IBSC System for Victims Management in Emergency Scenarios

This work describes an optimized system designed to help the greatest number of injured people in emergency situations, using the shortest possible time and cost. It is composed of a mobile application (assigned to medical staff and helpers), a web service and Near Field Communication wristbands assigned to victims. The mobile application is devoted to providing medical staff with the geolocation of victims as well as with an assistant indicating the best route to follow in order to take care of them based on the severity of their conditions and based on a triage method. Resolution of the routes is solved based on a classical problem, a Travelling Salesman Problem, using a k-parition algorithm to divide the huge number of victims in different clusters. Thus, each doctor has a specific area to assist victims. Besides, doctors can use a functionality of the application to contact their peers through a video call when additional help is needed. The proposal combines an keyed-Hash Message Authentication Code scheme to protect Near Field Communication tags and an IDentity-Based Cryptosystem to the wireless communication. Specifically an IDentity-Based Signcryption is used for communication confidentiality, authenticity and integrity, both among peers, and between server

[1]  Yu-Wei Su,et al.  A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi , 2007, IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.

[2]  Lirong Zheng,et al.  Radio frequency identification enabled wireless sensing for intelligent food logistics , 2014, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[3]  Leena Jain,et al.  Traveling Salesman Problem: A Case Study , 2012, BIOINFORMATICS 2012.

[4]  Mojtaba Alizadeh,et al.  Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..

[5]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[6]  Robert W. Knox Marcq Saint-Hilaire Without Tears , 2015 .

[7]  Michael R. Cohen,et al.  Practical guide to bar coding for patient medication safety. , 2003, American journal of health-system pharmacy : AJHP : official journal of the American Society of Health-System Pharmacists.

[8]  Majid Sarrafzadeh,et al.  The Advanced Health and Disaster Aid Network: A Light-Weight Wireless Medical System for Triage , 2007, IEEE Transactions on Biomedical Circuits and Systems.

[9]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution , 2009 .

[10]  P. Caballero Gil,et al.  Alternative communication system for emergency situations , 2014 .

[11]  Sébastien Le Digabel,et al.  Computational study of valid inequalities for the maximum k-cut problem , 2016, Ann. Oper. Res..

[12]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[13]  Roy Want,et al.  Near field communication , 2011, IEEE Pervasive Computing.

[14]  P. Hespanha,et al.  An Efficient MATLAB Algorithm for Graph Partitioning , 2006 .

[15]  D. N. Mudaliar,et al.  Unraveling Travelling Salesman Problem by genetic algorithm using m-crossover operator , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.

[16]  Delaunay Triangulations,et al.  Delaunay Triangulations , 2009 .

[17]  Nigel P. Smart Hash Functions, Message Authentication Codes and Key Derivation Functions , 2016 .

[18]  Maxim Sviridenko,et al.  An Approximation Algorithm for Hypergraph Max k-Cut with Given Sizes of Parts , 1999 .

[19]  Alexandra Rivero-García,et al.  FastTriaje: A Mobile System for Victim Classification in Emergency Situations , 2014, WEBIST.