2008
DOI: 10.1109/tmm.2008.922775
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(32 citation statements)
references
References 27 publications
0
32
0
Order By: Relevance
“…Other studies in the literature, use the same means of solving the problem, as shown by Kandris et al (2011), andCzarlinska &Kundur (2008). In the works referred to, once the sensor nodes detect an event in a certain region, the node(s) that is nearest to the event captures the multimedia content and sends it to the sink.…”
Section: Data Sensing and Delivery Modelmentioning
confidence: 99%
“…Other studies in the literature, use the same means of solving the problem, as shown by Kandris et al (2011), andCzarlinska &Kundur (2008). In the works referred to, once the sensor nodes detect an event in a certain region, the node(s) that is nearest to the event captures the multimedia content and sends it to the sink.…”
Section: Data Sensing and Delivery Modelmentioning
confidence: 99%
“…From the point of view of the cluster head, each sensor reporting its binary decision may be in error due to attack with some unknown probability q [5]. The effect of the active attack is to alter a decision 0 (privacy enabled) to a 1 (privacy disabled), or vice versa and must thus be mitigated.…”
Section: Network Attacks On Vsn Privacymentioning
confidence: 99%
“…This signifies that the scalar decisions d where d = [d1, · · · , dn] should have a weight (number of 1s) that is plausibly close to np (especially for large n where the actual weight approaches np on average). Since the attacker does not know the exact value of p (it depends both on the PDF of the sensed event and the threshold T h ), the optimal choice of q may be determined based on game theoretic analysis [5], the results of which we now summarize. The attacking network must select a value of q that is small and that decreases with increasing cluster size n to be stealthy.…”
Section: Sensor Attack Detection and Reactionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many recent works have been proposed for enhancing event monitoring performance, including multimedia coding [2][3][4], event coverage [5][6][7], and event detection [8][9][10]. For multimedia coding-related works, as it relates to the transmission and exchange of large amounts of data, in addition to computation-intensive features, it also has resource-demanding features.…”
Section: Introductionmentioning
confidence: 99%