Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises

Communications play a vital role in the response to disasters and crises. However, existing communications infrastructure is often impaired, destroyed or overwhelmed during such events. This leads to the use of substitute communications solutions including analog two-way radio or unsecured internet access. Often provided by unknown third parties, these solutions may have less sophisticated security characteristics than is desirable. While substitute communications are often invaluable, care is required to minimize the risk to NGOs and individuals stemming from the use of communications channels with reduced or unknown security properties. This is particularly true if private information is involved, including the location and disposition of individuals and first responders. In this work we enumerate the principal risks and challenges that may arise, and provide practical guidelines for mitigating them during crises. We take plausible threats from contemporary disaster and crisis events into account and discuss the security and privacy features of state-of-the-art communications mechanisms.

[1]  Sufian Yousef,et al.  Analysis and Enhancement of Authentication Algorithms in Mobile Networks , 2006 .

[2]  D Keromytis Angelos,et al.  VOICE OVER IP: RISKS, THREATS AND VULNERABILITIES , 2009 .

[3]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[4]  Satoshi Kurihara,et al.  Information sharing on Twitter during the 2011 catastrophic earthquake , 2013, WWW.

[5]  Taejoon Park,et al.  A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.

[6]  Fabio Ricciato,et al.  A review of DoS attack models for 3G cellular networks from a system-design perspective , 2010, Comput. Commun..

[7]  Dmitry Namiot On Mobile Mesh Networks , 2015 .

[8]  Vallipuram Muthukkumarasamy,et al.  Insecurity in Public-Safety Communications: APCO Project 25 , 2011, SecureComm.

[9]  K. Szocik An Axiological Aspect of Terrorism: Remarks on Scott Atran's Perspective , 2016 .

[10]  Dave Yates,et al.  Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake , 2011, Int. J. Inf. Manag..

[11]  Daniel Gutiérrez-Reina,et al.  A Survey on Ad Hoc Networks for Disaster Scenarios , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[12]  A. Kannammal,et al.  Survey on secure routing in mobile ad hoc networks , 2016, 2016 International Conference on Advances in Human Machine Interaction (HMI).

[13]  Angelos D. Keromytis,et al.  A Comprehensive Survey of Voice over IP Security Research , 2012, IEEE Communications Surveys & Tutorials.

[14]  Paul Gardner-Stephen,et al.  The Serval Project: Practical Wireless Ad-Hoc Mobile Telecommunications , 2011 .

[15]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[16]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[17]  Matt Blaze,et al.  Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System , 2011, USENIX Security Symposium.

[18]  Nicolas Sklavos,et al.  LTE/SAE Security Issues on 4G Wireless Networks , 2013, IEEE Security & Privacy.

[19]  Paul Arbon,et al.  Defining disaster: The need for harmonisation of terminology , 2015 .

[20]  Paul Gardner-Stephen,et al.  The rational behind the Serval Network Layer for Resilient Communications , 2013, J. Comput. Sci..

[21]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..

[22]  Paul Gardner-Stephen,et al.  The serval mesh: A platform for resilient communications in disaster & crisis , 2013, 2013 IEEE Global Humanitarian Technology Conference (GHTC).

[23]  R. Shaw,et al.  Utilization of Social Media in the East Japan Earthquake and Tsunami and its Effectiveness , 2012 .

[24]  Prabhakar L. Ramteke,et al.  MANET : History , Challenges And Applications , 2013 .

[25]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[26]  Louise K. Comfort,et al.  Communication, Coherence, and Collective Action , 2006 .

[27]  Paul Gardner-Stephen,et al.  MeshMS: Ad Hoc Data Transfer within Mesh Network , 2012 .

[28]  Tamba I. Isaac An Economic Analysis of Boko Haram’s Activities in the Chad-Cameroon-Nigeria Border Area , 2015 .

[29]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .