A review on security challenges of wireless communications in disaster emergency response and crisis management situations

被引:35
作者
Seba, Abderazek [1 ]
Nouali-Taboudjemat, Nadia [1 ]
Badache, Nadjib [1 ]
Seba, Hamida [2 ]
机构
[1] CERIST, Dept Theories & Comp Engn, Algiers, Algeria
[2] Univ Lyon 1, Univ Lyon, CNRS, LIRIS,UMR5205, F-69622 Villeurbanne, France
关键词
Wireless communication; Emergency situations; Security; Crisis; MESH NETWORKS; ISSUES;
D O I
10.1016/j.jnca.2018.11.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In all disaster management mission areas such as prevention, protection, mitigation, response and recovery, the first pressing need is to establish a communication network for data collection, and especially for reliable real-time information exchange between emergency actors. Generally, when a crisis happens all the pre-existing communication networks are down and the different responders have heterogeneous equipment. Because of the hurry of the situation, a rapid deployment of a reliable, easily configurable, robust, inter-operable, low cost and secure network is needed. Wireless networks provide a promising communication infrastructure to all the situation tiers such as headquarter and rescue operators. The security considerations are vital due to the sensitive and real-time need for information exchange, in the spatial context of chaotic emergency and crisis situations. Numerous security threats can be found in the different wireless based communication architectures proposed for crisis management. In this paper, we study disaster management security needs and we present an overview of the communication architecture proposed for emergency situations. We also provide a security analysis of theses architectures and open issues to be tackled.
引用
收藏
页码:150 / 161
页数:12
相关论文
共 80 条
[1]  
Adam N., 2008, Digital Government Society of North America, P407
[2]  
Al Hadhrami T., 2013, P IEEE 77 VEH TECHN, P1, DOI [10.1109/VTCSpring.2013.6692718, DOI 10.1109/VTCSPRING.2013.6692718]
[3]  
Al Hadhrami T., 2012, SPIE PHOTONICS EUROP
[4]   Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications [J].
Al-Janabi, Samaher ;
Al-Shourbaji, Ibrahim ;
Shojafar, Mohammad ;
Shamshirband, Shahaboddin .
EGYPTIAN INFORMATICS JOURNAL, 2017, 18 (02) :113-122
[5]   Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm [J].
Ali, Samaher Hussein .
2013 SIXTH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE), 2014, :259-269
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], 1997, CMUSEI97TR013
[8]  
[Anonymous], 2002, Proceedings of the 1st ACM workshop on Wireless security, DOI DOI 10.1145/570681.570685
[9]  
[Anonymous], COMBINATION AD HOC M
[10]  
[Anonymous], QSHINE 2007 WORKSH T