Information Technology Reference
In-Depth Information
personnel expects to stay in the emergency scene to calculate the routing. Then, when
a first responder leaves the meeting point they has to state when they will come back.
So, each device stores the time when the personnel who carries it expects to return to
the AMP. The mobile agent asks for this information for the service's platform of all
the neighbor devices and jumps to the one that has the smaller return time value. In
this way, the mobile agents arrives to the AMP as soon as possible. This is for security
reasons because they will be in a emergency scene where some disaster has occurred
and it is not fully safe. Therefore, they foresee a “time to return” (TTR) that they will
put into their device.
Some special devices, for instance those installed in an emergency vehicle, can store
a special “time to return” value. This is specially useful when an emergency vehicle has
to go to the emergency scene and come back to the AMP or ACP, or the first responder
has finished their job in the emergency scene and is coming back. In these situations
the “time to return” will have a low value. Therefore, all the mobile agents near the
platform with low TTR will jump into it because it is the fastest way to reach Internet.
It would wrongly seem that agents are not useful in the first situation, where mobile
devices can connect directly to Internet using network infrastructure available in the
emergency scene, and in the second situation, where the mobile devices can access to
Internet through the fully connected MANET. However, in emergency situations the
network infrastructures are usually unstable or over-saturated and mobile agents and
the routing protocols implemented can deal with this situation.
When the VEPMR is retrieved, a copy is saved in the AMP and ACP. Then VEPMR
will be already available once the victim reaches the AMP or ACP for the medical
personnel treating them.
Security has also been taken into account in our system. VEPMRs consist of sensible
private medical data. For this reason, this information has to be dealt with carefully
using strong security mechanisms, and the communication between ACP, or AMP, and
the VEPMR system has to be secure. The problem of security in ad-hoc networks is not
fully solved nowadays. Even thought the very agents can protect the data they carry by
using mechanisms such as [1]. Thus, the system could be used in insecure networks.
4.4.2 VEPMR for Emergencies
We also propose the creation of a special VEPMR containing only the relevant infor-
mation for an emergency case. This VEPMR for emergencies (VEPMRE) contains the
blood type, hepatitis, AIDS, allergies, and more basic information to treat the patient
in an emergency case. Thanks to this, the VEPMRE has a smaller size so it uses less
network bandwidth.
An important issue is how a VEPMRE is associated with the victim. An AMP may
receive many VEPMRE from requests launched by the mobile agents, so how do the
medical personnel know what VEPMRE corresponds to which victim? Our proposal
is based on adding the identifier number of the triage tag with each VEPMRE request
inside the mobile agent. In this way, once the VEPMRE is received it is possible to
identify the victim, since the triage tag is always carried by them.
 
Search WWH ::




Custom Search