{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:47:34Z","timestamp":1773247654921,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,18]]},"DOI":"10.1145\/3770501.3770505","type":"proceedings-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T11:20:16Z","timestamp":1765538416000},"page":"26-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Bridging Technical Capability and User Accessibility: Off-grid Civilian Emergency Communication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2334-6775","authenticated-orcid":false,"given":"Karim","family":"Khamaisi","sequence":"first","affiliation":[{"name":"University of St. Gallen, St. Gallen, St. Gallen, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3549-7191","authenticated-orcid":false,"given":"Oliver","family":"Kamer","sequence":"additional","affiliation":[{"name":"University of Z\u00fcrich, Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3799","authenticated-orcid":false,"given":"Bruno","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"University of St. Gallen, St. Gallen, St. Gallen, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0591-8887","authenticated-orcid":false,"given":"Jan","family":"von der Assen","sequence":"additional","affiliation":[{"name":"University of Z\u00fcrich, Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7461-7463","authenticated-orcid":false,"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[{"name":"University of Z\u00fcrich, Z\u00fcrich, Z\u00fcrich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2025,12,12]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-316"},{"key":"e_1_3_3_1_3_2","unstructured":"Bridgefy Inc.2023. Bridgefy \u2013 Offline Messages App & SDK. https:\/\/bridgefy.me\/"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Angelica\u00a0Moreno Cardenas Miguel\u00a0Kiyoshy Nakamura\u00a0Pinto Ermanno Pietrosemoli Marco Zennaro Marco Rainone and Pietro Manzoni. 2020. A low-cost and low-power messaging system based on the LoRa wireless technology. Mobile networks and applications 25 (2020) 961\u2013968.","DOI":"10.1007\/s11036-019-01235-5"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1515\/9783110628517-002"},{"key":"e_1_3_3_1_6_2","unstructured":"Mark DiFranco. 2023. AirChat: Peer-to-Peer Chat. https:\/\/apps.apple.com\/us\/app\/airchat-peer-to-peer-chat\/id1606916296"},{"key":"e_1_3_3_1_7_2","unstructured":"Disasteradio. 2024. A disaster-resilient communications network powered by the sun. https:\/\/disaster.radio\/"},{"key":"e_1_3_3_1_8_2","unstructured":"Federal\u00a0Office for Civil Protection\u00a0FOCP. 2024. AlertSwiss. https:\/\/www.alert.swiss\/"},{"key":"e_1_3_3_1_9_2","unstructured":"Alex Hern. 2014. Firechat updates as 40 000 Iraqis download \u2019mesh\u2019 chat app in censored Baghdad. The Guardian (June 2014). https:\/\/www.theguardian.com\/technology\/2014\/jun\/24\/firechat-updates-as-40000-iraqis-download-mesh-chat-app-to-get-online-in-censored-baghdad"},{"key":"e_1_3_3_1_10_2","unstructured":"Jeroen Hoebeke Ingrid Moerman Bart Dhoedt and Piet Demeester. 2004. An overview of mobile ad hoc networks: applications and challenges. Journal-Communications Network 3 3 (2004) 60\u201366."},{"key":"e_1_3_3_1_11_2","unstructured":"HypeLabs Inc.2020. HypeLabs. https:\/\/hypelabs.io\/"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582514"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.72"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Michele Luglio Cristiano Monti Cesare Roseti Antonio Saitto and Michael Segal. 2007. Interworking between MANET and satellite systems for emergency applications. International Journal of Satellite Communications and Networking 25 5 (Sept. 2007) 551\u2013558. 10.1002\/sat.890","DOI":"10.1002\/sat.890"},{"key":"e_1_3_3_1_15_2","unstructured":"Mattt. 2013. Multipeer Connectivity. https:\/\/nshipster.com\/multipeer-connectivity\/"},{"key":"e_1_3_3_1_16_2","unstructured":"Locha Mesh. 2024. Locha Mesh - The resilient network. https:\/\/locha.io\/"},{"key":"e_1_3_3_1_17_2","unstructured":"Meshtastic. 2024. Meshtastic device firmware. https:\/\/github.com\/meshtastic\/firmware"},{"key":"e_1_3_3_1_18_2","unstructured":"Meshtastic. 2024. An open source off-grid decentralized mesh network built to run on affordable low-power devices. https:\/\/meshtastic.org\/"},{"key":"e_1_3_3_1_19_2","unstructured":"Meshtastic. 2024. Radio Settings. https:\/\/meshtastic.org\/docs\/overview\/radio-settings\/"},{"key":"e_1_3_3_1_20_2","unstructured":"Meshtastic. 2024. Range Test Module Configuration. https:\/\/meshtastic.org\/docs\/configuration\/module\/range-test\/"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Bart Preneel. 2011. Cryptography Best Practices.","DOI":"10.1007\/978-1-4419-5906-5_603"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Luca Sciullo Angelo Trotta and Marco Di\u00a0Felice. 2020. Design and performance evaluation of a LoRa-based mobile emergency management system (LOCATE). Ad Hoc Networks 96 (2020) 101993.","DOI":"10.1016\/j.adhoc.2019.101993"},{"key":"e_1_3_3_1_23_2","unstructured":"Semtech. 2024. LoRa and LoRaWAN. https:\/\/web.archive.org\/web\/20240328053451\/https:\/\/lora-developers.semtech.com\/documentation\/tech-papers-and-guides\/lora-and-lorawan\/"},{"key":"e_1_3_3_1_24_2","unstructured":"Peter Shadbolt. 2014. FireChat in Hong Kong: How an app tapped its way into the protests. https:\/\/edition.cnn.com\/2014\/10\/16\/tech\/mobile\/tomorrow-transformed-firechat\/index.html"},{"key":"e_1_3_3_1_25_2","unstructured":"Filipo Sharevski Paige Treebridge Peter Jachim Audrey Li Adam Babin and Jessica Westbrook. 2020. Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse. http:\/\/arxiv.org\/abs\/2002.03885 arXiv:https:\/\/arXiv.org\/abs\/2002.03885 [cs]."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Deeksha\u00a0Rai Sharma Rohini\u00a0Ravindrasingh Raghuwanshi Tanvi Chandak and Dipali Ramdasi. 2023. LoRa-based IoT system for emergency assistance and safety in mountaineering. International Journal of Safety & Security Engineering 13 3 (2023).","DOI":"10.18280\/ijsse.130311"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Sok\u00a0Oeun Un Kimtho Po Kosorl Thourn Rathna Pec Channareth Srun and Seven Siren. [n. d.]. Design of Emergency Position Reporting System for Disasters Using Amateur Radio and Automatic Packet Reporting System (APRS) as a Mobile Station Operator for Educational Purposes. Indonesian Journal of Educational Research and Technology 3 3 ([n. d.]) 257\u2013264.","DOI":"10.17509\/ijert.v3i3.58888"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2015.7148424"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2015.7148424"},{"key":"e_1_3_3_1_30_2","unstructured":"CYREN ZH. 2022. CYREN ZH: Cyber Resilience Network For The Canton Of Zurich. https:\/\/dizh.ch\/en\/2022\/07\/07\/cyren-zh-cyber-resilience-network-for-the-canton-of-zurich-2\/"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","unstructured":"Adam\u00a0G. Zimmerman and Gabriel\u00a0J. Ybarra. 2016. Online aggression: The influences of anonymity and social modeling. Psychology of Popular Media Culture 5 2 (April 2016) 181\u2013193. 10.1037\/ppm0000038","DOI":"10.1037\/ppm0000038"}],"event":{"name":"IOT 2025: The 15th International Conference on the Internet of Things","location":"Vienna Austria","acronym":"IOT 2025"},"container-title":["Proceedings of the 15th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3770501.3770505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T11:21:07Z","timestamp":1765538467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3770501.3770505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,18]]},"references-count":30,"alternative-id":["10.1145\/3770501.3770505","10.1145\/3770501"],"URL":"https:\/\/doi.org\/10.1145\/3770501.3770505","relation":{},"subject":[],"published":{"date-parts":[[2025,11,18]]},"assertion":[{"value":"2025-12-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}