Building Robust Closed-Loop Supply Networks against Malicious Attacks

With recent industrial upgrades, it is essential to transform the current forward supply networks (FSNs) into closed-loop supply networks (CLSNs), which are formed by the integration of forward and reverse logistics. The method chosen in this paper for building reverse logistics is to add additional...

Full description

Bibliographic Details
Main Authors: Ding-Shan Deng, Wei Long, Yan-Yan Li, Xiao-Qiu Shi
Format: Article
Language:English
Published: MDPI AG 2021-12-01
Series:Processes
Subjects:
Online Access:https://www.mdpi.com/2227-9717/9/1/39
id doaj-eee39030f1be46d399b2a7ab8fcfa47e
record_format Article
spelling doaj-eee39030f1be46d399b2a7ab8fcfa47e2020-12-27T00:01:43ZengMDPI AGProcesses2227-97172021-12-019393910.3390/pr9010039Building Robust Closed-Loop Supply Networks against Malicious AttacksDing-Shan Deng0Wei Long1Yan-Yan Li2Xiao-Qiu Shi3School of Mechanical Engineering, Sichuan University, Chengdu 610000, ChinaSchool of Mechanical Engineering, Sichuan University, Chengdu 610000, ChinaSchool of Mechanical Engineering, Sichuan University, Chengdu 610000, ChinaSchool of Manufacturing Science and Engineering, Southwest University of Science and Technology, Mianyang 621000, ChinaWith recent industrial upgrades, it is essential to transform the current forward supply networks (FSNs) into closed-loop supply networks (CLSNs), which are formed by the integration of forward and reverse logistics. The method chosen in this paper for building reverse logistics is to add additional functions to the existing forward logistics. This process can be regarded as adding reverse edges to the original directed edges in an FSN. Due to the limitation of funds and the demand for reverse flow, we suppose that a limited number of reverse edges can be built in a CLSN. To determine the transformation schemes with excellent robustness against malicious attacks, this paper proposes a multi-population evolutionary algorithm with novel operators to optimize the robustness of the CLSN, and this algorithm is abbreviated as MPEA-RSN. Then, both the generated and realistic SNs are taken as examples to validate the effectiveness of MPEA-RSN. The simulation results show that the index R, introduced to evaluate the robustness of CLSNs, can be improved by more than 95%, and this indicates that (1) the different schemes for adding reverse routes to an FSN can lead to different robustness values, and (2) the robustness of the transformed CLSN to malicious attacks can be significantly improved after optimization by MPEA-RSN. When an FSN is to be transformed into a CLSN, this paper can provide a frame of reference for building a CLSN that is robust to malicious attacks from a network structural perspective.https://www.mdpi.com/2227-9717/9/1/39closed-loop supply networkrobustnessmulti-population evolutionary algorithmmalicious attacks
collection DOAJ
language English
format Article
sources DOAJ
author Ding-Shan Deng
Wei Long
Yan-Yan Li
Xiao-Qiu Shi
spellingShingle Ding-Shan Deng
Wei Long
Yan-Yan Li
Xiao-Qiu Shi
Building Robust Closed-Loop Supply Networks against Malicious Attacks
Processes
closed-loop supply network
robustness
multi-population evolutionary algorithm
malicious attacks
author_facet Ding-Shan Deng
Wei Long
Yan-Yan Li
Xiao-Qiu Shi
author_sort Ding-Shan Deng
title Building Robust Closed-Loop Supply Networks against Malicious Attacks
title_short Building Robust Closed-Loop Supply Networks against Malicious Attacks
title_full Building Robust Closed-Loop Supply Networks against Malicious Attacks
title_fullStr Building Robust Closed-Loop Supply Networks against Malicious Attacks
title_full_unstemmed Building Robust Closed-Loop Supply Networks against Malicious Attacks
title_sort building robust closed-loop supply networks against malicious attacks
publisher MDPI AG
series Processes
issn 2227-9717
publishDate 2021-12-01
description With recent industrial upgrades, it is essential to transform the current forward supply networks (FSNs) into closed-loop supply networks (CLSNs), which are formed by the integration of forward and reverse logistics. The method chosen in this paper for building reverse logistics is to add additional functions to the existing forward logistics. This process can be regarded as adding reverse edges to the original directed edges in an FSN. Due to the limitation of funds and the demand for reverse flow, we suppose that a limited number of reverse edges can be built in a CLSN. To determine the transformation schemes with excellent robustness against malicious attacks, this paper proposes a multi-population evolutionary algorithm with novel operators to optimize the robustness of the CLSN, and this algorithm is abbreviated as MPEA-RSN. Then, both the generated and realistic SNs are taken as examples to validate the effectiveness of MPEA-RSN. The simulation results show that the index R, introduced to evaluate the robustness of CLSNs, can be improved by more than 95%, and this indicates that (1) the different schemes for adding reverse routes to an FSN can lead to different robustness values, and (2) the robustness of the transformed CLSN to malicious attacks can be significantly improved after optimization by MPEA-RSN. When an FSN is to be transformed into a CLSN, this paper can provide a frame of reference for building a CLSN that is robust to malicious attacks from a network structural perspective.
topic closed-loop supply network
robustness
multi-population evolutionary algorithm
malicious attacks
url https://www.mdpi.com/2227-9717/9/1/39
work_keys_str_mv AT dingshandeng buildingrobustclosedloopsupplynetworksagainstmaliciousattacks
AT weilong buildingrobustclosedloopsupplynetworksagainstmaliciousattacks
AT yanyanli buildingrobustclosedloopsupplynetworksagainstmaliciousattacks
AT xiaoqiushi buildingrobustclosedloopsupplynetworksagainstmaliciousattacks
_version_ 1724370184638038016