IBSC System for Victims Management in Emergency Scenarios

Alexandra Rivero-García, Iván Santos-González, Candelaria Hernández-Goya, Pino Caballero-Gil

Abstract

This work describes an optimized system designed to help the greatest number of injured people in emergency situations, using the shortest possible time and cost. It is composed of a mobile application (assigned to medical staff and helpers), a web service and Near Field Communication wristbands assigned to victims. The mobile application is devoted to providing medical staff with the geolocation of victims as well as with an assistant indicating the best route to follow in order to take care of them based on the severity of their conditions and based on a triage method. Resolution of the routes is solved based on a classical problem, a Travelling Salesman Problem, using a k-parition algorithm to divide the huge number of victims in different clusters. Thus, each doctor has a specific area to assist victims. Besides, doctors can use a functionality of the application to contact their peers through a video call when additional help is needed. The proposal combines an keyed-Hash Message Authentication Code scheme to protect Near Field Communication tags and an IDentity-Based Cryptosystem to the wireless communication. Specifically an IDentity-Based Signcryption is used for communication confidentiality, authenticity and integrity, both among peers, and between server and medical staff.

References

  1. Ageev, A. A. and Sviridenko, M. I. (2000). An approximation algorithm for hypergraph max k-cut with given sizes of parts. In Algorithms-ESA 2000, pages 32-41. Springer.
  2. Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., and Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61:59-80.
  3. Baracoda (2017). Idbluean efficient way to add rfid reader/encoder to bluetooth pda and mobile phones. Available online: http://www.baracoda.com (accessed on 15 February 2017).
  4. Bos, J. W., Halderman, J. A., Heninger, N., Moore, J., Naehrig, M., and Wustrow, E. (2014). Elliptic curve cryptography in practice. In International Conference on Financial Cryptography and Data Security, pages 157-175. Springer.
  5. Boyen, X. (2010). Identity-based signcryption. Springer.
  6. de Berg, M., Cheong, O., van Kreveld, M., and Overmars, M. (2008). Delaunay triangulations. Computational Geometry: Algorithms and Applications, pages 191- 218.
  7. de Sousa, V. J. R., Anjos, M. F., and Le Digabel, S. (2016). Computational study of valid inequalities for the maximum k-cut problem.
  8. Facebook (2017). Facebook safety check. Available online: https://www.facebook.com/about/safetycheck/ (accessed on 15 February 2017).
  9. Foundation, S. (2017). management software. https://sahanafoundation.org/ February 2017).
  10. disaster online: on 15
  11. Gao, T., Massey, T., Selavo, L., Crawford, D., Chen, B.- r., Lorincz, K., Shnayder, V., Hauenstein, L., Dabiri, F., Jeng, J., et al. (2007). The advanced health and disaster aid network: A light-weight wireless medical system for triage. Biomedical Circuits and Systems, IEEE Transactions on, 1(3):203-216.
  12. Google (2017). Google person finder web page. Available online: https://google.org/ (accessed on 15 February 2017).
  13. Hespanha, J. P. (2004). An efficient matlab algorithm for graph partitioning. Santa Barbara, CA, USA: University of California.
  14. Hoffman, K. L., Padberg, M., and Rinaldi, G. (2013). Traveling salesman problem. In Encyclopedia of operations research and management science, pages 1573- 1578. Springer.
  15. Inoue, S., Sonoda, A., Oka, K., and Fujisaki, S. (2006). Emergency healthcare support: Rfid-based massive injured people management. In Proceedings of the fourth International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications, Irvine, CA.
  16. Knox, R. W. (2015). Marcq saint-hilaire without tears. The International Hydrographic Review, 52(2).
  17. Lee, J.-S., Su, Y.-W., and Shen, C.-C. (2007). A comparative study of wireless protocols: Bluetooth, uwb, zigbee, and wi-fi. InIndustrial Electronics Society, 2007. IECON 2007. 33rd Annual Conference of the IEEE, pages 46-51. IEEE.
  18. Malone-Lee, J. (2002). Identity-based signcryption. IACR Cryptology ePrint Archive, 2002:98.
  19. Mudaliar, D. N. and Modi, N. K. (2013). Unraveling travelling salesman problem by genetic algorithm using mcrossover operator. In Signal Processing Image Processing & Pattern Recognition (ICSIPR), 2013 International Conference on, pages 127-130. IEEE.
  20. Neuenschwander, M., Cohen, M. R., Vaida, A. J., Patchett, J. A., Kelly, J., and Trohimovich, B. (2003). Practical guide to bar coding for patient medication safety. AMERICAN JOURNAL OF HEALTH SYSTEM PHARMACY, 60(8):768-779.
  21. of Medicine at NIH, N. L. (2017). People locator and reunite web page. Available online: https://lpf.nlm.nih.gov/ (accessed on 15 February 2017).
  22. Rivero-Garcia, A., Hern ández-Goya, C., Santos-González, I., and Caballero-Gil, P. (2014). Fasttriaje: A mobile system for victim classification in emergency situations.
  23. Santos-González, I., Rivero-García, A., Caballero-Gil, P., and Hernández-Goya, C. (2014). Alternative communication system for emergency situations. In WEBIST (2), pages 397-402.
  24. Sesia, S., Toufik, I., and Baker, M. (2009). LTE: the UMTS long term evolution. Wiley Online Library.
  25. Smart, N. P. (2016). Hash functions, message authentication codes and key derivation functions. In Cryptography Made Simple, pages 271-294. Springer.
  26. Want, R. (2011a). Near field communication. IEEE Pervasive Computing, (3):4-7.
  27. Want, R. (2011b). Near field communication. IEEE Pervasive Computing, (3):4-7.
  28. Zou, Z., Chen, Q., Uysal, I., and Zheng, L. (2014). Radio frequency identification enabled wireless sensing for intelligent food logistics. Phil. Trans. R. Soc. A, 372(2017):20130313.
Download


Paper Citation


in Harvard Style

Rivero-García A., Santos-González I., Hernández-Goya C. and Caballero-Gil P. (2017). IBSC System for Victims Management in Emergency Scenarios . In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 276-283. DOI: 10.5220/0006298702760283


in Bibtex Style

@conference{iotbds17,
author={Alexandra Rivero-García and Iván Santos-González and Candelaria Hernández-Goya and Pino Caballero-Gil},
title={IBSC System for Victims Management in Emergency Scenarios},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},
year={2017},
pages={276-283},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006298702760283},
isbn={978-989-758-245-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - IBSC System for Victims Management in Emergency Scenarios
SN - 978-989-758-245-5
AU - Rivero-García A.
AU - Santos-González I.
AU - Hernández-Goya C.
AU - Caballero-Gil P.
PY - 2017
SP - 276
EP - 283
DO - 10.5220/0006298702760283