Document Type


Publication Date


Publication Title

Romanian Cyber Security Journal






8 (77-87)


The disaster area is a true dynamic environment. Lack of accurate information from the affected area create several challenges in distributing the supplies. The success of a disaster response network is based on collaboration, coordination, sovereignty, and equality in relief distribution. Therefore, a trust-based dynamic communication system is required to facilitate the interactions, enhance the knowledge for the relief operation, prioritize, and coordinate the goods distribution. One of the promising innovative technologies is blockchain technology which enables transparent, secure, and real-time information exchange and automation through smart contracts in a distributed technological ecosystem. This study aims to analyze the application of blockchain technology on disaster management resilience. Blockchain technology, the Internet of Things (IoT), and Dynamic Voltage Frequency Scaling (DVFS) algorithm are integrated in a network-based simulation. The results indicate an advancement in disaster-aids network strategies using smart contracts for collaborations. From the investigations, insights have been derived for researchers in the field and the managers interested in practical implementation.


"ROCYS is an open access journal which means that all content is freely available without charge to the user. Therefore, the users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission from the publisher or the author. This is in accordance with the definition of open access of the Budapest Open Access Initiative (BOAI) which is a public statement of principles related to open access to the research literature, which was released to the public on February 14, 2002."

Original Publication Citation

Pour, F. S. A., & Gheorghe, P. N.-M. (2021). A blockchain-enabled model to enhance disaster aids network resilience. Romanian Cyber Security Journal, 3(2), 77-87, Article 8.