Skip to main content

Routing in Post-Disaster Scenarios

  • Chapter
  • First Online:
Guide to Disaster-Resilient Communication Networks

Abstract

Current networks should provide disaster-resilience by coping with the possible failures and misbehaviours caused by massive natural or man-made disasters. This is necessary to keep a suitable level of Quality of Service after a disaster and to support the possible evacuation, rescue, assessment, and rescue operations within the affected area. Multiple possible methods and solutions can be put in place in a proactive and/or reactive manner to offer the required resilience degree. Among them, a proper routing algorithm can contribute to circumventing network elements damaged by the disaster or applying for spatial/temporal redundancy to guarantee effective communications. This chapter aims at presenting the main routing solutions to offer disaster-resilience communications, along with some related methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdulla AEAA, Fadlullah ZM, Nishiyama H, Kato N, Ono F, Miura R (2015) Toward fair maximization of energy efficiency in multiple UAS-aided networks: a game-theoretic methodology. IEEE Trans Wirel Commun 14(1):305–316

    Article  Google Scholar 

  2. Alzenad M, El-Keyi A, Lagum F, Yanikomeroglu H (2017) 3-D placement of an unmanned aerial vehicle base station (UAV-BS) for energy-efficient maximal coverage. IEEE Wirel Commun Lett 6(4):434–437

    Article  Google Scholar 

  3. Cheng Y, Gardner MT, Li J, May R, Medhi D, Sterbenz JPG (2015) Analysing GeoPath diversity and improving routing performance in optical networks. Comput Netw 82:50–67

    Article  Google Scholar 

  4. Cinque M, Di Martino C, Esposito C (2012) On data dissemination for large-scale complex critical infrastructures. Comput Netw 56(4):1215–1235

    Article  Google Scholar 

  5. Cinque M, Esposito C, Fiorentino M, Carrasco FJP, Matarese F (2015) A collaboration platform for data sharing among heterogeneous relief organizations for disaster management. In: Proceeding of the ISCRAM 2015 Conference

    Google Scholar 

  6. Cinque M, Cotroneo D, Esposito C, Fiorentino M, Russo S (2015) A reliable crisis information system to share data after the event of a large-scale disaster. In: Proceeding of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, pp 941–946

    Google Scholar 

  7. Downs A (1984) An economic theory of political action in a democracy. Polit Econ 12–26

    Google Scholar 

  8. Esposito C, Cotroneo D, Russo S (2013) On reliability in publish/subscribe services. Comput Netw 57(5):1318–1343

    Article  Google Scholar 

  9. Esposito C, Ciampi M, De Pietro G (2014) An event-based notification approach for the delivery of patient medical information. Inf Syst 39:22–44

    Article  Google Scholar 

  10. Esposito C, Platania M, Beraldi R (2014) Reliable and timely event notification for publish/subscribe services over the Internet. IEEE/ACM Trans Netw 22(1):230–243

    Article  Google Scholar 

  11. Esposito C, Castiglione A, Palmieri F, Ficco M (2016) A game-theoretic approach to network embedded FEC over large-scale networks. In: Computational Intelligence and Intelligent Systems

    Google Scholar 

  12. Esposito C, Castiglione A, Palmieri F, Ficco M (2017) Improving the gossiping effectiveness with distributed strategic learning (invited paper). Future Gen Comput Syst 71:221–233

    Article  Google Scholar 

  13. Esposito C, Castiglione A, Palmieri F, Pop F, Rak J (2017) Repeated game formulation of network embedded coding for multicast resilience in extreme conditions. In: Proceedings of the 13th International Conference Design of Reliable Communication Networks (DRCN 2017), pp 1–8

    Google Scholar 

  14. Esposito C, Castiglione A, Palmieri F, Ficco M (2018) Building a network embedded FEC protocol by using game theory. Inf Sci 433:365–380

    Article  MathSciNet  Google Scholar 

  15. Esposito C, Bruno A, Cattaneo G, Palmieri F (2018) On the optimal tuning and placement of FEC codecs within multicasting trees for resilient publish/subscribe services in edge-IoT architectures. Future Gen Comput Syst 88:140–150

    Article  Google Scholar 

  16. Esposito C, Zhao Z, Alcarria R, Rizzo G (2019) Game theoretic optimal user association in emergency networks. In: Proceedings of the 18th International Conference on Ad Hoc Networks and Wireless (AdHoc-Now 2019)

    Google Scholar 

  17. Eugster PT, Felber PA, Guerraoui R, Kermarrec AM (2003) The many faces of publish/subscribe. ACM Comput Surv (CSUR) 35(2):114–131

    Article  Google Scholar 

  18. Eugster PT, Guerraoui R, Kermarrec AM, Massoulié L (2004) Epidemic information dissemination in distributed systems. Computer 37(5):60–67

    Article  Google Scholar 

  19. Ferranti L, Cuomo F, Colonnese S, Melodia T (2018) Drone cellular networks: enhancing the quality of experience of video streaming applications. Ad Hoc Netw 78:1–12

    Article  Google Scholar 

  20. Ghaderi M, Towsley D, Kurose J (2008) Reliability gain of network coding in lossy wireless networks. In: IEEE INFOCOM 2008—the 27th Conference on Computer Communications, pp 2171–2179

    Google Scholar 

  21. Han J, Watson D, Jahanian F (2006) An experimental study of internet path diversity. IEEE Trans Dependable Secure Comput 3(4):273–288

    Article  Google Scholar 

  22. Han Z, Swindlehurst AL, Liu KJR (2009) Optimization of MANET connectivity via smart deployment/movement of unmanned air vehicles. IEEE Trans Veh Technol 58(7):3533–3546

    Article  Google Scholar 

  23. Hayajneh AM, Zaidi SAR, McLernon DC, Di Renzo M, Ghogho M (2018) Performance analysis of UAV enabled disaster recovery networks: a stochastic geometric framework based on cluster processes. IEEE Access 6:26215–26230

    Article  Google Scholar 

  24. Hotelling H (1990) Stability in competition. In: The Collected Economics Articles of Harold Hotelling. Springer, New York, pp 50–63

    Google Scholar 

  25. Jabbar A, Raman B, Frost VS, Sterbenz JPG (2008) Weather disruption-tolerant self-optimising millimeter mesh networks. In: Self-Organizing Systems. Springer, Berlin, Heidelberg, pp 242–255

    Google Scholar 

  26. Klose A, Drexl A (2005) Facility location models for distribution system design. Eur J Oper Res 162(1):4–29

    Article  MathSciNet  MATH  Google Scholar 

  27. Lin S, Costello DJ, Miller MJ (1984) Automatic-repeat-request error-control schemes. IEEE Commun Mag 22(12):5–17

    Article  Google Scholar 

  28. Lu Q, George B, Shekhar S (2005) Capacity constrained routing algorithms for evacuation planning: a summary of results. In: Advances in Spatial and Temporal Databases, pp 291–307

    Google Scholar 

  29. Merwaday A, Guvenc I (2015) UAV assisted heterogeneous networks for public safety communications. In: 2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp 329–334

    Google Scholar 

  30. Miranda K, Molinaro A, Razafindralambo T (2016) A survey on rapidly deployable solutions for post-disaster networks. IEEE Commun Mag 54(4):117–123

    Article  Google Scholar 

  31. Mozaffari M, Saad W, Bennis M, Debbah M (2016) Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage. IEEE Commun Lett 20(8):1647–1650

    Article  Google Scholar 

  32. Mozaffari M, Saad W, Bennis M, Debbah M (2017) Mobile unmanned aerial vehicles (UAVs) for energy-efficient Internet of Things communications. IEEE Trans Wirel Commun 16(11):7574–7589

    Article  Google Scholar 

  33. Mozaffari M, Saad W, Bennis M, Debbah M (2017) Wireless communication using unmanned aerial vehicles (UAVs): optimal transport theory for hover time optimization. IEEE Trans Wirel Commun 16(12):8052–8066

    Article  Google Scholar 

  34. Mozaffari M, Saad W, Bennis M, Nam YH, Debbah M (2019) A tutorial on UAVs for wireless networks: applications, challenges, and open problems. IEEE Commun Surv Tutor 21(3):2334–2360

    Google Scholar 

  35. Osborne MJ, Rubinstein A (1994) A course in game theory. MIT Press, Cambridge

    Google Scholar 

  36. Ranjan G, Kumar A (2005) A natural disasters management system based on location aware distributed sensor networks. In: Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005, pp 3–182

    Google Scholar 

  37. Reese J (2006) Solution methods for the p-median problem: an annotated bibliography. Networks 48(3):125–142

    Google Scholar 

  38. Saad W, Han Z, Basar T, Debbah M, Hjorungnes A (2009) A selfish approach to coalition formation among unmanned air vehicles in wireless networks. In: Proceedings of the 2009 International Conference on Game Theory for Networks. IEEE, pp 259–267

    Google Scholar 

  39. Selim MR, Goto Y, Cheng J (2007) A replication oriented approach to event based middleware over structured peer to peer networks. In: Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-hoc Computing: Held at the ACM/IFIP/USENIX 8th International Middleware Conference. ACM, pp 61–66

    Google Scholar 

  40. Sharma V, Bennis M, Kumar R (2016) UAV-assisted heterogeneous networks for capacity enhancement. IEEE Commun Lett 20(6):1207–1210

    Article  Google Scholar 

  41. Suurballe JW (1974) Disjoint paths in a network. Networks 4(2):125–145

    Article  MathSciNet  MATH  Google Scholar 

  42. Tembine H (2012) Distributed strategic learning for wireless engineers. CRC Press, Boca Raton

    Google Scholar 

  43. Timpner J, Wolf L (2016) Query-response geocast for vehicular crowd sensing. Ad Hoc Netw 36:435–449

    Article  Google Scholar 

  44. Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36–42

    Article  Google Scholar 

Download references

Acknowledgements

This chapter is based on work from COST Action CA15127 (“Resilient communication services protecting end-user applications from disaster-based failures—RECODIS”) supported by COST (European Cooperation in Science and Technology).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Esposito .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Esposito, C. et al. (2020). Routing in Post-Disaster Scenarios. In: Rak, J., Hutchison, D. (eds) Guide to Disaster-Resilient Communication Networks. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-44685-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-44685-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-44684-0

  • Online ISBN: 978-3-030-44685-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics