Skip to main content

Simulating a Multi-Stage Screening Network: A Queueing Theory and Game Theory Application

  • Chapter
  • First Online:
Game Theoretic Analysis of Congestion, Safety and Security

Part of the book series: Springer Series in Reliability Engineering ((RELIABILITY))

Abstract

Simulation is widely used to study model for balancing congestion and security of a screening system. Security network is realistic and used in practice, but it is complex to analyze, especially when facing strategic applicants. To our best knowledge, no previous work has been done on a multi-stage security screening network using game theory and queueing theory. This research fills this gap by using simulation. For multi-stage screening, the method to determine the optimal screening probabilities in each stage is critical. Potential applicants may have access to information such as screening policy and other applicants’ behaviors to adjust their application strategies. We use queueing theory and game theory to study the waiting time and the strategic interactions between the approver and the applicants. Arena simulation software is used to build the screening system with three major components: arrival process, screening process, and departure process. We use Matlab Graphic User Interface (GUI) to collect user inputs, then export data through Excel for Arena simulation, and finally export simulation from the results of the Arena to Matlab for analysis and visualization. This research provides some new insights to security screening problems.

This research was partially supported by the United States National Science Foundation (NSF) under award numbers 1200899 and 1334930. This research was also partially supported by the United States Department of Homeland Security (DHS) through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under award number 2010-ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the NSF, DHS, or CREATE. Cen Song and Jun Zhuang are the corresponding authors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bennett AC, Chin YZ (2008) 100 % container scanning: security policy implications for global supply chains. Master’s thesis, Massachusetts Institute of Technology, Engineering Systems Division

    Google Scholar 

  2. Bier VM, Haphuriwat N (2011) Analytical method to identify the number of containers to inspect at us ports to deter terrorist attacks. Ann Oper Res 187(1):137–158

    Article  MathSciNet  MATH  Google Scholar 

  3. Directorate-General Energy and Transport (2009) The impact of 100 transport. http://ec.europa.eu/transport/modes/maritime/studies/doc/2009_04_scanning_containers.pdf. Accessed July 2014

  4. Dorton SL (2011) Analysis of airport security screening checkpoints using queuing networks and discrete event simulation: a theoretical and empirical approach. Embry-Riddle Aeronautical University, Daytona Beach

    Google Scholar 

  5. Eckel N, Johnson W (1983) A model for screening and classifying potential accounting majors. J Acc Educ 1(2):57–65

    Article  Google Scholar 

  6. Fleming A (2014) Oversold flights, getting bumped and bumping. http://airtravel.about.com/od/travelindustrynews/qt/bumped1.htm. Accessed July 2014

  7. Gasson S, Shelfer KM (2007) IT-based knowledge management to support organizational learning: visa application screening at the INS. Inf Technol People 20(4):376–399

    Article  Google Scholar 

  8. Gaukler GM, Li C, Ding Y, Chirayath SS (2011) Detecting nuclear materials smuggling: performance evaluation of container inspection policies. Risk Anal 32(3):65–87

    MathSciNet  Google Scholar 

  9. Gilliam RR (1979) Application of queuing theory to airport passenger security screening. Interfaces 9(4):117–123

    Article  MathSciNet  Google Scholar 

  10. Kelton WD, Sadowski RP, Swets NB (2010) Simulation with arena. McGraw-Hill, Higher Education, Boston

    Google Scholar 

  11. Kronik L, Shapira Y (1999) Surface photovoltage phenomena: theory, experiment, and applications. Surf Sci Rep 37(1):1–206

    Article  Google Scholar 

  12. Maddox MW, Gubbins KE (1997) A molecular simulation study of freezing/melting phenomena for lennard-jones methane in cylindrical nanoscale pores. J Chem Phys 107(22):9659–9667

    Article  Google Scholar 

  13. MathWorks (2014) MATLAB GUI. http://www.mathworks.com/discovery/matlab-gui.html. Accessed July 2014

  14. McCarley JS, Kramer AF, Wickens CD, Vidoni ED, Boot WR (2004) Visual skills in airport-security screening. Psychol Sci 15(5):302–306

    Google Scholar 

  15. Merrick JRW, McLay LA (2010) Is screening cargo containers for smuggled nuclear threats worthwhile? Decis Anal 7(2):155–171

    Article  Google Scholar 

  16. Musa JD (2004) Software reliability engineering: more reliable software, faster and cheaper. Tata McGraw-Hill Education, New York

    Google Scholar 

  17. Myerson RB (1997) Game theory: analysis of conflict. Harvard University Press, Cambridge

    Google Scholar 

  18. Newark Liberty International Airport (2014) Facts and information. http://www.panynj.gov/airports/ewr-facts-info.html. Accessed July 2014

  19. Pendergraft DR, Robertson CV, Shrader S (2004) Simulation of an airport passenger security system. In: Proceedings of the 36th conference on Winter simulation, pp 874–878

    Google Scholar 

  20. Regattieri A, Gamberini R, Lolli F, Manzini R (2010) Designing production and service systems using queuing theory: principles and application to an airport passenger security screening system. Int J Serv Oper Manage 6(2):206–225

    Google Scholar 

  21. Roxy P, Devore JL (2011) Statistics: the exploration and analysis of data. Oxford University Press, Oxford

    Google Scholar 

  22. Shustorovich E (1986) Chemisorption phenomena: analytic modeling based on perturbation theory and bond-order conservation. Surf Sci Rep 6(1):1–63

    Article  Google Scholar 

  23. Sundarapandian V (2009) Queueing theory. probability, statistics and queueing theory. PHI Learning, New Delhi

    Google Scholar 

  24. Tadelis S (2013) Game theory: an introduction. Princeton University Press, Princeton

    Google Scholar 

  25. Transportation Security Administration (2013a) Certified cargo screening program. http://www.tsa.gov/certified-cargo-screening-program. Accessed July 2014

  26. Transportation Security Administration (2013b) My TSA mobile application. http://www.tsa.gov/traveler-information/my-tsa-mobile-application. Accessed July 2014

  27. Wang X, Zhuang J (2011) Balancing congestion and security in the presence of strategic applicants with private information. Eur J Oper Res 212(1):100–111

    Article  MathSciNet  MATH  Google Scholar 

  28. Wolfram S (2002) Some historical notes. http://www.wolframscience.com/reference/notes/971c Accessed July 2014

  29. Yoon D (2007) Analysis of truck delays at container terminal security inspection stations. Ph.D. thesis, New Jersey Institute of Technology, New York

    Google Scholar 

  30. Zeltyn Marmor YN, Mandelbaum et al SA (2011) Simulation-based models of emergency departments: operational, tactical, and strategic staffing. ACM Trans Model Comput Simul (TOMACS) 21(4):24

    Google Scholar 

  31. Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters–defensive strategy with endogenous attacker effort. Oper Res 55(5):976–991

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cen Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Wang, X., Song, C., Zhuang, J. (2015). Simulating a Multi-Stage Screening Network: A Queueing Theory and Game Theory Application. In: Hausken, K., Zhuang, J. (eds) Game Theoretic Analysis of Congestion, Safety and Security. Springer Series in Reliability Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-13009-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13009-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13008-8

  • Online ISBN: 978-3-319-13009-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics