Proceedings of the 2009 Winter Simulation Conference (WSC) 2009
DOI: 10.1109/wsc.2009.5429249
|View full text |Cite
|
Sign up to set email alerts
|

A post-disaster mobility model for Delay Tolerant Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 85 publications
(39 citation statements)
references
References 8 publications
0
39
0
Order By: Relevance
“…We use ONE simulator [5] to emulate a post-disaster rescue operations based on a previously published post-disaster mobility (PDM) model [6]. Admittedly, reconstructing a realistic situation is hard in a simulator.…”
Section: Discussionmentioning
confidence: 99%
“…We use ONE simulator [5] to emulate a post-disaster rescue operations based on a previously published post-disaster mobility (PDM) model [6]. Admittedly, reconstructing a realistic situation is hard in a simulator.…”
Section: Discussionmentioning
confidence: 99%
“…They follow a Random Way Point mobility model based movement pattern. A related work in the field of post-disaster scenarios has been reported by Uddin et al (2009) where authors have proposed the use of random way-point mobility model within each cluster. The specific simulation parameters used in our proposed work are mentioned in Table 1.…”
Section: Dtn Under Threatmentioning
confidence: 99%
“…We investigate the resiliency of an emergency communication network under two categories of DoS attacks. We use the Post-disaster mobility model 1 [7] recommended by IETF for ICN Baseline Scenarios on Emergency Support and Disaster Recovery in DTN [10]. We analyse the effect of these attacks on the performance of the Emergency communication network during the evacuation process and rescue operation.…”
Section: System Model and Architecturementioning
confidence: 99%
“…Communication infrastructures with fragile connectivity have no security solutions from the current Internet Protocols today, however much effort has been made by the academia and research groups towards achieving an efficient and effective communication model for networks with no end-to-end connectivity and variable long delays [6]. DTN is considered as an effective method of communication in areas requiring emergency communication support [7] however [3] points out that the mobility modeling used by DTNs are not suitable for disaster response communication networks as a result of its mobility pattern which are suitable for a disaster scenarios. Recent work in rescue operations demonstrates the use of DTN in information gathering on disaster victims and sharing among rescue workers [8], another work (MONAC) [9] focuses on information disseminated by victims using twitter messages through a DTN Network which is characterised by a variable long delay and there is no guarantee of delivery.…”
Section: Introductionmentioning
confidence: 99%