Skip to main content

Optimal Location of Security Devices

  • Chapter
  • First Online:
Railway Infrastructure Security

Part of the book series: Topics in Safety, Risk, Reliability and Quality ((TSRQ,volume 27))

Abstract

The design of a security system, in terms of number and position of the security devices composing it, is one of the main issue tackled in METRIP project (MEthodological Tool for Railway Infrastructure Protection). It is a complex problem where a very large set of configurations has to be explored in order to determine the most efficient one, which guarantees the highest protection level. Indeed a good placement of the devices has to satisfy two main targets. On one side it has to guarantee the highest security level, i.e. it has to be able to control the widest achievable area. On the other side, it has to be economically sustainable, i.e. it has to be realized with acceptable costs. In literature this problem is generally referred to as sensor placement problem, widely treated by integer linear programming models and combinatorial optimization methods. In this chapter we will present the main covering models present in literature and adopted in METRIP project for the placement of devices preventing the malicious intrusions in railway assets, with particular reference to the intrusions in a railway station. The applicability of these models will be proved using two test cases which represent two typical railway asset schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jenkins BM, Butterworth BR (2010) Explosives and incendiaries used in terrorist attacks on public surface transportation: a preliminary empirical analysis. Mineta Transportation Institute

    Google Scholar 

  2. Butterworth BR (2011) Empirical data to guide risk mitigation: examples from MTI database. Mineta Transportation Institute National Transportation Security Center

    Google Scholar 

  3. Wilson JM, Jackson BA, Eisman M, Steinberg P, Riley KJ (2007) Securing America’s passenger-rail systems. Rand Corporation, Santa Monica

    Google Scholar 

  4. Sforza A, Sterle C, D’Amore P, Tedesco A, De Cillis F, Setola R (2013) Optimization models in a smart tool for the railway infrastructure protection. Lect Notes Comput Sci 8328:191–196. doi:10.1007/978-3-319-03964-0_17

  5. Daskin MS (1995) Network and discrete location: models, algorithms and applications. Wiley, New York

    Book  MATH  Google Scholar 

  6. Hakimi SL (1964) Optimum locations of switching centers and the absolute centers and medians of a graph. Oper Res 12:450–459

    Article  MATH  Google Scholar 

  7. ReVelle CS, Swain RW (1970) Central facilities location. Geogr Anal 2(1):30–42

    Article  Google Scholar 

  8. Hakimi SL (1965) Optimum distribution of switching centers in a communication network and some related graph theoretic problems. Oper Res 13:462–475

    Article  MATH  MathSciNet  Google Scholar 

  9. Toregas C, ReVelle C, Swain R, Bergman L (1971) The location of emergency service facilities. Oper Res 19:1363–1373

    Article  MATH  Google Scholar 

  10. Church R, ReVelle C (1974) The maximal covering location problem. Pap Reg Sci Assoc 32:101–118

    Article  Google Scholar 

  11. Berman O, Drezner Z, Krass D (2010) Generalized coverage: new developments in covering location models. Comput Oper Res 37:1675–1687

    Article  MATH  MathSciNet  Google Scholar 

  12. Li X, Zhao Z, Zhu X, Wyatt T (2011) Covering models and optimization techniques for emergency response facility location and planning: a review. Math Methods Oper Res 74:281–310

    Article  MATH  MathSciNet  Google Scholar 

  13. Chvàtal V (1975) A combinatorial theorem in plane geometry. J Comb Theory, Ser B 18:39–41

    Article  MATH  Google Scholar 

  14. O’Rourke J (1987) Art gallery theorems and algorithms. Oxford University Press, New York

    MATH  Google Scholar 

  15. Ghosh SK (2010) Approximation algorithms for art gallery problems in polygons. Discrete Appl Math 158(6):718–722

    Article  MATH  MathSciNet  Google Scholar 

  16. Guvensan MA, Yavuz AG (2011) On coverage issues in directional sensor networks: a survey. Ad Hoc Netw 9(7):1238–1255

    Article  Google Scholar 

  17. Chakrabarty K, Sitharama S, Cho E (2002) Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans Comput 51(12):1448–1453

    Article  MathSciNet  Google Scholar 

  18. Dhillon SS, Chakrabarty K, Iyengar SS (2002) Sensor placement for grid coverage under imprecise detections. In: Proceedings of the 15th international conference on information fusion vol 2, pp 1581–1587

    Google Scholar 

  19. Erdem UM, Sclaroff S (2006) Automated camera layout to satisfy task-specific and floor plan-specific coverage requirements. Comput Vis Image Underst 103:156–169

    Article  Google Scholar 

  20. Hörster E, Lienhart R (2006) On the optimal placement of multiple visual sensors. In: Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks (VSSN), pp 111–120

    Google Scholar 

  21. Murray AT, Kim K, Davis JW, Machiraju R, Parent R (2007) Coverage optimization to support security monitoring. Comput Environ Urban Syst 31(2):133–147

    Article  Google Scholar 

  22. Yabuta K, Kitazawa H (2008) Optimum camera placement considering camera specification for security monitoring. Int Symp Circ Syst ISCAS 2008:2114–2117

    Google Scholar 

  23. Osais Y, St-Hilaire M, Yu F (2009) On sensor placement for directional wireless sensor networks. In: Proceeding of IEEE international conference on on communications (ICC’09), Dresden, Germany, pp 1–5

    Google Scholar 

  24. Van Der Hengel A, Hill R, Ward B, Cichowsi A, Detmold H, Madden C, Dick A, Bastian J (2009) Automatic camera placement for large scale surveillance networks. In: 2nd international conference on pervasive technologies related to assistive environments, (PETRA)

    Google Scholar 

  25. Debaque B, Jedidi R, Prevost D (2009) Optimal video camera network deployment to support security monitoring. Inf Fusion 1730–1736

    Google Scholar 

  26. Mostafavi SA, Dehghan M (2011) Optimal visual sensor placement for coverage based on target location profile. Ad Hoc Netw 9:528–541

    Article  Google Scholar 

  27. Hogan K, ReVelle C (1986) Concepts and applications of backup coverage. Manage Sci 32:1434–1444

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by Ansaldo STS under Grant HOME/2010/CIPS/AG/035 METRIP—MEthodological Tools for Railway Infrastructure Protection, financed by the European Commission, Directorate-General Home Affairs, within the Specific Programme on Prevention, Preparedness and Consequence Management of Terrorism and other Security-related risks.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Antonio Sforza or Claudio Sterle .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Sforza, A., Starita, S., Sterle, C. (2015). Optimal Location of Security Devices. In: Setola, R., Sforza, A., Vittorini, V., Pragliola, C. (eds) Railway Infrastructure Security. Topics in Safety, Risk, Reliability and Quality, vol 27. Springer, Cham. https://doi.org/10.1007/978-3-319-04426-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04426-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04425-5

  • Online ISBN: 978-3-319-04426-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics