Review Article

Survey of Connectivity Restoration in 3D Wireless Ad Hoc/Sensor Networks

Table 4

Summarization of the recovery method, contribution, and limitation of some literature in disaster.

LiteratureRecovery methodContributionLimitation

[29]Repair the network using mathematical model and a practical simulated annealing heuristic to determine the order of repairs for each network component.This study introduces a coordinated postdisaster repair routing problem considering infrastructure interdependencies, develops a mathematical model for prioritizing repairs, and presents an efficient simulated annealing metaheuristic to find high-quality solutions for realistic instances.Although the proposed problem assumes that the maintenance teams are the same, in fact, the size and capability of the maintenance teams may be different, and factors such as the size and capability of the maintenance teams are not considered.
[32]The proposed SmartDR method, utilizing smart phone-assisted disaster recovery with D2D communication in 5G networks for postdisaster communication.SmartDR enables smart phones to self-detect disasters, switch to a disaster mode, and relay emergency messages using a multihop D2D approach. The method includes a rendezvous process, a path selection algorithm considering delay and energy, and a multichannel hopping protocol for victim localization and an energy-aware routing protocol to improve energy efficiency during rescue operations.This method does not integrate the disaster detection (predisaster scenario) part with the postdisaster recovery methods, so as to design a complete end-to-end system for disaster detection and recovery.
[33]Restore network communication through building ad hoc network using the smart devices.This article’s main contribution lies in determining optimal ad hoc network construction, efficient network building under mobility challenges, and scheduling data transfer effectively in disaster scenarios using WiFi tethering technology, offering a novel approach to data routing in such contexts.The disadvantage is that mobile devices with more extensive features in terms of available sensors, network functions, and storage availability are not considered, and security issues and the trade-off between security and performance are also not considered.