Next Article in Journal
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
Previous Article in Journal
eHealth Service Support in Future IPv6 Vehicular Networks
Previous Article in Special Issue
A Review of Cyber Threats and Defence Approaches in Emergency Management
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Future Research on Cyber-Physical Emergency Management Systems

1
Intelligent Systems and Networks Group, Department of Electrical and Electronic Engineering, Imperial College London, London SW7 2AZ, UK
2
Department of Computer Science, National Chiao Tung University, Hsinchu 30010, Taiwan
*
Author to whom correspondence should be addressed.
Future Internet 2013, 5(3), 336-354; https://doi.org/10.3390/fi5030336
Submission received: 15 April 2013 / Accepted: 17 June 2013 / Published: 27 June 2013
(This article belongs to the Special Issue Emergency Management, Communications and the Internet)

Abstract

:
Cyber-physical systems that include human beings and vehicles in a built environment, such as a building or a city, together with sensor networks and decision support systems have attracted much attention. In emergencies, which also include mobile searchers and rescuers, the interactions among civilians and the environment become much more diverse, and the complexity of the emergency response also becomes much greater. This paper surveys current research on sensor-assisted evacuation and rescue systems and discusses the related research issues concerning communication protocols for sensor networks, as well as several other important issues, such as the integrated asynchronous control of large-scale emergency response systems, knowledge discovery for rescue and prototyping platforms. Then, we suggest directions for further research.

1. Introduction and Overall Vision

Cyber-technical systems (CPS) use wireless technologies, sensing and distributed decisions based on ubiquitous computing and networks with potential benefits in very diverse areas of human activity, such as [1] the environment [2], security [3], transport systems [4], emergency management [5], discovery of bombs, mines and unexploded ordnance [6,7] and leisure and tourism [8].
Recent survey articles [9,10] have reviewed research on sensor-aided CPSs that enable intelligent and fast response to emergencies, such as fires, earthquakes or terrorist attacks. The present paper will focus on projecting past and recent research in emergency management systems towards research opportunities.
Real-time monitoring and quick response are inherent requirements for emergency response. During a fire, different types of sensors can cooperate and interact with the evacuees and the environment. Temperature and gas sensors can help monitor the spread of hazards. Rotatable cameras track the spread of the fire and the movement of civilians. Ultrasonic sensors can range the distance to obstacles in the environment and monitor dynamic changes of maps, due to sudden changes in some built structures through destruction and debris. Smart evacuation schemes can help evacuees using the cooperation between first-aid decision nodes, sensors and civilians with mobile devices. Evacuees with mobile devices can follow personalised navigation paths with distributed decisions that mitigate congestion. Those without mobile devices may follow audio or visible LED directions. Grid/cloud-supported computing can gather sensing information and dynamically predict the movement of evacuees and hazards to make the best decisions regarding resource allocation and response. A search may also be conducted with the help of robotic devices, despite their limited autonomy [11].

2. Technically Challenging Areas

Since all of these requirements raise many critical challenges, two types of approaches have motivated considerable research to address issues in communications, information acquirement and dissemination, knowledge discovery, resource allocation and management, heterogeneous system integration and asynchronous control, and we discuss some of these challenges below.
  • Communication issues: many-to-many information flow [12,13,14,15,16,17,18,19,20,21,22,23] and opportunistic connection [24] are inevitable in emergencies. Considering a fire emergency, to find safe paths, sensing information may need to be conveyed from many sensors to many mobile evacuees. This will obviously be more difficult, since communications may break down and evacuees will move to escape. In addition, query-and-reply communications may also proceed between different groups of people, e.g., first responders, evacuees, members of the press and robots. In these cases, typical communication protocols, such as broadcast, convergecast, unicast, and multicast, may be not able to deal with these diverse communication requirements.
  • Information acquirement and dissemination: cross-domain sensing [25,26,27] and heterogeneous information flow [28,29,30] are inherent features in an emergency response system. To guarantee the safety of people, information in different domains must be acquired (e.g., ultrasonic sensors for localizing people, temperature and gas sensors for identifying hazards, camera sensors for counting civilians and life detectors for searching civilians). Moreover, sensors are no longer the only information contributors, and in situ interactions between sensors, actuators, people, objects and events will also be involved to disseminate and contribute high-level information. These features will raise a challenge to acquire and disseminate information in an efficient way.
  • Knowledge discovery: partial information and dynamic changes are inherent in an emergency. In such a rough environment, feasible and quick response must rely on data analysis technologies to extract knowledge from sensing data (e.g., counting, discovery, localization and tracking of civilians) [30,31,32,33,34,35,36,37,38]. Moreover, dynamic prediction and forecast of environmental changes should be conducted to avoid unnecessary casualties [20,21,39,40,41,42,43,44].
  • Resource allocation and management: limited resources make timely response more difficult. Unlike other sensor-aided applications, the needs of intelligent actuation, scheduling and efficient resource allocation will increase in emergency response systems. Intelligent scheduling is needed to select the best action, while scarce resources must be allocated efficiently to perform actions [45,46,47,48,49,50].
  • Heterogeneous system integration and asynchronous control: multi-domain technologies will be needed to enhance the capability and diversity of emergency response [26,27,30,38]. Furthermore, functionality separated tasks, such as sensing, storage, computation and decision-making, need to be conducted by independent functional units, so as to facilitate the integrated asynchronous control of multiple technologies. To achieve this goal, parallel and virtualisation technologies (e.g., grid or cloud computing) may steer the emergency response systems toward functionality-separated approaches for resource scaling, fault-tolerance and computation speed-up [25]. For instance, in an outdoor city-wide environment, large numbers of civilians may be tracked, and massive sensing information can only be stored and computed rapidly by a powerful resource pool.
  • Comparison with military systems: the objective of search and rescue systems is emergency response, but military systems focus on extensive simulations for tactical planning and decision. A search and rescue system usually consists of heterogeneous nodes, while a military system is a collection of mission-oriented sub-systems with resources and capabilities that provide complex functionalities that are far more than the sum of constituent systems. A search and rescue system is usually deployed over a smaller space, while a military system emphasises value-added functionalities that usually leave more time for decision-making and resource deployment, while an emergency system must offer an urgent life-critical response. Search and rescue systems may typically also use more limited communications and sensing than the global assets that military systems typically have, such as satellite communications and wide-band radar sensing.

3. Characteristics of Existing Evacuation Systems

In this section, we will first briefly review the salient characteristics of some proposed evacuation systems. References [13,14,15,16,17,18,20,21,39,42,43,44] rely on location information regarding the sensors to compute evacuation paths [51], while the deployment of sensors in work spaces and buildings in [12,13,14,15,16,17,20,21,25,39,42] enables the movement of evacuees and first responders. Except for [12,13,14,15,16,20,21], most approaches require maps either for computing or navigation purposes. Instead of physically sensed input, as in other work, some simulation studies [40,41] use virtual hazards to simulate emergencies. Also, the dynamic spread and shrinking of hazards is considered in [15,19,20,21,23,25,39,42]. While in [24,28], opportunistic networks are considered, other papers assume that [24,28,29,43,44] mobile users themselves facilitate sensing and communications. In [24,28,29,40,41,43,44] localization technologies to be used are required. We note that in [24,28,29,43,44] personalized navigation directions can be provided to individuals, and the issue of congestion is also addressed in some papers [16,17]. Table 1 also summarises and compares proposals that have been made for search and rescue systems. In [30,34] searching victims or tracking their movements is the focus, while in [35,36,37], attention is payed to tracking rescuers (or firefighters) to guarantee their safety. Based on the presence of victims, in [38], the search and rescue space is reduced, and in [32,33], a communication backbone is formed using robotics. The work in [26,27] uses robots to search and guide victims, and in [31], the number of civilians in an emergency is assessed. Finally, the following papers, [45,46,47,48,49,50], concentrate on the optimization of search and rescue cost.
Table 1. A comparison of search and rescue systems.
Table 1. A comparison of search and rescue systems.
functionalitiesreference
Localization/tracking of civilians[30,34,35,36,37]
Reduction of search/rescue space[38]
Communications with civilians[26,27,32,33]
Assessment of civilians status[31]
Optimization of search/rescue cost[45,46,47,48,49,50]
Figure 1 summarises the cost incurred as additional features and benefits are included in emergency response systems. wireless sensor network (WSN)-based emergency evacuation systems collect multi-domain sensing information to provide navigation services in a fully distributed manner and offer in-network knowledge discovery to respond to emergencies. This type of system relies on prior deployment of information and localization support. Decentralized evacuation systems offer better network resilience, scalability and lifetime, because they treat the sensing system separately from the decision system to prolong network lifetime and, also, involve mobile clients in sensing to adapt to intermittent connections and uncertain environments. However, this type of network must be supported by functionally separated system management and opportunistic networking and computing to extract the knowledge behind short-lived pieces of data. Agent-based simulators can help discover deep knowledge and conduct prediction and forecasting. Grid and cloud supported systems can provide parallel and auto-scaling computation to respond to emergencies. However, such systems must rely on a well-designed parallel programming model to divide adequately distribute computation tasks and Internet support. By involving more mobile entities, search and rescue systems can provide a richer response in case of emergencies using heterogeneous resource integration and control. In all these cases, we see that there is always a tradeoff between the quality and speed of the response to an emergency and the cost and sophistication of the technology.
We also need to consider the similarities and differences between indoor and outdoor emergency response systems. Both indoor and outdoor cases present similar challenges mentioned in Section 1, but existing technologies for indoor systems are quite distinct from those for outdoor systems. Table 2 compares indoor and outdoor systems with respect to the technical challenges mentioned in Section 1. In addition to WiFi, 3G and wired networks, short-range ZigBee and Bluetooth technologies are also useful in an indoor system. For information acquirement and dissemination, outdoor systems can benefit from rich information sources emanating from crowds. Localization in indoor systems can rely on RFID, RF or sensor-based positioning, while GPS, WiFi and GSM positioning technologies are useful in outdoor systems. The dynamics of emergencies in indoor systems can be predicted using purpose built or tuned simulators, which can be run in a decentralized way, while centralized prediction and forecast are often conducted on back-end servers in outdoor systems. Heterogeneous system integration and asynchronous control are usually distributed in indoor systems, but centralised in outdoor systems.
Figure 1. A cost-benefit analysis of emergency response systems.
Figure 1. A cost-benefit analysis of emergency response systems.
Futureinternet 05 00336 g001
Table 2. A comparison of indoor and outdoor evacuation and rescue systems.
Table 2. A comparison of indoor and outdoor evacuation and rescue systems.
Technologies/system typeIndoor evacuation and rescue systemsOutdoor evacuation and rescue systems
Communications and networkingZigBee, WiFi, Bluetooth, 3G, wired networksWiFi, 3G, wired networks
Information acquirement and disseminationclients and disseminationcrowdsourcing information
Knowledge discoveryRFID, RF or sensor-based positioningGPS, WiFi, GSM positioning
Decentralized predicationCentralized prediction
Resource allocation and managementLocalized dispatchingCentralized allocation
Heterogeneous system integrationDistributedCentralized
and asynchronous control
Existing technologies[12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,31,32,33,34,35,36,37,39,41,42,45,46,47,48,49,50][30,35,38,40,43,44,50]

4. Evolution towards Greater Complexity

Research on emergency evacuation systems has evolved from the simpler to the more complex, starting with homogeneous systems, which evacuate people with the help of a distributed WSN. This type of system emphasises in-network intelligence to find safe evacuation paths based on sensing data.
Then, we have moved toward a heterogeneous emergency evacuation system which separates functionalities into a distributed decision system and a sensing system to overcome the limitations of a homogeneous system. The sensing system will report multi-domain sensing information from mobile user clients and sensing clients to the distributed decision system so as to facilitate the interaction among the cyber and physical worlds. The third approach takes advantage of parallel agents to achieve fast-than-real-time prediction and discover deep knowledge. The fourth emerging approach relies on Grid computing technologies to find out contextual information for decision makers and handle a huge amount of data to predict dynamic hazard in a parallel way.
Finally, by introducing intentional mobility to emergency response systems, mobile entities are exploited to design more flexible and complex search and rescue systems.
Based on this evolution, we will discuss the issues on communications, information acquisition and dissemination, knowledge discovery, heterogeneous system integration and asynchronous control.
As the system becomes more complex, it can provide more precise prediction and decision, deeper knowledge, large-scale emergency support, and richer emergency response and bring better scalability, flexibility, system lifetime, and fault-tolerance. However, a more complex system relies on much more prior knowledge and complex technologies which will involve hardware costs and overheads in terms of network integration, cross-network communications, cross-machine computation, data management, networking infrastructure, distributed system management, integration control among diverse entities, resource management, and deployment. As different approaches aim at different objectives, open problems are still stimulating new research activities in emergency evacuation and rescue systems. For a WSN-based emergency evacuation system, if nodes break down or are moved by the hazards, system resilience and quality of information [52] are of concern. In addition, while most existing studies aim at an indoor system, an emergency evacuation system for outdoor and underground environments are also needed.
Since decentralised evacuation systems improve network lifetime and scalability by separating the sensing system and decision system but new network security risks such as Denial of Service also emerge [53]. Opportunistic networks (OppNets), opportunistic sensing (OppSense), inter-device security, and collaborative intelligence stimulate novel communication and computing paradigms. As contact duration among devices is limited (i.e., limited bandwidth) and sensing data is collected intermittently, it is of interest to exploit the limited bandwidth to exchange information with the highest knowledge reward [54], assure security of information exchanges, and discover knowledge behind short-lived and intermittent data to enhance system intelligence in a self-contained way are challenging problems.
While agent-based simulators offer the capability to discover deep knowledge from learning [55] and behind collected data, human behavior modelling, augmented reality [56], activity analysis and inference, and social behavior in emergencies can be considered to enhance system intelligence. As Grid or cloud supported systems can improve the system scalability, managing big data (a huge amount of data) is inevitable, and data analysis technologies will need to incorporate multi-domain information (for example, localization technologies may consider low-accuracy WiFi/GSM information to compensate for the lack of high-accuracy GPS). As search and rescue systems involve diverse mobile entities (e.g., robots and smartphones), cross-system integration control, intelligence learning for mobile entities in an OppSense environment, and more complex distributed computing in OppNets become challenging.

