, 2018;, and rail transportation networks (e.g., (D'Lima and Medda, 2015;Adjetey-Bahun et al., 2016;Chan and Schofer, 2016;Bababeik et al., 2018;Janić, 2018;Gu and Li, 2019;Bešinović, 2020). There is also previous research which examines resilience by not considering a specific event, thus investigating resilience in a more generic way (Serulle et al., 2011;Henry and Emmanuel Ramirez-Marquez, 2012;Oecd, 2014;Carpenter et al., 2001;Walker et al., 2004;Mitchell, 2013), as well as research which examines various events in multiple networks (Tang et al., 2020). ...
Article
Resilience is a complex term, bearing multiple definitions and resilience-related metrics. The most commonly utilized metrics are network efficiency and criticality that examine the impact that the removal of a structural element of a graph/ network has on its operation. Efficiency examines this term from a pure topological aspect and takes into account the shortest paths between the nodes whereas, on the other hand, criticality takes into account transportation-related variables like travel demand. In the present research, the interrelation between efficiency and criticality is further examined through a series of simulation experiments on the Athens city-center urban road network. For the quantification of efficiency, vulnerability, and criticality an iterative approach is used where, per iteration, one link of the network was removed. The outputs of the experiments are, then, statistically analyzed, using unsupervised and supervised techniques. Findings reveal that a polynomial relationship between the ratio of criticality and efficiency, and traffic flow exists. Finally, the implications of these findings to traffic and network management are discussed.
... Interruption of chokepoints uses different methodologies in the literature. Funk et al. (Alderson et al., 2020;Funk, 2017) analyzed the maritime sea transportation system and its resilience using a multilayered network theory and then applied multicommodity linear programming to optimize the system. These works aimed to investigate the interruption of some "weak" nodes of the system, i.e., chokepoints and containers port. ...
Article
Maritime chokepoints are key corridors in the global supply chain because they connect waterbodies, countries, and regions worldwide with few alternative routes. In case of closure (as the blockade of the Suez Canal in March 2021), the energy supply is substantially affected. Therefore, clear and safe passage through these chokepoints plays a critical role in energy transportation, global economy, and sustainable development. This study uses Agent-Based Modeling to develop an LNG market model and simulate the disruption of three main chokepoints: Panama Canal, Suez Canal / Bab el-Mandeb Strait, and Malacca Strait. After validating the computational model with the actual historical data, the model shows the chokepoints blockade effects on changing the LNG trade and exports from suppliers. The implications are immediate. In general, countries should work together to secure maritime trade routes, retain clear and safe maritime corridors, establish potential passages as alternatives to these chokepoints where possible, and decentralize LNG plants to have access from or to different maritime routes. Each importer should integrate their gas markets with pipelines networks, search for domestic gas resources, and diversify energy sources to decline energy dependency and gas imports from remote producing areas.
... Alderson modeled the global maritime transportation network as a layered network to evaluate the security of transportation systems utilizing collected data [8]. Furthermore, Carotenuto et al. utilized discrete event simulation to reproduce the behavior of the inventory trend for maritime transportation [9]. ...
... In terms of the emergent effect on the total profit, the combinations of technology IDs (1, 4), (2,4), (4,7), (4,8) had largely positive emergent effects. By contrast, the technology ID combinations (2, 6), (2, 7), (2,8), (6,7), (6,8), and (7,8) had large negative emergent effects. ...
... In terms of the emergent effect on the total profit, the combinations of technology IDs (1, 4), (2,4), (4,7), (4,8) had largely positive emergent effects. By contrast, the technology ID combinations (2, 6), (2, 7), (2,8), (6,7), (6,8), and (7,8) had large negative emergent effects. It was also established that for technology combinations (1,4), (2,4), and (6,7), the effect of the inter-technology interaction became evident as the velocity of the ship increased. ...
Article
Full-text available
The maritime industry is trying to utilize new technology for enhancing its competitiveness to overcome today’s severe economic situation, and some interact effects, or potentially emergent effects, will emerge during the introduction of these technologies. In this study, various simulations that relate to marine logistics and shipping were performed. By contrast, a detailed method that can reproduce emergent effects is required to some extent. This study utilized a Monte Carlo simulation for uncertainties, such as market and failure uncertainties. To evaluate and explore the emergent effect correctly and accurately when multiple technologies are introduced, an evaluation methodology was developed, which can evaluate the interact effect from the perspective of profit improvement and CO2 reduction during the transportation period. As a case study, decision making for introducing 28 technology combinations to the maritime industry was conducted, and the utility of the proposed methodology was assessed.
