CFP last date
20 December 2024
Reseach Article

A Query Based Trust Evaluation Scheme for Emergency Response Communication Networks

Published on None 2010 by Muhammad Ibrahim Channa, Samad Baseer, Kazi M. Ahmed
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 1
None 2010
Authors: Muhammad Ibrahim Channa, Samad Baseer, Kazi M. Ahmed
f881229b-9aa6-4c79-b77d-4772c36bd6d4

Muhammad Ibrahim Channa, Samad Baseer, Kazi M. Ahmed . A Query Based Trust Evaluation Scheme for Emergency Response Communication Networks. Mobile Ad-hoc Networks. MANETS, 1 (None 2010), 18-21.

@article{
author = { Muhammad Ibrahim Channa, Samad Baseer, Kazi M. Ahmed },
title = { A Query Based Trust Evaluation Scheme for Emergency Response Communication Networks },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 1 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 18-21 },
numpages = 4,
url = { /specialissues/manets/number1/1012-50/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A Muhammad Ibrahim Channa
%A Samad Baseer
%A Kazi M. Ahmed
%T A Query Based Trust Evaluation Scheme for Emergency Response Communication Networks
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 1
%P 18-21
%D 2010
%I International Journal of Computer Applications
Abstract

The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. This requires the generation and exchange of current information among first responders and emergency management centers in real time for making life saving decisions. Normally, the traditional communication infrastructures such as landline or cellular networks are damaged and don’t provide adequate services to first responders for exchanging emergency related information. Mobile ad hoc networks are commonly used as communication means during emergency response operations. Reliable and robust communication is vital for efficient emergency response operations. In large scale emergency response, various rescue teams from different rescue organizations participate for controlling the emergency situation. As the nodes from different rescue organizations join the same emergency response network, there is a possibility that some of the nodes may demonstrate selfish or malicious behavior. A node may experience some damage during emergency management operations that prevents it from forwarding the packets successfully. The communication interruptions among first responders and emergency management centers result into mismanagement of emergency response efforts causing more loss of human lives and other community resources. We propose a query based trust evaluation scheme for ad hoc emergency response networks that keeps track of faulty, selfish and malicious nodes. This information may be used by routing protocols to isolate faulty, selfish and malicious nodes during route setup process for providing reliable and robust emergency response communication services.

References
  1. Auf der Heide, E. 1989. Disaster Response: Principles of Preparation and Coordination. Online Book: http://coe-dmha.org/dr.
  2. Kyng M., Nielsen E. and Kristensen M. 2006. Challenges in Designing Interactive Systems for Emergency Response. Proceedings of the 6th Conference on Designing Interactive Systems, 301-310.
  3. Risse T. and Kirchner H. 2006. Challenges in Information Systems for Disaster Recovery and Response. Proceedings of the 3rd GI/ITG KuVS Fachges Prah, Berlin, 16-19.
  4. Manoj B. and Baker A. 2007. Communication Challenges in Emergency Response. Communications of the ACM, Vol. 50, Iusse 3, 51-53.
  5. Meissner A., Luckenbach T., Risse T., Kirste T. and Kirchner H. 2002. Design Challenges of an Integrated Disaster Management Communication and Information System. The First IEEE Workshop on Disaster Recovery Networks (DIREN 2002).
  6. Mehrotra S., Znati T. and Thompson C. 2008. Crisis Management. IEEE Internet Computing, Vol. 12, Issue 1, 14-17.
  7. Lueck T. 2005. Grant to Help City Broaden Radio Network. New York Times, September 19, 2005.
  8. Thompson C. 2005. Talking in the Dark. New York Times Magazine, September 18, 2005.
  9. Portman M. and Pirzada A. 2008. Wireless Mesh Networks for Public Safety and Crisis Management Applications. IEEE Internet Computing, Vol. 12, Issue 1, 18-25.
  10. Hubaux J., Gross T., Boudec J. and Vetterli M. 2001. Towards Self Organized Mobile Ad Hoc Networks: the Terminodes Project. IEEE Communications Magazine, Vol. 39, Issue 1, 118-124.
  11. Mobile Ad-hoc Networks (manet) WG, Mobile Ad-hoc Networks (manet) Charter, Wg Charter, IETF. 1999. http://www.ietf.org/html.charters/manet-charter.html.
  12. Pirzada A. and McDonald C. 2004. Establishing Trust in Pure Ad Hoc Networks. Proceedings of the 27th Australian Conference on Computer Science, 47-54.
  13. Mogre, P. Graffi, K. Hollick, M. and Steinmetz, R. 2007. AntSec, WatchAnt and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks. Proceedings of the 32nd IEEE Conference on Local Computer Networks, 539-547.
Index Terms

Computer Science
Information Sciences

Keywords

Emergency response Trust evaluation Mobile ad hoc networks Faulty nodes Selfish nodes Malicious nodes Reliability