Authors: | Ntalianis, Klimis Mastorakis, Nikolaos Skraparlis, Athanasios |
Issue Date: | 1-Jul-2022 |
Journal: | IEEE Access |
Volume: | 10 |
Keywords: | ADR, Critical infrastructure, Multiple explosions, Real time, Terrorism attacks, Threat assessment, Truck-bomb, Voronoi tessellation |
Abstract: | Critical infrastructures are assets of invaluable importance, essential for the whole world. Since they serve core functions of our societies, they often become targets of terrorists. Many critical infrastructures are vulnerable, due to their short distance from public roads and in the past years, several vehicle-bomb incidents have been recorded. This paper focuses on the case of truck-bombs, which can either be created from scratch, or terrorists can easily hijack truck cargos carrying dangerous goods and turn them into bombs. The latter are typically called ADR truck cargos, according to the respective agreement of the 30th of September 1957, concerning the international carriage of dangerous goods by road. The proposed scheme performs threat assessment of neighboring critical infrastructures, aiming at preventing explosions of truck-bombs. To do so, each crucial point of a critical infrastructure is initially associated with a level of importance. Next, three scenarios are analyzed: (a) single-attack single-infrastructure, (b) multiple-attack single-infrastructure, and (c) multiple-attack multiple-infrastructure. To reduce computational complexity, the third scenario is simplified to one of the two other scenarios, by introducing a novel fusion technique for the non-overlapping segments of the Voronoi tessellation. By this way, an area of threat assessment is estimated for each critical infrastructure. Then, the threat level is assessed in real time by an innovative algorithm, which: (a) estimates the impact of multiple consecutive explosions, (b) uses five adapted threat levels and (c) introduces multiple criteria and minimum classification conditions based on the number of crucial points and their levels of importance. Extensive real world experimental results and comparisons to other works, exhibit the pros and cons of the proposed scheme. In particular, compared to related work, the proposed scheme improves: (a) computational time by 74.5%, (b) threat notification time by 86.9% and (c) estimated surveillance cost by 98.6%. |
ISSN: | 2169-3536 |
DOI: | 10.1109/ACCESS.2022.3189674 |
URI: | https://uniwacris.uniwa.gr/handle/3000/2734 |
Type: | Article |
Department: | Department of Business Administration |
School: | School of Administrative, Economics and Social Sciences |
Affiliation: | University of West Attica (UNIWA) |
Appears in Collections: | Articles / Άρθρα |
CORE Recommender
SCOPUSTM
Citations
4
checked on Dec 18, 2024
Page view(s)
22
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.