5. Emerging Challenges and Opportunities

In this section, we will point to some technical challenges and opportunities for future emergency response systems and discuss related technical progress that has been made. Table 3 summarises the pros and cons of emerging technologies and open research problems from different perspectives.
Emerging technologies for heterogeneous network integration emphasize compliance with standardds that open an opportunity to integrate WSNs with other networks. However, current technologies still rely on gateway nodes to transfer data. Since opportunistic networking is at the confluence of ad hoc networking and disruption tolerant networks, this recent technology requires a more seamless networking environment to allow intermittent communications between any pair of devices at any time and place. Since emerging sensing devices are equipped with multiple types of wireless interfaces (for example, a smartphone has 3G, WiFi and Bluetooth interfaces), a device may belong to multiple types of networks at the same time. Network virtualisation for devices will then choose the best communication network for conveying data seamlessly based on urgency, available bandwidth and communication cost. On the other hand, instead of node-centric networks, knowledge-centric network designs are needed to advance towards distributed intelligence. Thus, knowledge-driven solutions will steer collaboration between several networks to integrate knowledge extracted from diverse data sources.
Regarding security, emerging technologies can offer secure communications between devices only when they have the same sensing signature. This approach facilitates automatic authentication between devices and secure pairing of devices in physical proximity. However, these technologies aim at device-level information sharing rather than content-level information sharing. Once devices authenticate each other, complete trust between devices may expose the system to malicious attacks (e.g., drop-all behavior, random RF jamming and dissemination of false information) [57] in an opportunistic networking environment. Thus, the security of opportunistic communications becomes an open issue in emergencies. Regarding privacy, emerging technologies pull service content to avoid pushing private information, so as to keep private data sets separate from public data. Although these technologies provide system-defined privacy to isolate personal private data, user-defined privacy and multi-level privacy are not provided, and activity inferences are a risk to personal privacy. As emergency response systems must rely on diverse data sources, there are important open issues on knowledge inference in connection with trust, security and privacy.
Table 3. The technical progress and open research problems toward cyber-physical evacuation and rescue systems.
Table 3. The technical progress and open research problems toward cyber-physical evacuation and rescue systems.
Technical scopeAdvantageDisadvantageOpen research problems
Network integration• interoperability with wireless sensor networks (WSNs)•integration via gateway nodes• seamless OppNets
• networking virtualisation
• compliance with networking standardds • knowledge-centric networks
Security and privacy• proximity-based authentication• device-level sharing• security of opportunistic communications
• pull-based service content• only system-defined privacy• privacy-preservation knowledge inferences
• separate private data sets• divulgence of privacy by inference• trust, security, and privacy in mobile systems
Mobile sensing systems and Cloud-enabled• knowledge from the wisdom of crowds• simple activity inferences• participatory and collaborative sensing models
• energy management of mobile devices
decision systems• scalable sensing/decision-making model• one-way knowledge flow• QoS-guaranteed cloud and big data in cloud
• load-balancing simulation models
• optimization of task migration
While emerging technologies pay attention to mobile sensing systems incorporated with cloud-enabled decision systems, they can also take advantage of information contributed by the crowd to find out the knowledge behind a huge amounts of sensing information. Only scalable decision-making models or bio-inspired approaches [58] are able to handle such a huge amount of data, and emerging technologies must pay attention to data optimisation and to migrating the computation between physical/virtual machines.
Although a simple learning process can suffice in certain cases (e.g., identification of user mobility using GPS data only), more complex learning and inference from human activity is needed using different ambient signatures including audio, location and social network information. However, as these technologies only consider one-way knowledge flow from data from the sources to the back-end cloud, a novel two-way knowledge feedback loop from cloud to clients may facilitate not only knowledge discovery, but also sensing optimization. Designing participatory sensing and collaborative sensing models [59] is also a challenging problem. The control of sensing with one or more groups of people, devices, networks and systems may contribute a single piece of location information or a summary [60]. Cloud-assisted collaborative sensing can then control the sampling rates of sensors to achieve a required level of accuracy.
The tradeoff between data quality and quantity collected by mobile devices also raises open research issues of energy management for mobile clients. QoS-guaranteed networks and systems also raise challenges in emergencies especially for time-constrained and resource-constrained responses. A cloud-related service’s service-level agreements (e.g., response time), the scheduling of concurrent tasks, parallel programming aspects and big data processing and management all create challenging performance problems.
Another important aspect in emergency management is the appropriate balance between simulation, which is extensively used, and modelling using probability models [61,62], which was first suggested many years ago [63], but which has been very seldom used. Simulation will necessarily be time consuming, both in programming and development to incorporate new features and details and in run time. Mathematical models can potentially be much faster, but require significant computation to obtain the normalising constants that are needed to compute all the event probabilities. Some recent promising work [64,65] indicates that graph theoretic models, as well as queueing theory, can help identify the most vulnerable or busy areas of an evacuation scene. Open queueing models can also provide lower and upper bounds to evacuation times and have the potential for providing insight in a computationally fast manner into the major bottlenecks and the time bounds related to an evacuation, and this analysis can also lead to further research on task and resource assignment algorithms [66] for emergencies. We feel that there is an opportunity for more work in these directions.

5.1. Network Integration

As a cyber-physical emergency response system may have to rely on cooperation among multiple networks, the integration and interference avoidance, among heterogeneous networks emerges as a significant issue.
Progress toward network integration standardds: IP is not adequate as a standard for WSNs, and TinyOS [67] deviates from IP and has to be lightweight for power-saving purposes. The uIP [68] concept includes a low-power link built on IEEE 802.15.4-embedded devices to avoid a heavyweight IP stack. The IETF defines the RFC 4944 (6LoWPAN) [69] to allow IPv6 datagrams to be carried over IEEE 802.15.4 frames by fragmentation and header compression. In [70], a IPv6-based network architecture is proposed to support duty-cycled link protocols, hop-by-hop forwarding and efficient routing protocols in WSNs. Multiple WSNs can be connected by border routers, which can forward IP datagrams, where each border router may also implement IPv4-to-IPv6 translation in compliance with conventional IPv4 networks. The emergence of WiFi Direct [71] allows mobile phones to exchange content directly based on peer-to-peer communications.
Interference avoidance among heterogeneous networks: communication reliability becomes more difficult when multiple networks co-exist., e.g., WiFi, Bluetooth and IEEE 802.15.4 networks. References [72,73] describe performance degradation in ZigBee networks that co-exist with WiFi networks. The major reason is that the ZigBee signal is too week to be detected by WiFi senders. Many efforts consider a pessimistic mechanism to avoid using the channels occupied by other coexisting networks. In [74], superframes of multiple coexisting ZigBee networks are scheduled, while [75] allows a node to use different channels at different time points. In contrast, [76] proposes a header redundancy scheme to reduce header corruption, where multiple headers associated with a single ZigBee packet are sent. Since WiFi packets are typically shorter than ZigBee packets, longer ZigBee packets may cause WiFi transmitters to back off and shorter WiFi packets may corrupt ZigBee packet headers. Using a multiple header scheme, the first (corrupted) header can cause a WiFi transmitter to back off, and the second header can improve the correctness of detection by a ZigBee receiver. To reduce the number of forwarding messages between multiple mobile networks, the approach in [77] proposes a mechanism to detect the overlapping structure among them based on their density and the degree of connectivity. Interoperability among several heterogeneous networks is facilitated by a gateway selection scheme proposed in [78].

5.2. Security and Privacy

As part of the essential needs for emergency management, sensing data cannot belong solely to individuals. Security and privacy issues thus become more important and challenging.
Cyber-world security: in case of emergencies, wireless mobile devices may need to interact when they encounter each other. Security thus becomes more important than in other cyber-physical systems. Secure pairing of mobile devices [79] allows mobile devices to simply shake (or sense) together, as in earthquakes, so as to construct a common cryptographic key based on data from accelerometers. Such approaches may not always work in emergencies. Instead of authentication by shaking, in [80], two mobile devices are allowed to share data only when they are in proximity of each other. A shared secret key will be generated automatically between the two devices based on their common ambient wireless signals. Mobile devices close to each other will perceive similar fluctuations in wireless signals, whereas they will perceive different fluctuations in wireless signals for devices further away from each other. In this way, mobile devices can authenticate with each other and, thus, secure data exchanges that are freer from malicious attacks (e.g., remote terrorists). As cloud computing boosts many promising services, several efforts focus on the security issue of back-end cloud centres. A conventional way is to encrypt (resp., decrypt) each piece of data before data contributors (resp., consumers) push (resp., pull) the data. In [81], the user revocation issue is discussed; it involves the overheads for key redistribution and data re-encryption when a data contributor wants to revoke some data consumers’ access privileges (for example, civilians may revoke pushed data after leaving form emergencies). In this work, each data contributor provides the cloud with a re-encryption key for each valid data customer, where the re-encryption key also helps transform encrypted information between each pair of contributor and consumer. Once a data customer is revoked by a data contributor, the data contributor simply commands the cloud to destroy the re-encryption key so that no overhead is incurred, due to key redistribution and data re-encryption. In practice, multiple types of emergency services (e.g., evacuation in fire events and rescue in earthquakes) may need to collaborate with each other or share resources. Considering the intra-cloud and inter-cloud security, [82] relies on a trusted third-party agreement government to provide all collaborating services with a contract, so as to enable secure communications between multiple services.
Physical-world privacy: as location-based services rely on location information of mobile users, evacuation and rescue applications need even more accurate location information of civilians, raising the issue of privacy. Instead of keeping the detailed locations of mobile users in back-end servers, the approach in [83] pre-fetches location-enhanced content (e.g., a local map) into mobile devices and caches it in advance before it is actually needed. When evacuation and rescue applications require the content, it is retrieved from the cache rather than pushed from the location of civilians with a live query. Due to mobility of civilians, the information can be downloaded and updated at a favorable time (e.g., when WiFi connection is available). Since cloud computing can provide customers with seamless technologies to access distributed database systems (e.g., Amazon SimpleDB [84]), the work in [85] considers separating the user database from service servers for greater privacy. High-privacy data is only stored in the private service server, while the public cloud database stores low-privacy data.

5.3. Mobile Sensing and Cloud-Enabled Decisions

As smart phones become ever more present and cloud computing emerges as a dominant technology, crowdsourced data in connection with cloud computing may greatly facilitate the evacuation and rescue systems of the future. Thus, we next discuss some emerging opportunities and technologies from this perspective.
Augmented reality with crowdsourced data: mobile phones are considered as simple clients in many evacuation and rescue systems, due to their sensing ability and popularity. Combining crowdsourced data with virtual or augmented reality on smart phones raises some challenges in terms of visual navigation directions, accurate positioning and aggregation of crowdsourced information. Visual navigation directions can annotate the direction of motion on smartphones to guide people clearly. Accurate localization systems guarantee precise positioning of victims, which cannot be supported by the low-accuracy GSM positioning technology. Aggregation of crowdsourced information provides first responders and victims with the wisdom of crowds.
Since people in a disaster are usually under stress and likely to be confused in [86], mobile phones guide users to the exit by using 3D building models augmented with visual evacuation directions based on the evacuees’ current positions and environmental situations in the building. Two important technologies, localization of victims and visualization of 3D building, are addressed in the system. The localization of victims relies on an active RFID system, while the 3D visualization is based on a mobile 3D rendering engine. Instead of a virtual building model, Augmented Reality (AR) guiding technologies could be preferred in emergencies, especially for people who are unfamiliar with the environments. Instead of costly RFID infrastructure, the work in [87] implements an infrastructure-less emergency evacuation system, which adopts built-in sensors on smartphones (e.g., accelerometers, cameras and digital compasses) and image-based localization technologies for flexibility and scalability purposes. The back-end server localises victims by matching image snapshots with well-known locations to provide them with uncrowded paths, where well-known locations could be crowdsourced labels. Since existing map providers (e.g., GoogleMaps) provide only roads or building shapes without enough information about the connection points between buildings and roads in the real world, in [88], a crowdsourced map which allows users to contribute evacuation routes between buildings and routes, so as to provide a more accurate environmental model for evacuation simulations, is suggested. Similarly, [89] provides volunteers with a crowdsourced map to tag information on incidents that need rescuers’ attention.
Cloud-enabled decision systems: as massive and multi-domain data need to be processed quickly in emergency response systems, cloud computing may be adopted to design more satisfactory systems with higher processing speed, larger storage memory, less risk, lower cost and higher capability for integration. In [90], computation tasks, including RFID-based positioning, calculation of evacuation paths and database management, are migrated to a back-end cloud platform. Considering urban-scale emergencies (e.g., earthquakes or tsunami disasters), [91] considers a cloud-enabled vehicular emergency response system to evacuate people from city. This system consists of three layers: (1) cloud infrastructure layer; (2) intelligence layer; and (3) system interface. The cloud infrastructure layer adopts a Xen hypervisor to provide a parallel and distributed architecture. The intelligence layer is deployed computational models and algorithms to process multi-domain data and make decisions on evacuation routes based on density and velocity of vehicles. The system interface acquires data from the vehicular networks via mobile phones or roadside communication units. Since the data and emergency response resources (e.g., hospitals, rescuers, volunteers, polices and emergency management organizations) may belong to different organizations and need to collaborate with each other in case of emergencies, [92] introduces the concept of social networking to construct a community-based emergency management system on the cloud. In this system, the cloud centre has two major components, information repository and social networking. The information repository manages the emergency response resources and collects the data of emergent situations from social networking, while the social networking provides users with access interfaces to interact with each other.
QoS in the cloud: For scalability and fault-tolerance reasons, MapReduce provides a parallel and distributed programming model to process massive amount of data. Hadoop is one of the most commonly-applied implementations of MapReduce to enable the virtualisation in the cloud. As a multi-core CUPis involved, Hadoop exploits virtualisation technologies to deploy multiple virtual machines (VMs) in a single physical machine, so as to speed up data processing in cloud. Work [93] exploits the above advantages to divide each database query into several subqueries in MapReduce for quick recovery from mid-query faults. However, I/O tasks between VMs may incur overheads, especially for I/O-intensive applications. Thus, how to reduce I/O tasks becomes a critical challenge in the cloud. Reference [94] allocates data across all VMs based on the data locality to reduce I/O overheads. To relieve the waste of network bandwidth, due to communications between VMs for I/O-intensive applications, [95] proposes a decentralized affinity-aware migration technique that monitors fingerprints of traffic exchanges between VMs and dynamically adjusts/migrates VM placement for communication optimization. In addition to optimization of data distribution in the cloud, some efforts address the QoS issue on virtual machine provisioning, which emphasises how many virtual machine instances should be allocated to an application for achieving QoS requirements (e.g., response time). Obviously, virtual machine provisioning without over/under-provisioning and having unacceptable QoS is a challenge, because workload and runtime situations are highly dynamic. Based on an analysis of workload for each application, [96] proposes a prediction-based approach to determine the number of allocated virtual machines.

