Advertisement

Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications

  • Raffaele Bruno
  • Marco Conti
  • Antonio Pinizzotto
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

Communications infrastructures are a critical asset in today’s information society. However, legacy telecommunication systems easily collapse in case of disruptions that may occur due to security incidents or crises. In this chapter, we first elaborate on the major shortcomings of the current communications networks for security applications to identify the key missing requirements for such networks. Then, we show that the ad hoc networking technologies, coupled with disruptive-tolerant techniques, are the best suited paradigm to build the next generation of dependable, secure, and rapidly deployable communications infrastructures. In particular, we focus on mesh, opportunistic, vehicular, and sensor networks giving an overview of the most recent advances and summarizing the challenges facing the design and the deployment of these networks. Finally, we conclude this chapter presenting the open research issues to realize the vision of a dependable communications infrastructure, with special attention to aspects such as interoperability among multiple heterogeneous networks, autonomic network management, and QoS protection.

Keywords

Sensor Network Sensor Node Cognitive Radio Mesh Network Communication Infrastructure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    ESARB, “Meeting the Challenge: the European Security Research Agenda – A report from the European Security Research Advisory Board”, September 2006.Google Scholar
  2. 2.
    London Regional Resilience Forum, “Looking Back, Moving Forward – The Multi-Agency Debrief”, September 2006.Google Scholar
  3. 3.
    UK Government (J. Reid, T. Jowell), “Addressing Lessons from the Emergency Response to the 7 July 2005 London Bombings”, September 2006.Google Scholar
  4. 4.
    US Homeland Security, “Hurricane Katrina: A Nation Still Unprepared”, May 2006.Google Scholar
  5. 5.
    US National Task Force on Interoperability, “Why Can’t We Talk?”, February 2005.Google Scholar
  6. 6.
    D. Hatfield, P. Weiser, “Toward A Next Generation Strategy – Learning from Katrina and Taking Advantage of New Technologies”, 2005.Google Scholar
  7. 7.
    N. Ahmed, K. Jamshaid, O.Z. Khan, SAFIRE: A self-organizing architecture for information exchange between first responders, in Proceedings of IEEE Workshop on Networking Technologies for SDR Networks, San Diego, CA, USA, 8 June 2007.Google Scholar
  8. 8.
    I. Chlamtac, M. Conti, J. Liu, Mobile ad hoc networking: imperatives and challenges, Elsevier Ad Hoc Networks Journal, 1(1), 2003, 13–64.CrossRefGoogle Scholar
  9. 9.
    M. Conti, S. Giordano, Multihop ad hoc networking: The reality, IEEE Communications Magazine, 45(4), 2007, 88–95.CrossRefGoogle Scholar
  10. 10.
    B.S. Manoj, A. Hubenko-Baker, Communication challenges in emergency response, Communications of the ACM, 50(3), 2007, 51–53.CrossRefGoogle Scholar
  11. 11.
    European Commission, “FP7 Cooperation Work Programme – Theme 10: Security (Call 1)”, 22 December 2006.Google Scholar
  12. 12.
    M. Conti, S. Giordano, Multihop ad hoc networking: The theory, IEEE Communications Magazine, 45(4), 2007, 78–86.CrossRefGoogle Scholar
  13. 13.
    R. Bruno, M. Conti, E. Gregori, Mesh networks: Commodity multi-hop ad hoc networks, IEEE Communications Magazine, 43, 2005, 123–131.CrossRefGoogle Scholar
  14. 14.
    C. Eklund, R.B. Marks, K.L. Stanwood, S. Wang, IEEE standard 802.16: A technical overview of the WirelessMAN air interface for broadband wireless access, IEEE Communications Magazine, June 2002, 98–107.Google Scholar
  15. 15.
    IEEE TGs, “Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs,” IEEE 802.11s-06/0328r0, March 2006. [Online]. Available: http://grouper.ieee.org/groups/802/11/Google Scholar
  16. 16.
    J. Bicket, S. Biswas, D. Aguayo, R. Morris, Architecture and evaluation of an unplanned 802.11b mesh network, in Proceedings of ACM MobiCom 2005, Cologne, Germany, 28 August 28–2 September 2005, pp. 31–42.Google Scholar
  17. 17.
    D. Wu, D. Gupta, P. Mohapatra, Quail ridge reserve wireless mesh network: Experiences, challenges and findings, Proceedings of the TRIDENTCOM 2007, Florida, USA, May 2007.Google Scholar
  18. 18.
    R.B. Dilmaghani, R.R. Rao, Future wireless communication infrastructure with application to emergency scenarios, in Proceedings of IEEE WoWMoM 2007, Helsinki, Finland, 18–21 June 2007.Google Scholar
  19. 19.
    S. Yousefi, M.S. Mousavi, M. Fathy, Vehicular ad hoc networks (VANETs): Challenges and perspectives, in Proceedings of sixth International Conference on ITS Telecommunications, Chengdu, China, 21–23 June 2006, pp. 761–766.Google Scholar
  20. 20.
    M. Torrent-Moreno, M. Killat, H. Hartenstein, The challenges of robust inter-vehicle communications, in Proceedings of IEEE VTC-Fall 2005, Dallas, TX, USA, 28–25 September 2005, pp. 319–323.Google Scholar
  21. 21.
    M. Roccetti, M. Gerla, C.E. Palazzi, S. Ferretti, G. Pau, First Responders’ crystal ball: How to scry the emergency from a remote vehicle in Proceedings of IEEE IPCCC 2007, New Orleans, LA, USA, 11–13 April 2007, pp. 556–561.Google Scholar
  22. 22.
    S. Liang, D. Hatzinakos, A cross-layer architecture of wireless sensor networks for target tracking, IEEE/ACM Transactions on Networking, 15(1), 2007, 145–158.CrossRefGoogle Scholar
  23. 23.
    M. Lopez-Ramos, J. Leguay, V. Conan, Designing a novel SOA architecture for security and surveillance WSNs with COTS, in Proceedings of IEEE MASS-GHS’07, Pisa, Italy, 8 October 2007.Google Scholar
  24. 24.
    L. lilien, A. Gupta, Z. Yang, Opportunistic networks for emergency applications and their standard implementation framework, in Proceedings of IEEE IPCCC 2007, New Orleans, LA, USA, 11–13 April 2007, pp. 588–593.Google Scholar
  25. 25.
    L. Pelusi, A. Passarella, M. Conti, Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks, IEEE Communications Magazine, 44(11), 2006, 134–141.CrossRefGoogle Scholar
  26. 26.
    K.N. Ramachandran, E.M. Belding-Royer, K.C. AImeroth, DAMON: A distributed architecture for monitoring multi-hop mobile net-works, in Proceeding of IEEE SECON 2004, Santa Clara, CA, USA, 4–7 October 2004, pp. 601–609.Google Scholar
  27. 27.
    L. Qiu, P. Bahl, A. Rao, L. Zhou, Troubleshooting wireless mesh networks, Computer Communications Review, 36(5), 2006, 19–28.CrossRefGoogle Scholar
  28. 28.
    J.M. Peha, The digital TV transition: A chance to enhance public safety and improve spectrum auctions, IEEE Communications Magazine, 44(6), 2006, 22–23.CrossRefGoogle Scholar
  29. 29.
    T.W. Rondeau, C.W. Bostian, D. Maldonado, A. Ferguson, S. Ball, S.F. Midkiff, B. Le, Cognitive radios in public safety and spectrum management, in Proceeding of 33rd Research Conference on Communication, Information and Internet Policy, Arlington, VA, USA, 23–25 September 2005.Google Scholar
  30. 30.
    P. Pawelczak, R.V. Prasad, X. Liang, I.G. Niemegeers, Cognitive radio emergency networks – requirements and design, in Proceeding of DySPAN 2005, Baltimora, MD, USA, 8–11 November 2005, pp. 601–606.Google Scholar
  31. 31.
    G. Ganesan, Y. Li, Cooperative spectrum sensing in cognitive radio networks, in Proceeding of DySPAN 2005, Baltimora, MD, USA, 8–11 November 2005, pp. 137–143.Google Scholar
  32. 32.
    N. Nie , C. Comaniciu, Adaptive channel allocation spectrum etiquette for cognitive radio networks, Mobile Networks and Applications, 11(6), 2006, 779–797.CrossRefGoogle Scholar
  33. 33.
    C.C. Beard, V.S. Frost, Prioritization of emergency network traffic using ticket servers: A performance analysis, Simulation: Transactions of the Society for Modeling and Simulation, 80(6), 2004, 289–299.CrossRefGoogle Scholar
  34. 34.
    L. Hanzo II, R. Tafazolli, A survey of QoS routing solutions for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 9(2), 2007, 50–70.CrossRefGoogle Scholar
  35. 35.
    M. Ayyash, K. Alzoubi, Y. Alsbou, Preemptive quality of service infrastructure for wireless mobile ad hoc networks, in Proceeding of IWCMC’06, Vancouver, British Columbia, Canada, 3–6 July 2006, pp. 707–712.Google Scholar

Copyright information

© Springer-Verlag London Limited 2009

Authors and Affiliations

  • Raffaele Bruno
    • 1
  • Marco Conti
    • 1
  • Antonio Pinizzotto
    • 1
  1. 1.Institute for Informatics and Telematics (IIT)Italian National Research Council (CNR)PisaItaly

Personalised recommendations