Optimizing the planning of construction site security for critical infrastructure projects

Hisham Said, Khaled El-Rayes

Research output: Contribution to journalArticlepeer-review


Construction decisions can have a significant impact on the security level of critical infrastructures over their entire life cycle. Federal regulations require construction managers and security officers to consider all possible physical security measures to protect critical assets and classified information that reside onsite during the construction phase of critical infrastructure projects. This paper presents the development of an automated multi-objective optimization framework for the planning of construction site layout and security systems of critical infrastructure projects that provides the capability of minimizing overall security risks and minimizing overall site costs. The framework is developed in four main phases: (1) risk identification and system modeling, (2) security lighting optimization, (3) security-cost optimization, and (4) performance evaluation. The automated framework utilizes newly developed metrics for quantifying the security system performance and the impact of site layout planning on the effectiveness of the security system. The performance of the present framework is analyzed using an application example that demonstrates its capabilities in planning construction site security systems and generating optimal tradeoffs between minimizing security risks and minimizing overall site costs.

Original languageEnglish (US)
Pages (from-to)221-234
Number of pages14
JournalAutomation in Construction
Issue number2
StatePublished - Mar 2010


  • Critical infrastructure
  • Dynamic layout planning
  • Genetic algorithms
  • Optimization
  • Physical security
  • Planning
  • Risk management

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Civil and Structural Engineering
  • Building and Construction


Dive into the research topics of 'Optimizing the planning of construction site security for critical infrastructure projects'. Together they form a unique fingerprint.

Cite this