... In their conclusion, this method will enhance the network's resilience to man-made unconventional emergency events. Alderson et al. (2020) presented a broader view when constructing the global maritime transportation system as a multilayer network of sea routes and land routes including nodes (seaports and maritime chokepoints) and arcs (route segments at sea or on land). They identified important nodes from a connectivity standpoint and directed the aggregate movement of goods between ports on the shortest and/or cheapest available route, then used re-routing strategies if a route segment becomes impassable for container ships. ...
Article
Purpose This paper presents a systematic review of the literature in the domain of maritime disruption management, upon which future research framework and agenda are proposed. Two review questions, i.e. the measures that are employed to manage disruptions and how these contribute to resilience performance, were pursued. Design/methodology/approach The systematic literature review procedure was strictly followed, including identification and planning, execution, selection, and synthesis and analysis. A review protocol was developed, including scope, databases and criteria guiding the review. Following this, 47 articles were eventually extracted for the systematic review to identify themes for not only addressing the review questions but also highlighting future research opportunities. Findings It was found that earlier studies mainly focused on measures, which are designed using mathematical models, management frameworks and other technical support systems, to analyse and evaluate risks, and their impacts on maritime players at the levels of organisation, transport system and region in which the organisation is embedded. There is, however, a lack of research that empirically examines how these measures would contribute to enhancing the resilience performance of maritime firms and their organisational performance as a whole. Subsequently, a Digitally Embedded and Technically Support Maritime Disruption Management (DEST-MDM) model is proposed. Research limitations/implications This review is constrained by studies recorded by the Web of Science only. Nevertheless, the proposed research model would expectedly contribute to enhancing knowledge building in the specific domain of maritime disruption management and supply chain management overall while providing meaningful managerial implications to policymakers and managers in the maritime industry. Originality/value This research is perhaps one of the first studies which presents a systematic review of literature in maritime disruption management, and proposes a future research framework that establishes the link between disruption management and resilience and organisational performance for empirical validation.
... Essentially, the MTS can be composed of several nets and layers including ports, port facilities, vessels, boats, transportation stations, border sites. Also, in order to support those nets and layers of MTS, there are important issues of efficient routes, information management, regulated international framework, risk management, liability as well as security, surveillance [27]- [30]. Fig. 1 depicts possible services and their supports by mobile robots and UAVs in MTS. ...
Article
Full-text available
A Maritime Transportation System (MTS) accomplishes diverse tasks including efficient route, information management, transportation stations. In particular, security and surveillance should be one of critical topics in IoT-supported MTS. In this paper, we introduce a secure framework that creates differential security barriers for virtual emotion detection in IoT-assisted maritime transportation systems. We formally define a problem whose goal is to maximize the number of differential security barriers by mobile robots and UAVs. To solve the problem, we propose two different schemes to provide an improved security detection in priority area so that the proposed methods create the maximum number of security barriers to fit with discriminative security levels in MTS subareas. Then, we analyze their performances through various settings and scenarios with detailed discussions.
... Some indicative approaches on multilayer analysis of spatial networks include analysis of air-sea global networks 36 , the bi-layered Greek maritime network 37 , and the intermingling of six maritime cargo layers 25 . These and similar works 21,[38][39][40] generally build on a cross-layer conceptualization implemented through comparisons between multilayer spatial network layers. Inspired by such conceptualization, this paper generates a multilayer network from a source (original) network, where layers include the same nodes (multiplex network model) with the original network. ...
