Skip to main content
Log in

Wireless image sensor networks: event acquisition in attack-prone and uncertain environments

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

Wireless Image Sensor Networks (WISNs) consisting of untethered camera nodes and sensors may be deployed in a variety of unattended and possibly hostile environments to obtain surveillance data. In such settings, the WISN nodes must perform reliable event acquisition to limit the energy, computation and delay drains associated with forwarding large volumes of image data wirelessly to a sink node. In this work we investigate the event acquisition properties of WISNs that employ various techniques at the camera nodes to distinguish between event and non-event frames in uncertain environments that may include attacks. These techniques include lightweight image processing, decisions from n sensors with/without cluster head fault and attack detection, and a combination approach relying on both lightweight image processing and sensor decisions. We analyze the relative merits and limitations of each approach in terms of the resulting probability of event detection and false alarm in the face of occasional errors, attacks and stealthy attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Aach T., Kaup A. (1993) Statistical model-based change detection in moving video. Signal Processing 31: 165–180

    Article  MATH  Google Scholar 

  • Aach T., Kaup A. (1995) Bayesian algorithms for adaptive change detection in image sequences using markov random fields. Signal Processing: Image Communication 1(2): 147–160

    Article  Google Scholar 

  • Akyildiz I., Kasimoglu I. (2004) Wireless sensor and actor networks: Research challenges. Ad Hoc Networks Journal 2(4): 3351–3677

    Article  Google Scholar 

  • Akyildiz I., Melodia T., Chowdhury K. (2007) A survey on wireless multimedia sensor networks. Computer Networks 51(4): 921–960

    Article  Google Scholar 

  • Bandyopadhyay, S., & Coyle, E. (2003). An energy efficient hierarchical clustering algorithm for wireless sensor networks. In INFOCOM 2003, pp. 1713–1723.

  • Basharat, A., Catbas, N., & Shah, M. (2005). A framework for intelligent sensor network with video camera for structural health monitoring of bridges. In Proceedings Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops, pp. 385–389.

  • Buttyan L., Hubaux J. P. (2002) Report on a working session on security in wireless ad hoc networks. Mobile Computing and Communications Review 6(4): 1–17

    Google Scholar 

  • Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE Security and Privacy, pp. 197–213.

  • Chow, K. Y., Lui, K. S., & Lam, E. (2006). Balancing image quality and energy consumption in visual sensor networks. In IEEE International Symposium on Wireless Pervasive Computing (p. 5). Phuket, Thailand.

  • Chow, K. Y., Lui, K. S., & Lam, E. (2007). Efficient on-demand image transmission in visual sensor networks. Eurasip Journal on Advances in Signal Processing, V, 11 pp.

  • Czarlinska, A., & Kundur, D. (2008). Reliable scalar-visual event-detection in wireless visual sensor networks. In IEEE CCNC ’08: Consumer Communications & Networking Conference (pp. 660–664). Las Vegas, NV.

  • Czarlinska, A., Luh, W., & Kundur, D. (2007). Attacks on sensing in hostile wireless sensor-actuator environments. In IEEE Globecom ’07: Global Telecommunications Conference (pp. 1001–1005). Washington, DC.

  • Eltoweissy M., Moharrum M., Mukkamala R. (2006) Dynamic key management in sensor networks. IEEE Communications Magazine 44(4): 122–130

    Article  Google Scholar 

  • Eltoweissy M., Wadaa A., Olariu S., Wilson L. (2005) Scalable cryptographic key management in wireless sensor networks. Journal of Ad Hoc Networks: Special Issue on Data Communications and Topology Control in Ad Hoc Networks 7: 796–802

    Google Scholar 

  • Feng, W. C., Walpole, J., Feng, W. C., & Pu, C. (2001). Moving towards massively scalable video-based sensor networks. In Workshop on New Visions for Large-Scale Networks: Research and Applications (p. 385). Washington, DC.

  • He T., Krishnamurthy S., Luo L., Yan T., Gu L., Stoleru R., Zhou G., Cao Q., Vicaire P., Stankovic J.A., Abdelzaher T.F. (2006) Vigilnet: An integrated sensor network system for energy-efficient surveillance. ACM Transactions on Sensor Networks 2(1): 1–38

    Article  Google Scholar 

  • He Z., Wu D. (2006) Resource allocation and performance analysis of wireless video sensors. IEEE Transactions on Circuits and Systems for Video Technology 16(5): 590–599

    Article  Google Scholar 

  • Ma, H., & Liu, Y. (2005). Correlation based video processing in video sensor networks. In IEEE International Conference on Wireless Networks, Communications and Mobile Computing (p. 987). Maui, Hawaii.

  • Maniezzo, D., Yao, K., & Mazzini, G. (2002). Energetic trade-off between computing and communication resource in multimedia surveillance sensor network. In 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN) (p. 373). Stockholm, Sweden.

  • Olariu S., Eltoweissy M., Younis M. (2007) ANSWER: Autonomous networked sensor system. Journal of Parallel and Distributed Computing 67(1): 111–124

    Article  MATH  Google Scholar 

  • Ott, R., & Longnecker, M. (2001). An introduction to statistical methods & data analysis. Duxbury Press.

  • Radke R., Al-Kofahi S.A.O., Roysam B. (2005) Image change detection algorithms: A systematic survey. IEEE Transactions on Image Processing 14(3): 294–307

    Article  MathSciNet  Google Scholar 

  • Rahimi, M., Baer, R., Iroezi, O. I., Garcia, J. C., Warrior, J., Estrin, D., & Srivastava, M. (2005). Cyclops: In situ image sensing and interpretation in wireless sensor networks. In ACM SenSys ’05, pp. 192–204.

  • Raymond D., Midkiff S. (2008) Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing 7(1): 74–81

    Article  Google Scholar 

  • Rodriguez, V. (2003). Resource management for scalably encoded information: The case of image transmission over wireless networks. In IEEE Proceedings 2003 International Conference on Multimedia and Expo (ICME 2003) (pp. I-813–816). Baltimore, MD.

  • Rosin P.L. (2002) Thresholding for change detection. Computer Vision and Image Understanding 86(2): 79–95

    Article  MATH  Google Scholar 

  • Soro S., Heinzelman W. (2005) On the coverage problem in video-based wireless sensor networks. IEEE Broadband Networks 2: 932–939

    Google Scholar 

  • Van Trees, H. L. (2001). Detection, estimation, and modulation theory part I. John Wiley & Sons, Inc.

  • Veeraraghavan, K., Peng, D., & Sharif, H. (2005). Energy efficient multi-resolution visual surveillance on wireless sensor networks. In IEEE International Conference on Electro Information Technology (6 pp.). Lincoln, NE.

  • Wu, M., & Chen, C. (2007). Collaborative image coding and transmission over wireless sensor networks. EURASIP Journal on Advances in Signal Processing, 2007, 1–9.

  • Yu C., Soro S., Sharma G., Heinzelman W. (2007) Lifetime-distortion trade-off in image sensor networks. IEEE ICIP V: 129–132

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandra Czarlinska.

Additional information

This work is supported in part by NSF grants ECCS-0735114 and EEC-0649142.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Czarlinska, A., Kundur, D. Wireless image sensor networks: event acquisition in attack-prone and uncertain environments. Multidim Syst Sign Process 20, 135–164 (2009). https://doi.org/10.1007/s11045-008-0071-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-008-0071-2

Keywords

Navigation