Abstract
This work presents a new secure system for deploying opportunistic communications for emergency management after any disaster in which network infrastructures have become collapsed or unavailable. This proposal uses different wireless technologies such as Bluetooth Low Energy, Wi-Fi Direct and LTE Direct to enable device-to-device communications between users through their smartphones. In this way, the system allows the deployment of decentralized communications in fragmented scenarios, what is essential for disaster relief applications. The general procedure of the proposed system is based on the use of chat rooms with possibility of real-time streaming. Two different types of chat rooms are defined: public chat rooms with open access for all registered and authenticated users, and private chat rooms that can be used by different authorized groups of people. The permissions required to use different chat room are established thanks to the use of a decentralized authentication scheme based on public keys and certificate graphs, where different trust levels can be applied. The proposed scheme includes also a decision protocol to choose the most appropriate communication technology in every moment, and a power saving protocol that minimizes the impact of the system on the device’s battery consumption. The first results of field experiments made with a beta application developed for Android smartphones are promising.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
CRISYS: Critical response in security and safety emergencies. http://cordis.europa.eu/project/rcn/98623_en.pdf. Accessed 4 July
RESCUECELL: Using Cell Phone Detection TEchnology to Save Lives. http://www.rescuecell.eu/. Accessed 4 July
TRADR: Long-Term Human-Robot Teaming for Robot-Assisted Disaster Response. http://www.tradr-project.eu. Accessed 4 July
Gandotra, P., Jha, R.K.: Device-to-device communication in cellular networks: a survey. J. Netw. Comput. Appl. 71, 99–117 (2016)
Asadi, A., Wang, Q., Mancuso, V.: A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutorials 16(4), 1801–1819 (2014)
Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of bluetooth low energy: an emerging low-power wireless technology. Sensors 12(9), 11734–11753 (2012)
Wi-Fi Direct, Wi-Fi Alliance. https://www.wi-fi.org/discover-wi-fi/wi-fi-direct. Accessed 4 July
Balraj, S.: LTE Direct Overview. Qualcomm Research, San Diego (2015)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)
Seedorf, J., Gill, B., Kutscher, D., Schiller, B., Kohlweyer, D.: Fully decentralised authentication scheme for ICN in disaster scenarios. In: ACM International Conference on Information-Centric Networking, pp. 191–192 (2014)
Alpify. http://www.safe365.com/. Accessed 4 July
Santos-González, I., Rivero-García, A., Caballero-Gil, P., Hernández-Goya, C.: Alternative communication system for emergency situations. In: WEBIST, pp. 397–402 (2014)
Jang, H.C., Lien, Y.N., Tsai, T.C.: Rescue information system for earthquake disasters based on MANET emergency communication platform. In: ACM International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, pp. 623–627 (2009)
Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)
Yi, S., Kravets, R.: Composite key management for ad hoc networks. MobiQuitous 4, 52–61 (2004)
Dahshan, H., Irvine, J.: A robust selforganized public key management for mobile ad hoc networks. Secur. Commun. Netw. 3(1), 16–30 (2010)
Qualcomm Technologies. LTE Direct Always-on Device-toDevice Proximal Discovery. https://www.qualcomm.com/media/documents/files/lte-direct-always-on-device-to-device-proximal-discovery.pdf. Accessed 4 July
Yu, C.H., Tirkkonen, O., Doppler, K., Ribeiro, C.: Power optimization of device-to-device communication underlaying cellular communication. In: IEEE International Conference on Communications, pp. 1–5 (2009)
Acknowledgements
This work has been partially supported by the grants TESIS2015010102, TESIS2015010106, IPT-2012-0585- 370000, RTC-2014-1648-8 y TEC2014-54110-R.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Santos-González, I., Caballero-Gil, P., Molina-Gil, J., Rivero-García, A. (2017). Decentralized Authentication for Opportunistic Communications in Disaster Situations. In: Ochoa, S., Singh, P., Bravo, J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science(), vol 10586. Springer, Cham. https://doi.org/10.1007/978-3-319-67585-5_55
Download citation
DOI: https://doi.org/10.1007/978-3-319-67585-5_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67584-8
Online ISBN: 978-3-319-67585-5
eBook Packages: Computer ScienceComputer Science (R0)