Towards a Secure Two-Stage Supply Chain Network: A Transportation-Cost Approach
The robustness, resilience and security of supply chain transportation is an active research topic, as it directly determines the overall supply chain resilience and security. In this paper, we propose a theoretical model for the transportation problem within a two-stage supply chain network with security constraints called the Secure Supply Chain Network (SSCN). The SSCN contains a manufacturer, directly connected to several distribution centres DC, which are directly connected to one or more customers C. Each direct link between any two elements of Secure Supply Chain Network is allocated a transportation cost. Within the proposed model, the manufacturer produces a single product type; each distribution centre has a fixed capacity and a security rank. The overall objective of the Secure Supply Chain Network is 100 % customer satisfaction whilst fully satisfying the security constraints and minimizing the overall transportation costs. A heuristic solving technique is proposed and discussed.
The study was conducted under the auspices of the IEEE-CIS Interdisciplinary Emergent Technologies TF.
- 6.Deaconu, A., Ciurea, E.: A study on the feasibility of the inverse supply and demand problem. In: Proceedings 15th International Conference on Computers, pp. 485–490 (2011)Google Scholar
- 12.Pintea, C.-M., Sitar, C.P., Hajdu-Macelaru, M., Petrica, P.: A hybrid classical approach to a fixed-charged transportation problem. In: Corchado, E., Snášel, V., Abraham, A., Woźniak, M., Graña, M., Cho, S.-B. (eds.) HAIS 2012. LNCS (LNAI), vol. 7208, pp. 557–566. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-28942-2_50CrossRefGoogle Scholar
- 15.Rice, J.B., Caniato, F.: Building a secure and resilient supply network. Supply Chain Manag. Rev. 7(5), 22–30 (2003)Google Scholar
- 16.Iantovics, B., Crainicu, B.: A distributed security approach for intelligent mobile multiagent systems. Stud. Comput. Intell. 486, 175–189 (2014)Google Scholar
- 17.Lee, H.L., Wolfe, M.: Supply chain security without tears. Supply Chain Manag. Rev. 7(3), 12–20 (2003)Google Scholar
- 18.Matei, O.: Evolutionary Computation: Principles and Practices. Risoprint, London (2008)Google Scholar
- 20.Nechita, E., et al.: Cooperative ant colonies for vehicle routing problem with time windows. A case study in the distribution of dietary products. WMSCI 5, 48–52 (2008)Google Scholar
- 23.Song, S., Kwok, Y., Hwang, K.: Security-driven heuristics and a fast genetic algorithm for trusted grid job scheduling. Int. Parallel Distrib. Process. IEEE CS 65, 4–12 (2005)Google Scholar
- 28.Li, X., Chandra, C.: Toward a secure supply chain: a system’s perspective. Hum. Syst. Manag. 27(1), 73–86 (2008)Google Scholar
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.