{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:03:45Z","timestamp":1747224225938,"version":"3.40.5"},"reference-count":21,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10,1]]},"abstract":"<p>During rescue missions first responders rely on voice communication making crisis management nearly impossible without good means of communication. Unfortunately the communication technology used by first responders today does not scale well. Also most of the given infrastructure, such as cell towers, might be destroyed after a disaster. Therefore, ad-hoc and peer-to-peer-based communication schemes have been proposed in recent research to provide scalable and resilient communication. Most mobile phones today are equipped with wireless transceivers that make them suitable to participate in ad-hoc networks. But in this case, device density might be too small for a connected topology. In this paper, the authors propose an emergency switch for privately owned wireless routers. The switch allows wireless routers to transition to an emergency mode creating a supportive wireless mesh network. To analyze if such a network would result in a resilient topology real data from wireless routers in a city is gathered. They calculate the locations of private and public routers from GPS traces and compare the resulting networks with each other. Finally, the authors discuss open and critical questions and implications the proposed emergency switch would introduce.<\/p>","DOI":"10.4018\/jiscrm.2012100104","type":"journal-article","created":{"date-parts":[[2013,2,27]],"date-time":"2013-02-27T17:23:57Z","timestamp":1361985837000},"page":"59-70","source":"Crossref","is-referenced-by-count":3,"title":["Can We Use Your Router, Please?"],"prefix":"10.4018","volume":"4","author":[{"given":"Kamill","family":"Panitzek","sequence":"first","affiliation":[{"name":"Telecooperation Group, TU Darmstadt, Darmstadt, Germany"}]},{"given":"Immanuel","family":"Schweizer","sequence":"additional","affiliation":[{"name":"Telecooperation Group, TU Darmstadt, Darmstadt, Germany"}]},{"given":"Axel","family":"Schulz","sequence":"additional","affiliation":[{"name":"Telecooperation Group, TU Darmstadt, Darmstadt, Germany"}]},{"given":"Tobias","family":"B\u00f6nning","sequence":"additional","affiliation":[{"name":"Department of Computer Science, TU Darmstadt, Darmstadt, Germany"}]},{"given":"Gero","family":"Seipel","sequence":"additional","affiliation":[{"name":"Department of Computer Science, TU Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4713-5327","authenticated-orcid":true,"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[{"name":"Telecooperation Group, TU Darmstadt, Darmstadt, Germany"}]}],"member":"2432","reference":[{"key":"jiscrm.2012100104-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2009.07.009"},{"key":"jiscrm.2012100104-1","unstructured":"Bradler, D., Aitenbichler, E., Schiller, B., & Liebau, N. (2009). Towards a distributed crisis response communication system. In Proceedings of the 6th International ISCRAM Conference."},{"key":"jiscrm.2012100104-2","doi-asserted-by":"crossref","unstructured":"Bradler, D., Kangasharju, J., & M\u00fchlh\u00e4user, M. (2008). Evaluation of peer-to-peer overlays for first response. In Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) (pp. 463-467).","DOI":"10.1109\/PERCOM.2008.14"},{"key":"jiscrm.2012100104-3","doi-asserted-by":"crossref","unstructured":"Bradler, D., Schweizer, I., Panitzek, K., & M\u00fchlh\u00e4user, M. (2008). First response communication sandbox. In Proceedings of the 11th Communications and Networking Simulation Symposium.","DOI":"10.1145\/1400713.1400733"},{"key":"jiscrm.2012100104-4","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(90)90358-O"},{"key":"jiscrm.2012100104-5","doi-asserted-by":"crossref","unstructured":"De Tommaso do Valle, R., & Muchaluat-Saade, D. C. (2012). Meshadmin: An integrated platform for wireless mesh network