Article
Full-text available
This paper examines how spatial distance affects network topology, on empirical data concerning the Global Container Shipping Network (GCSN). The GCSN decomposes into 32 multiplex layers defined at several spatial levels by successively removing connections of smaller distances. This multilayer decomposition approach allows studying the topological properties of each layer as a function of distance. The analysis provides insights into the hierarchical structure and (importing and exporting) trade functionality of the GCSN, hub connectivity, several topological aspects, and the distinct role of China in the network’s structure. It also shows that bidirectional links decrease with distance, highlighting the importance of asymmetric functionality in carriers’ operations. It further configures six novel clusters of ports concerning their spatial coverage. Finally, it reveals three levels of geographical scale in the structure of GCSN, where the network topology significantly changes; the neighborhood (local connectivity), the scale of international connectivity (mesoscale or middle connectivity), and the intercontinental market (large scale connectivity). The overall approach provides a methodological framework for analyzing network topology as a function of distance, highlights the spatial dimension in complex and multilayer networks, and provides insights into the spatial structure of the GCSN, which is the most important market of the global maritime economy.
... The problem mainly deals with attacks on networks that may disrupt network operations. Studies concern various types of networks, including telecommunication networks (e.g., Cox [5], Bellmore and Ratliff [6] and Frank and Frisch [7]), transportation networks (e.g., Alderson et al. [8], Kanturska et al. [9], and Bier and Hausken [10]), Electrical networks (e.g., Fang et al. [11]), computer networks (e.g., Obert et al. [12], and Hu et al. [13]), supply chains (e.g., Zhang et al. [14]), and counterdrug interdiction (e.g., Magliocca et al. [15] and Zhang et al. [16]), to name a few. ...
Article
Full-text available
In this paper, we develop solutions to the problem of identifying the k most vital cut-sets of a network under limited attacking resources in a network interdiction context. We treat three different versions of the problem, each having a different objective: namely, the highest probability of a successful attack, the least cost attack, and the least expected cost attack combining both success probability and attacking cost. We introduce a budget constraint to reflect the resource limitation of the attacker. We consider both the case of disjoint and non-disjoint cut-sets to target. We develop a simulation-optimization approach accounting for various techniques including the shortest path problem and the min-cut problem. The solution method is found to be very efficient even for large-scale networks. We implement the suggested algorithms for illustration purposes.
... Maritime chokepoints represent areas with restricted throughput and/or high concentration of ships, such as straits and canals. Because sea traffic is naturally constrained in these places, chokepoints create potential vulnerabilities to the movement of containers across the entire network (Alderson, 2020). As a significant portion of the global maritime trades passes through those specific locations, trade analyses focused on those areas are representative of global patterns. ...
Article
Full-text available
Maritime trade represents a significant part of all global import-export trade. The traffic of containerships can be monitored through Automatic Identification System (AIS), due to the fact that the International Maritime Organization (IMO) regulation requires AIS to be fitted aboard all ships of 300 gross tonnage and upwards engaged on international voyages. The approach proposed by the authors aimed to extract value added information from an AIS dataset, with a focus on maritime economy. Using an AIS dataset of global position of containerships from 01/01/2012 to 31/12/2016, the paper focuses on space-time data cube creation and analysis for a better understanding of maritime trades trends. Data cube creation has been tested at different spatio-temporal bins dimension and on different specific topics (TEU classes, alliances, chokepoints and port areas), analysing the sensitivity on trend results, and highlighting how appropriate spatio-temporal bins dimensions are important to effectively highlight relevant trends. Results of the trend analysis are discussed and validated with the main data and information found over the period 2012–2016. The aim of this paper is to demonstrate the suitability of this approach applied to AIS data and to highlight its limitations. The authors can conclude that the approach used has proved to be adequate in describing the evolution of the global import-export trade.
... Ausseil et al. [8] consider some military deception strategies that include falsifying targets and hiding routes on the network to deceive the attacker. Alderson, et al. [9] assess the node interdiction impact on the global maritime transportation. They consider the node as the seaports and maritime chokepoints where a disruption will lead to increase the re-route cost. ...
Article
Full-text available
The paper investigates the most critical k cut-sets to target in the context of attacks on networks. The targeted network fails if the attack successfully disables a full cut-set. The attack process is dynamic and targets one link at a time. We assume perfect information, so that the attacker picks the next link to target after identifying the outcome of the attack on the previous one. The attack may continue to reach up to k cut-sets. The problem is to identify which cut-sets to target (referred to as the k-critical cut-sets of the network) that maximize the probability of a successful attack. We distinguish both cases of disjoint and non-disjoint cut-sets. We develop an algorithm for each case with illustrations. We explore the large scale of networks and offer guidelines on the corresponding defensive strategies.