Abstract
In video surveillance with resource-constrained devices such as wireless video sensor nodes, power conservation, intrusion detection, and security are important features to guarantee. In this paper, we intend to preserve the network lifetime while fulfilling the surveillance application needs. We take into account security by considering that a malicious attacker can try to predict the behavior of the network prior to intrusion. These considerations lead to the definition of a novel chaos-based scheduling scheme for video surveillance. We explain why the chaos-based approach can defeat malicious intruders. Then, by simulations, we also compare our chaos-based scheduling to a classical random scheduling. Results show that in addition of being able to increase the whole network lifetime and to present comparable results against random attacks (low stealth time), our scheme is also able to withstand malicious attacks due to its fully unpredictable behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ai, J., Abouzeid, A.A.: Coverage by directional sensors in randomly deployed wireless sensor networks. Journal of Combinatorial Optimization 11(1), 21–41 (2006)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. IEEE Communications Magazine 40(8), 102–114 (2002)
Bahi, J.M., Guyeux, C.: Hash functions using chaotic iterations. Journal of Algorithms & Computational Technology 4(2), 167–181 (2010)
Bahi, J.M., Guyeux, C.: Topological chaos and chaotic iterations, application to hash functions. In: IJCNN 2010, Int. Joint Conf. on Neural Networks, Joint to WCCI 2010, IEEE World Congress on Computational Intelligence, Barcelona, Spain, pp. 1–7 (July 2010)
Guyeux, C., Wang, Q., Bahi, J.M.: A Pseudo Random Numbers Generator Based on Chaotic Iterations: Application to Watermarking. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) WISM 2010. LNCS, vol. 6318, pp. 202–211. Springer, Heidelberg (2010)
Banks, J., Brooks, J., Cairns, G., Stacey, P.: On devaney’s definition of chaos. Amer. Math. Monthly 99, 332–334 (1992)
Cai, Y., Lou, W., Li, M., Li, X.-Y.: Target-oriented scheduling in directional sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 1550–1558 (2007)
Cheng, M.X., Ruan, L., Wu, W.: Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. In: IEEE INFOCOM (2005)
Devaney, R.L.: An Introduction to Chaotic Dynamical Systems, 2nd edn. Westview Pr. (2003)
He, T., Krishnamurthy, S., Stankovic, J.A., Abdelzaher, T., Luo, L., Stoleru, R., Yan, T., Gu, L., Hui, J., Krogh, B.: Energy-efficient surveillance system using wireless sensor networks. In: MobiSys, pp. 270–283 (2003)
Liu, H., Wan, P., Jia, X.: Maximal lifetime scheduling for sensor surveillance systems with k sensors to one target. IEEE Transactions on Parallel and Distributed Systems 17(12), 1526–1536 (2006)
Ma, H., Liu, Y.: Some problems of directional sensor networks. International Journal of Sensor Networks 2(1-2), 44–52 (2007)
Oh, S., Chen, P., Manzo, M., Sastry, S.: Instrumenting wireless sensor networks for real-time surveillance. In: Proc. of the International Conference on Robotics and Automation (2006)
Pham, C., Makhoul, A.: Performance study of multiple cover-set strategies for mission-critical video surveillance with wireless video sensors. In: 6th IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communications, Wimob 2010, pp. 208–216 (2010)
Pham, C., Makhoul, A., Saadi, R.: Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications. Journal of Network and Computer Applications 34(2), 783–795 (2011)
Robert, F.: Discrete Iterations: A Metric Study. Springer Series in Computational Mathematics, vol. 6 (1986)
Tao, D., Ma, H., Liu, L.: Coverage-Enhancing Algorithm for Directional Sensor Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 256–267. Springer, Heidelberg (2006)
Wang, J., Niu, C., Shen, R.-M.: Randomized Approach for Target Coverage Scheduling in Directional Sensor Network. In: Lee, Y.-H., Kim, H.-N., Kim, J., Park, Y.W., Yang, L.T., Kim, S.W. (eds.) ICESS 2007. LNCS, vol. 4523, pp. 379–390. Springer, Heidelberg (2007)
Zhu, Y., Ni, L.M.: Probabilistic approach to provisioning guaranteed qos for distributed event detection. In: IEEE INFOCOM (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Bahi, J.M., Guyeux, C., Makhoul, A., Pham, C. (2012). Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications. In: Simplot-Ryl, D., Dias de Amorim, M., Giordano, S., Helmy, A. (eds) Ad Hoc Networks. ADHOCNETS 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29096-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-29096-1_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29095-4
Online ISBN: 978-3-642-29096-1
eBook Packages: Computer ScienceComputer Science (R0)