Advertisement

Emerging Information Infrastructures: Cooperation in Disasters

  • Mikael Asplund
  • Simin Nadjm-Tehrani
  • Johan Sigholm
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5508)

Abstract

Disasters are characterised by their devastating effect on human lives and the society’s ability to function. Unfortunately, rescue operations and the possibility to re-establish a working society after such events is often hampered by the lack of functioning communication infrastructures. This paper describes the challenges ahead in creating new communication networks to support post-disaster operations, and sets them in the context of the current issues in protection of critical infrastructures. The analysis reveals that while there are some common concerns there are also fundamental differences. The paper serves as an overview of some promising research directions and pointers to existing works in these areas.

Keywords

Intrusion Detection Critical Infrastructure Disaster Response Information Infrastructure Network Partition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adams, C.: Information sharing raises more questions than answers. AFCEA Signal Magazine (May 2008)Google Scholar
  2. 2.
    Amin, M.: Toward self-healing energy infrastructure systems. IEEE Comput. Appl. Power 14(1), 20–28 (2001)CrossRefGoogle Scholar
  3. 3.
    Baddeley, A.: Sweden seeks military communications flexibility. AFCEA Signal Magazine (May 2006)Google Scholar
  4. 4.
    Balasubramanian, A., Levine, B., Venkataramani, A.: DTN routing as a resource allocation problem. SIGCOMM Comput. Commun. Rev. 37(4), 373–384 (2007)CrossRefGoogle Scholar
  5. 5.
    Becker, J.C.: The opportunities and limits of technology in non profit disaster response. Keynote speech at the ISCRAM conference, Washington (May 2008)Google Scholar
  6. 6.
    Bengtsson, A., Westerdahl, L.: Access control in a coalition system. Technical Report FOI-R–2393–SE, Swedish Defence Research Agency (December 2007)Google Scholar
  7. 7.
    Birman, K.: Technology challenges for virtual overlay networks. IEEE Transactions on Systems, Man and Cybernetics, Part A 31(4), 319–327 (2001)CrossRefGoogle Scholar
  8. 8.
    Birman, K., Chen, J., Hopkinson, E., Thomas, R., Thorp, J., Van Renesse, R., Vogels, W.: Overcoming communications challenges in software for monitoring and controlling power systems. Proc. IEEE 93(5), 1028–1041 (2005)CrossRefGoogle Scholar
  9. 9.
    Bruno, R., Conti, M., Passarella, A.: Opportunistic networking overlays for ICT services in crisis management. In: Proc. 5th International ISCRAM Conference. ISCRAM (2008)Google Scholar
  10. 10.
    Buchegger, S., Le Boudec, J.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine 43(7), 101–107 (2005)CrossRefGoogle Scholar
  11. 11.
    Catarci, T., de Leoni, M., Marrella, A., Mecella, M., Salvatore, B., Vetere, G., Dustdar, S., Juszczyk, L., Manzoor, A., Truong, H.-L.: Pervasive software environments for supporting disaster responses. IEEE Internet Comput. 12(1), 26–37 (2008)CrossRefGoogle Scholar
  12. 12.
    CRUTIAL. European FP6 project, http://crutial.cesiricerca.it/
  13. 13.
    Denning, P.J.: Hastily formed networks. Commun. ACM 49(4), 15–20 (2006)MathSciNetCrossRefGoogle Scholar
  14. 14.
    DIESIS. European FP7 project, http://www.diesis-project.eu/
  15. 15.
    Dilmaghani, R., Rao, R.: A wireless mesh infrastructure deployment with application for emergency scenarios. In: Proc. 5th International ISCRAM Conference. ISCRAM (2008)Google Scholar
  16. 16.
    Farrell, S., Cahill, V.: Delay- and Disruption-Tolerant Networking. Artech House, Inc., Norwood (2006)Google Scholar
  17. 17.
    Fiore, M., Harri, J., Filali, F., Bonnet, C.: Vehicular mobility simulation for VANETs. In: Proc. 40th Annual Simulation Symposium (ANSS) (2007)Google Scholar
  18. 18.
    FORWARD. European FP7 project, http://www.ict-forward.eu/
  19. 19.
    Gao, T., Pesto, C., Selavo, L., Chen, Y., Ko, J., Lim, J., Terzis, A., Watt, A., Jeng, J., Chen, B., Lorincz, K., Welsh, M.: Wireless medical sensor networks in emergency response: Implementation and pilot results. In: Proc. 2008 IEEE International Conference on Technologies for Homeland Security. IEEE, Los Alamitos (2008)Google Scholar
  20. 20.
    Ghorbani, A.A., Bagheri, E.: The state of the art in critical infrastructure protection: a framework for convergence. International Journal of Critical Infrastructures 4, 215–244 (2008)CrossRefGoogle Scholar
  21. 21.
    Guimera, R., Amaral, L.: Modeling the world-wide airport network. The European Physical Journal B - Condensed Matter 38, 381–385 (2004)Google Scholar
  22. 22.
    Haas, Z.J., Small, T.: Evaluating the capacity of resource-constrained DTNs. In: Proc. 2006 international conference on Wireless communications and mobile computing (IWCMC). ACM, New York (2006)Google Scholar
  23. 23.
    Helal, A.A., Bhargava, B.K., Heddaya, A.A.: Replication Techniques in Distributed Systems. Kluwer Academic Publishers, Norwell (1996)MATHGoogle Scholar
  24. 24.
    HIDENETS. European FP6 project, http://www.hidenets.aau.dk/
  25. 25.
    IRRIIS. European FP6 project, http://www.irriis.org/
  26. 26.
    Jefferson, T.L.: Using the internet to communicate during a crisis. VINE 36, 139–142 (2006)CrossRefGoogle Scholar
  27. 27.
    Kostoulas, D., Aldunate, R., Pena-Mora, F., Lakhera, S.: A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations. Advanced Engineering Informatics 22(1), 45–58 (2008)CrossRefGoogle Scholar
  28. 28.
    Krügel, C., Robertson, W.K.: Alert verification: Determining the success of intrusion attempts. In: Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). German Informatics Society (2004)Google Scholar
  29. 29.
    Kuiper, E., Nadjm-Tehrani, S.: Mobility models for uav group reconnaissance applications. In: Proc. International Conference on Wireless and Mobile Communications (ICWMC) (2006)Google Scholar
  30. 30.
    Labovitz, C., Ahuja, A., Jahanian, F.: Experimental study of internet stability and backbone failures. In: Twenty-Ninth Annual International Symposium on Digest of Papers Fault-Tolerant Computing (1999)Google Scholar
  31. 31.
    Labovitz, C., Wattenhofer, R., Venkatachary, S., Ahuja, A.: Resilience characteristics of the internet backbone routing infrastructure. In: Proc. Third Information Survivability Workshop (2000)Google Scholar
  32. 32.
    Laprie, J., Kanoun, K., Kaniche, M.: Modeling interdependencies between the electricity and information infrastructures. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 54–67. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  33. 33.
    McHugh, J., Christie, A., Allen, J.: Defending yourself: the role of intrusion detection systems. IEEE Softw. 17(5), 42–51 (2000)CrossRefGoogle Scholar
  34. 34.
    Mehrotra, S., Butts, C.T., Kalashnikov, D., Venkatasubramanian, N., Rao, R.R., Chockalingam, G., Eguchi, R., Adams, B.J., Huyck, C.: Project RESCUE: challenges in responding to the unexpected. In: Santini, S., Schettini, R. (eds.) Internet Imaging V, vol. 5304, pp. 179–192. SPIE (2003)Google Scholar
  35. 35.
    Melby, J.: Jtrs and the evolution toward software-defined radio. In: MILCOM 2002, October 2002, pp. 1286–1290 (2002)Google Scholar
  36. 36.
    Nelson, S.C., Albert, I., Harris, F., Kravets, R.: Event-driven, role-based mobility in disaster recovery networks. In: Proc. second workshop on Challenged networks (CHANTS). ACM, New York (2007)Google Scholar
  37. 37.
    Olariu, S., Maly, K., Foutriat, E.C., Yamany, S.M., Luckenbach, T.: A Dependable Architecture for Telemedicine in Support of Diaster Relief. In: Dependable Computing Systems, pp. 349–368. Wiley, Chichester (2005)Google Scholar
  38. 38.
    Plagemann, T., Skjelsvik, K., Puzar, M., Drugan, O., Goebel, V., Munthe-Kaas, E.: Cross-layer overlay synchronization in sparse manets. In: Proc. 5th International ISCRAM Conference (2008)Google Scholar
  39. 39.
    ReSIST. Deliverable D12 resilience-building technologies: State of knowledge, ch. 2 (September 2006), http://www.resist-noe.org/Publications/Deliverables/D12-StateKnowledge.pdf
  40. 40.
    Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag. 21(6), 11–25 (2001)CrossRefGoogle Scholar
  41. 41.
    Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv. 37(1), 42–81 (2005)CrossRefMATHGoogle Scholar
  42. 42.
    Sandulescu, G., Nadjm-Tehrani, S.: Opportunistic dtn routing with windows-aware adaptive replication (2008) (submitted for publication)Google Scholar
  43. 43.
    Shank, N., Sokol, B., Hayes, M., Vetrano, C.: Human services data standards: Current progress and future visions in crisis response. In: Proc. ISCRAM conference (May 2008)Google Scholar
  44. 44.
    Small, T., Haas, Z.J.: The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc). ACM, New York (2003)Google Scholar
  45. 45.
    Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proc. SIGCOMM Workshop on Delay-tolerant networking (WDTN). ACM, New York (2005)Google Scholar
  46. 46.
    Steckler, B., Bradford, B.L., Urrea, S.: Hastily formed networks for complex humanitarian disasters (September 2005), http://www.hfncenter.org/cms/KatrinaAAR
  47. 47.
    Svendsen, N., Wolthusen, S.: Analysis and statistical properties of critical infrastructure interdependency multiflow models. In: Proc. IEEE SMC Information Assurance and Security Workshop (IAW) (2007)Google Scholar
  48. 48.
    Swanson, M., Hash, J., Bowen, P.: Guide for developing security plans for federal information systems. Technical Report 800-18, National Institute of Standards and Technology (February 2006)Google Scholar
  49. 49.
    Szentivanyi, D., Nadjm-Tehrani, S.: Middleware support for fault tolerance. In: Mahmoud, Q. (ed.) Middleware for Communications. John Wiley & Sons, Chichester (2004)Google Scholar
  50. 50.
    Tschudin, C., Gunningberg, P., Lundgren, H., Nordström, E.: Lessons from experimental MANET research. Ad Hoc Networks 3(2), 221–233 (2005)CrossRefGoogle Scholar
  51. 51.
    WOMBAT. European FP7 project, http://www.wombat-project.eu/

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Mikael Asplund
    • 1
  • Simin Nadjm-Tehrani
    • 1
  • Johan Sigholm
    • 2
  1. 1.Department of Computer and Information ScienceLinköping UniversityLinköpingSweden
  2. 2.Swedish National Defence CollegeStockholmSweden

Personalised recommendations