{"title":"30年的特设网络研究:人道主义和救灾解决方案如何?我们还缺少什么?","authors":"F. Legendre","doi":"10.1145/2185216.2185279","DOIUrl":null,"url":null,"abstract":"In this invited talk, we will start by surveying the research works conducted during the last 30 years on wireless networking technologies from ad hoc, mesh to delay-tolerant opportunistic networks. We present how these networking technology may be applied to uphold communications in the event of a disaster where the communication infrastructure can be wiped-out (earthquakes, floods), overloaded (surge of traffic and flash crowds) or not existing in the first place (developing countries). We summarize the advantages and disadvantages of each unique approach, how they can be combined together (and with legacy systems), and focus on recent advances in the field. In a second part we will present, Twimight, our Twitter application relying on opportunistic communications to spread tweets and sensor data in an epidemic fashion. Twimight is an open source Twitter client for Android phones featured with a \"disaster mode\", which users enable upon losing connectivity. In the disaster mode, tweets are not sent to the online Twitter servers but stored on the phone, carried around as people move, and forwarded opportunistically via Bluetooth or WiFi Direct when in proximity with other smartphones.\n We will demonstrate how opportunistic technologies such as Twimight can be of great value right after a disaster by enabling the self-organization of victims and a better coordination with first rescue organizations. Eventually, we will conclude with the main challenges still to overcome and provide directions for future research in this emerging field from protocol and system design to security and data privacy. We will stress the need for cross-disciplinary approaches to better understand the psychology of distressed victims and their interaction with innovative communication technologies.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"39","resultStr":"{\"title\":\"30 years of ad hoc networking research: what about humanitarian and disaster relief solutions? what are we still missing?\",\"authors\":\"F. Legendre\",\"doi\":\"10.1145/2185216.2185279\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this invited talk, we will start by surveying the research works conducted during the last 30 years on wireless networking technologies from ad hoc, mesh to delay-tolerant opportunistic networks. We present how these networking technology may be applied to uphold communications in the event of a disaster where the communication infrastructure can be wiped-out (earthquakes, floods), overloaded (surge of traffic and flash crowds) or not existing in the first place (developing countries). We summarize the advantages and disadvantages of each unique approach, how they can be combined together (and with legacy systems), and focus on recent advances in the field. In a second part we will present, Twimight, our Twitter application relying on opportunistic communications to spread tweets and sensor data in an epidemic fashion. Twimight is an open source Twitter client for Android phones featured with a \\\"disaster mode\\\", which users enable upon losing connectivity. In the disaster mode, tweets are not sent to the online Twitter servers but stored on the phone, carried around as people move, and forwarded opportunistically via Bluetooth or WiFi Direct when in proximity with other smartphones.\\n We will demonstrate how opportunistic technologies such as Twimight can be of great value right after a disaster by enabling the self-organization of victims and a better coordination with first rescue organizations. Eventually, we will conclude with the main challenges still to overcome and provide directions for future research in this emerging field from protocol and system design to security and data privacy. We will stress the need for cross-disciplinary approaches to better understand the psychology of distressed victims and their interaction with innovative communication technologies.\",\"PeriodicalId\":180836,\"journal\":{\"name\":\"International Conference on Wireless Technologies for Humanitarian Relief\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"39\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Wireless Technologies for Humanitarian Relief\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2185216.2185279\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Wireless Technologies for Humanitarian Relief","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2185216.2185279","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
30 years of ad hoc networking research: what about humanitarian and disaster relief solutions? what are we still missing?
In this invited talk, we will start by surveying the research works conducted during the last 30 years on wireless networking technologies from ad hoc, mesh to delay-tolerant opportunistic networks. We present how these networking technology may be applied to uphold communications in the event of a disaster where the communication infrastructure can be wiped-out (earthquakes, floods), overloaded (surge of traffic and flash crowds) or not existing in the first place (developing countries). We summarize the advantages and disadvantages of each unique approach, how they can be combined together (and with legacy systems), and focus on recent advances in the field. In a second part we will present, Twimight, our Twitter application relying on opportunistic communications to spread tweets and sensor data in an epidemic fashion. Twimight is an open source Twitter client for Android phones featured with a "disaster mode", which users enable upon losing connectivity. In the disaster mode, tweets are not sent to the online Twitter servers but stored on the phone, carried around as people move, and forwarded opportunistically via Bluetooth or WiFi Direct when in proximity with other smartphones.
We will demonstrate how opportunistic technologies such as Twimight can be of great value right after a disaster by enabling the self-organization of victims and a better coordination with first rescue organizations. Eventually, we will conclude with the main challenges still to overcome and provide directions for future research in this emerging field from protocol and system design to security and data privacy. We will stress the need for cross-disciplinary approaches to better understand the psychology of distressed victims and their interaction with innovative communication technologies.