1,583 research outputs found
Internet of things for disaster management: state-of-the-art and prospects
Disastrous events are cordially involved with the momentum of nature. As such mishaps have been showing off own mastery, situations have gone beyond the control of human resistive mechanisms far ago. Fortunately, several technologies are in service to gain affirmative knowledge and analysis of a disaster's occurrence. Recently, Internet of Things (IoT) paradigm has opened a promising door toward catering of multitude problems related to agriculture, industry, security, and medicine due to its attractive features, such as heterogeneity, interoperability, light-weight, and flexibility. This paper surveys existing approaches to encounter the relevant issues with disasters, such as early warning, notification, data analytics, knowledge aggregation, remote monitoring, real-time analytics, and victim localization. Simultaneous interventions with IoT are also given utmost importance while presenting these facts. A comprehensive discussion on the state-of-the-art scenarios to handle disastrous events is presented. Furthermore, IoT-supported protocols and market-ready deployable products are summarized to address these issues. Finally, this survey highlights open challenges and research trends in IoT-enabled disaster management systems. © 2013 IEEE
Opportunistic communication schemes for unmanned vehicles in urban search and rescue
In urban search and rescue (USAR) operations, there is a considerable amount
of danger faced by rescuers. The use of mobile robots can alleviate this issue.
Coordinating the search effort is made more difficult by the communication issues typically faced in these environments, such that communication is often
restricted. With small numbers of robots, it is necessary to break communication links in order to explore the entire environment. The robots can be
viewed as a broken ad hoc network, relying on opportunistic contact in order
to share data. In order to minimise overheads when exchanging data, a novel
algorithm for data exchange has been created which maintains the propagation
speed of
flooding while reducing overheads. Since the rescue workers outside
of the structure need to know the location of any victims, the task of finding
their locations is two parted: 1) to locate the victims (Search Time), and 2)
to get this data outside the structure (Delay Time). Communication with the
outside is assumed to be performed by a static robot designated as the Command Station. Since it is unlikely that there will be sufficient robots to provide
full communications coverage of the area, robots that discover victims are faced
with the difficult decision of whether they should continue searching or return
with the victim data. We investigate a variety of search techniques and see how
the application of biological foraging models can help to streamline the search
process, while we have also implemented an opportunistic network to ensure
that data are shared whenever robots come within line of sight of each other or
the Command Station. We examine this trade-off between performing a search
and communicating the results
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Recommended from our members
Indoor And Outdoor Real Time Information Collection in Disaster Scenario
A disaster usually severely harms human health and property. After a disaster, great amount of information of a disaster area is needed urgently. The information not only indicates the severity of the disaster, but also is crucial for an efficient search and rescue process. In order to quickly and accurately collect real time information in a disaster scenario, a mobile platform is developed for an outdoor scenario and a localization and navigation system for responders is introduced for an indoor scenario.
The mobile platform has been integrated to the DIORAMA system. It is built with a 6-wheel robot chassis along with an Arduino microcontroller. Controlled by a mounted Android smartphone, the mobile platform can receive commands from incident commanders and quickly respond to the commands. While patrolling in a disaster area, a constant RFID signal is collected to improve the localization accuracy of victims. Pictures and videos are also captured in order to enhance the situational awareness of rescuers.
The design of the indoor information collection is focused on the responder side. During a disaster scenario, it is hard to track responders’ locations in an indoor environment. In this thesis, an indoor localization and navigation system based on Bluetooth low energy and Android is developed for helping responders report current location and quickly find the right path in the environment. Different localization algorithms are investigated and implemented. A navigation system based on A* is also proposed
Recommended from our members
MULTI-SENSOR LOCALIZATION AND TRACKING IN DISASTER MANAGEMENT AND INDOOR WAYFINDING FOR VISUALLY IMPAIRED USERS
This dissertation proposes a series of multi-sensor localization and tracking algorithms particularly developed for two important application domains, which are disaster management and indoor wayfinding for blind and visually impaired (BVI) users. For disaster management, we developed two different localization algorithms, one each for Radio Frequency Identification (RFID) and Bluetooth Low Energy (BLE) technology, which enable the disaster management system to track patients in real-time. Both algorithms work in the absence of any pre-deployed infrastructure along with smartphones and wearable devices. Regarding indoor wayfinding for BVI users, we have explored several types of indoor positioning techniques including BLE-based, inertial, visual and hybrid approaches to offer accurate and reliable location and orientation in complex navigation spaces. In this dissertation, significant contributions have been made in the design and implementation of various localization and tracking algorithms under different requirements of certain applications
Intrusion Detection for Cyber-Physical Attacks in Cyber-Manufacturing System
In the vision of Cyber-Manufacturing System (CMS) , the physical components such as products, machines, and tools are connected, identifiable and can communicate via the industrial network and the Internet. This integration of connectivity enables manufacturing systems access to computational resources, such as cloud computing, digital twin, and blockchain. The connected manufacturing systems are expected to be more efficient, sustainable and cost-effective.
However, the extensive connectivity also increases the vulnerability of physical components. The attack surface of a connected manufacturing environment is greatly enlarged. Machines, products and tools could be targeted by cyber-physical attacks via the network. Among many emerging security concerns, this research focuses on the intrusion detection of cyber-physical attacks.
The Intrusion Detection System (IDS) is used to monitor cyber-attacks in the computer security domain. For cyber-physical attacks, however, there is limited work. Currently, the IDS cannot effectively address cyber-physical attacks in manufacturing system: (i) the IDS takes time to reveal true alarms, sometimes over months; (ii) manufacturing production life-cycle is shorter than the detection period, which can cause physical consequences such as defective products and equipment damage; (iii) the increasing complexity of network will also make the detection period even longer. This gap leaves the cyber-physical attacks in manufacturing to cause issues like over-wearing, breakage, defects or any other changes that the original design didn’t intend.
A review on the history of cyber-physical attacks, and available detection methods are presented. The detection methods are reviewed in terms of intrusion detection algorithms, and alert correlation methods. The attacks are further broken down into a taxonomy covering four dimensions with over thirty attack scenarios to comprehensively study and simulate cyber-physical attacks.
A new intrusion detection and correlation method was proposed to address the cyber-physical attacks in CMS. The detection method incorporates IDS software in cyber domain and machine learning analysis in physical domain. The correlation relies on a new similarity-based cyber-physical alert correlation method. Four experimental case studies were used to validate the proposed method. Each case study focused on different aspects of correlation method performance. The experiments were conducted on a security-oriented manufacturing testbed established for this research at Syracuse University.
The results showed the proposed intrusion detection and alert correlation method can effectively disclose unknown attack, known attack and attack interference that causes false alarms. In case study one, the alarm reduction rate reached 99.1%, with improvement of detection accuracy from 49.6% to 100%. The case studies also proved the proposed method can mitigate false alarms, detect attacks on multiple machines, and attacks from the supply chain.
This work contributes to the security domain in cyber-physical manufacturing systems, with the focus on intrusion detection. The dataset collected during the experiments has been shared with the research community. The alert correlation methodology also contributes to cyber-physical systems, such as smart grid and connected vehicles, which requires enhanced security protection in today’s connected world
Asynchronous Visualization of Spatiotemporal Information for Multiple Moving Targets
In the modern information age, the quantity and complexity of spatiotemporal data is increasing both rapidly and continuously. Sensor systems with multiple feeds that gather multidimensional spatiotemporal data will result in information clusters and overload, as well as a high cognitive load for users of these systems.
To meet future safety-critical situations and enhance time-critical decision-making missions in dynamic environments, and to support the easy and effective managing, browsing, and searching of spatiotemporal data in a dynamic environment, we propose an asynchronous, scalable, and comprehensive spatiotemporal data organization, display, and interaction method that allows operators to navigate through spatiotemporal information rather than through the environments being examined, and to maintain all necessary global and local situation awareness.
To empirically prove the viability of our approach, we developed the Event-Lens system, which generates asynchronous prioritized images to provide the operator with a manageable, comprehensive view of the information that is collected by multiple sensors. The user study and interaction mode experiments were designed and conducted. The Event-Lens system was discovered to have a consistent advantage in multiple moving-target marking-task performance measures. It was also found that participants’ attentional control, spatial ability, and action video gaming experience affected their overall performance
- …