IDEAS home Printed from https://ideas.repec.org/a/inm/ordeca/v16y2019i1p31-45.html
   My bibliography  Save this article

Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach

Author

Listed:
  • Yael Deutsch

    (Department of Management, Bar-Ilan University, 5290002 Ramat-Gan, Israel)

  • Boaz Golany

    (Faculty of Industrial Engineering and Management, Technion, Israel Institute of Technology, 3200003 Haifa, Israel)

Abstract

The prevention of malicious attacks on secured areas, such as airports and government installations, is a major concern everywhere as terror organizations increase their global reach. Typically, traffic in and out of such protected areas happens through well-defined gates. An attacker who wants to penetrate the area has to do it through one of the gates, and the defender who protects the area tries to prevent it by inspecting the incoming traffic. The trade-off faced by the defender is that increased inspections adversely affect the vast majority of innocent people passing through the gates by causing longer queues and discomfort. We combine game theory considerations with queueing theory analysis to address such situations. We formulate and analytically solve a defender–attacker game that takes place at multiple gates of a secured area. The gates are modeled as M / M / N queueing systems, where the “N” s are chosen strategically by the defender and may vary among the gates. Our analysis shows scenarios where even a limited number of guards is sufficient to deter would-be attackers and there is no need to assign additional guards even if they are available at no further cost.

Suggested Citation

  • Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
  • Handle: RePEc:inm:ordeca:v:16:y:2019:i:1:p:31-45
    DOI: 10.1287/deca.2018.0375
    as

    Download full text from publisher

    File URL: https://doi.org/10.1287/deca.2018.0375
    Download Restriction: no

    File URL: https://libkey.io/10.1287/deca.2018.0375?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    2. Deutsch, Yael & Golany, Boaz & Rothblum, Uriel G., 2011. "Determining all Nash equilibria in a (bi-linear) inspection game," European Journal of Operational Research, Elsevier, vol. 215(2), pages 422-430, December.
    3. Yael Deutsch & Boaz Golany, 2016. "Multiple agents finitely repeated inspection game with dismissals," Annals of Operations Research, Springer, vol. 237(1), pages 7-26, February.
    4. Naraphorn Haphuriwat & Vicki M. Bier & Henry H. Willis, 2011. "Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation," Decision Analysis, INFORMS, vol. 8(2), pages 88-102, June.
    5. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    6. Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
    7. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    8. E. Boros & L. Fedzhora & P. B. Kantor & K. Saeger & P. Stroud, 2009. "A large‐scale linear programming model for finding optimal container inspection strategies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 56(5), pages 404-420, August.
    9. Huseyin Cavusoglu & Srinivasan Raghunathan, 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis, INFORMS, vol. 1(3), pages 131-148, September.
    10. Yael Deutsch & Boaz Golany, 2018. "The effect of risk aversion on the outcomes of inspection games," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 645-660, May.
    11. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    12. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    13. Yael Deutsch & Boaz Golany, 2016. "Multiple agents finitely repeated inspection game with dismissals," Annals of Operations Research, Springer, vol. 237(1), pages 7-26, February.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Vicki M. Bier & Simon French, 2020. "From the Editors: Decision Analysis Focus and Trends," Decision Analysis, INFORMS, vol. 17(1), pages 1-8, March.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    2. Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
    3. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    4. Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
    5. Deutsch, Yael, 2021. "A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game," European Journal of Operational Research, Elsevier, vol. 288(3), pages 1036-1052.
    6. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    7. Jason R. W. Merrick & Fabrizio Ruggeri & Refik Soyer & L. Robin Keller, 2012. "From the Editors---Games and Decisions in Reliability and Risk," Decision Analysis, INFORMS, vol. 9(2), pages 81-85, June.
    8. L. Robin Keller, 2012. "From the Editor---Decisions over Time (Exploding Offers or Purchase Regret), in Game Settings (Embedded Nash Bargaining or Adversarial Games), and in Influence Diagrams," Decision Analysis, INFORMS, vol. 9(1), pages 1-5, March.
    9. L. Robin Keller & Kelly M. Kophazi, 2012. "From the Editors ---Copulas, Group Preferences, Multilevel Defenders, Sharing Rewards, and Communicating Analytics," Decision Analysis, INFORMS, vol. 9(3), pages 213-218, September.
    10. L. Robin Keller & Kelly M. Kophazi, 2011. "From the Editors---Deterrence, Multiattribute Utility, and Probability and Bayes' Updating," Decision Analysis, INFORMS, vol. 8(2), pages 83-87, June.
    11. L. Robin Keller & Ali Abbas & J. Eric Bickel & Vicki M. Bier & David V. Budescu & John C. Butler & Philippe Delquié & Kenneth C. Lichtendahl & Jason R. W. Merrick & Ahti Salo & George Wu, 2011. "From the Editors ---Probability Scoring Rules, Ambiguity, Multiattribute Terrorist Utility, and Sensitivity Analysis," Decision Analysis, INFORMS, vol. 8(4), pages 251-255, December.
    12. Deutsch, Yael & Goldberg, Noam & Perlman, Yael, 2019. "Incorporating monitoring technology and on-site inspections into an n-person inspection game," European Journal of Operational Research, Elsevier, vol. 274(2), pages 627-637.
    13. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    14. L. Robin Keller & Ali Abbas & Manel Baucells & Vicki M. Bier & David Budescu & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Ahti Salo & George Wu, 2010. "From the Editors..," Decision Analysis, INFORMS, vol. 7(4), pages 327-330, December.
      • L. Robin Keller & Manel Baucells & Kevin F. McCardle & Gregory S. Parnell & Ahti Salo, 2007. "From the Editors..," Decision Analysis, INFORMS, vol. 4(4), pages 173-175, December.
      • L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2008. "From the Editors..," Decision Analysis, INFORMS, vol. 5(4), pages 173-176, December.
      • L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2009. "From the Editors ..," Decision Analysis, INFORMS, vol. 6(4), pages 199-201, December.
    15. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    16. Yong Wu & Junlin Duan & Tao Dai & Dong Cheng, 2020. "Managing Security Outsourcing in the Presence of Strategic Hackers," Decision Analysis, INFORMS, vol. 17(3), pages 235-259, September.
    17. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    18. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    19. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    20. Naraphorn Haphuriwat & Vicki M. Bier & Henry H. Willis, 2011. "Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation," Decision Analysis, INFORMS, vol. 8(2), pages 88-102, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:16:y:2019:i:1:p:31-45. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.