By Topic

Network lifetime and stealth time of wireless video sensor intrusion detection systems under risk-based scheduling

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
CongDuc Pham ; LIUPPA Lab., Univ. of Pau, Pau, France

Intrusion detection surveillance applications with wireless video sensor networks are those applications which require low energy consumption to increase network lifetime while at the time require a high level of quality of service. This paper show by simulation how a dynamic risk management scheme based on Bezier curves that takes into account the application's criticality can provide fast event detection for mission-critical surveillance applications while increasing at the same the network lifetime. We also show that a simple form of reinforcement behavior used conjointly with the risk-based management succeeds in increasing further the network lifetime.

Published in:

Wireless and Pervasive Computing (ISWPC), 2011 6th International Symposium on

Date of Conference:

23-25 Feb. 2011