6. Areas for Future Work

This paper has discussed future research on emergency management systems that rely on sensor networks to locate hazards and also locate people, both evacuees and emergency personnel, and communications between evacuees and emergency personnel. These systems use distributed or cloud-based decision-making to make the best resource allocations and provide judicious guidance to evacuees.
Although we have tried to conduct a comprehensive review, there are several significant areas that we have not discussed and which require much more attention and research. We have seen that EMSsare intrinsically distributed, so that in the future, we may see more related work on distributed control and distributed algorithms for such systems [97]. The information that is collected via sensing is often inaccurate and requires interpretation [52]. Events, such as explosions and the spread of fire, can take place at a high rate and are themselves disruptive; thus, the limitations of sensing for EMS is definitely a topic that requires much more attention. A distinct, but related, problem is the manner in which one may be able to interpret items of information that are biased (e.g., information from people under the effect of fear or shock) or that is driven by different objectives (e.g., providing information to reduce panic) [60]. Much further work is needed in these areas with a specific focus on EMS.
The consequences of either over-estimating or under-estimating the resources needed during an emergency can both be dire. In addition, the optimum allocation problems are themselves NP-hard. Even worse, they typically need to be taken in real-time, based on incomplete or partial information [50]. This is yet another research area for EMS systems that merits much more attention.
Another important topic that has been neglected so far is the use of probability modelling [61,63,98] for emergency events that are intrinsically probabilistic, and where one seeks evaluations, which are necessarily statistical or probabilistic. Such methods can help us reduce or avoid lengthy computer simulations. An advantage of such approaches is that they can provide a computationally fast mathematical prediction of the overall performance of algorithms and policies [64], prior to lengthy simulation studies or experimental evaluations, even though the mathematical analysis may not be able to include all relevant aspects. We think that such methods will become more prevalent as the study of EMSs gains prominence and joins the mainstream of human based cyber-physical systems.

References

  1. Hu, F.; Xiao, Y.; Hao, Q. Congestion-aware, loss-resilient bio-monitoring sensor networking for mobile health applications. IEEE J. Sel. Areas Commun. 2009, 27, 450–465. [Google Scholar] [CrossRef]
  2. Terrestrial Ecology Observing Systems, Center for Embedded Networked Sensing. Available online: http://research.cens.ucla.edu/ (accessed on 19 June 2013).
  3. Liu, H.; Wan, P.; Jia, X. Maximal lifetime scheduling for sensor surveillance systems with K sensors to one target. IEEE Trans. Parallel Distrib. Syst. 2006, 17, 1526–1536. [Google Scholar] [CrossRef]
  4. Tubaishat, M.; Zhuang, P.; Qi, Q.; Shang, Y. Wireless sensor networks in intelligent transportation systems. Wirel. Commun. Mob. Comput. 2009, 9, 287–302. [Google Scholar] [CrossRef]
  5. Malan, D.J.; Fulford-Jones, T.R.; Nawoj, A.; Clavel, A.; Shnayder, V.; Mainland, G.; Welsh, M.; Moulton, S. Sensor networks for emergency response: Challenges and opportunities. IEEE Pervasive Comput. 2004, 3, 16–23. [Google Scholar]
  6. Gelenbe, E.; Cao, Y. Autonomous search for mines. Eur. J. Oper. Res. 1998, 108, 319–333. [Google Scholar] [CrossRef]
  7. Gelenbe, E.; Koçak, T. Area-based results for mine detection. Geosci. Remote Sens. IEEE Trans. 2000, 38, 12–24. [Google Scholar] [CrossRef]
  8. Chen, P.Y.; Chen, W.T.; Tseng, Y.C.; Huang, C.F. Providing group tour guide by RFIDs and wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1536–1276. [Google Scholar]
  9. Fischer, C.; Gellersen, H. Location and navigation support for emergency responders: A survey. IEEE Pervasive Comput. 2009, 9, 38–47. [Google Scholar] [CrossRef]
  10. Gelenbe, E.; Wu, F.J. Large scale simulation for human evacuation and rescue. Comput. Math. Appl. 2012, 64, 3869–3880. [Google Scholar] [CrossRef]
  11. Abdelrahman, O.H.; Gelenbe, E. Time and energy in team-based search. Phys. Rev. E 2013, 87, 032125:1–032125:6. [Google Scholar] [CrossRef]
  12. Li, Q.; Rosa, M.D.; Rus, D. Distributed Algorithms for Guiding Navigation across a Sensor Network. In Proceedings of the ACM International Conference Mobile Computing and Networking, San Diego, CA, USA, 14–19 September 2003; pp. 313–325.
  13. Tseng, Y.C.; Pan, M.S.; Tsai, Y.Y. Wireless sensor networks for emergency navigation. IEEE Comput. 2006, 39, 55–62. [Google Scholar] [CrossRef]
  14. Pan, M.S.; Tsai, C.H.; Tseng, Y.C. Emergency guiding and monitoring applications in indoor 3D environments by wireless sensor networks. Int. J. Sens. Netw. 2006, 1, 2–10. [Google Scholar] [CrossRef]
  15. Chen, D.; Mohan, C.K.; Mehrotra, K.G.; Varshney, P.K. Distributed in-network path planning for sensor network navigation in dynamic hazardous environments. Wirel. Commun. Mob. Comput. 2010, 12, 739–754. [Google Scholar] [CrossRef]
  16. Chen, W.T.; Chen, P.Y.; Wu, C.H.; Huang, C.F. A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks. In Proceedings of the IEEE Global Telecommunication Conference, New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–6.
  17. Chen, P.Y.; Kao, Z.F.; Chen, W.T.; Lin, C.H. A Distributed Flow-Based Guiding Navigation Protocol in Wireless Sensor Networks. In Proceedings of the International Conference Parallel Processing, Taipei, Taiwan, 13–16 September 2011; pp. 105–114.
  18. Chen, P.Y.; Chen, W.T.; Shen, Y.T. A Distributed Area-based Guiding Navigation Protocol for Wireless Sensor Networks. In Proceedings of the IEEE International Conference Parallel and Distributed Systems, Melbourne, Victoria, Australia, 8–10 December 2008; pp. 647–654.
  19. Li, M.; Liu, Y.; Wang, J.; Yang, Z. Sensor Network Navigation without Locations. In Proceedings of the IEEE INFOCOM, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 2419–2427.
  20. Barnes, M.; Leather, H.; Arvind, D.K. Emergency Evacuation using Wireless Sensor Networks. In Proceedings of the IEEE Conference Local Computer Networks, Clontarf Castle, Dublin, Ireland, 15–18 October 2007; pp. 851–857.
  21. Cherniak, A.; Zadorozhny, V. Towards Adaptive Sensor Data Management for Distributed Fire Evacuation Infrastructure. In Proceedings of the International Conference Mobile Data Management, Kansas City, MO, USA, 23–26 May 2010; pp. 151–156.
  22. Filippoupolitis, A.; Gelenbe, E. A Distributed Decision Support System for Building Evacuation. In Proceedings of the IEEE International Conference Human System Interaction, Catania, Italy, 21–23 May 2009; pp. 320–327.
  23. Filippoupolitis, A.; Gelenbe, E. An emergency response system for intelligent buildings. Sustain. Energy Build. 2011, 12, 265–274. [Google Scholar]
  24. Gorbil, G.; Gelenbe, E. Opportunistic Communications for Emergency Support Systems. In Proceedings of the International Conference Ambient Systems, Networks and Technologies, Niagara Falls, Ontario, Canada, 19–21 September 2011; pp. 1–9.
  25. Han, L.; Potter, S.; Beckett, G.; Pringle, G.; Welch, S.; Koo, S.H.; Wickler, G.; Usmani, A.; Torero, J.L.; Tate, A. FireGrid: An e-infrastructure for next-generation emergency response support. J. Parallel Distrib. Comput. 2010, 70, 1128–1141. [Google Scholar] [CrossRef] [Green Version]
  26. Kim, Y.D.; Kim, Y.G.; Lee, S.H.; Kang, J.H.; An, J. Portable Fire Evacuation Guide Robot System. In Proceedings of the IEEE/RSJ International Conference Intelligent Robots and Systems, St. Louis, MO, USA, 11–15 October 2009; pp. 2789–2794.
  27. Kantor, G.; Singh, S.; Peterson, R.; Rus, D.; Das, A.; Kumar, V.; Pereira, G.; Spletzer, J. Distributed search and rescue with robot and sensor teams. Field Serv. Robot. 2006, 24, 529–538. [Google Scholar]
  28. Gorbil, G.; Filippoupolitis, A.; Gelenbe, E. Intelligent Navigation Systems for Building Evacuation. In Proceedings of International Symposium on Computer and Information Sciences, London, UK, 26–28 September 2011; pp. 339–345.
  29. Inoue, Y.; Sashima, A.; Ikeda, T.; Kurumatani, K. Indoor Emergency Evacuation Service on Autonomous Navigation System using Mobile Phone. In Proceedings of the International Symposium Universal Communication, Osaka, Japan, 15–16 December 2008; pp. 79–85.
  30. Ko, A.; Lau, H.Y.K. Robot assisted emergency search and rescue system with a wireless sensor network. Int. J. Adv. Sci. Technol. 2009, 3, 69–78. [Google Scholar]
  31. Guo, S.; He, T.; Mokbel, M.F.; Stankovict, J.A.; Abdelzaher, T.F. On Accurate and Efficient Statistical Counting in Sensor-based Surveillance Systems. In Proceedings of the IEEE International Conference Mobile Ad Hoc and Sensor Systems, Atlanta, GA, USA, 29 September–2 October 2008; pp. 24–35.
  32. Loukas, G.; Timotheou, S.; Gelenbe, E. Robotic Wireless Network Connection of Civilians for Emergency Response Operations. In Proceedings of the International Symposium Computer and Information Sciences, Istanbul, Turkey, 27–29 October 2008; pp. 1–6.
  33. Timotheou, S.; Loukas, G. Autonomous Networked Robots for the Establishment of Wireless Communication in Uncertain Emergency Response Scenarios. In Proceedings of the ACM Symposium on Applied Computing, Honolulu, HI, USA, 08–12 March 2009; pp. 1171–1175.
  34. Reich, J.; Sklar, E. Robot-Sensor Networks for Search and Rescue. In Proceedings of the IEEE International Workshop Safety, Security and Rescue Robotics, Gaithersburg, MD, USA, 22–25 August 2006.
  35. Summit Safety. Available online: http://www.summitsafetyinc.com/ (accessed on 6 February 2009).
  36. Wilson, J.; Bhargava, V.; Redfern, A.; Wright, P. A Wireless Sensor Network and Incident Command Interface for Urban Firefighting. In Proceedings of the International Conference Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, PA, USA, 6–10 August 2007; pp. 1–7.
  37. Klann, M. Tactical navigation support for firefighters: The LifeNet ad-hoc sensor-network and wearable system. Mob. Response 2009, 5424, 41–56. [Google Scholar]
  38. Huang, J.H.; Amjad, S.; Mishra, S. CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses. In Proceedings of the ACM International Conference Embedded Networked Sensor Systems, San Diego, CA, USA, 2–4 November 2005; pp. 180–191.
  39. Filippoupolitis, A.; Hey, L.; Loukas, G.; Gelenbe, E.; Timotheou, S. Emergency Response Simulation Using Wireless Sensor Networks. In Proceedings of the International Conference Ambient Media and Systems, Athens, Greece, 15 March 2008; pp. 21:1–21:7.
  40. Schurr, N.; Marecki, J.; Tambe, M.; Scerri, P.; Kasinadhuni, N.; Lewis, J. The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO. In Proceedings of the AAAI Spring Symposium AI Technologies for Homeland Security, Stanford, CA, USA, 21–23 March 2005.
  41. Liu, K.; Shen, X.; Saddik, A.E.; Boukerche, A.; Georganas, N.D. SimSITE: The HLA/RTI Based Emergency Preparedness and Response Training Simulation. In Proceedings of the IEEE Symposium Distributed Simulation and Real-Time Applications, Chania, Greece, 22–24 October 2007; pp. 59–63.
  42. Dimakis, N.; Filippoupolitis, A.; Gelenbe, E. Distributed building evacuation simulator for smart emergency management. Comput. J. 2010, 53, 1384–1400. [Google Scholar] [CrossRef]
  43. Nakajima, Y.; Shiina, H.; Yamane, S.; Ishida, T. Disaster Evacuation Guide: Using a Massively Multiagent Server and GPS Mobile Phones. In Proceedings of the IEEE International Symposium Applications and the Internet, Hiroshima, Japan, 15–19 January 2007.
  44. Bo, Y.; Yong-gang, W.; Cheng, W. A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public Square. In Proceedings of the International Conference Computational Intelligence and Security, Beijing, China, 11–14 December 2009; pp. 211–216.
  45. Verma, A.; Sawant, H.; Tan, J. Selection and navigation of mobile sensor nodes using a sensor network. Pervasive Mob. Comput. 2006, 2, 65–84. [Google Scholar] [CrossRef]
  46. Stojmenovic, I.; Liu, D.; Jia., X. A scalable quorum based location service in ad hoc and sensor networks. Int. J. Commun. Netw. Distr. Syst. 2008, 1, 71–94. [Google Scholar] [CrossRef]
  47. Li, X.; Santoro, N.; Stojmenovic, I. Localized distance-sensitive service discovery in wireless sensor and actor networks. IEEE Trans. Comput. 2009, 58, 1275–1288. [Google Scholar]
  48. Wang, Y.C.; Peng, W.C.; Chang, M.H.; Tseng, Y.C. Exploring Load-Balance to Dispatch Mobile Sensors in Wireless Sensor Networks. In Proceedings of the IEEE International Conference Computer Communication and Networks, Honolulu, HI, USA, 13–16 August 2007; pp. 669–674.
  49. Li, S.; Zhan, A.; Wu, X.; Yang, P.; Chen, G. Efficient emergency rescue navigation with wireless sensor networks. J. Inf. Sci. Eng. 2011, 27, 51–64. [Google Scholar]
  50. Gelenbe, E.; Timotheou, S.; Nicholson, D. Fast distributed near-optimum assignment of assets to tasks. Comput. J. 2010, 53, 1360–1369. [Google Scholar] [CrossRef]
  51. Gelenbe, E. Search in unknown random environments. Phys. Rev. E 2010, 82, 061112. [Google Scholar] [CrossRef]
  52. Gelenbe, E.; Hey, L. Quality of Information: An Emprical Approach. In Proceedings of the 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Atlanta, Georgia, USA, 29 September–2 October 2008; pp. 730–735.
  53. Gelenbe, E.; Loukas, G. A self-aware approach to denial of service defence. Comput. Netw. 2007, 51, 1299–1314. [Google Scholar] [CrossRef]
  54. Tseng, Y.C.; Wu, F.J.; Lai, W.T. Opportunistic data collection for disconnected wireless sensor networks by mobile mules. Ad Hoc Netw. 2013, 11, 1150–1164. [Google Scholar] [CrossRef]
  55. Gelenbe, E.; Fourneau, J.M. Random neural networks with multiple classes of signals. Neural Comput. 1999, 11, 953–963. [Google Scholar] [CrossRef] [PubMed]
  56. Gelenbe, E.; Hussain, K.; Kaptan, V. Simulating autonomous agents in augmented reality. J. Syst. Softw. 2005, 74, 255–268. [Google Scholar] [CrossRef]
  57. Gorbil, G.; Gelenbe, E. Resilience and Security of Opportunistic Communications for Emergency Evacuation. In Proceedings of the ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, Paphos, Cyprus, 21–25 October 2012; pp. 115–124.
  58. Gelenbe, E. Natural computation. Comput. J. 2012, 55, 848–851. [Google Scholar] [CrossRef]
  59. Sheng, X.; Tang, J.; Zhang, W. Energy-Efficient Collaborative Sensing with Mobile Phones. In Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 1916–1924.
  60. Gelenbe, E.; Hébrail, G. A Probability Model of Uncertainty in Databases. In Proceedings of the ICDE. IEEE Computer Society, Los Angeles, CA, USA, 5–7 February 1986; pp. 328–333.
  61. Gelenbe, E.; Muntz, R.R. Probabilistic models of computer systems: Part I (exact results). Acta Inform. 1976, 7, 35–60. [Google Scholar] [CrossRef]
  62. Gelenbe, E. Probabilistic models of computer systems Part II: Diffusion approximations, waiting times and batch arrivals. Acta Inform. 1979, 12, 285–303. [Google Scholar] [CrossRef]
  63. Smith, J.M. State-dependent queueing models in emergency evacuation networks. Transp. Res. Part B: Methodol. 1991, 25, 373–389. [Google Scholar] [CrossRef]
  64. Desmet, A.; Gelenbe, E. Graph and Analytical Models for Emergency Evacuation. In Proceedings of IEEE PerCom 2013, PERNEM 2013 Workshop, San Diego, CA, USA, 22 March 2013.
  65. Desmet, A.; Gelenbe, E. Graph and analytical models for emergency evacuation. Future Internet 2013, 5, 46–55. [Google Scholar] [CrossRef] [Green Version]
  66. Aguilar, J.; Gelenbe, E. Task assignment and transaction clustering heuristics for distributed systems. Inf. Sci. 1997, 97, 199–219. [Google Scholar] [CrossRef]
  67. Tinyos. Available online: http://www.tinyos.net/ (accessed on 01 December 2005).
  68. Dunkels, A. Full TCP/IP for 8-bit Architectures. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, 5–8 May 2003; pp. 85–98.
  69. Montenegro, G.; Kushalnagar, N.; Hui, J.; Culler, D. Transmission of IPv6 packets over IEEE 802.15.4 networks. REC 4944 (Proposed Standard). 2007. [Google Scholar]
  70. Hui, J.W.; Culler, D.E. IP is Dead, Long Live IP for Wireless Sensor Networks. In Proceedings of the ACM International Conference Embedded Networked Sensor Systems, Raleigh, NC, USA, 5–7 November 2008; pp. 15–28.
  71. Wi-Fi Direct. Available online: http://www.wi-fi.org/discover-and-learn/wi-fi-direct (accessed on 01 March 2000).
  72. Hauer, J.H.; Handziski, V.; Wolisz, A. Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks. In Proceedings of the IEEE European Workshop Sensor Networks, Cork, Ireland, 11–13 February 2009; pp. 17–32.
  73. Musaloiu, E.R.; Terzis, A. Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks. Int. J. Sens. Netw. 2007, 3, 43–54. [Google Scholar]
  74. Kim, T.H.; Ha, J.Y.; Choi, S.; Kwon, W.H. Virtual channel management for densely deployed IEEE 802.15.4 LR-WPANs. In Proceedings of the IEEE Conference on Pervasive Computing and Communications, Pisa, Italy, 13–17 March 2006; pp. 103–115.
  75. Won, C.; Youn, J.H.; Ali, H.; Sharif, H.; Deogun, J. Adaptive Radio Channel Allocation for Supporting Coexistence of 802.15.4 and 802.11b. In Proceedings of the IEEE Vehicular Technology Conference, Dallas, TX, USA, 25–28 September 2005; pp. 2522–2526.
  76. Liang, C.J.M.; Priyantha, N.B.; Liu, J.; Terzis, A. Surviving Wi-Fi Interference in Low Power ZigBee Networks. In Proceedings of the ACM International Conference Embedded Networked Sensor Systems, Zurich, Switzerland, 3–5 November 2010; pp. 309–322.
  77. Nguyen, N.P.; Dinh, T.N.; Tokala, S.; Thai, M.T. Overlapping Communities in Dynamic Networks: Their Detection and Mobile Applications. In Proceedings of the ACM International Conference Mobile Computing and Networking, Las Vegas, NV, USA, 19–23 September 2011; pp. 85–96.
  78. Song, Y.; Wong, S.H.; Lee, K.W. Optimal Gateway Selection in Multi-Domain Wireless Networks: A Potential Game Perspective. In Proceedings of the ACM International Conference Mobile Computing and Networking, Las Vegas, NV, USA, 19–23 September 2011; pp. 325–336.
  79. Mayrhofer, R.; Gellersen, H. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Trans. Mob. Comput. 2009, 8, 792–806. [Google Scholar] [CrossRef]
  80. Mathur, S.; Miller, R.; Varshavsky, A.; Trappe, W.; Mandayam, N. ProxiMate: Proximity-Based Secure Pairing using Ambient Wireless Signals. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services, Washington, DC, USA, 28 June–1 July 2011; pp. 211–224.
  81. Yang, Y.; Zhang, Y. A Generic Scheme for Secure Data Sharing in Cloud. In Proceedings of the International Conference Parallel Processing Workshops, Taipei, Taiwan, 13–16 September 2011; pp. 145–153.
  82. Chen, S.; Nepal, S.; Liu, R. Secure Connectivity for Intra-Cloud and Inter-Cloud Communication. In Proceedings of the International Conference Parallel Processing Workshops, Taipei, Taiwan, 13–16 September 2011; pp. 154–159.
  83. Amini, S.; Lindqvist, J.; Hong, J.; Lin, J.; Toch, E.; Sadeh, N. Caché: Caching Location-Enhanced Content to Improve User Privacy. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services, Washington, DC, USA, 28 June–1 July 2011; pp. 197–210.
  84. Amazon SimpleDB. Available online: http://aws.amazon.com/simpledb/ (accessed on 27 December 2007).
  85. Chen, Y.J.; Wang, L.C. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing. In Proceedings of the International Conference Parallel Processing Workshops, Taipei, Taiwan, 13–16 September 2011; pp. 184–190.
  86. Chittaro, L.; Nadalutti, D. Presenting Evacuation Instructions on Mobile Devices by Means of Location-Aware 3D Virtual Environments. In Proceedings of the International Conference Human-Computer Interaction with Mobile Devices and Services, New York, NY, USA, 2–5 September 2008; pp. 395–398.
  87. Ahn, J.; Han, R. RescueMe: An Indoor Mobile Augmented-Reality Evacuation System by Personalized Pedometry. In Proceedings of the IEEE Asia-Pacific Services Computing Conference, Jeju, Korea, 12–15 December 2011; pp. 70–77.
  88. Stranders, R.; Ramchurn, S.D.; Shi, B.; Jennings, N.R. CollabMap: Augmenting maps using the wisdom of crowds. In Proceedings of the AAAI Workshop on Human Computation, San Francisco, CA, USA, 8 August 2011; pp. 111–112.
  89. Haiti-Ushahidi. Available online: http://haiti.ushahidi.com/ (accessed on 12 February 2010).
  90. Chu, L.; Wu, S.J. A Real-Time Decision Support with Cloud Computing Based Fire Evacuation System. In Proceedings of the North-East Asia Symposium on Nano, Information Technology and Reliability, Macao, China, 24–26 October 2011; pp. 45–48.
  91. Alazawi, Z.; Altowaijri, S.; Mehmood, R.; Abdljabar, M.B. Intelligent Disaster Management System Based on Cloud-Enabled Vehicular Networks. In Proceedings of the International Conference on ITS Telecommunications, Saint-Petersburg, Russia, 23–25 August 2011; pp. 361–368.
  92. Li, J.; Li, Q.; Khan, S.U.; Ghani, N. Community-Based Cloud for Emergency Management. In Proceedings of the International Conference on System of Systems Engineering, Albuquerque, NM, USA, 27–30 June 2011; pp. 55–60.
  93. Yang, C.; Yen, C.; Tan, C.; Madden, S.R. Osprey: Implementing MapReduce-Style Fault Tolerance in a Shared-Nothing Distributed Database. In Proceedings of the International Conference Data Engineering, Long Beach, CA, USA, 1–6 March 2010; pp. 657–668.
  94. Geng, Y.; Chen, S.; Wu, Y.; Wu, R.; Yang, G.; Zheng, W. Location-Aware MapReduce in Virtual Cloud. In Proceedings of the International Conference Parallel Processing, Taipei, Taiwan, 13–16 September 2011; pp. 275–284.
  95. Sonnek, J.; Greensky, J.; Reutiman, R.; Chandra, A. Starling: Minimizing Communication Overhead in Virtualized Computing Platforms Using Decentralized Affinity-Aware Migration. In Proceedings of the International Conference Parallel Processing, San Diego, CA, USA, 13–16 September 2010; pp. 228–237.
  96. Calheiros, R.N.; Ranjany, R.; Buyya, R. Virtual Machine Provisioning Based on Analytical Performance and QoS in Cloud Computing Environments. In Proceedings of the International Conference Parallel Processing, Taipei, Taiwan, 13–16 September 2011; pp. 295–304.
  97. Gelenbe, E.; Sevcik, K.C. Analysis of update synchronisation algorithms for multiple copy data bases. IEEE Trans. Comput. 1979, C-28, 737–747. [Google Scholar] [CrossRef]
  98. Gelenbe, E.; Stafylopatis, A. Global behaviour of homogeneous random neural systems. Appl. Math. Modell. 1991, 15, 534–541. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Gelenbe, E.; Wu, F.-J. Future Research on Cyber-Physical Emergency Management Systems. Future Internet 2013, 5, 336-354. https://doi.org/10.3390/fi5030336

AMA Style

Gelenbe E, Wu F-J. Future Research on Cyber-Physical Emergency Management Systems. Future Internet. 2013; 5(3):336-354. https://doi.org/10.3390/fi5030336

Chicago/Turabian Style

Gelenbe, Erol, and Fang-Jing Wu. 2013. "Future Research on Cyber-Physical Emergency Management Systems" Future Internet 5, no. 3: 336-354. https://doi.org/10.3390/fi5030336

APA Style

Gelenbe, E., & Wu, F. -J. (2013). Future Research on Cyber-Physical Emergency Management Systems. Future Internet, 5(3), 336-354. https://doi.org/10.3390/fi5030336

Article Metrics

Back to TopTop