Skip to main content

Abstract

Disaster and emergency management refers to a range of activities designed to maintain control over crisis situations, providing the rescue and assistance equipment with a framework for helping victims and reducing its impact. The range of activities include prevention, advance warning, early detection, analysis of the problem and assessment of scope, notification of the public and appropriate authorities, mobilization of a response, containment of damage, and relief and medical care for those affected. One of the challenges in emergency scenarios is the fact that communications can be interrupted, cutting the information flow. This lack of communication infrastructure makes an appropriate response to the disaster more challenging, and leads to reduced quality of services experienced by vulnerable civilians. As an example, emergency scenarios with big agglomerations of people or traffic jams following accidents demand a unified communication infrastructure to optimize the response and decision making. This can be overcome using self-configured wireless networks, because they do not require any pre-existing infrastructure to be established, and are easy to deploy and fast to operate.  The continuous use of modern smartphones facilitates the accessibility to wireless technologies. However, when incorporating mobile smartphones into disaster assisting networks, the biggest challenge is that such wireless networks need to be specifically designed and used for supporting victims, people and assistance equipment in crisis scenarios. Because of this, in future mobile networks designed for disaster management, there is a need for new architectures and protocols, capable to adapt existing and available wireless technologies for smart data capturing and decision making. This chapter analyses specific challenges and requirements related to supporting communication in such challenged situations. We present an extensive analysis of networking solutions designed to support situations such the ones described.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, L.-D., et al.: Small business Internet commerce: a case study. Information Resources Management Journal (IRMJ) 3, 17–41 (2003)

    Article  Google Scholar 

  2. Chen, K., Tarn, J.M., Han, B.T.: Internet dependency: its impact on online behavioral patterns in e-commerce. Human Systems Management 23(1), 49–58 (2004)

    Google Scholar 

  3. Böhmer, M., et al.: Falling asleep with angry birds, facebook and kindle: a large scale study on mobile application usage. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services. ACM (2011)

    Google Scholar 

  4. Ulusu, Y.: Determinant factors of time spent on Facebook: brand community engagement and usage types. Journal of Yasar University 18(5), 2949–2957 (2010)

    Google Scholar 

  5. Curran, K., Morrison, S., Cauley, S.M.: Google+ v Facebook: The Comparison. TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 10(2), 379–388 (2012)

    Article  Google Scholar 

  6. Java, A., et al.: Why we twitter: understanding microblogging usage and communities. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis. ACM (2007)

    Google Scholar 

  7. Duncombe, C.: The twitter revolution? Social media, representation and crisis in Iran and Libya. In: Australian Political Science Association Conference (APSA 2011), School of Politics & International Relations (2011)

    Google Scholar 

  8. Guha, S., Daswani, N.: An experimental study of the skype peer-to-peer voip system. Cornell University (2005)

    Google Scholar 

  9. Atzori, L., Iera, A., Morabito, G.: The Internet of things: A survey. Computer Networks 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  10. Shapiro, J.M.: Smart cities: quality of life, productivity, and the growth effects of human capital. The Review of Economics and Statistics 88(2), 324–335 (2006)

    Article  Google Scholar 

  11. Caragliu, A., Del Bo, C., Nijkamp, P.: Smart cities in Europe. Vrije Universiteit, Faculty of Economics and Business Administration (2009)

    Google Scholar 

  12. Mahizhnan, A.: Smart cities: the Singapore case. Cities 16(1), 13–18 (1999)

    Article  Google Scholar 

  13. Fuller, S.S.: Internet connectivity for hospitals and hospital libraries: strategies. Bulletin of the Medical Library Association 83(1), 32 (1995)

    Google Scholar 

  14. Armbrust, M., et al.: A view of cloud computing. Communications of the ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  15. Oyelaran-Oyeyinka, B., Lal, K.: Internet diffusion in sub-Saharan Africa: A cross-country analysis. Telecommunications Policy 29(7), 507–527 (2005)

    Article  Google Scholar 

  16. Woodcock, B.: Packet Clearing House. Overview of the Egyptian Internet Shutdown (2011)

    Google Scholar 

  17. Clayton, R.C., Murdoch, S.J., Watson, R.N.M.: Ignoring the great firewall of china. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 20–35. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Bailey, M., Labovitz, C.: Censorship and Co-option of the Internet Infrastructure, Ann Arbor, vol. 1001, p. 48104 (2011)

    Google Scholar 

  19. (June 21, 2013) http://english.ahram.org.eg/NewsContent/1/64/67894/Egypt/Politics-/Egypts-military-stops-attempt-to-cut-Internet-cabl.aspx (last accessed June 20, 2013)

  20. Upton, E., Halfacree, G.: Meet the Raspberry Pi. Wiley (2012)

    Google Scholar 

  21. Feature: Airwave ‘Could Be Replaced’, Police Oracle (February 19, 2013), http://www.policeoracle.com/news/Police+IT+and+Technology/2013/Feb/19/Feature-Airwave-Could-Be-Replaced_61319.html (last accessed June 20, 2013)

  22. Digital Agenda Europe, http://ec.europa.eu/digital-agenda/digital-agenda-europe (last accessed June 20, 2013)

  23. Telecoms Internet, Europe, http://ec.europa.eu/digital-agenda/telecoms-Internet-0 (last accessed June 20, 2013)

  24. TETRA standard and applications, http://www.tetra-applications.com/item.html&objID=15774 (last accessed June 20, 2013)

  25. The evolution of TETRA, white paper, http://www.p3-group.com/downloads/4/1/7/5/P3_-_Evolution_of_TETRA_-_White_Paper_-_v1.0.pdf (last accessed June 20, 2013)

  26. The MESA project, http://www.projectmesa.org (last accessed June 20, 2013)

  27. Chiti, F., Fantacci, R., Maccari, L., Marabissi, D., Tarchi, D.: A broadband wireless communications system for emergency management. Wireless Communications 15(3), 8–14 (2008)

    Article  Google Scholar 

  28. Durantini, A., Petracca, M., Vatalaro, F., Civardi, A., Ananasso, F.: Integration of Broadband Wireless Technologies and PMR Systems for Professional Communications. In: Fourth International Conference on Networking and Services, ICNS 2008, March 16-21, pp. 84–89 (2008)

    Google Scholar 

  29. Barakat, C., Altman, E., Dabbous, W., "On, T.C.P.: performance in a heterogeneous network: a survey. IEEE Communications Magazine 38(1), 40–46 (2000)

    Article  Google Scholar 

  30. Magalhaes, L., Kravets, R.: Transport level mechanisms for bandwidth aggregation on mobile hosts. In: Ninth International Conference on Network Protocols 2001, November 11-14, pp. 165–171 (2001)

    Google Scholar 

  31. Barré, S., Paasch, C., Bonaventure, O.: MultiPath TCP: From Theory to Practice. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part I. LNCS, vol. 6640, pp. 444–457. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  32. Nguyen, S.C., Nguyen, T.M.T.: Evaluation of multipath TCP load sharing with coupled congestion control option in heterogeneous networks. In: Global Information Infrastructure Symposium (GIIS 2011), August 4-6, pp. 1–5 (2011)

    Google Scholar 

  33. Terrestrial Trunked Radio (TETRA), Voice plus Data (V+D), Part 7: Security, ETSI EN 300 392-7 V3.2.1 (2010-06)

    Google Scholar 

  34. Terrestrial Trunked Radio (TETRA), Direct Mode Operation (DMO), Part 6: Security, ETSI EN 300 396-6 V1.4.1 (2010-07)

    Google Scholar 

  35. Spyropoulou, E., Agar, C., Levin, T., Irvine, C.: IPsec Modulation for Quality of Security Service. In: Proceedings of the International Systems Security Engineering Conference (2002)

    Google Scholar 

  36. The Loon project (June 24, 2013), http://www.google.com/loon (last accessed June 20, 2013)

  37. International Telecommunication Union (October 2010)

    Google Scholar 

  38. The new mobile world order, http://www.cisco.com/web/about/ac79/docs/sp/New-Mobile-World-Order.pdf (last accessed June 20, 2013)

  39. Erricson, Mobility report, http://www.ericsson.com/res/docs/2012/ericsson-mobility-report-november-2012.pdf (last accessed June 20, 2013)

  40. 50 billion devices online by 2020, The Telegraph (January 31, 2012), http://www.telegraph.co.uk/technology/Internet/9051590/50-billion-devices-online-by-2020.html (last accessed June 20, 2013)

  41. Erricson, http://www.ericsson.com/res/docs/whitepapers/wp-50-billions.pdf (last accessed June 20, 2013)

  42. Vahdat, A., Becker, D.: Epidemic routing for partially connected ad hoc networks. Technical Report CS-200006, Duke University (2000)

    Google Scholar 

  43. Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Single-copy routing in intermittently connected mobile networks. In: Proc. of First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 235–244 (October 2004)

    Google Scholar 

  44. Hui, P., Crowcroft, J.: BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks. IEEE Transactions on Mobile Computing 10(11), 1576–1589 (2011)

    Article  Google Scholar 

  45. Moreira, W., Mendes, P., Sargento, S.: Opportunistic routing based on daily routines. In: Proc. of IEEE Int. Symp. World of Wireless, Mobile and Multimedia Networks (WoWMoM 2012), pp. 1–6 (June 2012)

    Google Scholar 

  46. Hui, P., Crowcroft, J.: How Small Labels Create Big Improvements. In: Proc. of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW 2007), Washington, DC, USA, pp. 65–70 (2007)

    Google Scholar 

  47. Lindgren, A., Doria, A., Schelen, O.: Probabilistic Routing in Intermittently Connected Networks. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 19–20 (2003)

    Article  Google Scholar 

  48. Anh Nguyen, H., Giordano, S., Puiatti, A.: Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network (PROPICMAN). In: Proc. of IEEE Int. Symp. on World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), pp. 1–6 (June 2007)

    Google Scholar 

  49. Luqman, F.: TRIAGE: Applying context to improve timely delivery of critical data in mobile ad hoc networks for disaster response. In: Pervasive Computing and Communications 2011 IEEE International Conference on Workshops (PERCOM Workshops), March 21-25, pp. 407–408 (2011)

    Google Scholar 

  50. Yu, F.R., Jie, Z., Tang, H., Chan, H.C.B., Leung, V.C.M.: Enhancing interoperability in heterogeneous mobile wireless networks for disaster response. IEEE Transactions on Wireless Communications 8(5), 2424–2433 (2009)

    Article  Google Scholar 

  51. Cayirci, E., Coplu, T.: SENDROM: sensor networks for disaster relief operations management. Wireless Networks 13(3), 409–423 (2007)

    Article  Google Scholar 

  52. Fujihara, A., Miwa, H.: Real-time Disaster Evacuation Guidance using Opportunistic Communications. In: The 2012 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2012), pp. 326–331 (2012)

    Google Scholar 

  53. Fujihara, A., Miwa, H.: Effect of Traffic Volume in Real-time Disaster Evacuation Guidance using Opportunistic Communications. In: Third International Conference on Intelligent Networking and Collaborative Systems (INCoS 2012), pp. 457–462 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andreea-Cristina Petre .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Petre, AC., Chilipirea, C., Dobre, C. (2014). Delay Tolerant Networks for Disaster Scenarios. In: Resource Management in Mobile Computing Environments. Modeling and Optimization in Science and Technologies, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-06704-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06704-9_1

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06703-2

  • Online ISBN: 978-3-319-06704-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics