Skip to main content

A Primer On Public Safety Communication in the Context of Terror Attacks: The NATO SPS “COUNTER-TERROR” Project

  • Conference paper
  • First Online:
Advanced Technologies for Security Applications

Abstract

Terrorism is emerging as one of the most serious threats worldwide. Terrorist attacks are becoming more coordinated, sophisticated and hence more devastating. One of the important reasons for higher casualities is the “sluggish response time”. In some of the recent attacks, police and law enforcement agencies even after many hours were unable to have some of the basic information such as how many people are inside the attacked premises, the number of seriously injured persons, the number of terrorists, what their location is and so on.

So, one of the most important questions is “How to provide the fundamental information to public safety agencies as quickly as possible to reduce the response time following terrorist attacks”? The NATO – Science for Peace (SPS) “COUNTER-TERROR” G5482 project (2019–2021) presented in this paper investigates and proposed innovative ideas and solutionsto address this question from an information and communication technology viewpoint, including the establishment of secure D2D communication networks to quickly gather information and the use of UAVs to discover and localize weak signals.

It is envisioned that “connecting” the on-scene available (OS-A) heterogeneous devices (through multi-hop device-to-device (D2D) communication) to the nearest mobile deployed command center in an efficient way cannot only rapidly disseminate fundamental information but also aid in significantly reducing the response times and, consequently, many lives and infrastructure.

The objectives of this project are to design and evaluate efficient heterogeneous resource management by adaptive power control, throughput enhancement and interference management for device-to-device (D2D) communication. The originality is to exploit machine learning (ML) techniques to improve the existing state of the art. Further, the use of unmanned aerial vehicle (UAV) for weak signal detection and devices accurate position evaluation is an important objective. The deployed setup with UAV assisted connectivity is one of the novel contributions of this project. In addition, context aware and reliable D2D multi-hop routing and network connections to ensure high end-to-end throughout and low end-to-end energy consumption and delay is another core objective.

In order to enable the emergence of future pervasive communication systems enabling life-critical, public safety and preparedness, D2D communication can be realized both in licensed (driven by cellular spectrum) and un-licensed spectrums (used by other wireless technologies e.g., WiFi Direct, long term evolution (LTE) Direct, Bluetooth). In the licensed spectrum, smart phones can connect through LTE-A and can create multi-hop communication by exploiting UAVs (i.e., relay nodes). Whereas, in the unlicensed spectrum, smartphones can connect through WiFi Direct, LTE Direct, or LTE-U. The fundamental aspect of this work is to connect the devices (i.e., establish and maintain reliable connections) in harsh environments and existing works have to be extended and tested so that they can deal with such conditions.

So far, there have been only a few research projects specific to the context of terrorist attacks.

To enable future pervasive public safety communication systems, this work will foster the vision to achieve beyond state-of-the-art ambitious, highly innovative and challenging research and development goals. For the given context, in particular, connecting the OS-A devices in an efficient way to optimize their heterogeneous resources and improve reliability is key factor to the innovation of the proposed system.

By implementing the proposed D2D-based solution, the average response time shall be reduced by an average of 8 to 10 times. The direct positive consequences are that more lives will be saved, the number and severity of injuries will be reduced, and damages to infrastructure will be decreased.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhao J, Chai KK, Chen Y, Schormans J, Alonso-Zarate J (2015) Joint mode selection and resource allocation for machine-type d2d links. Trans Emerg Telecommun Technol

    Google Scholar 

  2. Kai Y, Zhu H (2015) Resource allocation for multiple-pair d2d communications in cellular networks. In: Communications (ICC), 2015 IEEE International Conference on IEEE, 2015, pp 2955–2960

    Google Scholar 

  3. Feng D, Lu L, Yuan-Wu Y, Li GY, Feng G, Li S (2013) Device-todevice communications underlaying cellular networks. IEEE Trans Commun 61(8):3541–3551

    Article  Google Scholar 

  4. Zhao J, Chai KK, Chen Y, Schormans J, Alonso-Zarate J (2015) Joint mode selection and resource allocation for machine-type d2d links. Trans Emerg Telecommun Technol

    Google Scholar 

  5. Min H, Lee J, Park S, Hong D (2011) Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks. IEEE Trans Wirel Commun 10(12):3995–4000

    Article  Google Scholar 

  6. Yu G, Xu L, Feng D, Yin R, Li GY, Jiang Y (2014) Joint mode selection and resource allocation for device-to-device communications. IEEE Trans Commun 62(11):3814–3824

    Article  Google Scholar 

  7. Zhao Y, Pelletier B, Pani D (2014) Resource allocation schemes for d2d communications. In: Systems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island. IEEE, 2014, pp 1–5

    Google Scholar 

  8. An R, Sun J, Zhao S, Shao S (2012) Resource allocation scheme for device-to-device communication underlying lte downlink network. In: Wireless Communications & Signal Processing (WCSP), 2012 International Conference on. IEEE, 2012, pp 1–5

    Google Scholar 

  9. Esmat HH, Elmesalawy MM, Ibrahim II (2016) Adaptive resource sharing algorithm for device-to-device communications underlaying cellular networks. IEEE Commun Lett 20(3):530–533

    Article  Google Scholar 

  10. Wang F, Song L, Han Z, Zhao Q, Wang X (2013) Joint scheduling and resource allocation for device-to-device underlay communication. In: Wireless Communications and Networking Conference (WCNC), 2013 IEEE. IEEE, 2013, pp 134–139

    Google Scholar 

  11. Luo Y, Shi Z, Zhou X, Liu Q, Yi Q (2014) Dynamic resource allocations based on q-learning for d2d communication in cellular networks. In: Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2014 11th International Computer Conference on IEEE, 2014, pp 385–388

    Google Scholar 

  12. Nie S, Fan Z, Zhao M, Gu X, Zhang L (2016) Q-learning based power control algorithm for d2d communication. In: Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016 IEEE 27th Annual International Symposium on IEEE, 2016, pp 1–6

    Google Scholar 

  13. Mozaffari M, Saad W, Bennis M, Debbah M (2016) Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage. preprint arXiv:1606.01962

    Google Scholar 

  14. Mozaffari M, Saad W, Bennis M, Debbah M (2016) Unmanned aerial vehicle with underlaid device-to-device communications: performance and tradeoffs. IEEE Trans Wirel Commun 15(6)

    Google Scholar 

  15. Kong M, Yorkinov O, Tran THV, Shimamoto S (2011) Elevation angle-based diversity access employing high altitude platform station and unmanned aerial vehicle (UAV) for urban area communications

    Google Scholar 

  16. Li Y, Cai L (2017) UAV-assisted dynamic coverage in a heterogeneous cellular system. IEEE Netw

    Google Scholar 

  17. Cileo D, Sharma N, Magarini M (2017) Coverage, capacity and interference analysis for an aerial base station in different environments. In: Proceedings of International Symposium on Wireless Communication Systems (ISWCS 2017), August 2017, Bologna, Italy

    Google Scholar 

  18. Sudheesh PG, Magarini M, Muthuchidambaranathan P (2016) Achieving maximum system capacity in multiple-high altitude platforms through interference alignment. In: Proceedings of International Conference on Industrial and Information Systems (ICIIS 2016), December 2016

    Google Scholar 

  19. Sudheesh PG, Sharma N, Magarini M, Muthuchidambaranathan P (2017) Interference alignment in multiple-high altitude platforms based communication with a generalized long distance line-of-sight channel model. In: Proceedings of ICCMIT, April 2017

    Google Scholar 

  20. Mahmood MA, Seah WKG, Welch I (2015) Reliability in wireless sensor networks: a survey and challenges ahead. Comput Netw 79:166–187., ISSN 1389-1286

    Article  Google Scholar 

  21. Scazzoli D, Mola A, Silverajan B, Magarini M, Verticale G (2017) A redundant gateway prototype for wireless avionic sensor networks. In: Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2017, Special Session on Mission Critical Communciations: Advancements, Challenges, and Opportunities), October 2017, Montreal, QC, Canada

    Google Scholar 

  22. Scazzoli D, Kumar A, Sharma N, Magarini M, Verticale G (May 2017) Fault recovery in time-synchronized mission critical ZigBee-based wireless sensor networks. Int J Wireless Inf Networks:1–10

    Google Scholar 

  23. Pinkney FJ, Hampel D, Di Pierro S (1996) Unmanned Aerial Vehicle (UAV) communications relay. Proc Milcom 96:47–51

    Google Scholar 

  24. Orfanus D, de Freitas EP, Eliassen F (2016) Self-organization as a supporting paradigm for military UAV relay networks. IEEE Commun Letters

    Google Scholar 

  25. Sadek AK, Han Z, Liu KR (2010) Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks. IEEE Trans Mobile Comput 9(4):505–515

    Article  Google Scholar 

  26. Feng H, Cimini LJ (2012) On optimum relay deployment in a multihop linear network with cooperation. In: IEEE Military Communications conference

    Google Scholar 

  27. Bao VNQ, Thanh TT, Nguyen TD, Vu TD (Jun. 2013) Spectrum sharingbased multi-hop decode-and-forward relay networks under interference constraints: performance analysis and relay position optimization. J Commun Netw 15(3):266–275

    Article  Google Scholar 

  28. Zhan PC, Yu K, Swindlehurst AL (2011) Wireless relay communications with unmanned aerial vehicles: performance and optimization. IEEE Trans Aerosp Electron Syst

    Google Scholar 

  29. Cetin O, Zagli I (2012) Continuous airborne communication relay approach using unmanned aerial vehicles. J Intell Robot Syst

    Google Scholar 

  30. Hanif U, McClean S, Nixon P, Parrt G, Luo C (2017) An optimal UAV deployment algorithm for bridging communication

    Google Scholar 

  31. Merwaday A, Guvenc I (2015) UAV assisted heterogeneous networks for public safety communications. In: IEEE Wireless Communication and Networking Conference. Workshops (WCNCW), March 2015

    Google Scholar 

  32. Li X, Guo D, Yin H, Wei G (2015) Drone-assisted public safety wireless broadband network. WCNC

    Google Scholar 

  33. Godara LC (1997) Applications of antenna arrays to mobile communications, part I: performance improvement, feasibility, and system considerations. Proc IEEE 85(7)

    Google Scholar 

  34. Godara LC (1997) Application of antenna arrays to mobile communications, part II: beam- forming and direction-of-arrival considerations. Proc IEEE 85(8)

    Google Scholar 

  35. Patwari N, Ash J, Kyperountas S, Hero A, Moses R, Correal N (2005) Locating the nodes: cooperative localization in wireless sensor networks. Signal Process Mag IEEE 22(4)

    Google Scholar 

  36. Mao G, Fidan B, Anderson BD (2007) Wireless sensor network localization techniques. Comput Netw 51(10)

    Google Scholar 

  37. Wang J, Ghosh R, Das S (2010) A survey on sensor localization. J Control Theory Appl 8(1)

    Google Scholar 

  38. Guvenc I, Chong C-C (2009) A survey on TOA based wireless localization and NLoS mitigation techniques. IEEE Commun Surv Tutorials 11(3):107–124

    Article  Google Scholar 

  39. Macagnano D, Destino G, Abreu G (2012) A comprehensive tutorial on localization: algorithms and performance analysis tools. Int J Wireless Inf Networks 19(4)

    Google Scholar 

  40. Gezici S (2008) A survey on wireless position estimation. Wirel Pers Commun 44(3):263–282

    Article  Google Scholar 

  41. Reggiani L, Fiorina J, Gezici S, Morosi S, Najar M (2013) Radio context awareness and applications. J Sens

    Google Scholar 

  42. Purvis KB, Astrom KJ, Khammash M (2008) Estimation and optimal configurations for localization using cooperative UAVs. IEEE Trans Control Syst Technol 16(5)

    Google Scholar 

  43. Mallick P, Routray A, Mohapatra J, Jana K (2014) Minimum variance estimators for enemy radar localization by unmanned aerial vehicles. In: IEEE International Conference on Electronics Computing and Communication Technologies (IEEE CONECCT), 2014

    Google Scholar 

  44. Dehghan SMM, Moradi H (2016) SLAM-inspired simultaneous localization of UAV and RF sources with unknown transmitted power. Trans Inst Meas Control 38

    Google Scholar 

  45. Legendre F, Theus H, Felix S, Bernhard P (2011) 30 years of wireless ad hoc networking research: what about humanitarian and disaster relief solutions? What are we still missing? In: Proceedings of the 1st ACM international conference on wireless technologies for humanitarian relief

    Google Scholar 

  46. Panaousis EA, Ramrekha TA, Millar GP, Politis C (2010) Adaptive and secure routing protocol for emergency mobile ad hoc networks. Int J Wireless Mob Netw 2(2)

    Google Scholar 

  47. Nishiyama H, Ngo T, Oiyama S, Kato N (2015) Relay by smart device: innovative communications for efficient information sharing among vehicles and pedestrians. IEEE Veh Technol Mag 10(4):54–62

    Article  Google Scholar 

  48. Reina DG, Askalani M, Toral SL, Barrero F, Asimakopoulou E, Bessis N (2015) A survey on multihop ad hoc networks for disaster response scenarios. Int J Distrib Sens Netw 2015, Article ID 647037, 16 pages

    Google Scholar 

  49. Nishiyama H, Ito M, Kato N (2014) Relay-by-smartphone: realizing multihop device-to-device communications. IEEE Commun Mag 52(4):56–65

    Article  Google Scholar 

  50. del Pilar Salamanca M, Camargo J (2016) A survey on IEEE 802.11-based MANETs and DTNs for survivor communication in disaster scenarios. In: 2016 IEEE Global Humanitarian Technology Conference (GHTC), Seattle, WA, pp 197–204

    Google Scholar 

  51. Kawamoto Y et al (2013) Toward terminal-to-terminal communication networks: a hybrid MANET and DTN approach. (Invited Paper). In: IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Berlin, Germany, September 2013, pp 228–232

    Google Scholar 

  52. Reina DG et al (2014) A survey on ad hoc networks for disaster scenarios. In: International Conference on Intelligent Networking and Collaborative Systems, Salerno, pp 433–438

    Google Scholar 

  53. Rosas E, Hidalgo N, Gil-Costa V, Bonacic C, Marin M, Senger H, Arantes L, Marcondes C, Marin O (2016) Survey on simulation for mobile ad-hoc communication for disaster scenarios. J Comput Sci Technol 31(2):326–349

    Article  Google Scholar 

  54. Rosati S, Krużelecki K, Heitz G, Floreano D, Rimoldi B (2016) Dynamic routing for flying ad hoc networks. IEEE Trans Veh Technol 65(3):1690–1700

    Article  Google Scholar 

  55. Minh QT, Shibata Y, Borcea C, Yamada S (2016) On-site configuration of disaster recovery access networks made easy. Ad Hoc Netw 40:46–60

    Article  Google Scholar 

  56. Hu Y, Guo W, Wang S (2014) "Emergency route selection for D2D cellular communications during an urban terrorist attack. In: IEEE International Conference on Communications (ICC)

    Google Scholar 

  57. Ren P, Du Q, Sun L (2013) Interference-aware routing for hopcount minimization in wireless d2d networks. In: IEEE/CIC International conference on communications in China – workshops (CIC/ICCC)

    Google Scholar 

  58. Babun L (2015) Extended coverage for public safety and critical communications using multi-hop and D2D communications. M.Sc dissertation, Florida International University

    Google Scholar 

  59. Jingyi Z, Xi L, Quansheng X (2015) Multi-hop routing for energy-efficiency enhancement in relay-assisted device-to-device communication. J China Univ Posts Telecommun 22(2):1–51

    Article  Google Scholar 

  60. Ali K, Nguyen HX, Shah P, Vien QT, Ever E (2017) D2D multi-hop relaying services towards disaster communication system. In: 24th International Conference on Telecommunications (ICT), Limassol, pp 1–5

    Google Scholar 

  61. Xing Y, Seferoglu H (2017) Device-aware routing and scheduling in multi-hop device-to-device networks. 2017 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, pp 1–7

    Google Scholar 

  62. Tanha M, Sajjadi D, Tong F, Pan J (2016) Disaster management and response for modern cellular networks using flow-based multi-hop device-to-device communications. In Proceedings of the IEEE Vehicular Technology Conference, VTC-Fall’16, pp 1–7

    Google Scholar 

  63. Park J (2016) Fast and energy efficient multihop D2D routing scheme. Int J Distrib Sens Netw 12(5)

    Google Scholar 

  64. Tata C, Kadoch M (2014) Multipath routing algorithm for deviceto-devicecommunicationsforpublic safety over lte heterogeneous networks. In: 1st International conference on information and communication technologies for disaster management (ICTDM).

    Google Scholar 

  65. El Alami M, Benamar N, Younis M, Shahin AA (2017) A framework for hotspot support using Wi-Fi direct based device-to-device links. In: Proceedings of the. 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, pp 552–557

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Mahtab Alam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature B.V.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alam, M.M., Le Moullec, Y., Ahmad, R., Magarini, M., Reggiani, L. (2020). A Primer On Public Safety Communication in the Context of Terror Attacks: The NATO SPS “COUNTER-TERROR” Project. In: Palestini, C. (eds) Advanced Technologies for Security Applications. NATO Science for Peace and Security Series B: Physics and Biophysics. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-2021-0_3

Download citation

Publish with us

Policies and ethics