Next Article in Journal
Structure and Anonymity of the Bitcoin Transaction Graph
Next Article in Special Issue
Future Research on Cyber-Physical Emergency Management Systems
Previous Article in Journal
Digital Differentiation in Young People’s Internet Use—Eliminating or Reproducing Disability Stereotypes
Previous Article in Special Issue
A Concept for Support of Firefighter Frontline Communication
Article Menu

Export Article

Open AccessReview
Future Internet 2013, 5(2), 205-236; doi:10.3390/fi5020205

A Review of Cyber Threats and Defence Approaches in Emergency Management

School of Computing and Mathematical Sciences, University of Greenwich, Old Royal Naval College,SE10 9LS, London, UK
*
Author to whom correspondence should be addressed.
Received: 17 February 2013 / Revised: 19 March 2013 / Accepted: 10 April 2013 / Published: 7 May 2013
(This article belongs to the Special Issue Emergency Management, Communications and the Internet)
View Full-Text   |   Download PDF [382 KB, uploaded 7 May 2013]   |  

Abstract

Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature. View Full-Text
Keywords: survey; pervasive computing; network-level security and protection; physical security; emergency management survey; pervasive computing; network-level security and protection; physical security; emergency management
This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Loukas, G.; Gan, D.; Vuong, T. A Review of Cyber Threats and Defence Approaches in Emergency Management. Future Internet 2013, 5, 205-236.

Show more citation formats Show less citations formats

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top