Skip to main content

Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications

  • Conference paper
Ad Hoc Networks (ADHOCNETS 2011)

Abstract

In video surveillance with resource-constrained devices such as wireless video sensor nodes, power conservation, intrusion detection, and security are important features to guarantee. In this paper, we intend to preserve the network lifetime while fulfilling the surveillance application needs. We take into account security by considering that a malicious attacker can try to predict the behavior of the network prior to intrusion. These considerations lead to the definition of a novel chaos-based scheduling scheme for video surveillance. We explain why the chaos-based approach can defeat malicious intruders. Then, by simulations, we also compare our chaos-based scheduling to a classical random scheduling. Results show that in addition of being able to increase the whole network lifetime and to present comparable results against random attacks (low stealth time), our scheme is also able to withstand malicious attacks due to its fully unpredictable behavior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ai, J., Abouzeid, A.A.: Coverage by directional sensors in randomly deployed wireless sensor networks. Journal of Combinatorial Optimization 11(1), 21–41 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. IEEE Communications Magazine 40(8), 102–114 (2002)

    Article  Google Scholar 

  3. Bahi, J.M., Guyeux, C.: Hash functions using chaotic iterations. Journal of Algorithms & Computational Technology 4(2), 167–181 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  4. Bahi, J.M., Guyeux, C.: Topological chaos and chaotic iterations, application to hash functions. In: IJCNN 2010, Int. Joint Conf. on Neural Networks, Joint to WCCI 2010, IEEE World Congress on Computational Intelligence, Barcelona, Spain, pp. 1–7 (July 2010)

    Google Scholar 

  5. Guyeux, C., Wang, Q., Bahi, J.M.: A Pseudo Random Numbers Generator Based on Chaotic Iterations: Application to Watermarking. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) WISM 2010. LNCS, vol. 6318, pp. 202–211. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Banks, J., Brooks, J., Cairns, G., Stacey, P.: On devaney’s definition of chaos. Amer. Math. Monthly 99, 332–334 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  7. Cai, Y., Lou, W., Li, M., Li, X.-Y.: Target-oriented scheduling in directional sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 1550–1558 (2007)

    Google Scholar 

  8. Cheng, M.X., Ruan, L., Wu, W.: Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. In: IEEE INFOCOM (2005)

    Google Scholar 

  9. Devaney, R.L.: An Introduction to Chaotic Dynamical Systems, 2nd edn. Westview Pr. (2003)

    Google Scholar 

  10. He, T., Krishnamurthy, S., Stankovic, J.A., Abdelzaher, T., Luo, L., Stoleru, R., Yan, T., Gu, L., Hui, J., Krogh, B.: Energy-efficient surveillance system using wireless sensor networks. In: MobiSys, pp. 270–283 (2003)

    Google Scholar 

  11. Liu, H., Wan, P., Jia, X.: Maximal lifetime scheduling for sensor surveillance systems with k sensors to one target. IEEE Transactions on Parallel and Distributed Systems 17(12), 1526–1536 (2006)

    Article  Google Scholar 

  12. Ma, H., Liu, Y.: Some problems of directional sensor networks. International Journal of Sensor Networks 2(1-2), 44–52 (2007)

    Article  Google Scholar 

  13. Oh, S., Chen, P., Manzo, M., Sastry, S.: Instrumenting wireless sensor networks for real-time surveillance. In: Proc. of the International Conference on Robotics and Automation (2006)

    Google Scholar 

  14. Pham, C., Makhoul, A.: Performance study of multiple cover-set strategies for mission-critical video surveillance with wireless video sensors. In: 6th IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communications, Wimob 2010, pp. 208–216 (2010)

    Google Scholar 

  15. Pham, C., Makhoul, A., Saadi, R.: Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications. Journal of Network and Computer Applications 34(2), 783–795 (2011)

    Article  Google Scholar 

  16. Robert, F.: Discrete Iterations: A Metric Study. Springer Series in Computational Mathematics, vol. 6 (1986)

    Google Scholar 

  17. Tao, D., Ma, H., Liu, L.: Coverage-Enhancing Algorithm for Directional Sensor Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 256–267. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Wang, J., Niu, C., Shen, R.-M.: Randomized Approach for Target Coverage Scheduling in Directional Sensor Network. In: Lee, Y.-H., Kim, H.-N., Kim, J., Park, Y.W., Yang, L.T., Kim, S.W. (eds.) ICESS 2007. LNCS, vol. 4523, pp. 379–390. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  19. Zhu, Y., Ni, L.M.: Probabilistic approach to provisioning guaranteed qos for distributed event detection. In: IEEE INFOCOM (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Bahi, J.M., Guyeux, C., Makhoul, A., Pham, C. (2012). Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications. In: Simplot-Ryl, D., Dias de Amorim, M., Giordano, S., Helmy, A. (eds) Ad Hoc Networks. ADHOCNETS 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29096-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29096-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29095-4

  • Online ISBN: 978-3-642-29096-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics