Advertisement

Wireless Multimedia Sensor Networks

  • Ivan Lee
  • William Shaw
  • Xiaoming Fan
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

The emergence of low-cost and mature technologies in wireless communication, visual sensor devices, and digital signal processing facilitate of wireless multimedia sensor networks (WMSN). Like sensor networks which respond to sensory information such as temperature and humidity, WMSN interconnects autonomous devices for capturing and processing video and audio sensory information. This survey highlights the following topics (1) a summary of applications and challenges of WMSN; (2) an overview of advanced coding techniques for WMSN, including video and audio source coding, and distributed coding techniques; (3) a survey of WMSN communication protocols, including routing techniques and physical layer standards; and (4) a summary of Quality-of-Service (QoS) and security aspects of WMSN.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Cluster Head Network Lifetime 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    V. Mhatre, C. Rosenberg, Homogeneous vs heterogeneous clustered networks: A comparative study, Proceedings of IEEE International Conference on Communications, June 2004.Google Scholar
  2. 2.
    K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, Protocols for self-organization of a wireless sensor network, IEEE Wireless Communications, 7(5), 16–27, 2000.Google Scholar
  3. 3.
    I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 40(8), 102–114, 2002.Google Scholar
  4. 4.
    H. Karl and A. Willig, Protocols and Architectures for Wireless Sensor Networks, Chichester: Wiley, 2005.Google Scholar
  5. 5.
    T. Arampatzis, J. Lygeros, and S. Manesis, A survey of applications of wireless sensors and wireless sensor networks, Proceedings of the IEEE International Symposium on Intelligent Control, Mediterrean Conference on Control and Automation, pp. 719–724, 2005.Google Scholar
  6. 6.
    J. Zander, Radio resource management – an overview, IEEE Vehicular Technology Conference, vol. 1, pp. 16–20, May 1996.Google Scholar
  7. 7.
    G. Pekhteryev, Z. Sahinoglu, P. Orlik, and G. Bhatti, Image transmission over IEEE 802.15.4 and ZigBee networks, IEEE International Symposium on Circuits and Systems, vol. 4, pp. 3539–3542, May 2005.Google Scholar
  8. 8.
    W. C. Feng, E. Kaiser, W. C. Feng, and M. Le Baillif, Panoptes: scalable low-power video sensor networking technologies, ACM Transactions on Multimedia Computing, Communications, and Applications, 1, 151–167, 2005.Google Scholar
  9. 9.
    Advanced video coding for generic audiovisual services, ITU-T Recommendation H.264.Google Scholar
  10. 10.
    Y. Zhao, and G. Taubin, Real-time median filtering for embedded smart cameras, IEEE International Conference on Computer Vision Systems, 2006.Google Scholar
  11. 11.
    T. Wiegand, G. J. Sullivan, G. Bjntegaard, and A. Luthra, Overview of the H.264/AVC video coding standard, IEEE Transactions on Circuits and Systems for Video Technology, 13(7), 560–576, 2003.Google Scholar
  12. 12.
    A. S. Spanias, Speech coding: a tutorial review, Proceedings of the IEEE, 82(10), 1541–1582, 1994.Google Scholar
  13. 13.
    A. Gersho, Advances in speech and audio compression, Proceedings of the IEEE, 82(6), 900–918, 1994.Google Scholar
  14. 14.
    M. Budagavi and J. D. Gibson, Speech coding in mobile radio communications, Proceedings of the IEEE, 86(7), pp. 1402–1412, 1998.Google Scholar
  15. 15.
    J. D. Gibson, Speech coding methods, standards, and applications, IEEE Circuits and Systems Magazine, 5(4), 30–49, 2005.Google Scholar
  16. 16.
    B. Girod, A. M. Aaron, S. Rane, and D. Rebollo-Monedero, Distributed video coding, Proceedings of the IEEE, 93(1), 71–83, 2005.Google Scholar
  17. 17.
    R. Puri, A. Majumbar, P. Ishwar, and K. Ramchandran, Distributed source coding for sensor networks, IEEE Signal Processing Magazine, 21(5), 80–94, 2004.Google Scholar
  18. 18.
    Z. Xiong, A. D. Liveris, and S. Cheng, Distributed source coding for sensor networks, IEEE Signal Processing Magazine, 21(5), 80–94, 2004.Google Scholar
  19. 19.
    D. Slepian and J. Wolf, Noiseless coding of correlated information sources, IEEE Transactions on Information Theory, 19(4), 471–480, 1973.Google Scholar
  20. 20.
    A. Wyner and J. Ziv, The rate-distortion function for source coding with side information at the decoder, IEEE Transactions on Information Theory, 22(1), 1–10, 1976.Google Scholar
  21. 21.
    A. Aaron, S. Rane, R. Zhang, and B. Girod, Wyner-Ziv coding for video: Applications to compression and error resilience, Proceedings of the Conference on Data Compression, 2003.Google Scholar
  22. 22.
    J. Garcia-Frias and Z. Xiong, Distributed source and joint source-channel coding: from theory to practice, Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 1093–1096, March 2005.Google Scholar
  23. 23.
    H. Dong, J. Lu, and Y. Sun, Distributed audio coding in wireless sensor networks, International Conference on Computational Intelligence and Security, vol. 2, pp. 1695–1699, Nov 2006.Google Scholar
  24. 24.
    A. Mohan and V. Kalogeraki, Speculative routing and update propagation: a kundali centric approach, IEEE International Conference on Communication, vol. 1, pp. 343–347, May 2003.Google Scholar
  25. 25.
    N. Pham, J. Youn, and W. Chulho, A comparison of wireless sensor network routing protocols on an experimental testbed, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 2, pp. 276–281, 2006.Google Scholar
  26. 26.
    J. N. Al-Karaki and A. E. Kamal, Routing techniques in wireless sensor networks: a survey, IEEE Wireless Communications, 11, 6–28, 2004.Google Scholar
  27. 27.
    R. Singh, M. Gandetto, M. Guainazzo, D. Angiati, and C. S. Ragazzoni, A novel positioning system for static location estimation employing WLAN in indoor environment, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 3, pp. 1762–1766, Sept 2004.Google Scholar
  28. 28.
    K. Kaemarungsi and P. Krishnamurthy, Properties of indoor received signal strength for WLAN location fingerprinting, International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 14–23, Aug 2004.Google Scholar
  29. 29.
    W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, Proceedings of the Hawaii International Conference on System Sciences, vol. 2, p. 10, Jan 2000.Google Scholar
  30. 30.
    J. Kulik, W. Heinzelman, and H. Balakrishnan, Negotiation-based protocols for disseminating information in wireless sensor networks, Wireless Networks, 8, 169–185, 2002.Google Scholar
  31. 31.
    W. R. Heinzelman, J. Kulik, and H. Balakrishnan, Adaptive protocols for information dissemination in wireless sensor networks, Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, pp. 174–185, 1999.Google Scholar
  32. 32.
    Q. Jiang and D. Manivannan, Routing protocols for sensor networks, IEEE Consumer Communications and Networking Conference, pp. 93–98, Jan 2004.Google Scholar
  33. 33.
    T. He, J. A. Stankovic, T. F. Abdelzaher, and C. Lu, A spatiotemporal communication protocol for wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 16(10), 995–1006, 2005.Google Scholar
  34. 34.
    T. He, J. A. Stankovic, C. Lu, and T. Abdelzaher, SPEED: a stateless protocol for real-time communication in sensor networks, Proceedings of International Conference on Distributed Computing Systems, pp. 46–55, May 2003.Google Scholar
  35. 35.
    E. Felemban, C. G. Lee, and E. Ekici, MMSPEED: multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks, IEEE Transactions on Mobile Computing, 5(6), 738–754, 2006.Google Scholar
  36. 36.
    S. Soro and W. B. Heinzelman, On the coverage problem in video-based wireless sensor networks, Second International Conference on Broadband Networks, vol. 2, pp. 932–939, Oct 2005.Google Scholar
  37. 37.
    J. A. Stankovic, T. F. Abdelzaher, C. Lu, L. Sha, and J. C. Hou, Real-time communication and coordination in embedded sensor networks, Proceedings of the IEEE, vol. 91, pp. 1002–1022, 2003.Google Scholar
  38. 38.
    I. Demirkol, C. Ersoy, and F. Alagoz, MAC protocols for wireless sensor networks: a survey, IEEE Communications Magazine, 44(4), 115–121, 2006.Google Scholar
  39. 39.
    M. Caccamo, L. Y. Zhang, L. Sha, and G. Buttazzo, An implicit prioritized access protocol for wireless sensor networks, IEEE Real-Time Systems Symposium, pp. 39–48, 2002.Google Scholar
  40. 40.
    R. Nusser and R. M. Pelz, Bluetooth-based wireless connectivity in an automotive environment, IEEE Vehicular Technology Conference, vol. 4, pp.1935–1942, 2000.Google Scholar
  41. 41.
    R. Benkoczi, H. Hassanein, S. Akl, and S. Tai, QoS for data relaying in hierarchical wireless sensor networks, Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, pp. 47–54, 2005.Google Scholar
  42. 42.
    E. H. Callaway, Jr., Wireless Sensor Networks, Architecture and Protocols, 2004. Boca Raton, FL: Auerbach.Google Scholar
  43. 43.
    L. Zheng, ZigBee Wireless Sensor Network in Industrial Applications, SICE-ICASE, pp. 1067–1070, Oct 2006.Google Scholar
  44. 44.
    G. Pekhteryev, Z. Sahinoglu, P. Orlik, and G. Bhatti, Image transmission over IEEE 802.15.4 and ZigBee networks, IEEE International Symposium on Circuits and Systems, vol. 4, pp. 3539–3542, May 2005.Google Scholar
  45. 45.
    I. Kim, J. Shim, J. Schlessman, and W. Wolf, Remote wireless face recognition employing zigbee, Workshop on Distributed Smart Cameras (DSC), Oct 2006.Google Scholar
  46. 46.
    E. Ljung, E. Simmons, A. Danilin, R. Kleihorst, and B. Schueler, 802.15.4 Powered distributed wireless smart camera network, Workshop on Distributed Smart Cameras, Boulder, CO, Oct 2006.Google Scholar
  47. 47.
    K. Mandke, H. Nam, L. Yerramneni, C. Zuniga, and T. Rappaport, The evolution of ultra wide band radio for wireless personal area networks, High Frequency Electron, pp. 22–32, Sept 2003.Google Scholar
  48. 48.
    J. Foerster, E. Green, S. Somayazulu, and D. Leeper, Ultra-wideband technology for short- or medium-range wireless communications, Intel Technology Journal, 2, 1–11, 2001.Google Scholar
  49. 49.
    I. Oppermann, L. Stoica, A. Rabbachin, Z. Shelby, and J. Haapola, UWB wireless sensor networks: UWEN – a practical example, IEEE Communications Magazine, 42(12), 27–32, 2004.Google Scholar
  50. 50.
    I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, A survey on wireless multimedia sensor networks, Computer Networks, 51, 921–960, 2007.Google Scholar
  51. 51.
    D. Djenouri, L. Khelladi, and AN Badache, A survey of security issues in mobile ad hoc and sensor networks, Communications Surveys and Tutorials, 7, 2–28, 2005.Google Scholar
  52. 52.
    Y. Wang, G. Attebury, and B. Ramamurthy, A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications Surveys and Tutorials, 7(4), 2–28, 2005.Google Scholar
  53. 53.
    T. Wu, L. Dai, Y. Xue, and Y. Cui, Digital rights management for video sensor network, Proceedings of the IEEE International Symposium on Multimedia, pp. 131–138, 2006.Google Scholar
  54. 54.
    A. Perrig, J. Stankovic, and D. Wagner, Security in wireless sensor networks, Communications of the ACM, 47, 53–57, 2004.Google Scholar
  55. 55.
    P. Tague and R. Poovendran, Modeling adaptive node capture attacks in multi-hop wireless networks, Ad Hoc Networks, 5, 801–814, 2007.Google Scholar
  56. 56.
    W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22(6), 644–654, 1976.Google Scholar
  57. 57.
    R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21(2), 120–126, 1978.Google Scholar
  58. 58.
    X. Fan, W. Shaw, and I. Lee, Layered clustering for solar powered wireless visual sensor networks, Proceedings of IEEE International Symposium on Multimedia, Dec 2007.Google Scholar
  59. 59.
    P. Biswas and Y. Ye, Semidefinite programming for ad hoc wireless sensor network localization, Proceedings of International Symposium on Information Processing in Sensor Networks, pp. 46–54, 2004.Google Scholar
  60. 60.
    W. R. Pires, T. H. P. Figueiredo, H. C. Wong, and A. A. F. Loureiro, Malicious node detection in wireless sensor networks, International Parallel and Distributed Processing Symposiums, 2004.Google Scholar
  61. 61.
    Y. Zhang, W. Liu, W. Lou, and Y. Fang, Securing sensor networks with location-based keys, IEEE Wireless Communications and Networking Conference, vol. 4, p. 1909–1914, March 2005.Google Scholar
  62. 62.
    C. Karlof, N. Sastry, and D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, Proceedings of the Second International Conference on Embedded Networked Sensor Systems, pp. 162–175, 2004.Google Scholar
  63. 63.
    C. Karlof and D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127, May 2003.Google Scholar
  64. 64.
    Y. Cheng and D. P. Agrawal, An improved key distribution mechanism for large-scale hierarchical wireless sensor networks, Ad Hoc Networks, 5, 35–48, 2007.Google Scholar
  65. 65.
    H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, Proceedings of Symposium on Security and Privacy, pp. 197–213, May 2003.Google Scholar
  66. 66.
    H. Bredin, A. Miguel, I. H. Witten, and G. Chollet, Detecting replay attacks in audiovisual identity verification, Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2006.Google Scholar
  67. 67.
    Y. C. Hu, D. B. Johnson, and A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pp. 3–13, 2002.Google Scholar
  68. 68.
    P. Barreto, H. Y. Kim, and V. Rijmen, Toward secure public-key blockwise fragile authentication watermarking, Proceedings of IEE Vision, Image and Signal Processing, 149(2), 57–62, 2002.Google Scholar
  69. 69.
    C. T. Li and H. Si, Wavelet-based fragile watermarking scheme for image authentication, Journal of Electronic Imaging, 16(1), 2007.Google Scholar
  70. 70.
    B. Yu and B. Xiao, Detecting selective forwarding attacks in wireless sensor networks, Proceedings of the International Workshop on Security in Systems and Networks, 2006.Google Scholar
  71. 71.
    E. C. H. Ngai, J. Liu, and M. R. Lyu, On the intruder detection for sinkhole attack in wireless sensor networks, Proceedings of the IEEE International Conference on Communications, 2006.Google Scholar
  72. 72.
    J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil attack in sensor networks: analysis and defences, Third International Symposium on Information Processing in Sensor Networks, pp. 259–268, 2004.Google Scholar
  73. 73.
    Y. C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless ad hoc networks, Proceedings of Annual Joint Conference of the IEEE Computer and Communications Societies, 2003.Google Scholar
  74. 74.
    K. Ren, K. Zeng, and W. Lou, On efficient key pre-distribution in large scale wireless sensor networks, IEEE Military Communications Conference, vol. 1, pp. 20–26, Oct 2005.Google Scholar
  75. 75.
    D. Chen and P. K. Varshney, QoS support in wireless sensor networks: A survey, Proceedings of International Conference on Wireless Networks, 2004.Google Scholar
  76. 76.
    W. Ye, J. Heidemann, and D. Estrin, Medium access control with coordinated adaptive sleeping for wireless sensor networks, IEEE/ACM Transactions on Networking, 12(3), 493–506, 2004.Google Scholar
  77. 77.
    R. Sivakumar, P. Sinha, and V. Bharghavan, CEDAR: a core-extraction distributed ad hoc routing algorithm, IEEE Journal on Selected Areas in Communications, 17(8), 1454–1465, 1999.Google Scholar
  78. 78.
    C. R. Lin, On-demand QoS routing in multihop mobile networks, Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1735–1744, 2001.Google Scholar
  79. 79.
    C. Zhu, M. S. Corson, F. Technol, and N. J. Bedminster, QoS routing for mobile ad hoc networks, Proceedings of Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 958–967, 2002.Google Scholar
  80. 80.
    K. Akkaya and M. Younis, An energy-aware QoS routing protocol for wireless sensor networks, Proceedings of International Conference on Distributed Computing Systems Workshops, pp. 710–715, May 2003.Google Scholar
  81. 81.
    K. Chow, K. Lui, and E.Y. Lam, Balancing image quality and energy consumption in visual sensor networks, International Symposium on Wireless Pervasive Computing, p. 5, Jan 2006.Google Scholar
  82. 82.
    Z. He and D. Wu, Resource allocation and performance analysis of wireless video sensors, IEEE Transactions on Circuits and Systems for Video Technology, 16, 590–599, 2006.Google Scholar
  83. 83.
    Z. He, and D. Wu, Accumulative visual information in wireless video sensor network: Definition and analysis, IEEE International Conference on Communications, vol. 2, pp. 1205–1208, May 2005.Google Scholar
  84. 84.
    Z. He and C. W. Chen, From rate-distortion analysis to resource-distortion analysis, IEEE Circuits and Systems Magazine, 5(3), 6–18, 2005.Google Scholar
  85. 85.
    S. Soro and W. Heinzelman, Camera selection in visual sensor networks, Proceedings of IEEE International Conference on Advanced Video and Signal based Surveillance, Sep 2007.Google Scholar
  86. 86.
    C. Yu, S. Soro, G. Sharma, and W. Heinzelman, Coverage-distortion in image sensor networks, Proceedings of IEEE International Conference on Image Processing, San Antonio, CA, Sep 2007.Google Scholar
  87. 87.
    D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton, CodeBlue: An ad hoc sensor network infrastructure for emergency medical care, Proceedings of the Workshop on Applications of Mobile Embedded Systems, 2004.Google Scholar
  88. 88.
    R. Holman, J. Stanley, and T. Ozkan-Haller, Applying video sensor networks to nearshore environment monitoring, IEEE Pervasive Computing, 2(4), 14–21, 2003.Google Scholar
  89. 89.
    R. Vedantham, Z. Zhuang, and R. Sivakumar, Addressing hazards in wireless sensor and actor networks, Proceedings of the International Conference on Mobile Computing and Communications, 10, 20–21, 2006.Google Scholar
  90. 90.
    I. F. Akyildiz and I. H. Kasimoglu, Wireless sensor and actor networks: research challenges, Article Ad Hoc Networks, 2(4), 351–367, 2004.Google Scholar
  91. 91.
    E. Gurses and O. B. Akan, Multimedia communication in wireless sensor networks, Annals of Telecommunication, 60, 799–827, 2005.Google Scholar

Copyright information

© Springer-Verlag London Limited 2009

Authors and Affiliations

  1. 1.School of computer and Information ScienceUniversity of South AustraliaMawson LakesAustralia

Personalised recommendations