Format Template Vol. 2, No. 1 | January – June 2018 SJCMS | P-ISSN: 2520-0755 | E-ISSN: 2522-3003 © 2018 Sukkur IBA University – All Rights Reserved 77 Internet of Things (IoTs) for Disaster Management Syeda Ambreen Zahra1, Iqra Shafique1, Tuba Farid1 Abstract: It is critical that rescuers can track the caught victims and perform composed help actions quickly. The ordinary media transmission framework (e.g. a landline or cell system) might be either mostly or totally harmed by a catastrophe occurrence. Internet of Things (IoTs) is an encouraging innovation that can be utilized to take care of a portion of the issues said above. To date, the use of IoT in disaster administration is as yet an unexplored issue. The target of this paper is to concentrate the IoT-based proposition for disaster administration structure. Keywords: IoT; Disaster; Crowdsourcing; Cloud computing; WSN. 1. Introduction Natural and man-made disasters, for example, quakes, surges, plane accidents, elevated structure falls, or major atomic office breakdowns, represent an ever-display test to open crisis administrations. Disaster organization has been attracting a lot of thought by many research gatherings, including Computer Science, Environmental Sciences, Health Sciences and Business. The makers' gathering starts from a product building establishment, and particularly from the zone of data organization and examination. Keeping in mind the end goal to adapt to such disasters in a quick and very organized way, the ideal arrangement of data concerning the circumstance is a basic pre- imperative [3]. Police, fire offices, general wellbeing, common guard and different associations need to respond effectively and exclusively, as well as in an organized way. This outcomes in the requirement for both intra and inters association coordination at a few order levels [1]. Since management requires current data and such data must be reported upstream and downstream inside and between associations progressively, the need emerges for an integrated communication and data framework for disaster administration that gives proficient, solid and secure trade and 1 CS & IT, University of Lahore, Gujrat, Pakistan Corresponding Email: Msituol@gmail.com preparing of important data. Regardless of the starting, crisis conditions are consistently joined by instability of how the disaster will develop, a sharp pace of response operations, and the probability of honest to goodness loss of human lives and property if not responded to really. Other grouping plans exist, however whatever the cause, certain elements are fascinating for administration of all disasters Prevention, Advance alerted, Early acknowledgment, Analysis of the issue, and examination of degree, Notification of the overall public and fitting masters ,Mobilization of a response, Containment of damage, Relief and helpful watch over those impacted because of natural change, among various causes, disastrous occasions have extended out and out consistently and that is not simply costing us to the extent assets/system hurt more over in dynamic adversities of human lives [2]. While we cannot stop the occasion of basic disasters, with the help of present day advancement one can extra people's lives more enough. Exchanges systems in the midst of a damaging occasion can be the complexity among life and downfall for those in the impacted areas [5]. mailto:Msituol@gmail.com Syeda Ambreen Zahra (et al.), Internet of Things (IoTs) for Disaster Management (pp. 77 - 85) Sukkur IBA Journal of Computing and Mathematical Sciences - SJCMS | Volume 2 No. 1 January – June 2018 © Sukkur IBA University 78 2. Idea of IoTs (Internet of things) There are various implications of the Internet of Things in the investigation and critical present day gatherings. The definitions may climb from the word 'Web 'and provoke an 'Internet organized 'vision, or 'things 'and incite a 'things arranged 'vision. Putting the world 'Internet' and 'Things' together semantically suggests a general arrangement of interconnected differences strangely addressable, in perspective of standard correspondence traditions. The term Internet of Things (IoT) has been around for a long time [3]. In this circumstance, it is gaining ground with the improvement of exploiting edge remote advancement. The basic idea of this thought is the proximity of a variety of articles – for instance, RFID, NFC, sensors, actuators, mobile phones, et cetera which, through uncommon tending to arrangements, can work together with each other. Presently a day's assorted advancements of IoT, for example, RFID (Radio Frequency Identification), Near Field Communication (NFC), Machine-to- Machine Communication (M2M) and Vehicular-to-Vehicular correspondence (V2V) are there in the business parts which are used to execute the front line thought of IoT [4]. 3. Purpose Behind Picking IoT Over the span of regular framework breakdown, D2D correspondence to be begun and confined an uncommonly selected framework where a segment of the devices will go about as a hand-off or portal administrator. This hand-off administrator will interface the impacted domain with rest of the world at whatever point they get any live advances, for instance, Wi-Fi, Satellite or working standard cell coordinate. Using IoT we will make a work arrangement of different devices so if one device can't confer then another device will be in used so there is no delay and objectivity among correspondence frameworks, IoT will be an assorted framework and distinctive sorts of devices will be related there [7]. Among them, general devices including equipment and devices for different IoT application spaces, for instance, mechanical machines, home electrical devices, sharp vehicles and pushed cells and so forth. These general devices may viably be embedded with high taking care of and computational chipsets, and hence may talk with various frameworks paying little character to the individual developments used. 4. Some Portion of IoT in Disaster Management It was energized by the way that the Internet has transformed into our exchanges spine for the web, and things rise toward phone calls. If there should be an occurrence of a disaster, power can go out, servers can go down and systems can wind up obviously over-weight, all of which can impact Internet- based exchanges. Regardless of having some redundancy and support structures set up, it is probably not going to expect that we could ever make the Internet truly impenetrable to any disaster [8]. When you consider the Internet of Things (IoT), the quickly growing number of devices in our lives that can connect with the Internet and to each other, you doubtlessly consider the ways it can make your life less requesting [6]. For example, the IoT starting now empowers us to do things like control the indoor controllers in our homes using an application on our phones. Regardless, adjacent to the solaces it can offer, the (IoT) Internet of Things moreover can serve an essential, possibly lifesaving, and part in the event of calamity, typical or something else. Today, immense scale catastrophe slant and response requires organizations which rely on the information that is being secured in these barely detectable IoT frameworks. These frameworks, however starting at now set up, are ceaselessly being revived, modernized, and pervaded with the latest advances which will over the long haul transform into the qualification between sensible disappointment Syeda Ambreen Zahra (et al.), Internet of Things (IoTs) for Disaster Management (pp. 77 - 85) Sukkur IBA Journal of Computing and Mathematical Sciences - SJCMS | Volume 2 No. 1 January – June 2018 © Sukkur IBA University 79 and groundbreaking pulverization for countless [9]. The purpose behind this paper is to give a comprehension into the current IoT based work and highlight a possible response for post – calamity response organization. The rule nature of this paper is the accentuation that IoT can be a promising one, represent an ever – display test to open crisis administration. Whatever is left of the paper is sorted out as takes after. Area we expose the idea of IoT. Then we talk about purposed methodology and related work. At long last, we display the conclusions and distinguish open research difficulties to build up an IoT based disaster flexible correspondence arrange. 5. Literature Review Several solutions have been proposed by researchers to adequately maintain communication after disaster. 1. Jeva et al ., proposed a system called “DBAPRS (Disaster Behavior Analysis and Probabilistic reasoning System)” for notifying future disaster alleviation and management in the city of Japan [13]. It can also figureout at what percent people will migrate to numerous cities of Japan in case of disaster. This system can also examine people’s evacuation behavior at the time of Great East Japan Earthquake. 2. According to Nan Jing, “Context – Aware Disaster Response System” can classify and inspect the setting data of mobile application users [34]. The major drawback of this framework was that Sky guard did not consider security measures when to accumulate and explore the assessment of mobile users. 3. Asli Soyler proposed that the structure and conduct of a disaster management System can be acquired in a single demonstrating environment by utilizing both the model based framework and its modeling language [35]. 4. Sarmad Sadik et al., proposed an architecture called “Policy based Migration of Mobile agents” that has been utilized for managing the exertion execution and the moving pattern of Mobile agents [36]. This model can also moderate the movement of mobile agents to specific areas and regulate the execution of certain actions on source and target machines. 5. According to Li Zbigangt et al., “Urban disaster management information system” can enhance the reaction speed and exactness of Government Emergency management [37]. Through this system, analyzing disaster information, managing safety measure and administration of crisis become feasible. 6. Hassan et al., presents a Novel model that comprises of Mobile Cloud (MC) called “D2D based Mobile Cloud”. On the basis of Residual energy and signal to noise interface (SNR), user Equipment’s (UE’s) challenge the cluster heads (CH’s) [32]. Numerous legitimate areas (Clusters) have different cluster heads (CH’s). Contrast to traditional mobile based communication, this model shows an increase of 25% in bandwidth and data transfer proficiency [14]. 7. Ahmed et al., proposed a software “Arc GIS Simulation tool” for anticipating the upcoming disaster and also analyze pre and post disaster flood risk analysis and an Ad hoc Wireless sensor network (WSN) architecture [16]-[31]. This software is very useful in emergency situation and also help rescuers to take preventive actions for saving the life of victims in case of critical conditions. The proposed architecture comprises the following three subtypes  WSN Area  GIS based Emergency Response DB Server  Remote Sensing and Satellite based infrastructure For predicting and analyzing Flood analysis, this research demands integration Syeda Ambreen Zahra (et al.), Internet of Things (IoTs) for Disaster Management (pp. 77 - 85) Sukkur IBA Journal of Computing and Mathematical Sciences - SJCMS | Volume 2 No. 1 January – June 2018 © Sukkur IBA University 80 with Wireless Sensor Network (WSN). Using proposed software, they had also performed simulations for estimating flood in different regions of Sindh. The GIS enabled Map for flood forecasting gives a broad insight about the areas which are likely to be affected from heavy rainfall during recent two years [15]. 8. Anthone et al., proposed an alternative solution of sending SMS in case of natural disaster. This system was called “Alternative Emergency SMS network”. This system is very handy for users as it provides an alternative means of communication. The proposed system is based on sending SMS directly to the Short Message Service Center (SMSC) utilizing the SMS interchange conventions over Wireless Mesh Sensor Network (WMSN) [16]- [33]. 9. Ashish Rauniyar et al., proposed a model in IOT called “CDMFC (Crowdsourcing Disaster Management Fog Computing)”. The model further classified into four layers namely [24]:  Sensing Layer The Purpose of this layer is to sense both natural and artificial disasters like; flood, fire, earthquake and many IOT based applications with the help of different sensors, mobile phone, Laptops and tablets, etc. The purpose of this layer is to only produce sensing information rather than the kind of event.  Crowdsourcing Layer The main purpose of this layer is to crowdsourced the data that is being sensed from the above layer (Sensing layer). Then this data is transferred to the cloud for detailed investigation in which different strategies like data mining are being tested to make this data understandable.  CDFMC Layer This layer accommodate filtering techniques that depends upon emergency and keywords (relevant to disaster). Development of these keywords is being possible by the IoT applications, through humans using different mobile phones, tablets and sensors dispose in disaster affected district or area. With the help of crowdsourcing and data offloading mechanism, disaster relevant IoT information explored in CDFMC layer in an effective manner. Facebook and twitter generated data gives information of areas and time stamps progressively. The exact location and time of disaster in a shorter time span can be identified from the information generated through Facebook and twitter [10]. This layer also comprises urgent contact numbers. These numbers are directly approachable by rescuers, who can arrange safeguard in case of disaster. This will be helpful in sense to make vital move as per crowdsourced basic calamity related IOT information.  Cloud Computing Layer This layer stores and inspects all the basic and non- basic information that is being generated from Crowdsourced layer. 10. Devasena et al., proposed two types of sensors for measuring the disaster [25]:  Homogenous WSN In this network, sensor nodes have identical attributes. They measure the same sort of parameters such as temperature. Examples of the clusters that are being intended for homogeneous WSN are Hybrid Energy Efficient Distributed clustering (HEED), Power efficient gathering in sensor information system (PEGASIS) and low Energy Adaptive clustering Hierarchy (LEACH).  Heterogeneous WSN In this network, sensor nodes have distinctive attributes because they need to quantify diverse parameters. SN are independent to take decisions to fulfill sensing task, building topology for network and routing policies. In this way, it ends up Syeda Ambreen Zahra (et al.), Internet of Things (IoTs) for Disaster Management (pp. 77 - 85) Sukkur IBA Journal of Computing and Mathematical Sciences - SJCMS | Volume 2 No. 1 January – June 2018 © Sukkur IBA University 81 noticeably essential to outline energy efficient algorithm for upgrading robustness against node failures and extending lifetime of WSN [11]. Heterogeneous WSN can be useful in disasterprone regions because it can interpret and analyze more than one parameters. It can also be fundamental to figure out the upcoming disaster and relevant actions could be taken on the basis of information produced by these clustering protocols. It additionally includes geographic graphs in which areas are digitally entered by address, interpret with calculation that delivers a likelihood surface indicating the possibility where crime incidents are high [12]. 6. Comparison & Result It is a fact that all nations bear the effect of disaster directly or indirectly. Consequently, different techniques used in different ways are to be compared. In order to achieve this objective, different methods and parameters are used in this paper. The table 1 compares all techniques, limitations, event phase and type of disaster of different methods. 7. Proposed Methodology In this paper, we have figureout that the systematic simulation and forecast of all types of disaster are conceivable. The principle challenge is that we have to propose such a mechanism that will sort out and examine the context information of mobile application users and utilizing that information in a manner to customize context aware and targeted instruction to mobile user. In our review paper, we recommend “CDFMC” for disaster management. This model has an advantage of Fog computing platform. Basic crowdsourced IOT disaster relevant information is examined progressively through this platform. This model also asserts data offloading mechanism, when a direct link to Fog computing is not available. By employing block chain technology, offload mechanism send disaster related IOT data to the CDFMC/fog layer [24]-[27]. We can also figure out disasters in actual time and manage plans for rescue operations with the help of this model. In addition, information relevant to disaster interpret on Fog and remaining information inspect on cloud. Hence this model can converse the bandwidth. In comparison to cloud computing model which are much more likely to be targeted by attackers to employ IoT data, this model would be beneficial to run the IoT data securely within Fog where the user can introduce their own incompetent Security Algorithms. 8. Conclusion Disasters are of increasing frequency and extremity in the current world. For the past years wireless technology has seen a massive progress in communications. To provide the command, control, and communications abilities needed in emergency situations, public safety and emergency management organizations increasingly rely on wireless technology [38]. In this paper, disaster and disaster management are defined by using IoT. Based on the results, we can say that natural disasters can be supervised if they are correctly managed, and acceptable infrastructures can control the disaster before it becomes ruin and Syeda Ambreen Zahra (et al.), Internet of Things (IoTs) for Disaster Management (pp. 77 - 85) Sukkur IBA Journal of Computing and Mathematical Sciences - SJCMS | Volume 2 No. 1 January – June 2018 © Sukkur IBA University 82 preparedness before disasters can remarkably reduce loses. Finally, criteria for disaster management is given that could be helpful for further disaster management planning and disaster studies [39]. TBALE 1. Comparison and Results. TECHNIQUE LIMITATIONS EVENT PHASE TYPES OF DISASTER DBARAS (Disaster Behavior Analysis and Probabilistic Reasoning System ) Difficulty in analyzing moving patterns Ultimate disaster relief & management Earth quakes, Tsunami Context Aware System Disaster Response System Security Issues when storing and investigating mobile user data Disaster response phase All type of Disaster Policy based Migration of Mobile Agents Collaboration issue among mobile agents Disaster response phase Earthquakes Urban Disaster Management Information System Complex research required Disaster response phase Fire, Cyclone & Flood etc. Arc GIS Simulation Tool Complex research required Future prediction and management phase Flood Crowdsourcing Disaster Management Fog Computing Latency & Security Disaster response phase Alternative Emergency SMS Network Reliability Security Disaster response phase Natural Disaster D2D based Mobile Cloud Architecture Coverage Restrictions Disaster response phase All type of Disaster Homogenous & Heterogeneous Tsunami, storm, volcano & Erath quake ACKNOWLEDGMENT We authors acknowledge with thanks the assistance rendered by Mr. Aziz Bhatti Sheikh, University of Lahore, Gujrat Campus for providing crucial insight during the course of the research work which greatly improved the manuscript. Syeda Ambreen Zahra (et al.), Internet of Things (IoTs) for Disaster Management (pp. 77 - 85) Sukkur IBA Journal of Computing and Mathematical Sciences - SJCMS | Volume 2 No. 1 January – June 2018 © Sukkur IBA University 83 REFERENCES [1] N. Ahmad and M. Hussain, “Flood Prediction and Disaster Risk Analysis using GIS based Wireless Sensor Networks,” International Journal of Basic and Applied Scientific Research, pp. 2090-4304, 2013. [2] S. Ray and J. Gutierrez, “A Study of IoT- based Post-Disaster Management,” ICOIN, vol. 7, no. 19, pp. 406-409, 2017. [3] V. Hristidis and Y. Deng, “Survey of data management and analysis in disaster situations,” The Journal of Systems and Software, vol. 7, no. 19, pp. 1701-1707, 2010. [4] O. Said and M. Masud, “Towards Internet of Things: Survey and Future Vision,” International Journal of Computer Networks (IJCN), vol. 5, no. 1, pp. 3-9, 2013. [5] C.Aggarwal and N. Ashish, “The Internet of Things: A Survey from the Data- Centric Perspective,” vol. 1, pp. 2-10, 2013. [6] S. Salman and F. Solehria, “A Proposed Least Cost Framework of Irrigation Control System Based on Sensor Network for Efficient Water Management in Pakistan,” International Journal of Basic & Applied Sciences IJBAS-IJENS, vol. 11, no. 2, 2011. [7] Er. Yadav and Er. Ankur “The Internet of Things: Impact and Applications in the High-Tech Industry,” vol. 1, pp. 3-9, 2015-2016. [8] [Online]. Available: http://us.corwin.com/sites/default/files/u pm- binaries/6244_Chapter_4_Boba_Final_P DF_3.pdf. [Accessed: 23- Nov- 2016]. [9] A. Balte and A. Kashid, “Security Issues in Internet of Things (IoT): A Survey,” International Journal of Advanced Research in Computer Science and Software Engineering, vol.5, pp. 5-9, 2015. [10] S. Fang et al., “An Integrated System for Regional Environmental Monitoring Management Based on Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1596- 1605, 2014. [11] M. Ancona et al., “An Internet of Things Vision of the Flood Monitoring Problem,” The Fifth International Conference on Ambient Computing, Applications, Services and Technologies, 2015, vol. 3, pp. 26 – 29. [12] M. D. Kamruzzaman et al., “A study of IoT- Based Post - Disaster Management,” Research Gate, pp. 406 – 410, 2017. [13] M. A. Khoshkholghi et al., “Disaster Recovery in Cloud Computing: A Survey,” Computer and Information Science, vol. 7, no. 4, pp. 39 – 54, 2014. [14] I. Priyadarshinee et al., “Flood Prediction and Prevention through Wireless Sensor Network (WSN): A Survey,” International Journal of Computing Applications, vol. 113, no. 9, pp. 30 – 36, 2015. [15] L. Atzori et al., “The Internet of Things: A Survey,” Computer Networks, no. 54, pp. 2787 – 2805, 2010. [16] N. Altay et al., “OR/MS Research in Disaster Operation Management,” European Journal of Operational Research, no. 175, pp. 475 – 493, 2006. [17] E R. Pooja and ER. Ankur, “A Survey of Growth and Opportunity of Internet of Things (IoT) in Global Scenario,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 12, pp. 20664 – 20671, 2016. [18] D. S. Rao et al., “A Survey of Emergency Communication Network Architectures,” International Journal of u – and e – Service, Science and Technology, vol. 8, no. 4, pp. 61– 68, 2015. [19] M. Yazdanipour, “Survey on Disaster Management in Developing Countries and Developed Countries,” UACEE International Journal of Computer Science and its Applications, vol. 2, no. 3, pp. 51 – 55, 2013. Syeda Ambreen Zahra (et al.), Internet of Things (IoTs) for Disaster Management (pp. 77 - 85) Sukkur IBA Journal of Computing and Mathematical Sciences - SJCMS | Volume 2 No. 1 January – June 2018 © Sukkur IBA University 84 [20] A. Saoji and P. Lambhate, “Survey Paper on Event Detection Techniques in Wireless Sensor Network for Disaster Recovery,” International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 12, pp. 120 – 124, 2013. [21] V. R. Jeva and J. Puthiyidam, “A Survey on Disaster Management System,” International Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 11, pp. 355 – 360, 2014. [22] A. Rauniyar et al., “Crowdsourced – Based Disaster Management using Fog Computing in Internet of Things Paradigm,” IEEE 2nd International Conference on Collaboration and Internet Computing, 2016, pp. 490 – 494. [23] A. Devasena and B. Sowmya, “Wireless Sensor Network in Disaster Management,” Indian Journal of Science and Technology, vol. 8, no. 14, pp. 1 – 6, 2015. [24] C. Perera et al., “Sensing as a Service Model for Smart Cities Supported by Internet of Things,” Transactions on Emerging Telecommunications Technologies, vol. 25, no. 1, pp. 81–93, 2014. [25] F. Jalali et al., “Fog Computing May Help to Save Energy in Cloud Computing,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 5, pp. 1728- 1739, 2016. [26] Z. Xu et al., “Crowdsourcing Based Description of Urban Emergency Events using Social Media Big Data,” 2016. [27] M. Aazam and E.-N. Huh, “Fog Computing: The Cloud-IoT/IoE Middleware Paradigm,” IEEE Potentials, vol. 35, no. 3, pp. 40–44, 2016. [28] T.E. Drabek, “Theories Relevant to Emergency Management versus a Theory of Emergency Management,” Journal of Emergency Management, vol. 3, no. 4, pp. 49-4, 2005. [29] N. Ahmad et al., “Flood Prediction and Disaster Risk Analysis using GIS based Wireless Sensor Networks: A Review,” Journal of Basic and Applied Scientific Research, ISSN 2090-4304, 2013. [30] S.T.Hassan et al., “Mobile Cloud based Architecture for Device – to – Device (D2D) Communication Underlying Cellular Network,” Research Gates, 2015. [31] V. Anthone and S. Oishi , “A wireless mesh sensor network framework for river flood detection which can be used as an emergency communications network in case of disaster,” 11th International Conference on Hydro informatics HIC, 2014. [32] N. Jing and Y. Li, “A Context-aware Disaster Response System Using Mobile Software Technologies and Collaborative Filtering Approach,” IEEE 18th International Conference on Computer Supported Cooperative Work in Design. [33] A. Soyler, “A Model-Based Systems Engineering Approach to Capturing Disaster Management Systems,”. [34] S. Sadik et al., “Policy Based Migration of Mobile Agents in Disaster Management Systems,” 2nd International Conference on Emerging Technologies, 2006, Peshawar, Pakistan, pp. 13-14. [35] Li. zbigangt et al., “Research of GIS- based Urban Disaster Emergency Management Information System,” International Conference on Computer and Communication Technologies in Agriculture Engineering, 2010. [36] D. Srinivasa rao et al, “A Survey of Emergency Communication Network Architectures,” International Journal of u- and e- Service, Science and Technology, vol.8, no.4 , pp. 61-68, 2015. [37] E. J. Catlos et al, “Nepal at risk: Interdisciplinary lessons learned from the april 2015 nepal (gorkha) earthquake and futureconcerns,” GSA Today, vol. 26, no. 6, 2016. [38] L. B. Brengarth and E. Mujkic, “Web 2.0: How social media applications leverage Syeda Ambreen Zahra (et al.), Internet of Things (IoTs) for Disaster Management (pp. 77 - 85) Sukkur IBA Journal of Computing and Mathematical Sciences - SJCMS | Volume 2 No. 1 January – June 2018 © Sukkur IBA University 85 nonprofit responses during a wildfire crisis,” Computers in Human Behavior, vol. 54, pp. 589–596, 2016. [39] A. R. Lee, A. Rauniyar, and S. Y. Shin, “Implementation of escarpment alarm system using terrestrial reference system,” International Journalof Future Computer and Communication, vol. 4, no. 1, p. 72, 2015.