Download Now Free registration required
In video surveillance with resource-constrained devices such as wireless video sensor nodes, power conservation, intrusion detection, and security are important features to guarantee. In this paper, the authors intend to preserve the network lifetime while fulfilling the surveillance application needs. They take into account security by considering that a malicious attacker can try to predict the behavior of the network prior to intrusion. These considerations lead to the definition of a novel chaos-based scheduling scheme for video surveillance. They explain why the chaos-based approach can defeat malicious intruders. Then, by simulations, they also compare their chaos-based scheduling to a classical random scheduling.
- Format: PDF
- Size: 434.4 KB