Next Article in Journal
Optimizing SARIMAX Model with Big Data to Predict Gaming Tourism Destination Demand
Previous Article in Journal
Robotic Surface Finishing with a Region-Based Approach Incorporating Dynamic Motion Constraints
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Design of a Layered Security System Using Imperfect Sensors and Response Units

1
School of Aerospace Engineering, Xiamen University, Xiamen 361005, China
2
Department of Industrial and System Engineering, University at Buffalo, Buffalo, NY 14260, USA
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(20), 3275; https://doi.org/10.3390/math13203275
Submission received: 5 September 2025 / Revised: 30 September 2025 / Accepted: 10 October 2025 / Published: 14 October 2025

Abstract

This paper addresses the optimal design of a multi-layer security system for protecting borders or sensitive areas against intruders who may deploy decoys. The system comprises successive layers of imperfect sensors and a limited number of mobile response units. Intruders that evade detection or neutralization in one layer proceed to the next. Our objective is to minimize the overall probability of a threat escaping the entire system. We formulate a nonlinear integer programming model within a queuing-theoretic framework to jointly determine the optimal number of security layers and the allocation of sensors and response units across them. A simulated annealing heuristic is proposed to solve this complex optimization problem. Furthermore, we extend the model to analyze the impact of decoys—objects that trigger intentional false alarms—which strategically drain system resources and increase the evasion risk for genuine threats. Numerical experiments demonstrate that the optimized multi-layer configuration significantly reduces the final escape probability compared to a single-layer baseline, validating the efficacy of the proposed framework for enhancing security in resource-constrained environments.

1. Introduction

The effective dispatch of response units is a critical operational challenge in public-sector security and emergency management. Unlike ambulances responding to medical emergencies, security forces must respond to sensor alarms in a timely and efficient manner. A significant body of research in this area treats the processing of these requests as a static problem. However, in practical security scenarios, particularly in border protection, the effectiveness of a response is highly dynamic. It depends on the time of initiation of the service and the spatial distribution of incidents, often in vast geographical areas. The core objectives are to minimize the average response time to validated alarms while maximizing the number of threats that are successfully neutralized, especially given that threats can degrade or escape if not addressed promptly.
Queueing theory provides a natural framework for modeling such dispatch systems. The hypercube queueing model, in particular, is well established for calculating steady-state performance metrics by accounting for the spatial distribution of servers and demands. Although extensive research has extended this model to incorporate complex policies and priority disciplines, a notable gap remains in the integrated design of the detection and response layers themselves.
The existing literature often takes the configuration of the sensor network as a given, focusing solely on optimizing the response strategy. This overlooks a critical interdependence: imperfect sensors generate false alarms and miss real threats, while a limited number of response units can become busy, leaving detected threats unneutralized. This interplay is exacerbated by adversarial tactics such as the use of decoys, objects designed to trigger intentional true alarms, which consume the scarce time and attention of both sensors and response units. Consequently, the probability that a real threat evades capture increases. Current models lack a holistic framework that captures this resource-draining effect within a multilayered queue-based security architecture.
To bridge these gaps, this paper makes several key contributions: First, we propose an integrated nonlinear integer programming model within a queuing-theoretic framework to jointly optimize the number of security layers and the allocation of imperfect sensors and mobile response units, minimizing the overall probability of escape of the threat. Second, we derive the structural properties of the optimal solution, showing that a maximum number of layers with balanced resource allocation is optimal. Third, we extend the model to incorporate decoys, which intentionally drain resources by causing false alarms and introducing service heterogeneity, and we develop a state-dependent queuing model to analyze their impact. Fourth, we design a simulated annealing heuristic to solve the problem efficiently and demonstrate through numerical experiments that the optimized multilayer system significantly outperforms a single-layer baseline.
The remainder of this paper is organized as follows. Section 2 reviews the relevant literature on security system design and resource allocation. Section 3 details the mathematical modeling framework, including the spatial framework, resource allocation mechanism, and extension to incorporate decoys with heterogeneous service requirements. Section 4 presents the structural properties of the layered security system, including monotonicity analysis and optimal architecture theorems. Section 5 describes the simulated annealing solution algorithm and its implementation details. Section 6 provides comprehensive numerical experiments, including model validation, algorithm comparison, and sensitivity analysis. Finally, Section 7 discusses limitations and future research directions.

2. Literature Review

The design of effective security systems must take into account the dual challenges of imperfect detection and resource constraints. Our work is at the intersection of two streams of research: (1) the strategic use of decoys to trigger false alarms and drain system resources and (2) the modeling and dispatch of mobile response units. This section reviews the relevant literature in these areas and identifies the gap that our study aims to fill.

2.1. Strategic Use of Decoys and False Alarms

The tactical deployment of decoys is a recognized method for degrading the performance of a security system by exploiting its inherent limitations. Peng et al. [1] pioneered a model that focuses on protecting a single target by deploying decoys characterized by their cost and detection probability. Their objective was to determine the optimal number and type of decoys to distract response units, thereby minimizing the probability that the real target would be detected. Using reliability theory, they found that flexibility in decoy type is most beneficial when the defender and attacker have comparable resources, especially under uncertain attack intensity. Furthermore, they showed that the optimal number of decoys decreases as their unit cost or individual detection probability increases.
Extending this concept to system architectures, Levitin and Hausken [2] investigated resource allocation between genuine targets and false targets (decoys) in series and parallel systems. In their model, an attacker cannot distinguish between real and false targets and attacks a random subset. The system fails under different conditions: A series system fails if any genuine element is destroyed, while a parallel system fails only if all genuine elements are destroyed. This work highlights the strategic trade-offs in distributing limited defensive resources between protection and deception.
Beyond static resource allocation, Baykal-Guersoy et al. [3] introduced a game-theoretic perspective on infrastructure security. They modeled the interaction between an adversary and a first responder within a transportation network (e.g., stations, bridges). The adversary aims to maximize damage by attacking nodes, while the responder allocation resources (e.g., personnel hours) to patrol and locate the threat. Their model incorporates both static and dynamic mobile games, utilizing Partially Observable Markov Decision Processes (POMDPs) to handle time-varying payoffs based on passenger flow. This emphasizes the dynamic and strategic nature of the allocation of security resources in the face of intelligent adversaries.
A common thread in these studies is the treatment of the security system’s response capacity as a simple probability or a static resource pool. They do not explicitly model the queuing dynamics and congestion effects that occur when multiple decoys and genuine threats compete for a limited number of mobile response units, which is a core focus of our present work.

2.2. Modeling and Dispatching of Mobile Response Units

The problem of dispatching mobile servers to spatially distributed demands is classically addressed using queuing theory. The seminal hypercube queuing model of Larson [4] provides a framework for analyzing systems where servers travel to serve Poisson-generated demands with exponential service times. A significant limitation of the basic model is its assumption of service times independent of server-customer pairs and its binary server state (free/busy).
Subsequent research has relaxed these assumptions. Jarvis [5] developed a heuristic that allows service times to depend on both the server and the customer. To model more complex server states, Larson and Mcknew [6] proposed models with 3 n states. Atkinson et al. [7] and Iannoni et al. [8] incorporating scenarios in which customers require service from two servers at different rates. Similarly, Geroliminis et al. [9], Boyacı and Geroliminis [10] used a 3 n state model to distinguish between servers busy with intra-district and inter-district calls, capturing the impact of travel distance on resource availability.
Another relevant approach is the probabilistic location model. Daskin [11] introduced the Maximum Expected Covering Location Problem (MEXCLP), assuming a common busy probability for all servers and ambulances operating independently. Goldberg et al. [12] extended this by using stochastic travel and service times to compute ambulance-specific busy probabilities, incorporating dispatch priority policies through a preference list, and considering prioritized calls for service.
A key insight from the dispatching literature is that not all requests need to be served immediately by the closest unit. Cutoff or reservation policies can improve overall system performance [13,14,15,16,17]. For instance, a server may be reserved for high-priority calls, allowing lower-priority calls (which could be decoy-induced) to queue even if other servers are free. Recent work continues to refine real-time dispatch policies. Majzoubi et al. [18] developed integer programs for EMS vehicle dispatch, while McLay and Mayorga [19,20] incorporated equity constraints and priority classification errors. Nasrollahzadeh et al. [13] and Jenkins et al. [14] employed approximate dynamic programming to generate high-quality policies for ambulance relocation and medical evacuation, respectively.
Lei et al. [21] formulated UAV border patrol as a Stackelberg game, where the patrol agency optimizes UAV paths against adversaries, minimizing the probability of detection. They developed compact models and strategy space reduction methods to tackle computational complexity, demonstrating superior performance and robustness over conventional strategies. Addressing the challenge of ensuring detection coverage against worst-case attacks in large networks, Dahan et al. [22] modeled network inspection as a bilevel optimization problem. Their solution leverages game equilibrium analysis and iterative refinement based on set cover/packing, demonstrating scalability and high performance in practical infrastructure networks. Wang et al. [23] investigated resource allocation to protect a series system against attacks with uncertain timing, formulating a two-stage Min-Max game model. The study integrates overarching protection, false targets (decoys), and individual protection strategies. A key finding is that the resource stockpiling rate critically influences the vulnerability of the system, challenging the conventional wisdom of centralized defense superiority. The main contributions include a novel modeling framework that combines truncated normal distributions to handle time uncertainty and a dynamic resource budget model that extends beyond static budget assumptions.
Although these studies offer sophisticated tools for managing a given set of response units, they largely take the underlying sensor system and its alarm generation process as exogenous. The interplay between spatial distribution and imperfection of the detection sensors and the congestion of the response units remains underexplored.

2.3. Synthesis and Research Gap

In summary, the literature on decoys effectively models strategic deception but lacks a detailed operational model of the congested response system that decoys aim to overwhelm. Conversely, the literature on response unit dispatching offers rich models for managing mobile servers but does not integrate the strategic generation of alarms (both false and true) into the system’s fundamental design.
Our research bridges this gap. We develop an integrated queuing-theoretic model that co-optimizes the design of the multilayer detection and response system itself. Unlike previous work, we explicitly model how the arrival stream of threats (including those generated by decoys) propagates through successive layers, with the performance of each layer being determined by its allocated sensors and response units. This allows us to quantify the resource-draining effect of decoys and determine the optimal architecture to mitigate them, a problem that is not addressed in the existing literature.

3. Mathematical Modeling of a Layered Security System

3.1. Modeling Context and Spatial Framework

3.1.1. Modeling Context

The mathematical model presented in this article is designed to address the critical challenge of securing remote and extensive border regions. A quintessential example is the United States–Mexico border, particularly in arid and mountainous sectors such as the Altar Desert within the Tucson Sector or the Big Bend National Park in Texas. In these areas, the primary operational objective is to deter and intercept illicit cross-border activity, including unauthorized migration and drug trafficking.
A key characteristic of these remote areas is that illicit incidents, while high-stakes, occur with relatively low frequency and are spatially dispersed compared to urban corridors. While arrivals are modeled as Poisson for tractability, intelligence-led patrols often treat threats as sporadic and independent, justifying this assumption in low-frequency scenarios. Furthermore, the vastness of the terrain makes it logistically prohibitive and economically inefficient to maintain a continuous, high-density presence of personnel or fixed checkpoints (e.g., static patrols or permanent barriers) across the entire landscape. The expected cost of staffing and maintaining such fixed assets in these areas often outweighs the security benefit, given the low probability of intercepting a threat at any specific, predetermined location.
Therefore, a more efficient strategy is to deploy a network of mobile and low-cost sensors to achieve area coverage, coupled with a limited number of mobile response units that can be dispatched to alarms. A foundational premise of our spatial model is that while the terrain is vast, threat movements are not uniformly distributed. Based on historical interdiction data and intelligence, border security agencies can identify likely origin-destination (OD) paths that threats follow, often determined by geography, such as valleys between mountain ranges or routes leading to known pickup points. Consequently, for the purpose of strategic resource allocation, we model the path of a target through any layer i as a known straight-line or estimated shortest path between a fixed origin point O i and destination point D i . This allows for the focused deployment of sensors on these high-probability corridors, maximizing the efficiency of limited assets.
This layered approach stands in contrast to a single-layer linear barrier system. A single layer, while potentially effective at a specific point, constitutes a single point of failure; any breach leads to immediate system failure. Our multilayer system is designed to create depth-in-defense, significantly increasing the likelihood that a threat is intercepted, even if it penetrates the initial perimeter.

3.1.2. Spatial Framework

We consider a multilayer security system designed to protect a linear border. The border is divided into l consecutive segments, each constituting a security layer, i ( i = 1 , 2 , , l ). Suspicious targets (including both genuine threats and decoys) arrive at the system according to a Poisson process with rate λ and must pass through each layer sequentially.
Each layer, i, is modeled using a discrete grid-based framework. The geographic area of the layer is discretized into a set of cells. The origin point, O i , and destination point, D i , for the cross-layer of the targets, i, are fixed and reside on this grid. The path a target follows from O i to D i is predefined. The allocation of sensors and the positioning of response units are also decisions made within this grid structure.
Within this framework, in each layer, i, several sensors, s i , are deployed. Each sensor, j, has a fixed instantaneous detection rate, η (e.g., probability of detection per unit time). However, the effective detection probability, p j , for a specific sensor, j, is not constant. It is derived from a timely detection model that accounts for the time a moving target spends within the sensor’s effective detection range.
The detection probability, p j , for a sensor, j, allocated to a specific cell of the grid is given as follows:
p j = 1 e η d j
where d j is the expected travel distance that a target spends within the detection range of sensor j, which is based on the length of its path segment within the sensor’s coverage area. Crucially, d j depends on the location of the sensor in the grid relative to the path of the target. Therefore, even with homogeneous instantaneous detection rates, η , different spatial allocations of sensors will result in heterogeneous effective detection probabilities, p 1 ,   p 2 ,   ,   p s i , for sensors in a layer.
The assumption of conditional independence between sensor detections is justified not by a lack of technological correlation but by the spatial and temporal separation of the underlying detection events. Each sensor is triggered by the physical presence of a target at its specific location. While sensors may have overlapping coverage zones, the event of a detection by one sensor (as the target enters its range) is distinct from a detection by another sensor (as the target later enters a different zone). Therefore, the independence assumption is a standard and reasonable simplification for modeling sequential detection along a path, where the joint probability f ( s i ) represents the cumulative effect of this screening process. The joint detection probability of all s i sensors in layer i is the probability that at least one sensor detects the target. Assuming conditional independence, it is given as follows:
f ( s i ) = 1 j = 1 s i ( 1 p j )
Each layer, i, is assigned n i mobile response units. A response unit has a service rate, μ , (targets/unit time), where the service time μ 1 includes the travel time to the location of a detected target and the time required to neutralize it.

3.2. Resource Re-Allocation Mechanism

The optimization of the layered structure involves re-allocating resources (sensors and response units) across layers. A key aspect of our model is the mechanism that governs how resources are reassigned when a layer is split, which directly impacts the detection probabilities in the modified layers.
Consider splitting a layer with configuration ( n i , s i ) into a modified layer, ( n i 1 , s i 1 ) , and a new layer ( 1 , 1 ) . This process is governed by two principles.
1. 
Removal of sensor from the original layer: When reducing the number of sensors in a layer from s i to s i 1 , we remove the sensor with the lowest individual detection probability, p j . This strategy reflects the practical operational policy of prioritizing the retention of the most effective sensors when downsizing a layer. Formally, the new set of detection probabilities for the modified layer is as follows:
{ p 1 ,   p 2 ,   ,   p s i 1 } where p 1 p 2 p s i 1
The joint detection probability is recalculated accordingly: f ( s i 1 ) = 1 j = 1 s i 1 ( 1 p j ) .
2. 
Sensor Deployment in the New Layer: The new layer receives one sensor. The detection probability p new for this sensor is determined by the most favorable grid cell available in the geographic area of the new layer, corresponding to the highest achievable detection probability given the expected path of the target. However, since the new layer may have a different OD pair, the maximum achievable probability, p new , may differ from those in the original layer. In our numerical experiments (Section 4.3), we examine scenarios where p new is drawn from distributions that are either comparable to or less favorable than the original layer’s distribution.
This resource reallocation mechanism is crucial for numerically validating the layer splitting inequality in Observation 1, to ensure that the analysis reflects practical operational constraints and decisions.

