Skip to main content

Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications

  • Chapter
  • First Online:
Guide to Wireless Sensor Networks

Part of the book series: Computer Communications and Networks ((CCN))

  • 1994 Accesses

Abstract

Communications infrastructures are a critical asset in today’s information society. However, legacy telecommunication systems easily collapse in case of disruptions that may occur due to security incidents or crises. In this chapter, we first elaborate on the major shortcomings of the current communications networks for security applications to identify the key missing requirements for such networks. Then, we show that the ad hoc networking technologies, coupled with disruptive-tolerant techniques, are the best suited paradigm to build the next generation of dependable, secure, and rapidly deployable communications infrastructures. In particular, we focus on mesh, opportunistic, vehicular, and sensor networks giving an overview of the most recent advances and summarizing the challenges facing the design and the deployment of these networks. Finally, we conclude this chapter presenting the open research issues to realize the vision of a dependable communications infrastructure, with special attention to aspects such as interoperability among multiple heterogeneous networks, autonomic network management, and QoS protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ESARB, “Meeting the Challenge: the European Security Research Agenda – A report from the European Security Research Advisory Board”, September 2006.

    Google Scholar 

  2. London Regional Resilience Forum, “Looking Back, Moving Forward – The Multi-Agency Debrief”, September 2006.

    Google Scholar 

  3. UK Government (J. Reid, T. Jowell), “Addressing Lessons from the Emergency Response to the 7 July 2005 London Bombings”, September 2006.

    Google Scholar 

  4. US Homeland Security, “Hurricane Katrina: A Nation Still Unprepared”, May 2006.

    Google Scholar 

  5. US National Task Force on Interoperability, “Why Can’t We Talk?”, February 2005.

    Google Scholar 

  6. D. Hatfield, P. Weiser, “Toward A Next Generation Strategy – Learning from Katrina and Taking Advantage of New Technologies”, 2005.

    Google Scholar 

  7. N. Ahmed, K. Jamshaid, O.Z. Khan, SAFIRE: A self-organizing architecture for information exchange between first responders, in Proceedings of IEEE Workshop on Networking Technologies for SDR Networks, San Diego, CA, USA, 8 June 2007.

    Google Scholar 

  8. I. Chlamtac, M. Conti, J. Liu, Mobile ad hoc networking: imperatives and challenges, Elsevier Ad Hoc Networks Journal, 1(1), 2003, 13–64.

    Article  Google Scholar 

  9. M. Conti, S. Giordano, Multihop ad hoc networking: The reality, IEEE Communications Magazine, 45(4), 2007, 88–95.

    Article  Google Scholar 

  10. B.S. Manoj, A. Hubenko-Baker, Communication challenges in emergency response, Communications of the ACM, 50(3), 2007, 51–53.

    Article  Google Scholar 

  11. European Commission, “FP7 Cooperation Work Programme – Theme 10: Security (Call 1)”, 22 December 2006.

    Google Scholar 

  12. M. Conti, S. Giordano, Multihop ad hoc networking: The theory, IEEE Communications Magazine, 45(4), 2007, 78–86.

    Article  Google Scholar 

  13. R. Bruno, M. Conti, E. Gregori, Mesh networks: Commodity multi-hop ad hoc networks, IEEE Communications Magazine, 43, 2005, 123–131.

    Article  Google Scholar 

  14. C. Eklund, R.B. Marks, K.L. Stanwood, S. Wang, IEEE standard 802.16: A technical overview of the WirelessMAN air interface for broadband wireless access, IEEE Communications Magazine, June 2002, 98–107.

    Google Scholar 

  15. IEEE TGs, “Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs,” IEEE 802.11s-06/0328r0, March 2006. [Online]. Available: http://grouper.ieee.org/groups/802/11/

    Google Scholar 

  16. J. Bicket, S. Biswas, D. Aguayo, R. Morris, Architecture and evaluation of an unplanned 802.11b mesh network, in Proceedings of ACM MobiCom 2005, Cologne, Germany, 28 August 28–2 September 2005, pp. 31–42.

    Google Scholar 

  17. D. Wu, D. Gupta, P. Mohapatra, Quail ridge reserve wireless mesh network: Experiences, challenges and findings, Proceedings of the TRIDENTCOM 2007, Florida, USA, May 2007.

    Google Scholar 

  18. R.B. Dilmaghani, R.R. Rao, Future wireless communication infrastructure with application to emergency scenarios, in Proceedings of IEEE WoWMoM 2007, Helsinki, Finland, 18–21 June 2007.

