Abstract
In this paper the Virtual Private Ad Hoc Networking (VPAN) platform is introduced as an integrated networking solution for many applications that require secure transparent continuous connectivity using heterogeneous devices and network technologies. This is done by creating a virtual logical self-organizing network on top of existing network technologies reducing complexity and maintaining session continuity right from the start. One of the most interesting applications relies in the field of emergency communication with its specific needs which will be discussed in this paper and matched in detail against the architecture and features of the VPAN platform. The concept and dynamics are demonstrated and evaluated with measurements done on real hardware.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Hamachi: Instant, zero-configuration vpn. https://secure.logmein.com/products/hamachi/vpn.asp.
IBBT ADAMO Advanced Disaster Architecture with Mobility Optimizations. http://www.ibbt.be/en/project/adamo.
IBBT GeoBIPS Geographical Broadband Integration for Public Services. http://www.ibbt.be/en/project/geobips.
Ietf network mobility working group. http://www.ietf.org/html.charters/nemo-charter.html.
iLab.t Technology Center @ IBBT. http://ilabt.ibbt.be.
The iLab.t virtual wall. http://ilabt.ibbt.be/?p=page5.
Leetnet: The true dynamic vpn. http://www.leetnet.org.
PC Engines™ALIX system boards. http://www.pcengines.ch/alix.htm.
Ubiquitous M2M, Service Networks (UseNet). http://usenet.erve.vtt.fi/.
Vpn technologies: Definitions and requirements, white paper (2004). http://www.vpnc.org/vpn-technologies.html.
Statement of Requirements for Public Safety Wireless Communication and Interoperability (2006). http://www.safecomprogram.gov/SAFECOM/library/technology/1258_statementof.htm.
Abdulrahman, A. H., & Golden, R. G. (2004). Load-balanced routing through virtual paths: Highly adaptive and efficient routing scheme for ad hoc wireless networks. In H. Hassanein, R. Oliver, & G. Richard (Eds.), The 2004 IEEE international performance, computing, and communications conference (IPCCC) (pp. 407–413). New York: IEEE Press.
Anderson, T., Peterson, L., Shenker, S., & Turner, J. (2005). Overcoming the internet impasse through virtualization. Computer, 38(4), 34–41.
Birman, K. P. (2000). The next-generation internet: Unsafe at any speed? Computer, 33(8), 54–60.
Chiti, F., Fantacci, R., Maccari, L., Marabissi, D., & Tarchi, D. (2008). A broadband wireless communications system for emergency management. IEEE Wireless Communications, 15(3), 8–14.
Couto, D. S. J. D., Aguayo, D., Bicket, J., & Morris, R. (2005). A high-throughput path metric for multi-hop wireless routing. Wireless Networks, 11(4), 419–434.
Cox, M., Engelschall, R., Henson, S., Laurie, B. et al. (2002). The OpenSSL project.
Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES–the Advanced Encryption Standard. Berlin: Springer.
Dahlman, E., Parkvall, S., Skold, J., & Beming, P. (2008). 3G Evolution (2nd ed.). HSPA and LTE for Mobile Broadband. San Diego: Academic Press.
Dedecker, P., Hoebeke, J., Moerman, I., Moreau, J., & Demeester, P. (2009). Multipath routing issues in virtual private ad hoc networks. Personalized Networks, 2009. In IEEE CCNC ’09. Workshop on.
Dedecker, P., Hoebeke, J., Naudts, D., Moerman, I., Moreau, J., & Demeester, P. (2009). Fast and safe emergency communication through network virtualization. In International conference on communications and mobile computing (p. 4).
Doval, D., & O’Mahony, D. (2003). Overlay networks: A scalable alternative for p2p. IEEE Internet Computing, 7(4), 79–82.
Ericsson: Keeping lifelines open: national security & public safety communication over mobile broadband (white paper) (2010). http://www.ericsson.com/article/nsps_20100216130134.
Fantacci, R., Vanneschi, M., Bertolli, C., Mencagli, G., & Tarchi, D. (2009). Next generation grids and wireless communication networks: towards a novel integrated approach. Wireless Communications and Mobile Computing, 9(4), 445–467.
Freeman, J., & Passmore, D. (1996). The virtual lan technology report.
Hoebeke, J. (2007). Adaptive ad hoc routing and its application to virtual private ad hoc networks. Ph.D. thesis, Ghent University.
Hoebeke, J., Holderbeke, G., Moerman, I., Dhoedt, B., & Demeester, P. (2006). Virtual private ad hoc networking. Wireless Personal Communications, 38, 125–141.
Hoebeke, J., Steenhuyse, M., Ackaert, A., Moerman, I., Demeester, P., Jacobs, A., Veys, A., Verhoeve, P., & Piepers, B. (2008). A new concept towards secure personal healthcare platforms. In Proceedings of TTEC2008, the Tromso telemedicine and eHealth conference (pp. 25–26).
Iapichino, G., Bonnet, C., del Rio Herrero, O., Baudoin, C., & Buret, I. (2009). Combining mobility and heterogeneous networking for emergency management. New York: ACM Press.
Iapichino, G., Bonnet, C., Del Rio Herrero, O., Baudoin, C., & Buret, I. (2008). A mobile ad-hoc satellite and wireless mesh networking approach for public safety communications. In SPSC 2008, 10th IEEE international workshop on signal processing for space communications, October 6–8, 2008, Rhodes Island, Greece.
Johnson, D., & Perkins, C. (2004). J. Arkko, Mobility Support in IPv6. Tech. rep., RFC 3775, June 2004.
Khanvilkar, S., & Khokhar, A. (2004). Virtual private networks: an overview with performance evaluation. IEEE Communications Magazine, 42(10), 146–154.
Kohler, E. The click modular router project. http://www.read.cs.ucla.edu/click/.
Lua, E. K., Crowcroft, J., Pias, M., Sharma, R., & Lim, S. (2005). A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials, 7(2), 72–93.
Murthy, S., & Garcia-Luna-Aceves, J. J. (1996). An efficient routing protocol for wireless networks. Mobile Networks and Applications, 1(2), 183–197.
National task force on interoperability (NTFI) and United States: why can’t we talk? Working together to bridge the communications gap to save lives: a guide for public officials-supplemental resources (2005).
Naudts, D., Bouckaert, S., Bergs, J., Schoutteet, A., Blondia, C., Moerman, I., & Demeester, P. (2007). A wireless mesh monitoring and planning tool for emergency services. End-to-End Monitoring Techniques and Services, 2007. In E2EMON ’07. Workshop on (pp. 1–6).
Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (Experimental).
Perkins, C. et al. (2002). IP mobility support for IPv4.
Portmann, M., & Pirzada, A. (2008). Wireless mesh networks for public safety and crisis management applications. IEEE Internet Computing, 12(1), 18–25.
Sánchez, L., Lanza, J., & Munoz, L. (2006). Experimental assessment of a cross-layer solution for TCP/IP traffic optimization on heterogeneous personal networking environments. In Lecture Notes in Computer Science (Vol. 4217, pp. 284).
Stavroulakis, P. (2007). TErrestrial trunked RAdio—TETRA: A global security tool. Berlin: Springer.
Triantafyllidou, D., & Agha, K. A. (2009). The impact of path-delay routing on TCP in ad hoc networks. In International conference on communications and mobile computing.
Viega, J., Messier, M., & Chandra, P. (2002). Network security with OpenSSL. Sebastopol: O’Reilly.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Dedecker, P., Hoebeke, J., Moerman, I. et al. Network virtualization as an integrated solution for emergency communication. Telecommun Syst 52, 1859–1876 (2013). https://doi.org/10.1007/s11235-011-9470-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9470-z