3.3. Target Flow and Layer Performance

The dynamic interaction within a layer for a single threat unfolds as follows.
1.
Approach and detection: A threat enters the layer i and follows its predefined path. The suite of s i sensors screens the threat, resulting in either of the following:
  • Detection: with probability f ( s i ) , the threat is detected, triggering an alarm.
  • Non-detection: with probability 1 f ( s i ) , the threat evades detection and immediately proceeds to the next layer.
2.
Alarm response: if an alarm is triggered, the system attempts to dispatch a mobile response unit available to intercept and neutralize the threat.
  • Neutralization: if at least one of the n i response units is available (with probability 1 B ( n i , ρ i ) ), it is dispatched, and the threat is neutralized, exiting the system.
  • Blocking/escape: if all response units are busy (with probability B ( n i , ρ i ) ), the threat cannot be engaged immediately. It escapes the layer and proceeds to the layer i + 1 .
The state of a target after processing in layer i is determined as follows (see Figure 1):
1.
Neutralized: The target is detected and a response unit is available to neutralize it. The target exits the system.
2.
Escaped: The target moves to layer i + 1 for two possible reasons:
  • Undetected: probability 1 f ( s i ) .
  • Detected but unneutralized: the target is detected, but no response unit is available. This occurs with probability f ( s i ) · B ( n i , ρ i ) .
Here, B ( n i , ρ i ) is the Erlang-B formula (the blocking probability for an M / M / n i / n i loss system), and  ρ i = λ i 1 / μ is the load offered to the response units in layer i, where λ i 1 is the arrival rate of targets in layer i.
Thus, the escape probability for a single layer i is as follows:
P e s c i = [ 1 f ( s i ) ] + f ( s i ) · B ( n i , ρ i ) = 1 [ 1 B ( n i , ρ i ) ] f ( s i )
The escape rate from layer i, which becomes the arrival rate for layer i + 1 , is as follows:
λ i = λ i 1 · P e s c i
The final escape rate from the entire system is λ l , and the final escape probability is P e s c i .

3.4. Optimization Model

The optimization problem is to minimize the final escape probability by allocating a limited total number of sensors (s) and response units (n) across the layers. The number of layers l can also be a decision variable, constrained by the need to have at least one sensor and one unit per layer.
Min i = 1 l { 1 [ 1 B ( n i , ρ i ) ] f ( s i ) }  
s . t . i = 1 l n i n  
i = 1 l s i s  
n i 1 , s i 1 , i = 1 , 2 , , l
n i , s i Z +
This model integrates the dynamic allocation of sensors and response units across layers and within each layer’s spatial grid. A detailed study of the optimal placement of the sensor within a layer, given a fixed s i , is a critical sub-problem that directly influences the values of p j and, therefore, f ( s i ) .

3.5. Extension: Modeling Decoys with Heterogeneous Service

The prior model assumed a homogeneous service rate for all targets. We now refine this to capture a critical adversarial tactic: the deployment of decoys. We distinguish between two types of arrival:
  • Real threats arrive at a fixed rate, λ t , representing the core threat level.
  • Decoys are injected by an adversary at a rate of λ d .
The total arrival rate is, therefore, λ = λ t + λ d . Decoys are investigated and dismissed faster than genuine threats. We denote their service rates as μ d and μ t , respectively, where μ d > μ t .
This scenario presents a key modeling challenge: to analyze a multi-server loss system where the service rate depends on the customer type. We model a single security layer as an M / M / n / n loss system with the previous arrival process. The state of the system is ( i , j ) , where the following applies:
  • i: the number of servers busy with decoys.
  • j: the number of servers busy with real threats.
  • i + j n .
Let p i , j denote the steady-state probability. The balance equations for the interior states ( i + j < n ) are as follows:
( λ t + λ d ) + i μ d + j μ t p i , j = λ d · p i 1 , j + λ t · p i , j 1 + ( i + 1 ) μ d · p i + 1 , j + ( j + 1 ) μ t · p i , j + 1 .
For boundary states ( i + j = n ) :
i μ d + j μ t p i , j = λ d · p i 1 , j + λ t · p i , j 1 , for i + j = n .
The system is solved with the normalization condition p i , j = 1 . The overall blocking probability, p b , is the following:
p b = i + j = n p i , j .
The key performance metric for the defender is the probability of escape from real threats, which is this blocking probability p b , as a real threat lost signifies a security failure.

State-Based Model and Steady-State Analysis for n = 2

The state space encompasses all possible combinations: ( 0 , 0 ) , ( 1 , 0 ) , ( 0 , 1 ) , ( 2 , 0 ) , ( 1 , 1 ) , and  ( 0 , 2 ) .
The state transition diagram is shown in Figure 2. The corresponding set of balance equations for the steady-state probabilities p i , j is as follows:
( λ t + λ d ) p 0 , 0 = μ d p 1 , 0 + μ t p 0 , 1
( λ t + λ d + μ d ) p 1 , 0 = λ d p 0 , 0 + 2 μ d p 2 , 0 + μ t p 1 , 1  
( λ t + λ d + μ t ) p 0 , 1 = λ t p 0 , 0 + 2 μ t p 0 , 2 + μ d p 1 , 1  
( μ d + μ t ) p 1 , 1 = λ t p 1 , 0 + λ d p 0 , 1                  
2 μ d p 2 , 0 = λ d p 1 , 0                        
2 μ t p 0 , 2 = λ t p 0 , 1                        
These equations, coupled with the normalization condition p 0 , 0 + p 1 , 0 + p 0 , 1 + p 2 , 0 + p 1 , 1 + p 0 , 2 = 1 , uniquely determine the steady-state probabilities.
The total blocking probability p b —the probability that an arriving target finds both servers busy and escapes—is the sum of the probabilities of all states where i + j = 2 :
p b = p 2 , 0 + p 1 , 1 + p 0 , 2 .
Solving the system of equations yields the following expression for p b :
p b = λ t 2 μ d 2 + λ d 2 μ t 2 + 2 λ t λ d μ d μ t ( λ t μ d + λ d μ t + μ d μ t ) 2 + μ d 2 μ t 2 .

4. Structural Properties

This section establishes the fundamental properties of the layered security system model. We first present theoretical propositions regarding the monotonicity of the escape probability in the case without decoys. Then, we provide a theoretical proposition regarding the monotonicity of the blocking probability in the case of decoy activities and when n = 2 . The core of our analysis is Observation  1, which shows that splitting a security layer always improves the performance of the system. This Observation is then used to derive Theorem 1 on the optimal number of layers and Theorem 2 on the optimal allocation of resources.

4.1. Monotonicity Properties of Escape Probability

We begin by establishing the monotonic behavior of the layer escape probability, which is foundational to all subsequent results.
Proposition 1.
The escape probability P e s c i is strictly decreasing in:
1. 
n i for fixed ρ i and s i ,
2. 
s i for fixed n i and ρ i .
Proof. 
Part 1: Monotonicity in n i (fixed ρ i , s i ).
According to the standard properties of the Erlang B loss function, the following applies:
B ( n i , ρ i ) n i < 0 , ρ i > 0
Since f ( s i ) 0 :
n i [ 1 B ( n i , ρ i ) ] = B n i > 0
P e s c i n i = f ( s i ) · n i [ 1 B ( n i , ρ i ) ] < 0
Part 2: Monotonicity in s i (fixed n i , ρ i ).
For sensors with heterogeneous timely detection probabilities, the following applies,
f ( s i ) = 1 j = 1 s i ( 1 p j ) , p j ( 0 , 1 ]
When adding a ( s i + 1 ) -th sensor,
f ( s i + 1 ) f ( s i ) = 1 ( 1 p s i + 1 ) j = 1 s i ( 1 p j ) 1 j = 1 s i ( 1 p j ) = p s i + 1 j = 1 s i ( 1 p j ) > 0
Thus, f ( s i ) increases strictly in s i . Consequently,
P e s c i s i = [ 1 B ( n i , ρ i ) ] · f s i 0 < 0
   □

4.2. Monotonicity of the Blocking Probability

A central question is how the adversary’s decoy injection rate λ d impacts system security, measured by p b .
Proposition 2.
For a system with n = 2 servers and for fixed λ t , μ d , μ t , the blocking probability p b is a strictly increasing function of the decoy arrival rate λ d .
Proof. 
Consider the expression for p b in Equation (21). We can treat p b as a function of λ d , that is, p b ( λ d ) . To prove that it is strictly increasing, we examine its derivative with respect to λ d , d p b d λ d .
The denominator of p b is always positive. The sign of the derivative is determined by the numerator of d p b d λ d , which simplifies to an expression of the form:
d p b d λ d = 2 μ d μ t 2 ( μ d ( λ t 2 + μ d μ t ) + ( positive terms ) ) ( positive denominator ) 2 .
Given that λ t > 0 , μ d > 0 , and  μ t > 0 , every term in the numerator of the derivative is positive. Therefore, d p b d λ d > 0 for all λ d 0 , proving that p b is strictly increasing in λ d .    □
This result confirms the intuitive adversarial effect of decoys: By increasing the load on the system, they cause more frequent congestion, thereby raising the probability that a genuine threat will arrive when all servers are busy and escape.

4.3. The Layer-Splitting Observation

The optimality of a multilayer architecture is based on the following key observation, which establishes that splitting a layer is always beneficial.
Observation 1
(Layer-Splitting Benefit). For any layer configuration ( n , s ) with n 2 , s 2 and traffic intensity ρ > 0 , splitting it into two layers with configurations ( n 1 , s 1 ) and ( 1 , 1 ) always reduces the overall probability of escape. That is, the following inequality holds:
g ( n , s , ρ ) g ( n 1 , s 1 , ρ ) · g ( 1 , 1 , ρ · g ( n 1 , s 1 ) )
where g ( n , s , ρ ) = 1 [ 1 B ( n , ρ ) ] f ( s ) is the escape probability of a layer.
Proof. 
We consider two cases based on the joint detection capability:
Case 1: Perfect Detection ( f ( s ) = 1 )
In the ideal case where sensors provide perfect detection ( f ( s ) = 1 ), the inequality reduces to
B ( n , ρ ) B ( n 1 , ρ ) · B ( 1 , ρ · B ( n 1 , ρ ) )
Recall the recurrence relation for the Erlang B function:
B ( n , ρ ) = ρ B ( n 1 , ρ ) n + ρ B ( n 1 , ρ )
The inequality we seek to prove is equivalent to
ρ B ( n 1 , ρ ) n + ρ B ( n 1 , ρ ) B ( n 1 , ρ ) · ρ B ( n 1 , ρ ) 1 + ρ B ( n 1 , ρ )
For ρ > 0 and B ( n 1 , ρ ) > 0 , we can divide both sides by ρ B ( n 1 , ρ ) :
1 n + ρ B ( n 1 , ρ ) B ( n 1 , ρ ) 1 + ρ B ( n 1 , ρ )
Cross-multiplying (as both denominators are positive) yields
1 + ρ B ( n 1 , ρ ) n B ( n 1 , ρ ) + ρ [ B ( n 1 , ρ ) ] 2
Rearranging terms, we obtain the following:
1 ( n ρ ) B ( n 1 , ρ ) + ρ [ B ( n 1 , ρ ) ] 2
Let x = B ( n 1 , ρ ) . Since n 2 and ρ > 0 , it is a known property of the Erlang B function that 0 < x < 1 . We now define the quadratic function:
g ( x ) = ρ x 2 + ( n ρ ) x 1
Proving the inequality 1 ( n ρ ) x + ρ x 2 is equivalent to proving that g ( x ) 0 . For  n = 2 , the upper bound x = B ( 1 , ρ ) = ρ / ( 1 + ρ ) achieves the maximum. Substituting x = ρ / ( 1 + ρ ) into g ( x ) ,
g ρ 1 + ρ = ρ ρ 1 + ρ 2 + ( 2 ρ ) ρ 1 + ρ 1 = 1 ( 1 + ρ ) 2
The numerator < 0 for all ρ > 0 , completing the proof for the case f ( s ) = 1 .
Case 2: Imperfect Detection ( f ( s ) < 1 )
For the general case, the analytical proof is intractable. We, therefore, employ numerical validation, following the resource re-allocation mechanism detailed in Section 3.2. Specifically, for a given configuration, ( n , s ) :
  • The modified layer ( n 1 , s 1 ) is formed by removing the sensor with the lowest p j from the original set.
  • The new layer’s sensor probability p new is assigned based on the most favorable location in the new layer’s area.
Our investigation considered two realistic scenarios for sensor deployment:
  • Scenario A: detection probabilities of sensors in the new layer follow U ( 0.8 , 0.99 ) , comparable to those in existing layers.
  • Scenario B: detection probabilities of sensors in the new layer follow U ( 0.7 , 0.95 ) , representing potentially less favorable deployment conditions.
  • Scenario C: detection probabilities of sensors in the new layer follow B e a t ( 8 , 2 ) , skewed toward high detection probabilities (mean = 0.8).
  • Scenario D: detection probabilities of sensors in the new layer follow N ( 0.85 , 0.08 ) , truncated to [ 0.7 , 0.98 ] .
We evaluated the inequality across the following parameter ranges:
  • Number of response units: n = 2 , 3 , , 20 .
  • Number of sensors: s = 2 , 3 , , 20 .
  • Traffic intensity: ρ [ 0.1 , 9.9 ] (15 values).
  • For each parameter combination, we performed 100 Monte Carlo simulations.
The key finding is unequivocal: the inequality (28) held in 100% of the over 100,000 tested cases across both scenarios. Figure 3 shows the distribution of the difference between the two sides of the inequality, which is strictly positive with a substantial margin in all cases.
This comprehensive numerical verification provides strong empirical evidence that the inequality holds for all practical purposes under realistic operating conditions.    □

4.4. Optimal Architecture Theorems

Based on the layer-splitting observation, we now establish the main theorems regarding the optimal architecture of the layered security system.
Theorem 1
(Optimal Number of Layers). Given a total of n response units and s sensors, the minimal escape probability is achieved when the number of layers l is maximized, subject to each layer containing at least one response unit and one sensor. Thus, the optimal number of layers is l * = min ( n , s ) .
Proof. 
From Observation 1, splitting a layer always reduces the overall probability of escape, which implies that adding more layers (each with at least one unit and one sensor) always improves system performance, as long as resources are available.
However, each layer requires at least one response unit and one sensor. Therefore, the maximum number of layers that can be formed is limited by min ( n , s ) . Any additional layer beyond this would violate the constraints. Hence, l * = min ( n , s ) .    □
Theorem 2
(Resource Allocation for Fixed Layers). When the number of layers, l, is fixed and with n l and s l , the probability of escape is minimized when resources are allocated in a decreasing manner between layers: that is, n i n i + 1 and s i s i + 1 for i = 1 ,   2 ,   ,   l 1 .
Proof. 
We proceed by induction on the number of layers, l.
Base Case ( l = 2 ): Consider a two-layer system with total resources n = n 1 + n 2 and s = s 1 + s 2 . The overall escape probability is as follows:
P escape = P esc 1 · P esc 2 = ( 1 [ 1 B ( n 1 , x 1 ) ] f ( s 1 ) ) · ( 1 [ 1 B ( n 2 , x 2 ) ] f ( s 2 ) )
where x 1 = λ / μ and x 2 = λ 1 / μ = λ · P esc 1 / μ .
By Proposition 1, P e s c i is strictly decreasing in both n i and s i . Furthermore, since λ 1 > λ 2 , it follows that x 1 > x 2 , and thus B ( n i , x 1 ) > B ( n i , x 2 ) for any fixed n i . Consequently, the marginal reduction in P escape achieved by allocating an additional unit of resource is greater in the first layer than in the second, due to the higher intensity of traffic and the multiplicative nature of the overall objective function. Therefore, the optimal allocation must satisfy n 1 n 2 and s 1 s 2 .
Inductive Hypothesis: Assume that the theorem holds for a system with l = k layers. That is, for a system of k layers, the optimal allocation of resources is decreasing:
n 1 n 2 n k and s 1 s 2 s k .
Inductive Step ( l = k + 1 ): Consider a system with k + 1 layers. We can conceptually aggregate the first k layers into a single super-layer, denoted as layer A, with a composite escape probability:
P esc A = P esc 1 , k = i = 1 k P esc i .
The entire ( k + 1 ) -layer system is then equivalent to a two-layer system comprising:
  • Layer A: the first k layers (superlayer), with total resources n A = i = 1 k n i and s A = i = 1 k s i , and output rate λ k = λ · P esc A .
  • Layer B: the ( k + 1 ) -th layer, with resources n k + 1 and s k + 1 .
The overall escape probability is P escape = P esc A · P esc k + 1 .
By the inductive hypothesis, the resources within the superlayer A (i.e., the first k layers) are optimally allocated in a decreasing manner. We now apply the logic of the base case to this equivalent two-layer system (A and B). The arrival rate to Layer B is λ k , which is strictly less than the arrival rate λ to Layer A. Therefore, to minimize P escape , the optimal allocation between Layer A and Layer B must satisfy the following:
n A n k + 1 and s A s k + 1 .
Since the resources within Layer A are already optimally structured as a decreasing sequence ( n 1 n k , s 1 s k ), and the total resources for Layer A are not less than those for Layer B, it follows that the allocation of resources across all k + 1 layers must also be decreasing:
n 1 n 2 n k n k + 1 , s 1 s 2 s k s k + 1 .
This completes the induction.    □

5. Solution Algorithm

Given the combinatorial complexity and non-linear nature of the optimization problem formulated in Section 3, finding an exact optimal solution for large-scale instances is computationally intractable. Therefore, we develop a Simulated Annealing (SA) metaheuristic to efficiently find high-quality approximate solutions. The SA framework is well suited to this problem due to its ability to escape local optima and its flexibility in handling complex constraints and objective functions.
The core challenge lies in jointly determining the number of layers l and the allocation of sensors s = ( s 1 , s 2 , , s l ) and response units n = ( n 1 , n 2 , , n l ) between them. Crucially, the structural properties derived in Section 4 (Theorems 1 and 2) are used to initialize the algorithm with a high-quality starting solution and to effectively guide the search process.

5.1. Solution Representation and Initialization

A solution, X, is represented by the number of layers, l, and two integer vectors:
X = ( l , s , n ) , where
s = ( s 1 , s 2 , , s l ) , i = 1 l s i s , s i 1  
n = ( n 1 , n 2 , , n l ) , i = 1 l n i n , n i 1  
The objective value F ( X ) is the overall escape probability calculated by Objective 6.
The initialization of X is directly governed by Theorems 1 and 2:
  • Number of Layers (l): l init = min ( s , n ) .
  • hlResource Allocation ( s , n ): Resources are allocated in a decreasing manner across layers. The specific initial distribution depends on the relationship between s and n:
    1.
    Case 1: s > n . l = n layers are initialized, each with one response unit ( n i = 1 ). The s sensors are distributed, such that s 1 s 2 s l and s i = s .
    2.
    Case 2: s < n . l = s layers are initialized, each with one sensor ( s i = 1 ). The n response units are distributed, such that n 1 n 2 n l and n i = n .
    3.
    Case 3: s = n . l = s = n layers are initialized, each with one sensor and one response unit ( s i = 1 , n i = 1 ). This initial solution is then perturbed to explore the search space.
This initialization strategy ensures the algorithm starts from a solution that already satisfies the proven optimal structure, providing a superior starting point compared to a random initial solution.
Discussion on Fixed Number of Layers (l): The initialization strategy and the subsequent algorithm are designed for the general case where the number of layers l is a decision variable, as established by Theorem 1. However, in certain practical scenarios, the number of security layers might be fixed a priori due to geographical, logistical, or budgetary constraints.
In such cases where l is fixed and is not min ( s , n ) , the core optimization problem reduces to allocating the resources s and n among these l fixed layers. Theorem 2 still applies: the optimal allocation follows a decreasing pattern across the sequential layers ( s 1 s 2 s l and n 1 n 2 n l ). Our SA algorithm seamlessly handles this case by simply fixing the number of layers l to the pre-defined value during the initialization and throughout the neighbor generation process, while still utilizing the same resource transfer operator to find the optimal decreasing allocation.

5.2. Simulated Annealing Framework

The SA algorithm iteratively explores the solution space by moving from the current solution X current to a neighbor solution, X neighbor . The move is always accepted if it improves the objective function ( F ( X neighbor ) < F ( X current ) ). To escape local optima, it may also be accepted with a probability exp ( Δ E / T ) , where Δ E is the increase in objective value and T is the current temperature parameter, which decreases according to a cooling schedule.
Key implementation details:
  • The number of layers l is fixed at l * = min ( S , N ) throughout the optimization process, as established by Theorem 1.
  • The neighborhood generation focuses exclusively on reallocating sensors and response units between these fixed layers.
  • The initial solution is generated to satisfy the decreasing allocation pattern ( s 1 s 2 s l and n 1 n 2 n l ) based on Theorem 2.
The pseudocode for the proposed SA heuristic is presented in Algorithm 1.
Algorithm 1 Simulated annealing heuristic for resource allocation.
Require: Total sensors s, total response units n, initial temperature T 0 , cooling rate α , Markov chain length L max , stopping criterion
Ensure: Best-found solution X *
  1:
X current InitializeSolution ( s , n ) {Based on Section 5.1}
  2:
X * X current
  3:
T T 0
  4:
k 0
  5:
while stopping criterion not met do
  6:
   for  l = 1 to L max  do
  7:
      X neighbor GenerateNeighbor ( X current ) {See Section 5.3}
  8:
      Δ E F ( X neighbor ) F ( X current ) {Calculate change in objective}
  9:
     if  Δ E < 0  then
10:
         X current X neighbor
11:
        if  F ( X current ) < F ( X * )  then
12:
           X * X current
13:
        end if
14:
     else if exp ( Δ E / T ) > random ( 0 , 1 ) then
15:
         X current X neighbor
16:
     end if
17:
   end for
18:
    T α · T {Cooling}
19:
    k k + 1
20:
end while
21:
return  X *

5.3. Neighborhood Generation

Given that Theorem 1 establishes the optimal number of layers as l * = min ( s , n ) for the available resources, the neighborhood generation function GenerateNeighbor ( X ) is designed to explore the solution space while maintaining a fixed number of layers l = l * and the decreasing allocation patterns ( s 1 s 2 s l and n 1 n 2 n l ). This approach ensures that the search remains within the structurally optimal configuration space. We define three neighborhood operators that perturb the resource allocation between layers, applied with equal probability:
1.
Sensor Reallocation: Randomly select two distinct layers, i and j. If s i > 1 (donor layer has at least one sensor to give), transfer one sensor from layer i to layer j. This operator fine-tunes the sensor distribution while maintaining i = 1 l s i = s .
2.
Response Unit Reallocation: Randomly select two distinct layers, i and j. If n i > 1 (donor layer has at least one response unit to give), transfer one response unit from layer i to layer j. This operator fine-tunes the response unit distribution while maintaining i = 1 l n i = s .
3.
Balanced Resource Reallocation: Randomly select two distinct layers, i and j. If s i > 1 and n i > 1 , simultaneously transfer one sensor and one response unit from layer i to layer j. This operator maintains the balance between sensing and response capabilities while exploring different resource distributions.
All generated neighbor solutions are verified for feasibility ( s i 1 , n i 1 for all layers i = 1 , , l ). If a move would result in an infeasible solution, the operator is applied again with different layer pairs until a feasible neighbor is found.
This neighborhood design ensures that the algorithm efficiently explores the optimal allocation of resources across layers, as established by Theorem 2, while respecting the fixed optimal number of layers determined by Theorem 1.

5.4. Integration with Spatial Deployment Subproblem

The optimization model involves a critical subproblem: for a fixed number of sensors, s i , in a layer, determine their spatial deployment to maximize the probability of joint detection, f ( s i ) . Our algorithm addresses this through a computationally efficient greedy approach that operates under simplified but reasonable assumptions.
Greedy Sensor Placement Algorithm: Given the fixed OD path through a layer and the assumption that all grid cells are equally feasible for sensor deployment, the greedy algorithm proceeds as follows:
1.
Pre-compute the detection probability p j for each grid cell based on the target’s exposure distance within the sensor’s range using Equation (1).
2.
Sort all grid cells in descending order of their individual detection probabilities, p j .
3.
Select the top s i cells with the highest detection probabilities.
4.
Calculate the joint detection probability f ( s i ) using Equation (2).
This approach has linear time complexity O ( m ) , where m is the number of grid cells, making it highly efficient for integration within the SA framework. Under our simplified assumptions, this greedy selection is optimal, as it maximizes the immediate gain in detection probability at each deployment step.
Two-Stage Implementation: Our algorithm employs a decoupled approach to manage computational complexity:
1. Stage 1 (Global Allocation): The SA heuristic optimizes the number of layers, l, and the allocation of resources, s , n , across them. During the evaluation of F ( X ) for any candidate solution, the greedy algorithm provides a quick estimate of f ( s i ) for each layer.
2. Stage 2 (Post-Processing): For the final optimized solution, more sophisticated placement algorithms can be applied to incorporate additional practical constraints such as terrain feasibility and deployment costs. However, this detailed placement problem is beyond the scope of the current study, which focuses on the higher-level interlayer resource allocation.
This decoupled approach ensures that the complex joint problem remains computationally tractable while providing effective solutions for the primary optimization objective.

6. Numerical Experiments and Analysis

6.1. Base Case and Model Validation

This section provides comprehensive numerical experiments to validate the proposed model and investigate the efficiency of the derived structural properties. We analyze both two- and three-layer systems to demonstrate the scalability of our approach and provide empirical evidence for the optimality principles established in Section 4.

6.1.1. Experimental Setup

We maintain consistent parameter values across all experiments (Table 1). The total number of sensors and response units is fixed at s = n = 10 . The arrival rate of suspicious targets is λ = 10 , and the service rate is μ = 2 . For each layer, the set of detection probabilities is generated from a uniform distribution U ( 0.8 , 0.99 ) , reflecting realistic sensor capabilities. When allocating sensors within a layer, the strategy is to always select the sensors with the highest individual detection probabilities first.

6.1.2. Two-Layer System Analysis

We first analyze the two-layer system configuration. Through exhaustive search over all feasible resource allocations, the optimal configuration is found to be ( s 1 = 7 , n 1 = 7 ) for Layer 1 and ( s 2 = 3 , n 2 = 3 ) for Layer 2. This allocation achieves an overall performance log ( P escape ) = 6.983 .
The results confirm the decreasing allocation pattern ( s 1 s 2 , n 1 n 2 ) as established in Theorem 2. Figure 4 shows the performance landscape visualized as a heatmap, where warmer colors indicate higher escape probabilities (worse performance) and cooler colors indicate better performance. The optimal configuration is clearly identifiable in the region where both sensor and response unit allocations favor the first layer.

6.1.3. Three-Layer System Analysis

Extending the analysis to a three-layer system, we conduct an exhaustive search over all feasible resource allocations under the constraints that each layer must have at least one sensor and one response unit ( s i 1 , n i 1 ). This results in 1296 valid configurations to evaluate.
The optimal allocation for the three-layer system is as follows:
  • Layer 1: s 1 = 4 , n 1 = 5
  • Layer 2: s 2 = 3 , n 2 = 3
  • Layer 3: s 3 = 3 , n 3 = 2
This configuration achieves a performance log ( P escape ) = 7.704 . The optimal allocation follows the predicted decreasing pattern: s 1 s 2 s 3 and n 1 n 2 n 3 , providing strong empirical validation for Theorem 2 in multi-layer systems beyond the two-layer case.
Figure 5 shows the performance landscape for the three-layer system using a 3D surface plot. The plot displays the best achievable performance for each sensor allocation pattern to Layers 1 and 2 (with Layer 3 receiving the remaining sensors), after optimizing the response unit distribution. The results demonstrate that balanced-decreasing allocations consistently outperform other patterns.

6.1.4. Comparative Analysis and Theoretical Validation

Table 2 summarizes the performance comparison across different system configurations. The results demonstrate the progressive improvement achieved by increasing the number of layers while maintaining the same total resource budget, providing strong empirical support for Theorem 1.
The experimental results validate the core theoretical contributions:
1.
Theorem 1 (Max-Layer Optimality): The three-layer system demonstrates substantially better performance than the two-layer system, confirming that increasing the number of layers improves security effectiveness given the same total resources.
2.
Theorem 2 (Decreasing Allocation): The optimal allocations for both two- and three-layer systems follow the predicted decreasing pattern, validating the theoretical findings across different system scales.
3.
Robustness of Structural Properties: The consistent emergence of optimal patterns across different configurations provides robust validation of the structural properties derived in Section 4.
This comprehensive analysis demonstrates the practical effectiveness of the multi-layer security architecture and provides strong empirical evidence for the proposed theoretical framework.

6.2. Performance Comparison: Simulated Annealing vs. Tabu Search

To validate the effectiveness of our optimization approach, we conducted a comprehensive comparison between the proposed Simulated Annealing (SA) heuristic and a Tabu Search (TS) algorithm. Both metaheuristics were applied to a case problem on a median scale with total resources of s = 12 , n = 10 , an arrival rate of λ = 10 , a service rate of μ = 2 , and a redefined number of layers, l = 6 .

6.2.1. Experimental Setup

The comparative analysis was designed with the following experimental setup:
  • Algorithm Parameters:
    Simulated Annealing: Geometric cooling schedule with initial temperature T 0 = 100 , cooling rate α = 0.95
    Tabu Search: Tabu list size = 15 with aspiration criterion
    Steady-State Rule: Both algorithms stop if the relative improvement in the best-found objective value over the last 100 temperature cycles is less than 0.1 %
    Maximum Iteration Rule: A force stop is triggered if the algorithm reaches a maximum of 1000 iterations.
  • Evaluation Protocol: 10 independent runs with random initial solutions following the decreasing allocation pattern established in Theorem 2.
  • Implementation: Python 3.9 on an Intel i7-10700K processor with 32 GB of RAM.
  • Performance Metrics:
    Solution quality: best and average escape probability.
    Computational efficiency: average runtime.

6.2.2. Comparison Results

Table 3 presents the quantitative comparison between the two algorithms in multiple performance metrics.

6.2.3. Key Findings

The comparative analysis revealed several important insights:
1.
Solution Quality Parity: Both algorithms achieved identical best-case performance log ( P escape ) = 8.271 , with nearly identical average performance. This demonstrates that both metaheuristics are capable of finding high-quality solutions for the layered security optimization problem.
2.
Computational Efficiency Advantage: The most significant difference emerged in computational efficiency. Simulated Annealing was approximately 6 times faster than Tabu Search (2.34 s vs. 15.37 s average runtime). This substantial efficiency advantage makes SA more suitable for real-time applications and large-scale problem instances.
3.
Optimal Allocation Pattern: the best solutions found using both algorithms consistently exhibited the decreasing resource allocation pattern ( s 1 s 2 s l , n 1 n 2 n l ) as predicted by Theorem 2, validating our structural properties.
The computational efficiency advantage of Simulated Annealing can be attributed to its stochastic acceptance criterion, which allows more aggressive exploration of the solution space with fewer function evaluations. The probability of accepting worse solutions, given by exp ( Δ E / T ) , enables SA to escape local optima efficiently. In contrast, Tabu Search’s deterministic neighborhood evaluation and tabu list management incur higher computational overhead due to the need to maintain and check against historical solutions.
This comparative analysis confirms that our proposed Simulated Annealing heuristic not only produces high-quality solutions but does so with exceptional computational efficiency. The results justify our algorithm selection and demonstrate its suitability for the layered security system optimization problem, particularly in scenarios requiring rapid solution generation. While both algorithms are effective, SA’s superior computational performance makes it the preferred choice for practical implementations where response time is critical.

6.3. Sensitivity Analysis

In terms of a large-scale problem, we provide a sensitivity analysis to test the influence of three factors: the ratio of response units to sensors, the instantaneous detection rate, and the number of sensors. We keep the arrival rate of the suspicious target λ = 10 and the service rate μ = 2 the same for all instances. Detailed data are shown in Table 4. In this computational test, the number of layers itself is also a decision variable determined based on the developed properties. In terms of each layer, we have three different patterns to work with, shown in Figure 6. During the test, each layer will randomly select a pattern from three candidates to simulate the complex situation in a border crossing scenario in a wild area. We have nine instances in total to further test the influence of the ratio of response units to sensors in a larger range, shown in Table 5.
We study one-way, two-way, and three-way effects to understand the impact of each factor on the objective function. Table 6 shows the combination of the three factors and the results obtained for one of the cases. Table 7 shows the ANOVA analysis for the results, and we can conclude that all three factors, including the ratio of response units to sensors, the instantaneous detection rate, and the number of sensors, have a significant impact on the total expected escape rate of suspicious targets. All three factors have p-value = 0, which means that, for any confidence level, the ratio of response units to sensors, the instantaneous detection rate of sensors, and the number of sensors would contribute to the success of capturing suspicious targets.
Table 8 shows the ANOVA analysis for CPU times. In terms of the one-way effect, only the instantaneous sensor response rate factor shows a low impact on the computation time of SA heuristics (p-value = 0.972). The reason is that a large fraction of high-value sensors will provide a better starting point for the heuristics to work with. Because of this, two-way and three-way effects involved with an instantaneous detection rate show low sensitivity to the computational time.

6.4. Numerical Analysis of Impact of Decoy Activities

We numerically analyze the model to quantify the impact of adversarial decoys. We set a base scenario with λ t = 3 , μ d = 2.0 , μ t = 0.5 , and n = 2 . We vary the decoy arrival rate λ d from 0 to 7.
Figure 7a plots the blocking probability p b against λ d , calculated using Equation (21). The curve confirms the proposition: p b increases monotonically with the decoy rate. This graph translates the abstract resource draining effect into a concrete security metric, showing how an adversary can systematically degrade system performance.
Figure 7b provides further insight by comparing the system’s performance with a traditional model that assumes homogeneous service times. It plots the relative error in the estimated blocking probability if one incorrectly assumes that all targets have the same service rate μ t . The discrepancy highlights the need for the proposed heterogeneous model to accurately assess security when there are decoys.

Implications for Layered Security System Design

The analysis confirms that decoys are an effective adversarial strategy. Their resource-draining effect is twofold: they increase the total arrival rate, λ , and alter the effective service capacity by introducing a mixture of fast and slow service requirements.
When integrating this into the multilayer design framework, the decision variables for a layer should be based on the expected decoy injection rate, λ d , in addition to the real threat rate, λ t . A layer expecting significant decoy activity will have a higher total load and thus require more resources to maintain a low escape probability for genuine threats. The explicit formula for p b (Equation (21)) or the state-based model for higher n can be directly incorporated into the optimization heuristic from Section 6, replacing the simpler Erlang B formula, to design systems that are robust against this type of adversarial deception.

7. Limitations and Future Work

7.1. Conclusions

This paper has presented an integrated queuing-theoretic framework for the optimal design of a multilayer security system against intruders employing decoys. Our core contributions are threefold: (1) a novel nonlinear integer programming model that co-optimizes the number of layers and the allocation of imperfect sensors and mobile response units; (2) the derivation of key structural properties proving the optimality of a max-layer, balanced-resource strategy; and (3) an efficient simulated annealing heuristic for practical problem-solving. Numerical experiments validated that the optimized multilayer system significantly outperforms a single-layer baseline. Furthermore, we extended the model to analyze the impact of decoys, revealing that their resource-draining effect arises not only from increased arrival rates but also from service heterogeneity, leading to a higher-than-expected risk of genuine threats escaping.

7.2. Limitations

  • Arrival Process Assumption: Our model assumes that threats arrive according to a Poisson process. Although mathematically tractable and common in initial queueing models, this assumption does not capture potential batch arrivals (e.g., coordinated groups of intruders or decoys), which could lead to short-term system congestion not fully captured by the average arrival rate λ .
  • Sensor Detection Independence: The calculation of the joint detection probability f ( s i ) is based on the assumption of conditional independence between sensors. In practice, correlated false alarms or common environmental factors affecting nearby sensors could violate this assumption, potentially leading to an overestimation of system performance.
  • Analytical Bound for Layer-Splitting: The key Observation 1, which underpins the optimality of the max-layer architecture, is proven analytically only for the case of perfect sensors ( f ( s ) = 1 ). For the general case, we rely on comprehensive but not exhaustive numerical validation. The absence of a general analytical proof remains a theoretical limitation.
  • Static and Deterministic Path Modeling: The model assumes a single, fixed, and known Origin-Destination (OD) path for targets within a layer. In reality, adversaries can adapt their routes dynamically or choose from a set of possible paths, reducing the effectiveness of a static sensor deployment optimized for a single path.
  • Computational Scalability of Decoy Model: The state-based model for decoys with heterogeneous service times is solved in closed form only for n = 2 servers. For layers with more resources, the combinatorial explosion of the state space makes exact analysis computationally intractable within our current framework.

7.3. Future Research Directions

These limitations naturally chart a course for valuable future work:
  • Modeling Batch Arrivals and Correlated Sensors: Future models could incorporate more sophisticated arrival processes, such as a Markov-Modulated Poisson Process (MMPP) or a compound Poisson process, to better represent coordinated adversarial actions. Similarly, the sensor model could be extended using copulas or spatial correlation structures to account for dependent detection events.
  • Theoretical Analysis of the Layer-Splitting Observation: A significant theoretical endeavor would be to derive formal sufficient conditions under which Observation 1 holds for imperfect sensors or to provide a rigorous proof for a broader class of detection functions.
  • Robust and Adaptive Optimization: To address the uncertainty of the path, a promising direction is to develop a robust optimization or stochastic programming version of our model. This would involve optimizing against a distribution of possible paths or worst-case scenarios, making the system design less sensitive to adversarial route adaptation.
  • Dynamic Resource Allocation and Machine Learning: Extending the model from a static design to a dynamic resource allocation problem is a critical next step. Reinforcement Learning (RL) is a suitable framework for developing policies that reallocate sensors and response units in real time based on evolving threat levels and system congestion.
  • Game-Theoretic Adversarial Modeling: Finally, treating the adversary’s decoy deployment strategy not as an exogenous parameter but as an endogenous, strategic choice leads to a Stackelberg game formulation. The defender (system designer) would optimize their layered system, anticipating the best-response attack strategy of an intelligent adversary, leading to more resilient and robust designs.

Author Contributions

Conceptualization, Y.Z. and R.B.; methodology, Y.Z. and R.B.; software, Y.Z.; validation, Y.Z.; formal analysis, Y.Z.; investigation, Y.Z.; resources, Y.Z.; data curation, Y.Z.; writing—original draft preparation, Y.Z. and R.B.; writing—review and editing, Y.Z. and R.B.; visualization, Y.Z.; supervision, R.B.; project administration, R.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Peng, R.; Levitin, G.; Xie, M.; Ng, S.H. Optimal defence of single object with imperfect false targets. J. Oper. Res. Soc. 2011, 62, 134–141. [Google Scholar] [CrossRef]
  2. Levitin, G.; Hausken, K. Defence resource distribution between protection and decoys for constant resource stockpiling pace. J. Oper. Res. Soc. 2013, 64, 1409–1417. [Google Scholar] [CrossRef]
  3. Baykal-Guersoy, M.; Duan, Z.; Poor, H.V.; Garnaev, A. Infrastructure security games. Eur. J. Oper. Res. 2014, 239, 469–478. [Google Scholar] [CrossRef]
  4. Larson, R.C. A hypercube queuing model for facility location and redistricting in urban emergency services. Comput. Oper. Res. 1974, 1, 67–95. [Google Scholar] [CrossRef]
  5. Jarvis, J.P. Approximating the equilibrium behavior of multi-server loss systems. Manag. Sci. 1985, 31, 235–239. [Google Scholar] [CrossRef]
  6. Larson, R.C.; Mcknew, M.A. Police patrol-initiated activities within a systems queueing model. Manag. Sci. 1982, 28, 759–774. [Google Scholar] [CrossRef]
  7. Atkinson, J.; Kovalenko, I.N.; Kuznetsov, N.; Mykhalevych, K. A hypercube queueing loss model with customer-dependent service rates. Eur. J. Oper. Res. 2008, 191, 223–239. [Google Scholar] [CrossRef]
  8. Iannoni, A.P.; Morabito, R.; Saydam, C. An optimization approach for ambulance location and the districting of the response segments on highways. Eur. J. Oper. Res. 2009, 195, 528–542. [Google Scholar] [CrossRef]
  9. Geroliminis, N.; Karlaftis, M.G.; Skabardonis, A. A spatial queuing model for the emergency vehicle districting and location problem. Transp. Res. Part B Part Methodol. 2009, 43, 798–811. [Google Scholar] [CrossRef]
  10. Boyacı, B.; Geroliminis, N. Approximation methods for large-scale spatial queueing systems. Transp. Res. Part B Methodol. 2015, 74, 151–181. [Google Scholar] [CrossRef]
  11. Daskin, M.S. A maximum expected covering location model: Formulation, properties and heuristic solution. Transp. Sci. 1983, 17, 48–70. [Google Scholar] [CrossRef]
  12. Goldberg, J.; Dietrich, R.; Chen, J.M.; Mitwasi, M.G.; Valenzuela, T.; Criss, E. Validating and applying a model for locating emergency medical vehicles in Tuczon, AZ. Eur. J. Oper. Res. 1990, 49, 308–324. [Google Scholar] [CrossRef]
  13. Nasrollahzadeh, A.A.; Khademi, A.; Mayorga, M.E. Real-time ambulance dispatching and relocation. Manuf. Serv. Oper. Manag. 2018, 20, 467–480. [Google Scholar] [CrossRef]
  14. Jenkins, P.R.; Robbins, M.J.; Lunday, B.J. Approximate dynamic programming for military medical evacuation dispatching policies. INFORMS J. Comput. 2021, 33, 2–26. [Google Scholar] [CrossRef]
  15. Gans, N.; Zhou, Y.P. A call-routing problem with service-level constraints. Oper. Res. 2003, 51, 255–271. [Google Scholar] [CrossRef]
  16. Gurvich, I.; Armony, M.; Mandelbaum, A. Service-level differentiation in call centers with fully flexible servers. Manag. Sci. 2008, 54, 279–294. [Google Scholar] [CrossRef]
  17. Schaack, C.; Larson, R.C. An N-server cutoff priority queue. Oper. Res. 1986, 34, 257–266. [Google Scholar] [CrossRef]
  18. Majzoubi, F.; Bai, L.; Heragu, S.S. An optimization approach for dispatching and relocating EMS vehicles. IIE Trans. Healthc. Syst. Eng. 2012, 2, 211–223. [Google Scholar] [CrossRef]
  19. McLay, L.A.; Mayorga, M.E. A dispatching model for server-to-customer systems that balances efficiency and equity. Manuf. Serv. Oper. Manag. 2013, 15, 205–220. [Google Scholar] [CrossRef]
  20. McLay, L.A.; Mayorga, M.E. A model for optimally dispatching ambulances to emergency calls with classification errors in patient priorities. IIE Trans. 2013, 45, 1–24. [Google Scholar] [CrossRef]
  21. Lei, X.; Hu, X.; Wang, G.; Luo, H. A multi-UAV deployment method for border patrolling based on Stackelberg game. J. Syst. Eng. Electron. 2023, 34, 99–116. [Google Scholar] [CrossRef]
  22. Dahan, M.; Sela, L.; Amin, S. Network inspection for detecting strategic attacks. Oper. Res. 2022, 70, 1008–1024. [Google Scholar] [CrossRef]
  23. Wang, B.; Kou, G.; Xiao, H. Defending a Series Signaling System Against Uncertain Attack Time with Individual Protection, False Nodes, and Overarching Protection. Reliab. Eng. Syst. Saf. 2025, 264, 111364. [Google Scholar] [CrossRef]
Figure 1. Targets escaping a layer propagate to the next.
Figure 1. Targets escaping a layer propagate to the next.
Mathematics 13 03275 g001
Figure 2. The state transition diagram of a security layer with 2 response units.
Figure 2. The state transition diagram of a security layer with 2 response units.
Mathematics 13 03275 g002
Figure 3. Comprehensive validation of layer-splitting observation across multiple probability distributions. All scenarios show strictly positive differences, confirming the benefit of layer-splitting.
Figure 3. Comprehensive validation of layer-splitting observation across multiple probability distributions. All scenarios show strictly positive differences, confirming the benefit of layer-splitting.
Mathematics 13 03275 g003
Figure 4. Heat map showing the system’s escape rate (−log scale). The axes represent the number of resources ( s 1 , n 1 ) assigned to Layer 1; Layer 2 receives the remainder ( s 2 = 10 s 1 , n 2 = 10 n 1 ) . The optimal configuration ( s 1 = 7 , n 1 = 7 ) is marked.
Figure 4. Heat map showing the system’s escape rate (−log scale). The axes represent the number of resources ( s 1 , n 1 ) assigned to Layer 1; Layer 2 receives the remainder ( s 2 = 10 s 1 , n 2 = 10 n 1 ) . The optimal configuration ( s 1 = 7 , n 1 = 7 ) is marked.
Mathematics 13 03275 g004
Figure 5. Performance landscape of the three-layer security system. The surface shows the best achievable performance (higher values indicate better security) for different sensor allocations to Layers 1 and 2 (Layer 3 receives remaining sensors, shown in left), as well as different response unit allocations with the same pattern (shown in right).
Figure 5. Performance landscape of the three-layer security system. The surface shows the best achievable performance (higher values indicate better security) for different sensor allocations to Layers 1 and 2 (Layer 3 receives remaining sensors, shown in left), as well as different response unit allocations with the same pattern (shown in right).
Mathematics 13 03275 g005
Figure 6. Schematic diagram of three different crossing patterns (OD pairs) for targets in a wild border area.
Figure 6. Schematic diagram of three different crossing patterns (OD pairs) for targets in a wild border area.
Mathematics 13 03275 g006
Figure 7. Numerical analysis of the blocking probability p b . (a) Blocking Probability vs. Decoy Arrival Rate; (b) Relative Error of Homogeneous Model Assumption.
Figure 7. Numerical analysis of the blocking probability p b . (a) Blocking Probability vs. Decoy Arrival Rate; (b) Relative Error of Homogeneous Model Assumption.
Mathematics 13 03275 g007
Table 1. Parameter settings for the base case.
Table 1. Parameter settings for the base case.
ParameterDescriptionValue
λ Arrival rate10
μ Service rate2
nNumber of response units10
sNumber of sensors10
rDetection radius10 m
η Instantaneous detection rate0.06
Table 2. Performance comparison across different layer configurations.
Table 2. Performance comparison across different layer configurations.
SystemOptimal Allocation−log(Pescape)
Single-Layer(10,10)4.151
Two-Layer(7,7), (3,3)6.983
Three-Layer(4,5), (3,3), (3,2)7.704
Table 3. Algorithm performance comparison.
Table 3. Algorithm performance comparison.
MetricSimulated AnnealingTabu Search
Best Escape Probability (−log scale)8.2718.271
Average Escape Probability (−log scale)8.0368.032
Average Runtime (seconds)2.3415.37
Table 4. Factors with different levels.
Table 4. Factors with different levels.
FactorsLowMediumHigh
Ratio of response units to sensors0.750.961.2
Instantaneous detection rate η HS 0.040.060.08
Number of sensors s121824
Table 5. Summary of instances.
Table 5. Summary of instances.
Instance123456789
Settings n 1 n 2 n 3 n 4 n n + 1 n + 2 n + 3 n + 4
Table 6. Results of sensitive analysis with three factors.
Table 6. Results of sensitive analysis with three factors.
FactorsResult
RunFractionRateSensorResultCPU Time (s)
1LowLowLow2.468417325905.8492904
2LowLowMedium0.3771223941453.895795
3LowLowHigh0.0172130461859.566701
4LowMediumLow4.215767419909.8106087
5LowMediumMedium1.856639591430.789385
6LowMediumHigh0.5031152471852.283655
7LowHighLow5.660872497905.7008405
8LowHighMedium3.6800561871445.041258
9LowHighHigh2.1122807231817.905169
10MediumLowLow1.5082446811124.397979
11MediumLowMedium0.1228156121759.212189
12MediumLowHigh0.0022205132340.808934
13MediumMediumLow3.4013218151117.571303
14MediumMediumMedium1.2196137481737.764299
15MediumMediumHigh0.2175979932359.47242
16MediumHighLow5.1923112091109.597461
17MediumHighMedium3.1712714851744.040538
18MediumHighHigh1.6276795842305.239862
19HighLowLow0.7415891081220.965206
20HighLowMedium0.0272274511841.022417
21HighLowHigh0.0002613842454.786236
22HighMediumLow2.5481769121212.837232
23HighMediumMedium0.6089833651811.1534
24HighMediumHigh0.0613567062493.959533
25HighHighLow4.4690052471230.350301
26HighHighMedium2.3692781761883.218999
27HighHighHigh0.8808067672454.921907
Table 7. ANOVA table for results.
Table 7. ANOVA table for results.
SourceDFAdj SSAdj MSF-Valuep-Value
fraction242.19821.09982.950
rate2290.012145.006570.110
sensor2319.899159.949628.860
fraction × rate42.5980.652.550.04
fraction × sensor46.3441.5866.240
rate × sensor431.3727.84330.840
fraction × rate × sensor84.6280.5792.270.024
Error21654.9390.254
Total242751.99
Table 8. ANOVA table for computational time.
Table 8. ANOVA table for computational time.
SourceDFAdj SSAdj MSF-Valuep-Value
fraction28,764,5334,382,267120.640
rate2208410420.030.972
sensor252,086,94426,043,472716.980
fraction × rate414,51536290.10.982
fraction × sensor4837,890209,4735.770
rate × sensor437,33393330.260.905
fraction × rate × sensor8852010650.031
Error2167,845,91536,324
Total24269,597,735
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhou, Y.; Batta, R. The Design of a Layered Security System Using Imperfect Sensors and Response Units. Mathematics 2025, 13, 3275. https://doi.org/10.3390/math13203275

AMA Style

Zhou Y, Batta R. The Design of a Layered Security System Using Imperfect Sensors and Response Units. Mathematics. 2025; 13(20):3275. https://doi.org/10.3390/math13203275

Chicago/Turabian Style

Zhou, Yu, and Rajan Batta. 2025. "The Design of a Layered Security System Using Imperfect Sensors and Response Units" Mathematics 13, no. 20: 3275. https://doi.org/10.3390/math13203275

APA Style

Zhou, Y., & Batta, R. (2025). The Design of a Layered Security System Using Imperfect Sensors and Response Units. Mathematics, 13(20), 3275. https://doi.org/10.3390/math13203275

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop