Low-Cost Monitoring and Intruders Detection Using Wireless Video Sensor Networks

There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a s...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of distributed sensor networks Vol. 2012; no. 2012; pp. 1 - 11
Main Authors Bahi, Jacques M., Guyeux, Christophe, Makhoul, Abdallah, Pham, Congduc
Format Journal Article
LanguageEnglish
Published Cairo, Egypt Hindawi Puplishing Corporation 01.01.2012
SAGE Publications
Sage Publications Ltd
Hindawi Publishing Corporation
Wiley
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks of weak computation and battery power. In this paper, our aim is to prolong the whole network lifetime while fulfilling the surveillance application needs. We present a novel scheduling algorithm where only a subset of video nodes contributes significantly to detect intruders and prevent malicious attacker to predict the behavior of the network prior to intrusion. Our approach is chaos based, where every node based on its last detection, a hash value and some pseudorandom numbers easily compute a decision function to go to sleep or active mode. We validate the efficiency of our approach through theoretical analysis and demonstrate the benefits of our scheduling algorithm by simulations. Results show that in addition to being able to increase the whole network lifetime and to present comparable results against random attacks (low stealth time), our scheme is also able to withstand malicious attacks due to its fully unpredictable behavior.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1550-1329
1550-1477
1550-1477
DOI:10.1155/2012/929542