    Google Scholar 

  19. S. Yousefi, M.S. Mousavi, M. Fathy, Vehicular ad hoc networks (VANETs): Challenges and perspectives, in Proceedings of sixth International Conference on ITS Telecommunications, Chengdu, China, 21–23 June 2006, pp. 761–766.

    Google Scholar 

  20. M. Torrent-Moreno, M. Killat, H. Hartenstein, The challenges of robust inter-vehicle communications, in Proceedings of IEEE VTC-Fall 2005, Dallas, TX, USA, 28–25 September 2005, pp. 319–323.

    Google Scholar 

  21. M. Roccetti, M. Gerla, C.E. Palazzi, S. Ferretti, G. Pau, First Responders’ crystal ball: How to scry the emergency from a remote vehicle in Proceedings of IEEE IPCCC 2007, New Orleans, LA, USA, 11–13 April 2007, pp. 556–561.

    Google Scholar 

  22. S. Liang, D. Hatzinakos, A cross-layer architecture of wireless sensor networks for target tracking, IEEE/ACM Transactions on Networking, 15(1), 2007, 145–158.

    Article  Google Scholar 

  23. M. Lopez-Ramos, J. Leguay, V. Conan, Designing a novel SOA architecture for security and surveillance WSNs with COTS, in Proceedings of IEEE MASS-GHS’07, Pisa, Italy, 8 October 2007.

    Google Scholar 

  24. L. lilien, A. Gupta, Z. Yang, Opportunistic networks for emergency applications and their standard implementation framework, in Proceedings of IEEE IPCCC 2007, New Orleans, LA, USA, 11–13 April 2007, pp. 588–593.

    Google Scholar 

  25. L. Pelusi, A. Passarella, M. Conti, Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks, IEEE Communications Magazine, 44(11), 2006, 134–141.

    Article  Google Scholar 

  26. K.N. Ramachandran, E.M. Belding-Royer, K.C. AImeroth, DAMON: A distributed architecture for monitoring multi-hop mobile net-works, in Proceeding of IEEE SECON 2004, Santa Clara, CA, USA, 4–7 October 2004, pp. 601–609.

    Google Scholar 

  27. L. Qiu, P. Bahl, A. Rao, L. Zhou, Troubleshooting wireless mesh networks, Computer Communications Review, 36(5), 2006, 19–28.

    Article  Google Scholar 

  28. J.M. Peha, The digital TV transition: A chance to enhance public safety and improve spectrum auctions, IEEE Communications Magazine, 44(6), 2006, 22–23.

    Article  Google Scholar 

  29. T.W. Rondeau, C.W. Bostian, D. Maldonado, A. Ferguson, S. Ball, S.F. Midkiff, B. Le, Cognitive radios in public safety and spectrum management, in Proceeding of 33rd Research Conference on Communication, Information and Internet Policy, Arlington, VA, USA, 23–25 September 2005.

    Google Scholar 

  30. P. Pawelczak, R.V. Prasad, X. Liang, I.G. Niemegeers, Cognitive radio emergency networks – requirements and design, in Proceeding of DySPAN 2005, Baltimora, MD, USA, 8–11 November 2005, pp. 601–606.

    Google Scholar 

  31. G. Ganesan, Y. Li, Cooperative spectrum sensing in cognitive radio networks, in Proceeding of DySPAN 2005, Baltimora, MD, USA, 8–11 November 2005, pp. 137–143.

    Google Scholar 

  32. N. Nie , C. Comaniciu, Adaptive channel allocation spectrum etiquette for cognitive radio networks, Mobile Networks and Applications, 11(6), 2006, 779–797.

    Article  Google Scholar 

  33. C.C. Beard, V.S. Frost, Prioritization of emergency network traffic using ticket servers: A performance analysis, Simulation: Transactions of the Society for Modeling and Simulation, 80(6), 2004, 289–299.

    Article  Google Scholar 

  34. L. Hanzo II, R. Tafazolli, A survey of QoS routing solutions for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 9(2), 2007, 50–70.

    Article  Google Scholar 

  35. M. Ayyash, K. Alzoubi, Y. Alsbou, Preemptive quality of service infrastructure for wireless mobile ad hoc networks, in Proceeding of IWCMC’06, Vancouver, British Columbia, Canada, 3–6 July 2006, pp. 707–712.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag London Limited

About this chapter

Cite this chapter

Bruno, R., Conti, M., Pinizzotto, A. (2009). Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications. In: Misra, S., Woungang, I., Misra, S. (eds) Guide to Wireless Sensor Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84882-218-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-218-4_27

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-217-7

  • Online ISBN: 978-1-84882-218-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics