Abstract
The root cause of the deliberate run-over accident that took place in Nice city was a terrorism type called lone wolf. Although the lone wolf terrorists are extremely difficult to detect at any stage of the attack, this paper proposes a new design approach for transportation systems based internet of things to counter the lone wolf just before the attacks done by vehicles. In this design, the obstacle barriers were replaced by a wireless network that covers the desired prohibited traffic zone where the entrance to that zone requires permission from the security authority. This permission is asked by an embedded system that is attached to the vehicle. If there is no entering permission the system will prevent the vehicle to enter into the prohibited traffic zone. Also, in threaten behavior like deliberate run-over accidents, the system will stop the vehicle as soon as possible and inform the security authority to ensure a fast response. By applying this approach in intelligent transportation systems many accidents like deliberate run-over accidents and stealing or dispersion of hazardous materials; can be prevented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Khanwalkar, S.S.: Crime intelligence 2.0: reinforcing crowdsourcing using artificial intelligence and mobile computing. M.Sc. thesis, University of California, Irvine (2016)
Auer, A., Feese, S., Lockwood, S.: History of intelligent transportation systems. Report no. FHWA-JPO-16-329, U.S. Department of Transportation (2016)
Eichendorf, W.: Advanced emergency braking systems for commercial vehicles. German Road Safety Council (2016)
Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Martenson, C., Svenson, P.: Harvesting and analysis of weak signals for detecting lone wolf terrorists. Secur. Inf., vol. 2, no. 11. Springer, Heidelberg (2013). doi:10.1186/2190-8532-2-11
Kaati, L., Shrestha, A., Sardella, T.: Identifying warning behaviors of violent lone offenders in written communication. In: 16th IEEE International Conference on Data Mining Workshops (ICDMW), pp. 1053–1060. IEEE Press, Barcelona, Spain (2016). doi:10.1109/ICDMW.2016.0152
Al-Sakran, H.O.: Intelligent traffic information system based on integration of internet of things and agent technology. Int. J. Adv. Comput. Sci. Appl. 6(2), 37–43 (2015)
Ou, H., Wang, Y., Zhang, J.: Development of intelligent traffic control system based on internet of things and fpga technology in proteus. In: International Conference on Education, Management, Computer and Society, EMCS 2016, pp. 405–409. Atlantis Press (‎‎2016)‎
Xiao, L., Wang, Z.: Internet of things: a new application for intelligent traffic monitoring system. J. Netw. 6(6), 887–894 (2011). doi:10.4304/jnw.6.6.887-894
Leng, Y., Zhao, L.: Novel design of intelligent internet-of-vehicles management system based on cloud-computing and internet-of-things. In: International Conference on Electronic and Mechanical Engineering and Information Technology, pp. 3190–3193. IEEE Press (2011)
Bojan, T.M., Kumar, U.R., Bojan, V.M.: An internet of things based intelligent transportation system. In: IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 174–179. IEEE Press (2014)
Nice attack. Wikipedia. https://en.wikipedia.org/wiki/2016_Nice_attack. Accessed 28 Mar 2017
Tsai, H., Craig, B., Lee, H., Mittal, K., Liu, Y., Shuler, J.: ARG-US remote area modular monitoring for dry casks and critical facilities. In: Proceedings of 55th Annual Meeting of the Institute of Nuclear Materials Management (INMM), Georgia, USA (2014)
Almogy, G., Kedar A., Bala, M.: When a vehicle becomes a weapon: intentional vehicular assaults in Israel. J. Trauma, Resuscitation Emerg. Med. 24(149) (2016). doi:10.1186/s13049-016-0338-9
Dwan, A.: Vehicles as weapons. International Journalism, 23 May 2017. http://internationaljournalism280.com/vehicles-as-weapons/. Accessed 8 June 2017
Hughes, M., Hess, J.: An assessment of lone wolves using explosive-laden consumer drones in the United States. Glob. Secur. Intell. Stud. 2(1), 62–80 (2016). doi:10.18278/gsis.2.1.5
Berlin attack. Wikipedia. https://en.wikipedia.org/wiki/2016_Berlin_attack. Accessed 25 May 2017
Acknowledgements
The authors wish to acknowledge the Professor Ezzat A. Eisawy for his strong support. They want also to thank Dr. M. Elzorkany for his precious suggestions. We are thankful to Mr. Khairy Mahmoud Abd-Elmajeed for his worth cooperation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Morsi, H.F., Youssef, M.I., Sultan, G.F. (2018). Novel Design Based Internet of Things to Counter Lone Wolf, Part-A: Nice Attack. In: Hassanien, A., Shaalan, K., Gaber, T., Tolba, M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017. AISI 2017. Advances in Intelligent Systems and Computing, vol 639. Springer, Cham. https://doi.org/10.1007/978-3-319-64861-3_82
Download citation
DOI: https://doi.org/10.1007/978-3-319-64861-3_82
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64860-6
Online ISBN: 978-3-319-64861-3
eBook Packages: EngineeringEngineering (R0)