Filters








2,447 Hits in 3.3 sec

Future Research on Cyber-Physical Emergency Management Systems

Erol Gelenbe, Fang-Jing Wu
2013 Future Internet  
Cyber-physical systems that include human beings and vehicles in a built environment, such as a building or a city, together with sensor networks and decision support systems have attracted much attention  ...  This paper surveys current research on sensor-assisted evacuation and rescue systems and discusses the related research issues concerning communication protocols for sensor networks, as well as several  ...  Based on the presence of victims, in [38] , the search and rescue space is reduced, and in [32, 33] , a communication backbone is formed using robotics.  ... 
doi:10.3390/fi5030336 fatcat:fhprtq467fdfhamh4pmikxbtzu

Emergency Response Communications and Associated Security Challenges [article]

Muhammad Ibrahim Channa, Kazi M. Ahmed
2010 arXiv   pre-print
Wireless ad hoc networks such as mobile ad hoc networks, wireless sensor networks and wireless mesh networks are the promising alternatives in such type of situations.  ...  This paper presents a survey of the proposed emergency response communication frameworks and the potential security services required by them to provide reliable and secure information exchange during  ...  SECURITY CHALLENGES FOR WIRELESS SENSOR NETWORKS IN EMERGENCY RESPONSE A distributed search and rescue system comprising of humans, sensors and robots has been proposed for emergency situations [11] .  ... 
arXiv:1010.4887v1 fatcat:q65lcjsauzfefpbhtdldblr4du

Emergency Response Communications and Associated Security Challenges

Muhammad Ibrahim Channa, Kazi M. Ahmed
2010 International journal of network security and its applications  
Wireless ad hoc networks such as mobile ad hoc networks, wireless sensor networks and wireless mesh networks are the promising alternatives in such type of situations.  ...  This paper presents a survey of the proposed emergency response communication frameworks and the potential security services required by them to provide reliable and secure information exchange during  ...  SECURITY CHALLENGES FOR WIRELESS SENSOR NETWORKS IN EMERGENCY RESPONSE A distributed search and rescue system comprising of humans, sensors and robots has been proposed for emergency situations [11] .  ... 
doi:10.5121/ijnsa.2010.2414 fatcat:bx6qmk2lrzdyhntapo37vfhiwq

Advances in Transportation Cyber-Physical System (T-CPS)

Saraju P. Mohanty
2020 IEEE Consumer Electronics Magazine  
Security and privacy issues in T-CPS are in various forms.  ...  The privacy issues in T-CPS include system privacy, location privacy, and privacy of the driver and passengers.  ... 
doi:10.1109/mce.2020.2986517 fatcat:ghk5uklihvd5te6ixp7kl5pzhe

Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard

Seung-Hyun Seo, Jung-In Choi, Jinseok Song
2017 Sensors  
Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination  ...  between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation.  ...  In our UAV-EMOR system, the beacon sensors are used to implement rescue and evacuation functionality.  ... 
doi:10.3390/s17102200 pmid:28946659 pmcid:PMC5677227 fatcat:do5jie7bxjfclk3rcc6h3336o4

Algorithmic Aspects of Wireless Networks

Xiuzhen Cheng, Wei Li, Taieb Znati
2007 EURASIP Journal on Wireless Communications and Networking  
., analyzes security weakness of the operational and proposed CDMA systems and presents an encryption-based secure scrambling process.  ...  Potential applications of these networks include search and rescue, smart homes, battlefield surveillance, environment monitoring and control, and so forth.  ...  They describe an analytical model of the system under consideration and present two mathematical approaches to derive solutions for any system configuration and deployment, along with an adaptive feedback-based  ... 
doi:10.1155/2007/52861 fatcat:33rc33jtxfcmdpd2z6qbdghla4

Special Issue on Intelligent Edge Computing for Cyber Physical and Cloud Systems

Prof. Weijia Jia, Prof. Geyong Min, Prof. Yang Xiang, Dr. Arun Kumar Sangaiah
2019 ACM Transactions on Intelligent Systems and Technology  
Systems in industrial informatics.  ...  Cloud computing extends the computing and storage ability of CPS and leads to a new paradigm-Cyber Physical and Cloud Systems (CPCS), which is a product of combining CPS and Cloud Computing together.  ...  In "Edge-enabled Disaster Rescue: A Case Study of Searching for Missing People," Fang Liu et al. design a highly efficient disaster rescue framework based on edge computing that uses a computer vision  ... 
doi:10.1145/3372277 fatcat:uamjbttmsvgfpllhgadcdk75ea

A Big Data Reference Architecture for Emergency Management

Carlos A. Iglesias, Alfredo Favenza, Álvaro Carrera
2020 Information  
Nowadays, we are witnessing a shift in the way emergencies are being managed.  ...  On the one hand, the availability of big data and the evolution of geographical information systems make it possible to manage and process large quantities of information that can hugely improve the decision-making  ...  Second, the security and privacy fabric is only used for controlling access in the visualization component, which can be an issue since the system should preserve confidentiality, privacy, and security  ... 
doi:10.3390/info11120569 fatcat:kxostcrulbh7lpnd3qehl7h2by

Cloud based Spatial Cloaking for Mobile User Privacy Preservation

Revathy GangadarenM, Lijo V. P.
2012 International Journal of Applied Information Systems  
The well known spatial cloaking technique based on k-anonymity concept is using in mobile devices for privacy preserved location based services.  ...  Mobile Cloud Computing has invoked a new era of mobile world. The rapid growth of the mobile cloud computing has given rises to many new security issues.  ...  In the device based security systems, run the security system inside the device i.e., it is a resource consuming process. In MCC, this is not preferable.  ... 
doi:10.5120/ijais12-450709 fatcat:4qoqlgkjlzcmrpy24oop6o6fli

Opportunities and threats posed by new technologies

Geert De Cubber
2019 Zenodo  
In this paper, we will focus on a number of novel technologies and discuss how security actors are currently doing their best to maximize the "good" use of these tools, while minimizing the "bad" use.  ...  Aerial Systems (Drones), and showcase how the potential security threats posed by these systems can be mitigated by novel drone detection systems. • Unmanned Maritime Systems, and showcase how this technology  ...  carrying a rescue capsule) for search and rescue operations (De Cubber et al. 2013) UNMANNED GROUND SYSTEMS: HOW TO PREVENT CYBER-ATTACKS ON OUR FUTURE AUTOMATED CARS?  ... 
doi:10.5281/zenodo.2628757 fatcat:ledp4tpmlffihm2mzxftqenm54

Sensor-based data storage for search and rescue

Sanem Sariel Talay, Esin Ergen, Gurhan Avdan, Cagri Eroglu
2008 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing  
The discussions on the current information needs are based on the search and rescue guidelines and on the initial interviews that were conducted with earthquake responders in Turkey such as Turkish Civil  ...  In the paper, the types of information items that are needed during search and rescue operations are determined, and the requirements identified for the proposed system are discussed.  ...  ACKNOWLEDGEMENT Authors would like to thank Gursans Guven and Senem Seyis for their tremendous efforts in conducting interviews and helping outline the data model of the system.  ... 
doi:10.1109/issnip.2008.4761954 fatcat:qm6u227vynfjrir2xeklasxukm

The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights

Chris Schlag
2013 Pittsburgh Journal of Technology Law and Policy  
from a privacy protection standpoint and limiting the use of drones in a way that would invade an individual's privacy expectations.  ...  For example, drone use in domestic airspace raises the significant and undeniable risk of individual privacy invasions through the use of drones by both public entities and third parties.  ...  50 to over 7,000. 57 Search and Rescue UAVs recently have become a popular tool for search and rescue operations, as UAVs can be equipped with optical sensors, infrared cameras, synthetic aperture radars  ... 
doi:10.5195/tlp.2013.123 fatcat:vogl6l7vnvhhpj4kav7ia6ydgi

Editorial: Distributed intelligence and data fusion for sensor systems

L. Shu, M. Chen, J.J.P.C. Rodrigues, J. Lloret
2011 IET Communications  
In this paper we summarise a Special Issue that tackles the distributed intelligence and data fusion for sensor systems from the perspective of coding and channel allocation, data aggregation and data  ...  The next step is to promote the research of distribute intelligence in sensor systems in order to let the sensors be smart and take their own decisions, and propose new data fusion techniques and methods  ...  monitoring sensor systems which can proactively self-adapt to changes and evolution occurring in the provision of search and rescue capabilities in a dynamic environment.  ... 
doi:10.1049/iet-com.2011.0534 fatcat:gfwzyd6qcrgv7khzzdp6lkdpmy

Project rescue: challenges in responding to the unexpected

Sharad Mehrotra, C. T. Butts, D. Kalashnikov, Nalini Venkatasubramanian, Ramesh R. Rao, G. Chockalingam, R. Eguchi, B. J. Adams, C. Huyck, Simone Santini, Raimondo Schettini
2003 Internet Imaging V  
For example, building collapses where victims are trapped may require search, rescue and medical resources, release of hazardous materials may require large-scale evacuation, etc.  ...  Operationally, these incidents are assigned a measure of urgency/priority, typically based on immediate threats to life safety.  ...  In this context, key areas of research we are exploring include: a) fusing of imagery from different sources, scales and sensors; b) change detection methodologies to quantify local and regional damage  ... 
doi:10.1117/12.537805 fatcat:6jlkux62cbh5nldqtq3hxajkru

RADIO FREQUENCY IDENTIFICATION TECHNOLOGY APPLICATION FOR DISASTER AND RESCUE: A REVIEW

Gaurav Jain, Abhijit Kulshrestra, N.L. Vyas.
2017 International Journal of Advanced Research  
., 2015 [37] introduced the DIORAMA based system that provides situational awareness for urban search and rescue operations in both indoor and outdoor settings, significantly improving the operations'  ...  Privacy in RFID and mobile object [53] 1511  ... 
doi:10.21474/ijar01/3307 fatcat:nhr7rjhjofgjzivrqwpxey6lvm
« Previous Showing results 1 — 15 out of 2,447 results