You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

19 January 2020

RDSP: Rapidly Deployable Wireless Ad Hoc System for Post-Disaster Management

,
,
,
,
,
,
,
,
and
1
Department of Electrical and Computer Engineering, COMSATS University Islamabad-Attock Campus, Attock 43600, Pakistan
2
Department of Electrical Engineering, COMSATS University Islamabad Wah Campus, Wah 47040, Pakistan
3
Division of Computer and Electronics Systems Engineering, Hankuk University of Foreign Studies, Yongin-si 17035, Korea
4
Department of Computer and Information Security, Sejong University, Seoul 05006, Korea
This article belongs to the Special Issue Vertical IoT Solutions and Their Applications in Smart Cities, Smart Agriculture, Smart Environment and Disaster Management

Abstract

In post-disaster scenarios, such as after floods, earthquakes, and in war zones, the cellular communication infrastructure may be destroyed or seriously disrupted. In such emergency scenarios, it becomes very important for first aid responders to communicate with other rescue teams in order to provide feedback to both the central office and the disaster survivors. To address this issue, rapidly deployable systems are required to re-establish connectivity and assist users and first responders in the region of incident. In this work, we describe the design, implementation, and evaluation of a rapidly deployable system for first response applications in post-disaster situations, named RDSP. The proposed system helps early rescue responders and victims by sharing their location information to remotely located servers by utilizing a novel routing scheme. This novel routing scheme consists of the Dynamic ID Assignment (DIA) algorithm and the Minimum Maximum Neighbor (MMN) algorithm. The DIA algorithm is used by relay devices to dynamically select their IDs on the basis of all the available IDs of networks. Whereas, the MMN algorithm is used by the client and relay devices to dynamically select their next neighbor relays for the transmission of messages. The RDSP contains three devices; the client device sends the victim’s location information to the server, the relay device relays information between client and server device, the server device receives messages from the client device to alert the rescue team. We deployed and evaluated our system in the outdoor environment of the university campus. The experimental results show that the RDSP system reduces the message delivery delay and improves the message delivery ratio with lower communication overhead.

1. Introduction

Cellular telephony is an extensively used communication technology. There are approximately eight billion active cellular subscriptions globally with approximately half of those users added in the last few years, mostly in developing areas [1]. Currently, mobile-cellular subscribers are more than the total population of the world. This is because people enjoy more than one subscription to take advantage of competing data plans of different cellular operators and so forth. Therefore, in many developing areas, cellular networks have replaced conventional landline telephone systems because of easy usage and the low cost of deployment. However, natural or man-made disasters can disrupt or fully destroy the cellular and land line telecommunication infrastructures and services in the effected areas. Recently, in September 2014, Hurricane Odile struck Mexico’s Baja California coasts [2]. The hurricane of category four destroyed many towns, causing the massive destruction of the electrical infrastructure that left over 90% of the population without electricity. The destruction of the communication infrastructure resulted in the absence of cooperation between the aid organizations; consequently, thousands of individuals endured hardship, due to mismanaged rescue operations. After the distractions of a disaster, the communication among rescue groups, such as firemen, police officers, and paramedics is vital. In particular, the feedback of first rescue responders is extremely important for an effective rescue and restoration operation. From a networking perspective, the aim is to recover connectivity to offer at least temporary communication services to rescue groups. One way to overcome these issues is to arrange network components, such as relays, access points, or routers to create a temporary network on request [3]. This needs a quickly deployable network to perform the required relief efforts, including helicopters and first responders on the floor that can save many lives. In addition, to guarantee the safety of survivors in the disaster-affected region, it is very important to manage stranded people’s requests in a timely manner to provide a general picture of the total injuries, relocation method, emergency needs, and so forth [4,5]. Furthermore, in an attempt to rapidly handle and deliver food and other resources to displaced inhabitants, the need for a secure and reliable communication network that is easy to deploy and relies on radio waves instead of a data cable would be a good choice for communication in disaster situations [6].
In this work, we propose a rapidly deployable system using multi-hop relays for a post-disaster wireless ad hoc network, named RDSP. The RDSP aims to reduce the average waiting times for transmitting the rescue groups and victim’s location information towards the control server. In addition, the RDSP scheme enables intermediate relay devices to dynamically select their IDs on the basis of the information provided by their neighbor relays and then each intermediate relay selects the best forwarders towards the control server to minimize end-to-end and round-trip message delivery delays. Finally, the client device is used to transmit victim’s information via Wi-Fi towards the control server, which then alerts emergency rescue teams to deliver food and other resources to displaced and stuck survivors.
The remainder of this paper is organized as follows. Section 2 summarizes the related work. Section 3 explains the flow charts and algorithms for the client, relay, and server devices. Section 4 describes the performance evaluation and compares the performance of the RDSP with the existing scheme. Finally, Section 5 provides the concluding remarks.

