Abstract
Simulation is widely used to study model for balancing congestion and security of a screening system. Security network is realistic and used in practice, but it is complex to analyze, especially when facing strategic applicants. To our best knowledge, no previous work has been done on a multi-stage security screening network using game theory and queueing theory. This research fills this gap by using simulation. For multi-stage screening, the method to determine the optimal screening probabilities in each stage is critical. Potential applicants may have access to information such as screening policy and other applicants’ behaviors to adjust their application strategies. We use queueing theory and game theory to study the waiting time and the strategic interactions between the approver and the applicants. Arena simulation software is used to build the screening system with three major components: arrival process, screening process, and departure process. We use Matlab Graphic User Interface (GUI) to collect user inputs, then export data through Excel for Arena simulation, and finally export simulation from the results of the Arena to Matlab for analysis and visualization. This research provides some new insights to security screening problems.
This research was partially supported by the United States National Science Foundation (NSF) under award numbers 1200899 and 1334930. This research was also partially supported by the United States Department of Homeland Security (DHS) through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under award number 2010-ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the NSF, DHS, or CREATE. Cen Song and Jun Zhuang are the corresponding authors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bennett AC, Chin YZ (2008) 100 % container scanning: security policy implications for global supply chains. Master’s thesis, Massachusetts Institute of Technology, Engineering Systems Division
Bier VM, Haphuriwat N (2011) Analytical method to identify the number of containers to inspect at us ports to deter terrorist attacks. Ann Oper Res 187(1):137–158
Directorate-General Energy and Transport (2009) The impact of 100 transport. http://ec.europa.eu/transport/modes/maritime/studies/doc/2009_04_scanning_containers.pdf. Accessed July 2014
Dorton SL (2011) Analysis of airport security screening checkpoints using queuing networks and discrete event simulation: a theoretical and empirical approach. Embry-Riddle Aeronautical University, Daytona Beach
Eckel N, Johnson W (1983) A model for screening and classifying potential accounting majors. J Acc Educ 1(2):57–65
Fleming A (2014) Oversold flights, getting bumped and bumping. http://airtravel.about.com/od/travelindustrynews/qt/bumped1.htm. Accessed July 2014
Gasson S, Shelfer KM (2007) IT-based knowledge management to support organizational learning: visa application screening at the INS. Inf Technol People 20(4):376–399
Gaukler GM, Li C, Ding Y, Chirayath SS (2011) Detecting nuclear materials smuggling: performance evaluation of container inspection policies. Risk Anal 32(3):65–87
Gilliam RR (1979) Application of queuing theory to airport passenger security screening. Interfaces 9(4):117–123
Kelton WD, Sadowski RP, Swets NB (2010) Simulation with arena. McGraw-Hill, Higher Education, Boston
Kronik L, Shapira Y (1999) Surface photovoltage phenomena: theory, experiment, and applications. Surf Sci Rep 37(1):1–206
Maddox MW, Gubbins KE (1997) A molecular simulation study of freezing/melting phenomena for lennard-jones methane in cylindrical nanoscale pores. J Chem Phys 107(22):9659–9667
MathWorks (2014) MATLAB GUI. http://www.mathworks.com/discovery/matlab-gui.html. Accessed July 2014
McCarley JS, Kramer AF, Wickens CD, Vidoni ED, Boot WR (2004) Visual skills in airport-security screening. Psychol Sci 15(5):302–306
Merrick JRW, McLay LA (2010) Is screening cargo containers for smuggled nuclear threats worthwhile? Decis Anal 7(2):155–171
Musa JD (2004) Software reliability engineering: more reliable software, faster and cheaper. Tata McGraw-Hill Education, New York
Myerson RB (1997) Game theory: analysis of conflict. Harvard University Press, Cambridge
Newark Liberty International Airport (2014) Facts and information. http://www.panynj.gov/airports/ewr-facts-info.html. Accessed July 2014
Pendergraft DR, Robertson CV, Shrader S (2004) Simulation of an airport passenger security system. In: Proceedings of the 36th conference on Winter simulation, pp 874–878
Regattieri A, Gamberini R, Lolli F, Manzini R (2010) Designing production and service systems using queuing theory: principles and application to an airport passenger security screening system. Int J Serv Oper Manage 6(2):206–225
Roxy P, Devore JL (2011) Statistics: the exploration and analysis of data. Oxford University Press, Oxford
Shustorovich E (1986) Chemisorption phenomena: analytic modeling based on perturbation theory and bond-order conservation. Surf Sci Rep 6(1):1–63
Sundarapandian V (2009) Queueing theory. probability, statistics and queueing theory. PHI Learning, New Delhi
Tadelis S (2013) Game theory: an introduction. Princeton University Press, Princeton
Transportation Security Administration (2013a) Certified cargo screening program. http://www.tsa.gov/certified-cargo-screening-program. Accessed July 2014
Transportation Security Administration (2013b) My TSA mobile application. http://www.tsa.gov/traveler-information/my-tsa-mobile-application. Accessed July 2014
Wang X, Zhuang J (2011) Balancing congestion and security in the presence of strategic applicants with private information. Eur J Oper Res 212(1):100–111
Wolfram S (2002) Some historical notes. http://www.wolframscience.com/reference/notes/971c Accessed July 2014
Yoon D (2007) Analysis of truck delays at container terminal security inspection stations. Ph.D. thesis, New Jersey Institute of Technology, New York
Zeltyn Marmor YN, Mandelbaum et al SA (2011) Simulation-based models of emergency departments: operational, tactical, and strategic staffing. ACM Trans Model Comput Simul (TOMACS) 21(4):24
Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters–defensive strategy with endogenous attacker effort. Oper Res 55(5):976–991
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wang, X., Song, C., Zhuang, J. (2015). Simulating a Multi-Stage Screening Network: A Queueing Theory and Game Theory Application. In: Hausken, K., Zhuang, J. (eds) Game Theoretic Analysis of Congestion, Safety and Security. Springer Series in Reliability Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-13009-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-13009-5_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13008-8
Online ISBN: 978-3-319-13009-5
eBook Packages: EngineeringEngineering (R0)