An evolutionary computation approach for optimizing connectivity in disaster response scenarios

D. G. Reina, S. L. Toral Marin, N. Bessis*, F. Barrero, E. Asimakopoulou

*Corresponding author for this work

Research output: Contribution to journalArticle (journal)peer-review

30 Citations (Scopus)


This article presents an evolutionary computation approach for increasing connectivity in disaster scenarios. Connectivity is considered to be of critical importance in disaster scenarios due to constrained and mobile conditions. We propose the deployment of a number of auxiliary static nodes whose purpose is to increase the reachability of broadcast emergency packets among the nodes which are participating in the disaster scenario. These nodes represent people and vehicles acting in rescue operations. The main goal is to find the optimum positions for the auxiliary nodes, reinforcing the communications in points where certain lack of connectivity is found. These points will depend on the movements of the rescue teams, which are influenced by tactical reasons. Due to the complexity of the problem and the number of parameters to be considered, a genetic algorithm combined with the network simulator NS-2 is proposed to find the optimum positions of the auxiliary nodes. Specifically, NS-2 is used to model the communication layers and provide the fitness function guiding the genetic search. The proposed approach has been tested using the disaster mobility model included in the motion generator BonnMotion. The simulation results obtained demonstrate the feasibility of the proposed approach and illustrate its applicability in other scenarios where lack of connectivity is evident.

Original languageEnglish
Pages (from-to)833-845
Number of pages13
JournalApplied Soft Computing Journal
Issue number2
Publication statusPublished - 28 Feb 2013


  • Connectivity
  • Disaster scenarios
  • Genetic algorithm
  • Mobile ad hoc networks (MANETs)
  • NS-2


Dive into the research topics of 'An evolutionary computation approach for optimizing connectivity in disaster response scenarios'. Together they form a unique fingerprint.

Cite this