Ad Hoc Networks. Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers

Research Article

Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications

Download
430 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29096-1_1,
        author={Jacques Bahi and Christophe Guyeux and Abdallah Makhoul and Congduc Pham},
        title={Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications},
        proceedings={Ad Hoc Networks. Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers},
        proceedings_a={ADHOCNETS},
        year={2012},
        month={5},
        keywords={video sensor networks surveillance scheduling mathematical theory of chaos security},
        doi={10.1007/978-3-642-29096-1_1}
    }
    
  • Jacques Bahi
    Christophe Guyeux
    Abdallah Makhoul
    Congduc Pham
    Year: 2012
    Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-642-29096-1_1
Jacques Bahi1,*, Christophe Guyeux1,*, Abdallah Makhoul1,*, Congduc Pham2,*
  • 1: University of Franche-Comté
  • 2: University of Pau
*Contact email: jacques.bahi@univ-fcomte.fr, christophe.guyeux@univ-fcomte.fr, abdallah.makhoul@univ-fcomte.fr, congduc.pham@univ-pau.fr

Abstract

In video surveillance with resource-constrained devices such as wireless video sensor nodes, power conservation, intrusion detection, and security are important features to guarantee. In this paper, we intend to preserve the network lifetime while fulfilling the surveillance application needs. We take into account security by considering that a malicious attacker can try to predict the behavior of the network prior to intrusion. These considerations lead to the definition of a novel chaos-based scheduling scheme for video surveillance. We explain why the chaos-based approach can defeat malicious intruders. Then, by simulations, we also compare our chaos-based scheduling to a classical random scheduling. Results show that in addition of being able to increase the whole network lifetime and to present comparable results against random attacks (low stealth time), our scheme is also able to withstand malicious attacks due to its fully unpredictable behavior.