2013
DOI: 10.1007/s11235-013-9849-0
|View full text |Cite
|
Sign up to set email alerts
|

A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…In Table 6, the secure routing protocols have been compared to the next-generation features in WMSNs. This table shows that most of the protocols (Wang et al [4], [17], and Lin et al [11]) that have been proposed thus far are only for WMSNs. Only a few of the recently proposed protocols (Zhou and Chao [12], MDSAH [13], and Porambage et al [14]) have been developed to maintain and secure the data traffic over a heterogeneous network.…”
Section: Secure Routing Protocolsmentioning
confidence: 98%
“…In Table 6, the secure routing protocols have been compared to the next-generation features in WMSNs. This table shows that most of the protocols (Wang et al [4], [17], and Lin et al [11]) that have been proposed thus far are only for WMSNs. Only a few of the recently proposed protocols (Zhou and Chao [12], MDSAH [13], and Porambage et al [14]) have been developed to maintain and secure the data traffic over a heterogeneous network.…”
Section: Secure Routing Protocolsmentioning
confidence: 98%
“…If a Fog platform or network contains any bugs due to lack of diligence, the crucial video stream might be viewed, altered and even destroyed. It is important that Fog node ensures a secure connection between all communicating devices and protect multi-media content by obfuscation techniques, finegrained access control, generating a new link for video stream, selective encryption and limiting the number of connections [66].…”
Section: Surveillance Video Stream Processingmentioning
confidence: 99%
“…Additionally, these variables add complexity to cryptography, since the costs for video compression and transmission are already high. Thus, an encryption algorithm for video streaming should possess at least two characteristics [56]. First, the encryption time should be low to avoid transmission delays, and second, the compression rate of the video should not decrease.…”
Section: Video Cryptographymentioning
confidence: 99%
“…For predictive video codecs, compression is achieved exploiting information in the video frames: the redundancy within one frame is typically reduced exploiting spatial correlation, while inter-frame coding reduces the redundancy in subsequent frames exploiting both spatial and temporal correlation [56]. As a result, frames with different relevancies for reconstruction are created, and the most relevant ones may be encrypted for security reasons.…”
Section: Video Cryptographymentioning
confidence: 99%