3. System Architecture of the RDSP Scheme

This section presents the architecture of the RDSP scheme, which aims to reduce the average waiting times for transmitting victim’s information towards the server by utilizing the following key features:
  • Client Device: The client devices are the end point communication devices held by rescue team members and victims. The client device is a WiFi-enabled device that manages to transmit the victim’s location information to the server device using relay devices. The client devices are used to establish the communication between rescue teams and server and to send feedback about the emergency situation.
  • Relay Device: Relay devices are randomly deployed at a distance of 90 m from each other to transmit the victim’s location information generated by the client device towards the server and then send back acknowledgment information to the client device. Relay devices dynamically connect with each other in a manner to establish the shortest path towards the server.
  • Server Device: The server device continuously listens for the arrival of incoming messages sent by the client device via relay devices in order to alert the rescue teams. Moreover, it sends the control and operational messages and is also responsible for receiving the feedback from rescue teams.
Figure 1 illustrates a deployment scenario of the RDSP system after disaster. When disaster occurs, the rescue team members will deploy the RDSP system as follows: A server device is installed in the incident area that will receive updates from rescue teams and victims. Additionally, rescue team members will move forward towards disaster areas while deploying relay devices at equal distances of about 90 m until any victim is sighted. Then, the client device that is carried by the rescue team members is used to send the victim’s position information to the server. The distance of 90 m between relays is managed by incorporating GPS modules in relays. After the server module is installed in an incident area, we start deploying the relays as follows: First of all, the first relay wirelessly connects with the server module. Afterwards, while carrying the relay and moving away from the server module, the relay continuously calculates its distance from the server using the GPS module that provides location coordinates of the relay module, whereas the location coordinates of the server are fixed and known to the relay module. If the calculated distance is 90 m, a green LED (installed on relay module) lights up, indicating to drop the first relay module at that particular position. Similarly, a second relay is chosen which connects with the first relay and the distance between the first relay and the second relay is again calculated by the second relay and it is dropped when the green LED on the second relay lights up. Following this procedure, all the relay devices manage to maintain a distance of 90 m between each other. The 90 m distance was selected because the relay device uses WiFi technology that has a transmission range of 90 m. However, the transmission range can be increased by using other advanced technologies, which is highly application dependent. It is indicated in Figure 1 that both the client device and relay device communicate wirelessly with the server device via WiFi. The server device manages all the request messages received and sends back an acknowledgment to the client device to ensure the reception of the request message.
Figure 1. Deployment scenario of the RDSP scheme.
Figure 2 presents a flow chart of the server device. After the initialization, the server waits for the arrival of request messages. If a message arrives, the server sends back an acknowledgment message to the client device via relay devices and generates an alarm message to alert the rescue teams.
Figure 2. Flow chart of server device.
Algorithm 1 presents the operation of the microcontroller in the server device. The input to the server device is a request message R m s g , whereas the output is an acknowledgment message and an alarm message. As shown in step 2, the server device continuously waits for the detection of R m s g . If  R m s g is detected, alarm message is generated, acknowledgment is sent back to the client device and R m s g is printed on screen. The microcontroller in the server device utilizes the Haversine formula [30] to determine the distance between the client device and server. This process is defined by the following Equation (1):
d i s t = 2 r sin 1 sin 2 Δ ϕ 2 + cos ϕ 1 cos ϕ 2 sin 2 Δ δ 2
where ϕ is the latitude, δ is longitude (in radians).
Algorithm 1 Server device
Input: R m s g (Request message containing node ID, message ID, and GPS coordinates)
Output: A c k m s g (Acknowledgment message)
     A l a r m m s g (Alarm message generated)
1:
procedure
2:
 Step 1: defining and initializing variables
3:
 Step 2: detecting events
4:
while 1 do
5:
  if R m s g = t r u e then
6:
    Generate A l a r m m s g
7:
    send A c k m s g back
8:
    Print request message on screen.
9:
  end if
10:
end while
11:
end procedure
Figure 3 shows the flow chart of the relay device. After initialization, the relay device scans for available networks and applies the Dynamic ID Assignment (DIA) algorithm (explained later in Algorithm 2) to generate its own ID. Then, the Minimum Maximum Neighbor (MMN) algorithm is utilized that returns minimum and maximum IDs (explained later). Afterwards, the relay device waits for the arrival of messages. If the request message arrives, it selects the minimum ID to transmit the message to the server. The relay with the minimum ID is selected because it is much closer to the server (as will be explained later in the DIA algorithm) and delivers the message in minimum possible time. However, if an Ack message arrives, the relay device selects the maximum ID to transmit the message back to the client.
Algorithm 2 Dynamic ID Assignment (DIA)
Input: A V B n e t (Available Networks)
Output: I D a s s i g n e d (Assigned ID )
1:
procedure
2:
 Step 1: defining and initializing variables
3:
A r r a y i d = Array containing available networks IDs
4:
F i n d e x = First index of A r r a y i d
5:
S i n d e x = Second index of A r r a y i d
6:
 Step 2: Assigning ID to relay
7:
 Store A V B n e t in A r r a y i d
8:
 Sor t A r r a y i d in ascending order
9:
I D a s s i g n e d = A r r a y i d [ F i n d e x ]
10:
if I D a s s i g n e d = 1 then
11:
   I D a s s i g n e d = A r r a y i d [ S i n d e x ]
12:
end if
13:
I D a s s i g n e d = I D a s s i g n e d +1
14:
end procedure
Figure 3. Flow chart of relay device.
Algorithm 2 presents the dynamic ID assignment (DIA) algorithm. This DIA algorithm is used by relay devices to dynamically select their IDs based on all the available IDs of networks. Initially, it is assumed that the server has an ID = 0 and all the deployed relay devices have an ID = −1. As shown in step 2, each relay device stores available network IDs in A r r a y i d . Then, A r r a y i d is sorted in ascending order. Finally, the relay device generates its own ID by selecting the first index of A r r a y i d as it the contains minimum ID. However, if the first index of A r r a y i d contains −1, then the second index of A r r a y i d is selected and incremented by 1.
The detailed procedure of the DIA algorithm is explained in Figure 4. All relays are deployed randomly at a distance of 90m and initially their IDs are −1 and the server ID are 0, as shown in Figure 4a. According to Figure 4b, relay X will receive network IDs 0 and −1 from server S and relay Y, respectively. By applying the DIA algorithm, relay X will choose the positive minimum ID, i.e., 0 and increments it by 1. Therefore, the ID of relay X becomes 1. Similarly, in the same fashion, relay Y will receive IDs 1 and −1 from relay X and Z, respectively. As shown in Figure 4c, after applying the DIA algorithm, relay Y will chose the positive minimum ID, i.e., 1 and increments it by 1. Therefore, the ID of relay Y will become 2 and this process will continue until all the relays will be assigned dynamic IDs, as shown in Figure 4e. Hence, it can be seen from Figure 4 that relays having lower IDs are much closer to the server as compared with relays having higher IDs.
Figure 4. Dynamic ID assignment procedure.
Algorithm 3 presents the MMN algorithm. This MMN algorithm is used by client and relay devices to dynamically select their next neighbor relays for the transmission of messages. As shown in step 2, each relay device stores available network IDs in A r r a y i d . Then, A r r a y i d is sorted in ascending order. Finally, the relay device finds M i n I D and M a x I D by selecting the first and last index of A r r a y i d , respectively.
Algorithm 3 Minimum Maximum Neighbor (MMN)
Input: A V B n e t (Available Networks)
Output: M i n I D and M a x I D
1:
procedure
2:
 Step 1: defining and initializing variables
3:
     A r r a y i d = Array containing available networks IDs
4:
     F i n d e x = First index of A r r a y i d
5:
     L i n d e x = Last index of A r r a y i d
6:
 Step 2: Finding Minimum and Maximum IDs
7:
    Store A V B n e t in A r r a y i d
8:
    Sort A r r a y i d in ascending order
9:
     M i n I D = A r r a y i d [ F i n d e x ]
10:
     M a x I D = A r r a y i d [ L i n d e x ]
11:
end procedure
The detailed procedure of the MMN algorithm is explained in Figure 5. Figure 5a shows that all the relays have been assigned IDs after applying the DIA algorithm, as explained earlier in Algorithm 2. Afterwards, each relay will select its next neighbor relay for the transmission of messages. It is shown in Figure 5b that relay X will receive IDs 0 and 2 from server S and relay Y respectively. By applying MMN algorithm, relay A will choose 0 as the minimum ID and 2 as maximum ID. Similarly, in the same fashion, relay Y will receive IDs 1 and 3 from relay X and Z, respectively. After applying the MMN algorithm, relay Y will chose 1 as the minimum ID and 3 as the maximum ID.
Figure 5. Minimum Maximum Neighbor selection.
Algorithm 4 presents the code for the microcontroller in the relay device. The input to the relay device is a request message R m s g , an acknowledgment message A c k m s g , and available networks A V B n e t . The output is either a request message or an acknowledgment message. As shown in step 1, the relay device scans for available networks and then it applies the DIA algorithm to select its ID and then the MMN algorithm to select minimum and maximum neighbor IDs. Then in step 2, the relay device continuously waits for the detection of events. If R m s g is detected, then the request message is sent to the next relay node having M i n I D . However, if A c k m s g is detected, then acknowledgment is sent back towards the client device via the next relay node having M a x I D .
Algorithm 4 Relay device
Input: R m s g (Request message containing node ID, message ID and GPS coordinates)
    A c k m s g (Acknowledgment message)
    A V B n e t (Available Networks)
Output: R m s g (Request message containing node ID, message ID and GPS coordinates)
    A c k m s g (Acknowledgment message)
1:
procedure
2:
 Step 1: defining and initializing variables
3:
    Scan A V B n e t
4:
    Apply DIA Algorithm (assigns ID)
5:
    Apply MMN Algorithm ( returns Min & Max ID)
6:
 Step 2: detecting events
7:
while 1 do
8:
  if R m s g = t r u e then
9:
    send R m s g to M i n I D
10:
  end if
11:
  if A c k m s g = t r u e then
12:
    send A c k m s g to M a x I D
13:
  end if
14:
end while
15:
end procedure
Figure 6 shows the flow chart of client device. The client device includes a GPS system, a microcontroller, WiFi device, and a push button. The GPS device is utilized to receive the latitude and longitude information of the victim. The microcontroller is utilized to transmit the victim’s position information to the server via the WiFi module. As shown in the flowchart, after initialization, the client device scans for available networks and applies the MMN algorithm that returns the minimum and maximum IDs (explained earlier). Afterwards, the client device reads the status of push button. If the push button is pressed, it connects with the relay node having a minimum ID. The client device then reads the GPS coordinates and transmits the request message towards the server via multi hop intermediate relays. The relay with a minimum ID is selected because it is much closer to the server (as explained earlier in DIA algorithm). After sending the request message, the client device waits for the arrival of the acknowledgment message. If acknowledgment is received, it is then printed on the screen.
Figure 6. Client device.
Algorithm 5 presents the code for the microcontroller in the client device. The input to the client device is the push button P b , acknowledgment message A c k m s g , GPS coordinates G P S c o r , and available networks A V B n e t . The output is a request message R m s g . As shown in step 1, the client device scans for available networks and it applies the MMN algorithm to select minimum and maximum IDs. Then, in step 2, the client device continuously waits for the detection of events. Since, the client device includes a push button that is pressed by a rescue team member if any victim is sighted. Therefore, if the push button P b is detected, the client device reads G P S c o r and transmits the request message to the next relay node having M i n I D and continuously waits for the arrival of the acknowledgment message. If the A c k m s g is detected, then acknowledgment is printed on the screen.
Algorithm 5 Client device
Input: P b (Push button)
    A c k m s g (Acknowledgment message)
    G P S c o r (GPS coordinates )
    A V B n e t (Available Networks)
Output: R m s g (Request message containing node ID, message ID, and GPS coordinates)
1:
procedure
2:
 Step 1: defining and initializing variables
3:
    Scan A V B n e t
4:
    Apply MMN Algorithm ( returns Min & Max ID)
5:
 Step 2: detecting events
6:
while 1 do
7:
  if P b = t r u e then
8:
    read G P S c o r
9:
    send R m s g to M i n I D
10:
  end if
11:
  if A c k m s g = t r u e then
12:
    Pring A c k m s g on screen
13:
  end if
14:
end while
15:
end procedure
Figure 7a shows a sample network scenario to explain the working procedure of the RDSP system. As shown in the figure, relays are deployed in a manner to establish two different paths between server device S and client device C. The first path is defined by C, a 1 , a 2 , a 3 , S whereas the second path is defined by C, a 10 , a 9 , a 8 , a 7 , a 6 , a 5 , a 4 , S. After deployment, each relay node applies the DIA algorithm to select the dynamic ID based on available networks.
Figure 7. Sample network deployment scenario.
As shown in Figure 7a, after applying the DIA algorithm, the IDs of a 3 , a 2 , a 1 are 1, 2, and 3 respectively. Similarly IDs of a 4 , a 5 , a 6 , a 7 , a 8 , a 9 , a 10 are 1, 2, 3, 4, 5, 6, 7, and 8 respectively. After ID assignments, each relay and client node applies the MMN algorithm to to select M i n I D and M a x I D . Client C receives ID 3 from relay a 1 and ID 8 from relay a 10 . Therefore, client C selects 3 as the minimum ID and 8 as the maximum ID. Similarly, relay a 1 selects 2 as the minimum ID and relay a 10 selects 7 as the minimum ID. Both relay a 1 and relay a 10 only receive IDs from relay a 2 and relay a 9 respectively but not from client C as client C has no ID. Relay a 2 receives ID 1 and 3 from relays a 3 and a 1 , respectively, and hence, selects 1 as the minimum and 3 as the maximum ID. This process is continued until all relays select their minimum and maximum neighbor IDs.
Figure 7b shows how the request message R m s g is sent from client C to server S. According to Algorithm 5, if the push button is pressed, the client device sends the request message to a neighbor having M i n I D , that is, relay a 1 having ID 3. Therefore, client C sends the request message to relay a 1 instead of relay a 10 . According to Algorithm 4, if the request message is received, the relay device sends it to a neighbor having M i n I D . Therefore, relay a 1 sends the request message to relay a 2 . Afterwards, relay a 2 sends it to relay a 3 having ID 1. Finally, relay a 3 sends the request message to server S having ID 0.
Figure 7c shows how the Ack message is sent back to the client device from server S. According to Algorithm 1, server S sends back the acknowledgment message to relay a 3 . As described in Algorithm 4, if the acknowledgment message is received, the relay device sends the received acknowledgment message to a neighbor having M a x I D . Therefore, relay a 3 sends the acknowledgment message to relay a 2 having ID 2. Afterwards, relay a 2 sends it to relay a 1 having ID 3. Finally, relay a 1 sends it to client C.

4. Performance Evaluation

In this section, the performance of the RDSP scheme is compared with the UF scheme [29] by deploying the real time multihop communication network.

4.1. Deployment Environment

A multihop communication network is deployed in Comsats university Islamabad-attock campus as shown in Figure 8.
Figure 8. Deployment of the RDSP system.
The total area of the university is 153,000 m2. As shown in the figure, the server device is installed at point S and the client device is installed at point C. The relays are deployed all over the area in a manner to establish four different paths between server device S and client device C. The first path defined by points C, Y, Z, S contains 7 relays, second path defined by points C, Z, S contains 6 relays, third path defined by points C, S contains 5 relays and fourth path defined by points C, X, S contains 8 relays. The relays are placed at fixed positions at equal distance of 90 m. To find the shortest paths between the client and server devices, the proposed RDSP system utilizes DIA and MMN algorithms whereas the UF scheme uses Destination-Sequenced Distance Vector (DSDV) [28] routing algorithm. In the DSDV, each node maintains a routing table with routes to destinations. An entry for a given destination consists of the ID of the next-hop, total hops to the destination, route’s sequence number, and the time for the recent route update. In the case of the proposed RDSP, each node periodically broadcasts a hello message every 2 s containing only the node ID. However, in the UF scheme, each node periodically broadcasts an entire routing table every 1 s containing the route destination, the advertising node’s next-hop node for that route, the number of hops to the destination, and the sequence number. Following the deployment of the multihop communication system, both the client device and server device are tested to communicate wirelessly with each other across all four paths. One hundred request messages were generated to collect the results for each path. The experiment duration was set at 550 s. The results presented for each path are averaged over 5 repeated experiments. The experimental parameters are summarized in Table 1.
Table 1. Experimental Parameters.

4.2. Performance Metrics

To investigate the performance of the RDSP scheme, the following metrics were used:
  • Distance covered: refers to the total distance covered by intermediate relays using wireless transmission
  • End-to-end delay: refers to the average time it takes for a request message sent from the client device to reach the server device.
  • Round-trip delay: refers to the average time it takes for a message sent from the client device to reach the server device and an acknowledgment message sent back from the server device to reach the client device.
  • Message delivery ratio: refers to the percentage of messages successfully received by the server device.
  • Network overhead: refers to the total number of control messages sent by relays on different paths.

4.3. Distance Covered

Figure 9a shows the distance covered by different edges described in Figure 8 along with the deployed number of relays at each edge. Edge C-Y covers 358 m with 4 relays whereas edge Y-Z and Z-S cover 90 and 268 m with 2 and 3 relays respectively. Similarly, edge C-Z and C-S cover 352 and 528 m with 4 and 5 relays, respectively. Finally, edge C-X and X-S cover 352 and 441 m with 4 and 5 relays, respectively. It is evident from Figure 9a that as the number of relays increases across an edge, the distance covered also increases and vice versa. Figure 9b shows the distance covered by four different paths described in Figure 8 along with the number of relays deployed on each path. Distance covered by path-1 is 716 m and comprises of three edges, i.e., C-Y, Y-Z and Z-S. Similarly, the distance covered by path-2 is 628 m and comprises two edges, i.e., C-Z and Z-S. Likewise, path-3 covers 582 m and comprises of edge C-S whereas path-4 covers 793 m and comprises of edges C-X and X-S. It is once again obvious from Figure 9b that the paths comprising of more relays cover long distances compared with the paths comprising of less relays.
Figure 9. Distance covered by edges and paths.

4.4. End-to-End Delay

Figure 10a compares the end-to-end delay for the RDSP system and UF scheme. It shows that the end-to-end delay for both systems increases as the number of relays increases across the path. To elaborate, the end-to-end delay for path-4 having 8 relays is greater than that of path-1 having 7 relays. Similarly, the end-to-end delay of path-1 is greater than that of path-2 having 6 relays. Likewise, the end-to-end delay of path-2 is greater than that of path-3 having 5 relays. This is because when the number of relays increases across a particular path, the processing and transmission time of messages also increase, but more relays offer a long-distance coverage benefit. However, the RDSP system achieved around 12% lower end-to-end delays than the UF scheme across all the four paths. This was because the UF scheme is based on a DSDV protocol that requires all the relays to periodically exchange hello messages and entire routing tables, which leads to frequent contention and collisions among neighboring relays. In such cases, the relays must wait for a busy channel to become idle before performing any transmission. On the other hand, the RDSP system avoids the formation and exchange of routing tables and creates routes between the server and client device on the fly during the deployment of relays, as explained earlier in Figure 7, which eventually reduces collisions among neighboring relays and causes a decrease in the end-to-end delay. Figure 10b compares the round-trip delay for the RDSP system and UF scheme. It shows that the round-trip delays are approximately twice the end-to-end delays of both systems and R the DSP system achieves around 13% lower round-trip delays than the UF scheme across all the four paths.
Figure 10. End-to-end and round-trip delays.

4.5. Message Delivery Ratio

Figure 11 compares the message delivery ratio for the RDSP system and UF scheme. It shows that the message delivery ration for both systems decreases as the number of relays increased across the path. To elaborate, the packet delivery ratio for path-4 having 8 relays is less than that of path-1 having 7 relays. Similarly, the packet delivery ration of path-1 is less than that of path-2 having 6 relays. Likewise, the packet delivery ratio of path-2 is less than that of path-3 having 5 relays. This was because when the number of relays increases across a particular path, the frequent contention and collisions of messages among neighboring relays also increases which eventually reduces packet delivery ratio. However, RDSP system achieved around 8% higher message delivery ratio than UF scheme across all the four paths particularly at high relay densities because it avoids exchange of routing tables thus reduces collisions among neighboring relays and hence achieves higher message delivery ratio. On the other hand, UF scheme utilizes periodic exchange of entire routing tables that leads to frequent contention and collisions among neighboring relays which eventually reduces message delivery ratio.
Figure 11. Message delivery ratio.

4.6. Network Overhead

Figure 12 compares the average network overhead for the RDSP system and UF scheme. The UF overhead was very high because of the periodic exchange of entire routing tables to maintain the whole network information at each relay node. In contrast, the RDSP system overhead was much lower, due to the absence of the exchange of routing tables. Thus, the overhead in the RDSP system was related to the transmission of hello messages and acknowledgment messages. As a result, the average network overhead for the RDSP was about 33% lower than that for the UF scheme.
Figure 12. Network overhead.

5. Conclusions

In this study, an RDSP was proposed that aims to reduce the average waiting times for transmitting the request messages containing rescue groups and victim’s location information towards the control server. Additionally, unlike existing schemes, the RDSP does not rely on the periodic exchange of entire routing tables. However, the proposed RDSP scheme enables intermediate relays to dynamically select their IDs based on the information provided by their neighbor relays and then each intermediate relay selects the best forwarders towards the control server to minimize end-to-end delays. The results of real time experiments demonstrate that with the proposed RDSP scheme, a request message generated by the client device can reach the server device with a minimal delay in both light and heavily deployed paths compared to the existing UF system. In addition, the results confirmed that the RDSP outperforms the UF scheme under various relay densities in terms of the end-to-end delay, round-trip delay, massage delivery ratio, and network overhead.

Author Contributions

Conceptualization, hardware, software, writing, A.K. and A.M.; methodology, validation, Z.K. and F.U.; resources, conceptualization, funding acquisition, M.B. and L.N.; writing–original draft preparation, S.S.; resources, writing-review, and editing, L.D.N.; writing-review and editing, funding acquisition, S.M.R.I. and K.-S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by National Research Foundation of Korea-Grant funded by the Korean Government (Ministry of Science and ICT) NRF 2020R1A2B5B0200247.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. ITU. Measuring the Information Society Report 2018. Available online: https://www.itu.int/en/ITU-D/Statistics/Pages/publications/misr2018.aspx (accessed on 2 June 2020).
  2. Cangialosi, J.P.; Kimberlain, T.B. Tropical Cyclone Report; National Hurricane Center: Miami, FL, USA, 2014.
  3. Mase, K. How to Deliver Your Message from/to a Disaster Area. IEEE Commun. Mag. 2011, 49, 52–57. [Google Scholar] [CrossRef]
  4. Miranda, K.; Molinaro, A.; Razafindralambo, T. A survey on rapidly deployable solutions for post-disaster networks. IEEE Commun. Mag. 2016, 54, 117–123. [Google Scholar] [CrossRef]
  5. Uddin, M.; Ahmadi, H.; Abdelzaher, T.; Kravets, R. A low-energy, multi-copy inter-contact routing protocol for disaster response networks. In Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, Italy, 22–26 June 2009; pp. 1–9. [Google Scholar]
  6. Guo, W.; Huang, X. Mobility model and relay management for disaster area wireless networks. In Proceedings of the Third International Conference (WASA 2008), Dallas, TX, USA, 26–28 October 2008; pp. 274–285. [Google Scholar]
  7. Jahir, Y.; Atiquzzaman, M.; Refai, H.; Paranjothi, A.; LoPresti, P.G. Routing protocols and architecture for disaster area network: A survey. Ad Hoc Netw. 2019, 82, 1–14. [Google Scholar] [CrossRef]
  8. Reina, D.; Askalani, M.; Toral, S.; Barrero, F.; Asimakopoulou, E.; Bessis, N. A Survey on Multihop Ad Hoc Networks for Disaster Response Scenarios. Int. J. Distrib. Sens. Netw. 2015, 11, 647037. [Google Scholar] [CrossRef]
  9. Li, H.; Shan, L.; Matsuda, T.; Miura, R. Design and deployment of infrastructure-independent D2D networks without centralized coordination. In Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels, Belgium, 25–28 August 2015; pp. 376–380. [Google Scholar]
  10. Ghaznavi, I.; Heimerl, K.; Muneer, U.; Hamid, A.; Ali, K.; Parikh, T.S.; Saif, U. Rescue base station. In Proceedings of the Fifth ACM Symposium on Computing for Development, San Jose, CA, USA, 5–6 December 2014. [Google Scholar] [CrossRef]
  11. Pezeshkian, N.; Nguyen, H.G.; Burmeister, A. Unmanned Ground Vehicle Radio Relay Deployment System for Non-Line-of-Sight Operations. In Proceedings of the 13th IASTED International Conference on Robotics and Applications, Würzburg, Germany, 29–31 August 2007; pp. 501–506. [Google Scholar] [CrossRef][Green Version]
  12. Nguyen, C.Q.; Min, B.-C.; Matson, E.T.; Smith, A.H.; Dietz, J.E.; Kim, D. Using mobile robots to establish mobile wireless mesh networks and increase network throughput. Int. J. Distrib. Sens. Netw. 2012, 8, 1–13. [Google Scholar] [CrossRef]
  13. Jia, S.; Fadlullah, Z.M.; Kato, N.; Zhang, L. Eco-Udc: An energy efficient data collection method for disaster area networks. In Proceedings of the 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC), Beijing, China, 23–25 September 2016; pp. 130–134. [Google Scholar]
  14. Li, M.; Nishiyama, H.; Kato, N.; Owada, Y.; Hamaguchi, K. On the energy-efficient of hroughput-based scheme using renewable energy for wireless mesh net- works in disaster area. IEEE Trans. Emerg. Top. Comput. 2015, 3, 420–431. [Google Scholar] [CrossRef]
  15. Suzuki, H.; Kaneko, Y.; Mase, K.; Yamazaki, S.; Makino, H. An ad hoc network in the sky, skymesh, for large-scale disaster recovery. In Proceedings of the IEEE Vehicular Technology Conference, Melbourne, Australia, 7–10 May 2006; pp. 1–5. [Google Scholar]
  16. Sakano, T.; Kotabe, S.; Komukai, T.; Kumagai, T.; Shimizu, Y.; Takahara, A.; Ngo, T.; Fadlullah, Z.M.; Nishiyama, H.; Kato, N. Bringing movable and deployable networks to disaster areas: Development and field test of mdru. IEEE Netw. 2016, 30, 86–91. [Google Scholar] [CrossRef]
  17. Ngo, T.; Nishiyama, H.; Kato, N.; Sakano, T.; Takahara, A. A spectrum-and energy–efficient scheme for improving the utilization of MDRU-based disaster resilient networks. IEEE Trans. Veh. Technol. 2014, 63, 2027–2037. [Google Scholar] [CrossRef]
  18. Chen, A.Y.; Peña-Mora, F.; Plans, A.P.; Mehta, S.J.; Aziz, Z. Supporting Urban Search and Rescue with digital assessments of structures and requests of response resources. Adv. Eng. Inf. 2012, 26, 833–845. [Google Scholar] [CrossRef]
  19. Hu, D.; Li, S.; Chen, J.; Kamat, V.R. Detecting, locating, and characterizing voids in disaster rubble for search and rescue. Adv. Eng. Inf. 2019, 42, 100974. [Google Scholar] [CrossRef]
  20. Peña-Mora, F.; Chen, A.Y.; Aziz, Z.; Soibelman, L.; Liu, L.Y.; El-Rayes, K.; Arboleda, C.A.; Lantz, T.S., Jr.; Plans, A.P.; Lakhera, S.; et al. Mobile Ad Hoc Network-Enabled Collaboration Framework Supporting Civil Engineering Emergency Response Operations. J. Comput. Civil Eng. 2010, 3, 302–312. [Google Scholar] [CrossRef]
  21. Chen, A.Y.; Peña-Mora, F.; Ouyang, Y. A collaborative GIS framework to support equipment distribution for civil engineering disaster response operations. Autom. Constr. 2011, 20, 637–648. [Google Scholar] [CrossRef]
  22. Crawford, P.S.; Al-Zarrad, M.A.; Graettinger, A.J.; Hainen, A.M.; Back, E.; Powell, L. Rapid Disaster Data Dissemination and Vulnerability Assessment through Synthesis of a Web-Based Extreme Event Viewer and Deep Learning. Adv. Civ. Eng. 2018, 2018. [Google Scholar] [CrossRef]
  23. Menon, V.G.; Pathrose, J.P.; Priya, J. Ensuring Reliable Communication in Disaster Recovery Operations with Reliable Routing Technique. Mob. Inf. Syst. 2016, 2016. [Google Scholar] [CrossRef]
  24. Vo, N.-S.; Masaracchia, A.; Nguyen, L.D.; Huynh, B.-C. Natural Disaster and Environmental Monitoring System for Smart Cities: Design and Installation Insights. EAI Endorsed Trans. Indust. Netw. Intellig. Syst. 2018, 5, e5. [Google Scholar] [CrossRef]
  25. Nguyen, L.D.; Kortun, A.; Duong, T.Q. An Introduction of Real-Time Embedded Optimisation Programming for UAV Systems under Disaster Communication. EAI Endorsed Trans. Indust. Netw. Intellig. Syst. 2018, 5, e5. [Google Scholar] [CrossRef]
  26. Souryal, M.R.; Geissbuehler, J.; Miller, L.E.; Moayeri, N. Real-Time Deployment of Multihop Relays for Range Extension. In Proceedings of the 5th international conference on Mobile systems, applications and services. (MobiSys), San Juan, PR, USA, 11–14 June 2007; pp. 85–98. [Google Scholar] [CrossRef]
  27. Wolff, A.; Subik, S.; Wietfeld, C. Performance analysis of highly available ad hoc surveillance networks based on dropped units. In Proceedings of the 2008 IEEE Conference on Technologies for Homeland Security, Waltham, MA, USA, 12–13 May 2008; pp. 123–128. [Google Scholar]
  28. Bao, J.Q.; Lee, W.C. Rapid deployment of wireless ad hoc backbone net works for public safety incident management. In Proceedings of the IEEE GLOBECOM 2007—IEEE Global Telecommunications Conference, Washington, DC, USA, 26–30 November 2007; pp. 1217–1221. [Google Scholar]
  29. Liu, H.; Xie, Z.; Li, J.; Li, S.; Siu, D.J.; Hui, P.; Whitehouse, K.; Stankovic, J.A. An automatic, robust, and efficient multi-user breadcrumb system for emergency response applications. IEEE Trans. Mob. Comput. 2013, 13, 723–736. [Google Scholar] [CrossRef]
  30. Khan, A.; Ullah, F.; Kaleem, Z.; Rehman, S.U.; Anwar, H.; Cho, Y.-Z. EVP-STC: Emergency Vehicle Priority and Self-Organising Traffic Control at Intersections Using Internet-of-Things Platform. IEEE Access 2018, 6, 68242–68254. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.