management. Network Operations and Management Symposium (NOMS) (pp. 293-301).","DOI":"10.1109\/NOMS.2012.6211911"},{"journal-title":"Modeling signal attenuation in IEEE 802.11 wireless LANs-vol. 1","year":"2005","author":"D. B.Faria","key":"jiscrm.2012100104-6"},{"key":"jiscrm.2012100104-7","doi-asserted-by":"crossref","unstructured":"Florencio, D., & Harley, C. (2007). A large-scale study of web password habits. In Proceedings of the 16th Conference on Word Wide Web (pp. 657-666).","DOI":"10.1145\/1242572.1242661"},{"key":"jiscrm.2012100104-8","doi-asserted-by":"publisher","DOI":"10.4018\/jiscrm.2011100103"},{"key":"jiscrm.2012100104-9","unstructured":"Huppertz, G. (2010). Chorus \u2013 car horns used as sirens. Fraunhofer Symposium Future Security (pp. 294-297)."},{"key":"jiscrm.2012100104-10","doi-asserted-by":"publisher","DOI":"10.4018\/jiscrm.2012040104"},{"key":"jiscrm.2012100104-11","unstructured":"Morales, L. (2013) Home internet access still out of reach for many worldwide. Gallup World. Retrieved January 17, 2013, from http:\/\/www.gallup.com\/poll\/159815\/home-internet-access-remains-reach-worldwide.aspx"},{"key":"jiscrm.2012100104-12","unstructured":"Panitzek, K., Bradler, D., Schweizer, I., & M\u00fchlh\u00e4user, M. (2011) City mesh \u2013 Resilient first responder communication. In Proceedings of the 8th International ISCRAM Conference (pp. 1-10)."},{"key":"jiscrm.2012100104-13","doi-asserted-by":"publisher","DOI":"10.1504\/IJMNDI.2012.048489"},{"key":"jiscrm.2012100104-14","doi-asserted-by":"crossref","unstructured":"Raniwala, A., & Chiueh, T. (2005). Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network. In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (pp. 2223-2234).","DOI":"10.1109\/INFCOM.2005.1498497"},{"key":"jiscrm.2012100104-15","volume":"Vol. 2","author":"T. S.Rappaport","year":"1996","journal-title":"Wireless communications: principles and practice"},{"key":"jiscrm.2012100104-16","doi-asserted-by":"crossref","unstructured":"Savvides, A., Han, C.-C., & Strivastava, M. B. (2001). Dynamic fine-grained localization in ad-hoc networks of sensors. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking - MobiCom\u201901 (pp. 166-179).","DOI":"10.1145\/381677.381693"},{"key":"jiscrm.2012100104-17","doi-asserted-by":"crossref","unstructured":"Schiller, B., Bradler, D., Schweizer, I., M\u00fchlh\u00e4user, M., & Strufe, T. (2010) GTNA: A framework for the graph-theoretic network analysis. In Proceedings of the 2010 Spring Simulation Multiconference (SpringSim\u201910).","DOI":"10.1145\/1878537.1878653"},{"key":"jiscrm.2012100104-18","doi-asserted-by":"crossref","unstructured":"Tews, E., & Beck, M. (2009) Practical attacks against WEP and WPA. In Proceedings of the Second ACM Conference on Wireless Network Security (pp. 79-86).","DOI":"10.1145\/1514274.1514286"},{"key":"jiscrm.2012100104-19","doi-asserted-by":"crossref","unstructured":"Tews, E., Weinmann, R.-P., & Physhkin, A. (2007) Breaking 104 bit WEP in less than 60 seconds. In Kim, S., Yung, M. and Lee, H.-W. (Eds.), Information security applications, (LNCS 4867, pp. 188-202).","DOI":"10.1007\/978-3-540-77535-5_14"},{"key":"jiscrm.2012100104-20","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4519963"}],"container-title":["International Journal of Information Systems for Crisis Response and Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=75445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:06:13Z","timestamp":1654106773000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jiscrm.2012100104"}},"subtitle":["Benefits and Implications of an Emergency Switch for Wireless Routers"],"short-title":[],"issued":{"date-parts":[[2012,10,1]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jiscrm.2012100104","relation":{},"ISSN":["1937-9390","1937-9420"],"issn-type":[{"type":"print","value":"1937-9390"},{"type":"electronic","value":"1937-9420"}],"subject":[],"published":{"date-parts":[[2012,10,1]]}}}