| Literature DB >> 30721537 |
Stef Janssen1, Alexei Sharpanskykh1, Richard Curran1.
Abstract
Security risk management is essential for ensuring effective airport operations. This article introduces AbSRiM, a novel agent-based modeling and simulation approach to perform security risk management for airport operations that uses formal sociotechnical models that include temporal and spatial aspects. The approach contains four main steps: scope selection, agent-based model definition, risk assessment, and risk mitigation. The approach is based on traditional security risk management methodologies, but uses agent-based modeling and Monte Carlo simulation at its core. Agent-based modeling is used to model threat scenarios, and Monte Carlo simulations are then performed with this model to estimate security risks. The use of the AbSRiM approach is demonstrated with an illustrative case study. This case study includes a threat scenario in which an adversary attacks an airport terminal with an improvised explosive device. The approach provides a promising way to include important elements, such as human aspects and spatiotemporal aspects, in the assessment of risk. More research is still needed to better identify the strengths and weaknesses of the AbSRiM approach in different case studies, but results demonstrate the feasibility of the approach and its potential.Entities:
Keywords: Agent-based modeling; airport terminal; security risk management
Year: 2019 PMID: 30721537 PMCID: PMC6850165 DOI: 10.1111/risa.13278
Source DB: PubMed Journal: Risk Anal ISSN: 0272-4332 Impact factor: 4.000
An Example Vulnerability Table That Is Used to Categorize Vulnerabilities (Adapted from Washington, 2009)
| Vulnerability Range (%) | Bin Number |
|---|---|
| <3.11 | 0 |
| 3.12–6.24 | 1 |
| 6.25–12.4 | 2 |
| 12.5–24.9 | 3 |
| 25–49 | 4 |
| 50–74 | 5 |
| 75–89 | 6 |
| 90–100 | 7 |
An Example Security Game
| Att. Checkpoint | Att. Check‐In | |
|---|---|---|
| Def. checkpoint | 10, −80 | −100, 100 |
| Def. check‐in | −80, 80 | 20, −100 |
| Do not def. | −90, 80 | −90, 100 |
Note: The row player is the defender, the column player is the attacker. The described payoffs are for the defender (first value) and the attacker (second value).
Figure 1An example attack tree with two types of nodes: AND and OR.
Figure 2The airport layout of the case study, with indicators for different areas. A, B, and C are facility areas. D is the check‐in area and E is the queuing area. F is the checkpoint area and G is the gate area.
Figure 3The AATOM architecture consists of three different layers: the strategic layer, the tactical layer, and the operational layer. Each of these layers is responsible for a different aspect of the behavior of the agent.
Figure 4The different types of agents and their interactions in model . Model M contains the same agents and interactions, but does not include the attacker agent.
Figure 5The conditional risks (and the 95% confidence intervals) for the IED threat scenario. Rows correspond to different numbers of security lanes open, whereas columns correspond to different interarrival time of passengers.
The Acceptability of the Security Setups (with Their Respective Number of Employees) Based on Different Maximum Risk Levels
| Lanes | Sec Empl. | BDE | Empl. |
|
|
| % Red. of Empl. |
|---|---|---|---|---|---|---|---|
| 2 | 8 | 0 | 8 | N | N | N | 53 |
| 3 | 13 | 0 | 13 | N | N | N | 24 |
| 4 | 16 | 0 | 16 | Y | Y | Y | 6 |
| 2 | 8 | 1 | 9 | N | N | N | 47 |
| 3 | 13 | 1 | 14 | N | N | Y | 18 |
| 4 | 16 | 1 | 17 | Y | Y | Y | 0 |