Protecting air transportation: a survey of operations research applications to aviation security

Catastrophic events often illustrate a nation’s preparedness in anticipating and preventing the extreme consequences of an intentional malicious attack. When terrorists hijacked four commercial aircraft for use as guided missiles against the World Trade Center and the Pentagon on September 11, 2001, the world’s population became aware of the human potential to inflict destruction and harm, and the vulnerability of transportation systems against preventing the occurrence of similar disasters. Through research, simulation, and system analysis, procedures may be formulated that limit or eradicate the possibility of future occurrences. Operations research encompasses the optimal allocation of resources subject to constraints, as well as providing techniques that evaluate the performance of security policies. This article provides a survey of operations research activities directed toward analyzing and enhancing the aviation security system, with the intent to be informative and motivate the continual improvement of our nation’s transportation security.

[1]  Matthew J. Liberatore,et al.  A Survey of Operations Research Models and Applications in Homeland Security , 2006, Interfaces.

[2]  Li Lin,et al.  Passenger grouping with risk levels in an airport security system , 2009, Eur. J. Oper. Res..

[3]  Li Lin,et al.  Passenger grouping under constant threat probability in an airport security system , 2006, Eur. J. Oper. Res..

[4]  Sheldon Howard Jacobson,et al.  Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .

[5]  Jonathan P Caulkins,et al.  CAPPS II: A Risky Choice Concerning an Untested Risk Detection Technology , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[6]  M. J. Kwinn,et al.  A systems approach to John Wayne airport security , 2003, IEEE Systems and Information Engineering Design Symposium, 2003.

[7]  Sheldon Howard Jacobson,et al.  The tradeoff between technology and prescreening intelligence in checked baggage screening for aviation security , 2008 .

[8]  Sheldon Howard Jacobson,et al.  A Detection Theoretic approach to Modeling Aviation Security Problems using the Knapsack Problem , 2001 .

[9]  Uwe Glässer,et al.  Computational Modeling and Experimental Validation of Aviation Security Procedures , 2006, ISI.

[10]  Sheldon Howard Jacobson,et al.  Modeling aviation baggage screening security systems: a case study , 2003 .

[11]  Arnold Barnett,et al.  CAPPS II: The Foundation of Aviation Security? , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[12]  Sheldon Howard Jacobson,et al.  Addressing the dependency problem in access security system architecture design , 1996 .

[13]  Sheldon Howard Jacobson,et al.  A multilevel passenger screening problem for aviation security , 2006 .

[14]  Jackrapong Attagara,et al.  The explosive scanning devices allocation problem for airport security systems , 2006 .

[15]  Robert A. Shumsky,et al.  Safe At Home? An Experiment in Domestic Airline Security , 2001, Operational Research.

[16]  Robert M. Peterson,et al.  Using USCAP's Analytical Models, the Transportation Security Administration Balances the Impacts of Aviation Security Policies on Passengers and Airlines , 2007, Interfaces.

[17]  Leticia J Pacheco Designing for effective deterrence: A Markovian approach to modeling and analyzing terrorist behavior within the aviation security environment , 2004 .

[18]  Susan E. Martonosi,et al.  How Effective Is Security Screening of Airline Passengers? , 2006, Interfaces.

[19]  Vojin S. Tosic,et al.  A review of airport passenger terminal operations analysis and modelling , 1992 .

[20]  Alex R. Piquero,et al.  Testing a rational choice model of airline hijackings , 2005 .

[21]  Qianmei Feng On determining specifications and selections of alternative technologies for airport checked-baggage security screening. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[22]  Sheldon H Jacobson,et al.  A Cost‐Benefit Analysis of Alternative Device Configurations for Aviation‐Checked Baggage Security Screening , 2006, Risk analysis : an official publication of the Society for Risk Analysis.

[23]  Julie L Virta,et al.  Analyzing the cost of screening selectee and non-selectee baggage. , 2003, Risk analysis : an official publication of the Society for Risk Analysis.

[24]  Sheldon H. Jacobson,et al.  A Sequential Stochastic Security System Design Problem for Aviation Security , 2007, Transp. Sci..

[25]  R. Lazarick Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[26]  Sheldon Howard Jacobson,et al.  Modeling and analyzing multiple station baggage screening security system performance , 2005 .

[27]  Robert W. Poole,et al.  Airport Security: Time for a New Model , 2007 .

[28]  Sheldon Howard Jacobson,et al.  Probability models for access security system architectures , 1997 .

[29]  D.L. Wilson Use of modeling and simulation to support airport security , 2005, IEEE Aerospace and Electronic Systems Magazine.

[30]  Sheldon Howard Jacobson,et al.  Please Scroll down for Article Iie Transactions a Sequential Stochastic Passenger Screening Problem for Aviation Security a Sequential Stochastic Passenger Screening Problem for Aviation Security , 2022 .

[31]  Yacov Y. Haimes,et al.  Roadmap for Modeling Risks of Terrorism to the Homeland , 2002 .

[32]  Sheldon Howard Jacobson,et al.  Integer programming models and analysis for a multilevel passenger screening problem , 2007 .

[33]  Youn Chul Choi,et al.  Analytic Hierarchy Process Approach for Identifying Relative Importance of Factors to Improve Passenger Security Checks at Airports , 2006 .

[34]  Diane Wilson,et al.  Security Checkpoint Optimizer (SCO): An Application for Simulating the Operations of Airport Security Checkpoints , 2006, Proceedings of the 2006 Winter Simulation Conference.

[35]  Sheldon Howard Jacobson,et al.  Modeling and analyzing the performance of aviation security systems using baggage value performance measures , 2001 .

[36]  Richard T. Lazarick Airport vulnerability assessment: an analytical approach , 1998, Other Conferences.

[37]  Sheldon H. Jacobson,et al.  Designing optimal aviation baggage screening strategies using simulated annealing , 2004, Comput. Oper. Res..

[38]  Sheldon H. Jacobson,et al.  Outgoing selectee rates at hub airports , 2002, Reliab. Eng. Syst. Saf..

[39]  Aaron Strauss,et al.  Carnival Booth: An Algorithm for Defeating the Computer-Assisted Passenger Screening System , 2002, First Monday.

[40]  Marvin K. Nakayama,et al.  A sampling procedure to estimate risk probabilities in access-control security systems , 2000, Eur. J. Oper. Res..

[41]  Sheldon Howard Jacobson,et al.  Integer Programming Models for Deployment of Airport Baggage Screening Security Devices , 2005 .

[42]  T. M. Wood,et al.  An airport vulnerability assessment methodology , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[43]  Norman Aghahowa Enoma Developing key performance indicators for airport safety and security : a study of three Scottish airports , 2007 .